default search action
Riaz Ahmed Shaikh 0001
Person information
- affiliation: King Abdulaziz University, Jeddah, Saudi Arabia
- affiliation (former): University of Québec, Canada
Other persons with the same name
- Riaz Ahmed Shaikh 0002 — Shah Abdul Latif University, Khairpur, Pakistan (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Muhammad Haleem Junejo, Ab Al-Hadi Ab Rahman, Riaz Ahmed Shaikh, Kamaludin Mohamad Yusof, Shahidatul Sadiah:
Trust Model for Reliable Grouping-Based Communications in Vehicular Ad-Hoc Networks. IEEE Access 11: 124584-124596 (2023) - 2022
- [p1]Mohammad Kamrul Hasan, Musse Mohamud Ahmed, Shayla Islam, Imran Memon, Riaz Ahmed Shaikh, Hidayatullah Shaikh:
Window Functions for Phasor Signal Processing of Wide-Area Measurement in Smart Grid Internet of Things Communications. IoT and WSN based Smart Cities 2022: 49-66 - 2021
- [j15]Shah Zaman Nizamani, Syed Raheel Hassan, Riaz Ahmed Shaikh, Ehab Atif Abozinadah, Rashid Mehmood:
A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability. IEEE Access 9: 51294-51312 (2021) - 2020
- [j14]Muhammad Aminu Lawal, Riaz Ahmed Shaikh, Syed Raheel Hassan:
Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks. IEEE Access 8: 43355-43374 (2020) - [j13]Ibrahim Abdo Rai, Riaz Ahmed Shaikh, Syed Raheel Hassan:
A hybrid dual-mode trust management scheme for vehicular networks. Int. J. Distributed Sens. Networks 16(7): 155014772093937 (2020) - [j12]Imran Memon, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan, Rosilah Hassan, Amin Ul Haq, Khairul Akram Zainol:
Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology. Secur. Commun. Networks 2020: 8897098:1-8897098:12 (2020) - [j11]Muhammad Haleem Junejo, Ab Al-Hadi Ab Rahman, Riaz Ahmed Shaikh, Kamaludin Mohamad Yusof, Imran Memon, Hadiqua Fazal, Dileep Kumar:
A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks. Sci. Program. 2020: 8831611:1-8831611:21 (2020)
2010 – 2019
- 2017
- [j10]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. Int. J. Inf. Sec. 16(1): 91-113 (2017) - [j9]Thaha Muhammed, Riaz Ahmed Shaikh:
An analysis of fault detection strategies in wireless sensor networks. J. Netw. Comput. Appl. 78: 267-287 (2017) - 2015
- [j8]Riaz Ahmed Shaikh, Sungyoung Lee, Aiiad Albeshri:
Security Completeness Problem in Wireless Sensor Networks. Intell. Autom. Soft Comput. 21(2): 235-250 (2015) - [j7]Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr., Riaz Ahmed Shaikh:
Critical applications in vehicular ad hoc/sensor networks. Telecommun. Syst. 58(4): 275-277 (2015) - 2014
- [j6]Riaz Ahmed Shaikh, Ahmed Saeed Alzahrani:
Intrusion-aware trust model for vehicular ad hoc networks. Secur. Commun. Networks 7(11): 1652-1669 (2014) - 2013
- [c18]Riaz Ahmed Shaikh, Ahmed Saeed Alzahrani:
Trust Management Method for Vehicular Ad Hoc Networks. QSHINE 2013: 801-815 - 2012
- [j5]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4): 447-464 (2012) - 2011
- [c17]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. PST 2011: 189-192 - 2010
- [j4]Riaz Ahmed Shaikh, Young-Koo Lee, Sungyoung Lee:
An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks. J. Networks 5(3): 283-291 (2010) - [j3]Riaz Ahmed Shaikh, Hassan Jameel Asghar, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Achieving Network Level Privacy in Wireless Sensor Networks. Sensors 10(3): 1447-1472 (2010) - [c16]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. IAS 2010: 204-209 - [c15]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. ICDIM 2010: 417-422
2000 – 2009
- 2009
- [j2]Riaz Ahmed Shaikh, Hassan Jameel Asghar, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. Sensors 9(8): 5989-6007 (2009) - [j1]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 20(11): 1698-1712 (2009) - [c14]Le Xuan Hung, Riaz Ahmed Shaikh, Hassan Jameel, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Activity-Oriented Access Control for Ubiquitous Environments. CCNC 2009: 1-5 - [c13]Riaz Ahmed Shaikh, Young-Koo Lee, Sungyoung Lee:
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. ICUIMC 2009: 602-606 - [i1]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, Young Jae Song:
Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. CoRR abs/0912.5334 (2009) - 2008
- [c12]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee:
Network Level Privacy for Wireless Sensor Networks. IAS 2008: 261-266 - [c11]Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young Jae Song, Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. ICYCS 2008: 2038-2043 - [c10]Le Xuan Hung, Hassan Jameel, Riaz Ahmed Shaikh, Syed Muhammad Khaliq-ur-Rahman Raazi, Weiwei Yuan, Ngo Trong Canh, Phan Tran Ho Truc, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes, Miso Kim, Yonil Zhung:
Activity-based Security Scheme for Ubiquitous Environments. IPCCC 2008: 475-481 - [c9]Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Weiwei Yuan, Syed Muhammad Khaliq-ur-Rahman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices. WISA 2008: 211-224 - 2007
- [c8]Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates. CT-RSA 2007: 67-84 - [c7]Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments. ICPS 2007: 149-152 - [c6]Brian J. d'Auriol, Jie Yang, Xiaoling Wu, Hui Xu, Yu Niu, Jin Wang, Riaz Ahmed Shaikh, Min Meng, Sungyoung Lee, Young-Koo Lee:
A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks. ICWN 2007: 468-473 - 2006
- [c5]Riaz Ahmed Shaikh, Sungyoung Lee, Mohammad A. U. Khan, Young Jae Song:
LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. PWC 2006: 367-377 - [c4]Xiaoling Wu, Hoon Heo, Riaz Ahmed Shaikh, Jinsung Cho, Oksam Chae, Sungyoung Lee:
Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks. ISORC 2006: 179-185 - [c3]Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Saeed Rajput, Young Jae Song:
Trust Management Problem in Distributed Wireless Sensor Networks. RTCSA 2006: 411-414 - [c2]Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, Yonil Zhung:
Securing Distributed Wireless Sensor Networks: Issues and Guidelines. SUTC (2) 2006: 226-231 - 2005
- [c1]Riaz Ahmed Shaikh, Saeed Rajput, S. M. H. Zaidi, Kashif Shairf:
Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection. Security and Management 2005: 144-148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 01:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint