default search action
Syed Naqvi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Ijeoma Ebere-Uneze, Syed Naqvi:
Using Artificial Intelligence in Cyber Security Risk Management for Telecom Industry 4.0. ARES 2024: 148:1-148:7
2010 – 2019
- 2019
- [j2]Jacob Chakareski, Syed Naqvi, Nicholas Mastronarde, Jie Xu, Fatemeh Afghah, Abolfazl Razi:
An Energy Efficient Framework for UAV-Assisted Millimeter Wave 5G Heterogeneous Cellular Networks. IEEE Trans. Green Commun. Netw. 3(1): 37-44 (2019) - [c29]Thomas Nagunwa, Syed Naqvi, Shereen Fouad, Hanifa Shah:
A Framework of New Hybrid Features for Intelligent Detection of Zero Hour Phishing Websites. CISIS-ICEUTE 2019: 36-46 - [c28]Syed Naqvi, Peter Sommer, Mark B. Josephs:
A Research-Led Practice-Driven Digital Forensic Curriculum to Train Next Generation of Cyber Firefighters. EDUCON 2019: 1204-1211 - [c27]Syed Naqvi, Ian Williams, Sean Enderby, Péter Pollner, Daniel Abel, Berta Biescas, Oscar Garcia, Monica Florea, Cristi Potlog:
Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert Approach. EuroS&P Workshops 2019: 257-263 - [c26]Yussuf Ahmed, Syed Naqvi, Mark B. Josephs:
Cybersecurity Metrics for Enhanced Protection of Healthcare IT Systems. ISMICT 2019: 1-9 - [c25]Syed Naqvi, Sean Enderby, Ian Williams, Waqar Asif, Muttukrishnan Rajarajan, Cristi Potlog, Monica Florea:
Privacy-Preserving Social Media Forensic Analysis for Preventive Policing of Online Activities. NTMS 2019: 1-6 - 2018
- [c24]Syed Naqvi:
Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals. ARES 2018: 63:1-63:5 - [c23]Yussuf Ahmed, Syed Naqvi, Mark B. Josephs:
Aggregation of security metrics for decision making: a reference architecture. ECSA (Companion) 2018: 53:1-53:7 - [c22]Syed Naqvi, Jacob Chakareski, Nicholas Mastronarde, Jie Xu, Fatemeh Afghah, Abolfazl Razi:
Energy Efficiency Analysis of UAV-Assisted mmWave HetNets. ICC 2018: 1-6 - 2016
- [b1]Syed Naqvi:
Learning Feature Selection and Combination Strategies for Generic Salient Object Detection. Victoria University of Wellington, New Zealand, 2016 - 2012
- [c21]Syed Naqvi, Arnaud Michot, Michael Van de Borne:
Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security. TrustCom 2012: 1137-1142 - 2011
- [c20]Philippe Massonet, Syed Naqvi, Christophe Ponsard, Joseph Latanicki, Benny Rochwerger, Massimo Villari:
A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures. IPDPS Workshops 2011: 1510-1517 - 2010
- [c19]Syed Naqvi, Gautier Dallons, Christophe Ponsard:
Protecting corporate ICT infrastructures by using digital forensics. CISIM 2010: 255-258 - [c18]Joseph Latanicki, Philippe Massonet, Syed Naqvi, Benny Rochwerger, Massimo Villari:
Scalable Cloud Defenses for Detection, Analysis and Mitigation of DDoS Attacks. Future Internet Assembly 2010: 127-137 - [c17]Syed Naqvi, Gautier Dallons, Christophe Ponsard:
Applying Digital Forensics in the Future Internet Enterprise Systems - European SME's Perspective. SADFE 2010: 89-93 - [i1]Syed Naqvi, Philippe Massonet:
RESERVOIR - A European Cloud Computing Project. ERCIM News 2010(83): 35 (2010)
2000 – 2009
- 2009
- [c16]Philippe Massonet, Syed Naqvi, Francesco Tusa, Massimo Villari, Joseph Latanicki:
Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures. CloudComp 2009: 73-82 - [c15]Syed Naqvi, Paolo Mori:
Security and Trust Management for Virtual Organisations: GridTrust Approach. IFIPTM 2009: 306-309 - [c14]Michal Dyrda, Maciej Malawski, Marian Bubak, Syed Naqvi:
Providing security for MOCCA component environment. IPDPS 2009: 1-7 - [c13]Syed Naqvi, Gautier Dallons, Arnaud Michot, Christophe Ponsard:
Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon Region's eHealth Platform. PrimeLife 2009: 146-159 - 2008
- [j1]Syed Naqvi:
VIPSEC: Virtualized and Pluggable Security Services Architecture for Grids. Int. J. Inf. Secur. Priv. 2(1): 54-79 (2008) - [c12]Syed Naqvi, Philippe Massonet, Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Paolo Mori, Lorenzo Blasi, Giovanni Cortese:
Fine-Grained Continuous Usage Control of Service Based Grids - The GridTrust Approach. ServiceWave 2008: 242-253 - 2007
- [c11]Amit D. Lakhani, Erica Y. Yang, Brian Matthews, Ian J. Johnson, Syed Naqvi, Gheorghe Cosmin Silaghi:
Threat Analysis and Attacks on XtreemOS: a Grid-enabled Operating System. CoreGRID 2007: 53-62 - 2006
- [c10]Syed Naqvi, Alvaro E. Arenas, Philippe Massonet:
Deriving Policies from Grid Security Requirements Model. CoreGRID Integration Workshop 2006: 151-163 - [c9]Syed Naqvi, Philippe Massonet, Alvaro Arenas:
Security Requirements Model for Grid Data Management Systems. CRITIS 2006: 30-41 - [c8]Syed Naqvi, Olivier Poitou, Philippe Massonet, Alvaro Arenas:
Security Requirements Analysis for Large-Scale Distributed File Systems. Euro-Par Workshops 2006: 49-60 - [c7]Syed Naqvi, Philippe Massonet, Alvaro Arenas:
Scope of Forensics in Grid Computing - Vision and Perspectives. ISPA Workshops 2006: 964-970 - 2005
- [c6]Syed Naqvi, Michel Riguidel:
Dynamic Access Control for Pervasive Grid Applications. CIS (2) 2005: 348-355 - [c5]Syed Naqvi, Michel Riguidel:
Grid Security Services Simulator (G3S) - A Simulation Tool for the Design and Analysis of Grid Security Solutions. e-Science 2005: 421-428 - [c4]Syed Naqvi, Michel Riguidel:
Threat Model for Grid Security Services. EGC 2005: 1048-1055 - [c3]Syed Naqvi, Michel Riguidel:
Securing Grid-Based Critical Infrastructures. ISI 2005: 654-655 - [c2]Syed Naqvi, Michel Riguidel:
Security and trust assurances for smart environments. MASS 2005 - 2004
- [c1]Syed Naqvi, Michel Riguidel:
VIPSEC: Virtualized and Pluggable Security Services Infrastructure for Adaptive Grid Computing. NCA 2004: 362-365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint