Securing the internet of things (IoT): A security taxonomy for IoT S Rizvi, A Kurtz, J Pfeffer, M Rizvi 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 190 | 2018 |
A survey of security and privacy challenges in cloud computing: solutions and future directions Y Liu, YL Sun, J Ryoo, AV Vasilakos Korean Institute of Information Scientists and Engineers (KIISE), 2015 | 121 | 2015 |
Cloud security auditing: challenges and emerging approaches J Ryoo, S Rizvi, W Aiken, J Kissell IEEE Security & Privacy 12 (6), 68-74, 2013 | 95 | 2013 |
Identifying the attack surface for IoT network S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi Internet of Things 9, 100162, 2020 | 92 | 2020 |
Threat model for securing internet of things (IoT) network at device-level S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams Internet of Things 11, 100240, 2020 | 72 | 2020 |
A review of the sealworm problem: biology, implications and solutions H Hafsteinsson, SSH Rizvi Journal of Food Protection 50 (1), 70-84, 1987 | 62 | 1987 |
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers S Rizvi, J Mitchell, A Razaque, MR Rizvi, I Williams Journal of cloud computing 9, 1-17, 2020 | 55 | 2020 |
Privacy preserving model: a new scheme for auditing cloud stakeholders A Razaque, SS Rizvi Journal of Cloud Computing 6, 1-17, 2017 | 49 | 2017 |
A threat to vehicular cyber security and the urgency for correction S Rizvi, J Willet, D Perino, S Marasco, C Condo Procedia computer science 114, 100-105, 2017 | 47 | 2017 |
A centralized trust model approach for cloud computing S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta 2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014 | 47 | 2014 |
State-of-art review of information diffusion models and their impact on social network vulnerabilities A Razaque, S Rizvi, M Almiani, A Al Rahayfeh Journal of King Saud University-Computer and Information Sciences 34 (1 …, 2022 | 46 | 2022 |
Proposing enhanced feature engineering and a selection model for machine learning processes MF Uddin, J Lee, S Rizvi, S Hamada Applied Sciences 8 (4), 646, 2018 | 45 | 2018 |
Secure data aggregation using access control and authentication for wireless sensor networks A Razaque, SS Rizvi computers & security 70, 532-545, 2017 | 43 | 2017 |
A security evaluation framework for cloud security auditing S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu The Journal of Supercomputing 74, 5774-5796, 2018 | 40 | 2018 |
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment A Razaque, SS Rizvi Computers & Security 62, 328-347, 2016 | 39 | 2016 |
Application of ultrasonic waves to detect sealworms in fish tissue H HAFSTEINSSON, K PARKER, R CHIVERS, SSH RIZVI Journal of Food Science 54 (2), 244-247, 1989 | 36 | 1989 |
Secure online transaction algorithm: securing online transaction using two-factor authentication J Gualdoni, A Kurtz, I Myzyri, M Wheeler, S Rizvi Procedia computer science 114, 93-99, 2017 | 32 | 2017 |
IEEE 802.11 & Bluetooth interference: simulation and coexistence A Mathew, N Chandrababu, K Elleithy, S Rizvi 2009 Seventh Annual Communication Networks and Services Research Conference …, 2009 | 31 | 2009 |
Utilizing third party auditing to manage trust in the cloud S Rizvi, K Karpinski, B Kelly, T Walker Procedia Computer Science 61, 191-197, 2015 | 28 | 2015 |
Third-party auditor (TPA): a potential solution for securing a cloud environment S Rizvi, A Razaque, K Cover 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 26 | 2015 |