Siraj Ahmed Shaikh
Orcid: 0000-0002-0726-3319
According to our database1,
Siraj Ahmed Shaikh
authored at least 78 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Simul. Model. Pract. Theory, 2024
Cyber-physical and business perspectives using Federated Digital Twins in multinational and multimodal transportation systems.
CoRR, 2024
CoRR, 2024
TOMSAC - Methodology for trade-off management between automotive safety and cyber security.
Comput. Secur., 2024
2023
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons.
Trans. Emerg. Telecommun. Technol., November, 2023
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception.
J. Cybersecur., January, 2023
Sensors, 2023
J. Log. Algebraic Methods Program., 2023
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis.
Inf., 2023
2022
Texts in Theoretical Computer Science. An EATCS Series, Springer, ISBN: 978-3-030-38799-0, 2022
Systematic threat assessment and security testing of automotive over-the-air (OTA) updates.
Veh. Commun., 2022
J. Cybersecur., 2022
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022
2021
Comput. Electr. Eng., 2021
A Real-Time In-Vehicle Network Testbed for Machine Learning-Based IDS Training and Validation.
Proceedings of the Workshop on AI and Cybersecurity (AI-Cybersec 2021) co-located with 41st SGAI International Conference on Artificial Intelligence (SGAI 2021), 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
2020
Proceedings of the 13th IEEE International Conference on Software Testing, 2020
2019
Proceedings of the Information Security Theory and Practice, 2019
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Developing a QRNG ECU for Automotive Security: Experience of Testing in the Real-World.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019
2018
Building an automotive security assurance case using systematic security evaluations.
Comput. Secur., 2018
Proceedings of the Critical Infrastructure Protection XII, 2018
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
Veh. Commun., 2017
CoRR, 2017
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications.
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper.
Proceedings of the 19th Workshop on Formal Techniques for Java-like Programs, 2017
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
2016
Effective network security monitoring: from attribution to target-centric monitoring.
Telecommun. Syst., 2016
Proceedings of the Information Security Theory and Practice, 2016
Utilising $${\mathbb {K}}$$ Semantics for Collusion Detection in Android Applications.
Proceedings of the Critical Systems: Formal Methods and Automated Verification, 2016
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016
2015
J. Knowl. Manag., 2015
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.
Comput. Electr. Eng., 2015
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015
Proceedings of the Critical Infrastructure Protection IX, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Selected contributions from the Open Source Software Certification (OpenCert) workshops.
Sci. Comput. Program., 2014
2013
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise.
Inf. Syst. Frontiers, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Operating heavy duty vehicles under extreme heat conditions: A fuzzy approach for smart gear-shifting strategy.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Engineering Psychology and Cognitive Ergonomics. Applications and Services, 2013
2012
Int. J. Appl. Logist., 2012
Proceedings of the Proceedings First International Workshop on Formal Techniques for Safety-Critical Systems, 2012
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012
Proceedings of the Information Technology and Open Source: Applications for Education, Innovation, and Sustainability, 2012
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning.
Proceedings of the 4th International Conference on Cyber Conflict, 2012
2011
Analysis of Collaboration Effectiveness and Individuals' Contribution in FLOSS Communities.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2011
Proceedings of the Software Engineering and Formal Methods - 9th International Conference, 2011
Who's your best friend?: targeted privacy attacks In location-sharing social networks.
Proceedings of the UbiComp 2011: Ubiquitous Computing, 13th International Conference, 2011
2010
Characteristic trade-offs in designing large-scale biometric-based identity management systems.
J. Netw. Comput. Appl., 2010
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2010
Certification of open-source software: A role for formal methods?
Comput. Syst. Sci. Eng., 2010
ICT Driven Knowledge Management in Developing Countries: A Case Study in a Chinese Organisation.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010
2009
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009
2007
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions.
Int. J. Netw. Secur., 2007
2006
J. Res. Pract. Inf. Technol., 2006
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
2004
Analysis and implementation of virtual private network support in corporate networks.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004
2002
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
Proceedings of the 2002 International Symposium on Information Technology (ITCC 2002), 2002
2001
Virtual Private Network Support in a Corporate Network.
Proceedings of WebNet 2001, 2001