Syed Rizvi

Orcid: 0000-0003-0168-3774

Affiliations:
  • Pennsylvania State University, Department of Information Sciences and Technology, Altoona, PA, USA


According to our database1, Syed Rizvi authored at least 46 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analyzing transparency and malicious insiders prevention for cloud computing environment.
Comput. Secur., February, 2024

2023
A modular framework for auditing IoT devices and networks.
Comput. Secur., September, 2023

Data Protection and Data Recovery Plan for IoT Transportation Domain.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

2022
State-of-art review of information diffusion models and their impact on social network vulnerabilities.
J. King Saud Univ. Comput. Inf. Sci., 2022

TUI Model for data privacy assessment in IoT networks.
Internet Things, 2022

2020
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers.
J. Cloud Comput., 2020

Threat model for securing internet of things (IoT) network at device-level.
Internet Things, 2020

Identifying the attack surface for IoT network.
Internet Things, 2020

Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider.
IEEE Access, 2020

Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts.
Proceedings of the International Conference on Software Security and Assurance, 2020

Why Compliance is needed for Internet of Things?
Proceedings of the International Conference on Software Security and Assurance, 2020

VM based Malware Security Protection on Android Platform.
Proceedings of the International Conference on Software Security and Assurance, 2020

An Internet of Things (IoT) Security Assessment for Households.
Proceedings of the International Conference on Software Security and Assurance, 2020

2019
Computing Security Scores for IoT Device Vulnerabilities.
Proceedings of the International Conference on Software Security and Assurance, 2019

Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection.
Proceedings of the International Conference on Software Security and Assurance, 2019

A Hybrid Framework for Detecting Repackaged Applications on the Android Market.
Proceedings of the International Conference on Software Security and Assurance, 2019

Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

2018
A security evaluation framework for cloud security auditing.
J. Supercomput., 2018

Token security for internet of things.
Int. J. Embed. Syst., 2018

Proposing Logical Table Constructs for Enhanced Machine Learning Process.
IEEE Access, 2018

Securing the Internet of Things (IoT): A Security Taxonomy for IoT.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Attack Vector for IoT Networks.
Proceedings of the International Conference on Software Security and Assurance, 2018

2017
Privacy preserving model: a new scheme for auditing cloud stakeholders.
J. Cloud Comput., 2017

Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process.
Comput. Secur., 2017

Secure data aggregation using access control and authentication for wireless sensor networks.
Comput. Secur., 2017

Protecting an automobile network using distributed firewall system.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Security evaluation of cloud service providers using third party auditors.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Multi-Layer Defense Model for Securing Online Financial Transactions.
Proceedings of the International Conference on Software Security and Assurance, 2017

Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage.
Proceedings of the International Conference on Software Security and Assurance, 2017

2016
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment.
Comput. Secur., 2016

2015
Novel Architecture of Self-organized Mobile Wireless Sensor Networks.
J. Comput. Sci. Eng., 2015

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015

A user oriented cloud security evaluation framework.
Int. J. Trust. Manag. Comput. Commun., 2015

A stakeholder-oriented assessment index for cloud security auditing.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider.
Proceedings of the 1st International Conference on Software Security and Assurance, 2015

Cloud Data Integrity Using a Designated Public Verifier.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking.
Proceedings of the Complex Adaptive Systems 2015 Conference, San Jose, 2015

Utilizing Third Party Auditing to Manage Trust in the Cloud.
Proceedings of the Complex Adaptive Systems 2015 Conference, San Jose, 2015

A Semi-distributed Access Control Management Scheme for Securing Cloud Environment.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Cloud Security Auditing: Challenges and Emerging Approaches.
IEEE Secur. Priv., 2014

A centralized trust model approach for cloud computing.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

A generic layered modeling for cognitive radio networks.
Proceedings of the 2014 SpringSim Poster Session, Tampa, FL, USA, April 13 - 16, 2014, 2014

A Trusted Third-party (TTP) based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment.
Proceedings of the Complex Adaptive Systems 2014 Conference, 2014

2012
Algorithm for Improving the Computing Power of Next Generation Wireless Receivers.
J. Comput. Sci. Eng., 2012


  Loading...