Riaz Ahmed Shaikh
Orcid: 0000-0001-6666-0253Affiliations:
- King Abdulaziz University, Jeddah, Saudi Arabia
- University of Québec, Canada (former)
According to our database1,
Riaz Ahmed Shaikh
authored at least 36 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2023
IEEE Access, 2023
2022
Window Functions for Phasor Signal Processing of Wide-Area Measurement in Smart Grid Internet of Things Communications.
Proceedings of the IoT and WSN based Smart Cities: A Machine Learning Perspective, 2022
2021
A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability.
IEEE Access, 2021
2020
A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks.
Sci. Program., 2020
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology.
Secur. Commun. Networks, 2020
Int. J. Distributed Sens. Networks, 2020
IEEE Access, 2020
2017
J. Netw. Comput. Appl., 2017
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets.
Int. J. Inf. Sec., 2017
2015
Intell. Autom. Soft Comput., 2015
2014
Secur. Commun. Networks, 2014
2013
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
2012
2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
2010
An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks.
J. Networks, 2010
Detecting incompleteness in access control policies using data classification schemes.
Proceedings of the Fifth IEEE International Conference on Digital Information Management, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
IEEE Trans. Parallel Distributed Syst., 2009
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Sensors, 2009
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks
CoRR, 2009
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the 2008 IEEE International Performance, 2008
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks.
Proceedings of the 2007 International Conference on Wireless Networks, 2007
A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007
Proceedings of the Topics in Cryptology, 2007
2006
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the 12th IEEE Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2006), 2006
Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks.
Proceedings of the Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 2006
Proceedings of the Personal Wireless Communications, 2006
2005
Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection.
Proceedings of The 2005 International Conference on Security and Management, 2005