TARA+: Controllability-aware Threat Analysis and Risk Assessment for L3 Automated Driving Systems A Bolovinou, UI Atmaca, AT Sheik, O Ur-Rehman, G Wallraf, A Amditis 2019 IEEE Intelligent Vehicles Symposium (IV), 8-13, 2019 | 17 | 2019 |
Challenges in Threat Modelling of New Space Systems: A Teleoperation Use-Case AT Sheik, UI Atmaca, C Maple, G Epiphaniou Advances in Space Research, 2022 | 10 | 2022 |
Human factors for vehicle platooning: A review UI Atmaca, C Maple, G Epiphaniou, AT Sheik Competitive Advantage in the Digital Economy (CADE 2021) 2021, 33-38, 2021 | 6 | 2021 |
Edge Computing to Support Message Prioritisation in Connected Vehicular Systems AT Sheik, C Maple 2019 IEEE Global Conference on Internet of Things (GCIoT), 1-7, 2019 | 6 | 2019 |
Key security challenges for cloud-assisted connected and autonomous vehicles AT Sheik, C Maple Living in the Internet of Things (IoT 2019), 1-9, 2019 | 6 | 2019 |
A Comparative Study of Cyber Threats on Evolving Digital Identity Systems AT Sheik, C Maple, G Epiphaniou, UI Atmaca | 5 | 2021 |
Analysis of cyber risk and associated concentration of research (ACR) 2 in the security of vehicular edge clouds Y Lu, C Maple, AT Sheik, H Alhagagi, T Watson, M Dianati, A Mouzakitis IET Digital Library, 2018 | 5 | 2018 |
Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment AT Sheik, C Maple, G Epiphaniou, M Dianati Sensors 24 (1), 241, 2023 | 3 | 2023 |
The impact of message encryption on teleoperation for space applications C Maple, G Epiphaniou, W Hathal, UI Atmaca, AT Sheik, H Cruickshank, ... 2022 IEEE Aerospace Conference (AERO), 1-10, 2022 | 3 | 2022 |
A threat based approach to computational offloading for collaborative cruise control AT Sheik, C Maple, T Watson, H Alhagagi, NS Safa, S Woo-Lee Proceedings of the Second International Conference on Internet of things …, 2017 | 3 | 2017 |
A Comprehensive Survey of Threats in Platooning—A Cloud-Assisted Connected and Autonomous Vehicle Application AT Sheik, C Maple, G Epiphaniou, M Dianati Information 15 (1), 14, 2023 | 2 | 2023 |
Considerations for secure MOSIP deployment AT Sheik, C Maple, G Epiphaniou Competitive Advantage in the Digital Economy (CADE 2022) 2022, 135-143, 2022 | 2 | 2022 |
Customers' perception of cybersecurity risks in E-commerce websites J Hariharan, AT Sheik, C Maple, N Beech, UI Atmaca International Conference on AI and the Digital Economy (CADE 2023) 2023, 53-60, 2023 | 1 | 2023 |
Onboarding citizens to digital identity systems T Spiliotopoulos, AT Sheik, D Gottardello, R Dover International Conference on AI and the Digital Economy (CADE 2023) 2023, 77-81, 2023 | 1 | 2023 |
Security-minded verification of cooperative awareness messages M Farrell, M Bradbury, RC Cardoso, M Fisher, LA Dennis, C Dixon, ... IEEE Transactions on Dependable and Secure Computing, 2023 | | 2023 |
Enhancing the relationship between digital technology/AI and frontline NHS healthcare staff S Sholapurkar, AT Sheik IET Digital Library, 2023 | | 2023 |
Behavioural analysis of COVID-19 vaccine hesitancy survey: A machine learning approach VK Marimuthu, S Jayaraman, AT Sheik, C Maple IET Digital Library, 2023 | | 2023 |
TARA+: Controllability-aware Threat Analysis and Risk Assessment for L3 Automated Driving Systems A Amditis | | |
On Decision-making for Computation Offloading in Cloud-assisted Autonomous Vehicle Systems Y Lu, C Maple, T Sheik, M Dianati, A Mouzakitis Poster Papers, 16, 0 | | |