Syed Rizvi
Orcid: 0000-0003-0168-3774Affiliations:
- Pennsylvania State University, Department of Information Sciences and Technology, Altoona, PA, USA
According to our database1,
Syed Rizvi
authored at least 46 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Analyzing transparency and malicious insiders prevention for cloud computing environment.
Comput. Secur., February, 2024
2023
Comput. Secur., September, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
2022
State-of-art review of information diffusion models and their impact on social network vulnerabilities.
J. King Saud Univ. Comput. Inf. Sci., 2022
2020
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers.
J. Cloud Comput., 2020
Internet Things, 2020
IEEE Access, 2020
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts.
Proceedings of the International Conference on Software Security and Assurance, 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
Proceedings of the International Conference on Software Security and Assurance, 2020
2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection.
Proceedings of the International Conference on Software Security and Assurance, 2019
Proceedings of the International Conference on Software Security and Assurance, 2019
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019
2018
IEEE Access, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
2017
J. Cloud Comput., 2017
Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process.
Comput. Secur., 2017
Secure data aggregation using access control and authentication for wireless sensor networks.
Comput. Secur., 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage.
Proceedings of the International Conference on Software Security and Assurance, 2017
2016
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment.
Comput. Secur., 2016
2015
J. Comput. Sci. Eng., 2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015
Int. J. Trust. Manag. Comput. Commun., 2015
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
Proceedings of the 1st International Conference on Software Security and Assurance, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking.
Proceedings of the Complex Adaptive Systems 2015 Conference, San Jose, 2015
Proceedings of the Complex Adaptive Systems 2015 Conference, San Jose, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014
Proceedings of the 2014 SpringSim Poster Session, Tampa, FL, USA, April 13 - 16, 2014, 2014
A Trusted Third-party (TTP) based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment.
Proceedings of the Complex Adaptive Systems 2014 Conference, 2014
2012
J. Comput. Sci. Eng., 2012