‘Using Cisco network components to improve NIDPS performance W Bul’ajoul, A James, S Shaikh, M Pannu Comput. Sci. Inf. Technol, 137-157, 2016 | 2 | 2016 |
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)| 978-1-6654-3950-3/21/$31.00© 2021 IEEE| DOI: 10.1109/DSN-W52860. 2021 … F Ahmad, Y Amir, E Asselin, V Bandur, TA Beyene, G Boisvert, T Braun, ... | | |
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions. CK Dimitriadis, SA Shaikh Int. J. Netw. Secur. 5 (1), 99-111, 2007 | 12 | 2007 |
A certification process for android applications HK Kalutarage, P Krishnan, SA Shaikh Information Technology and Open Source: Applications for Education …, 2014 | 4 | 2014 |
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons SJ Taylor, F Ahmad, HN Nguyen, SA Shaikh, J Bryans, CE Wartnaby Transactions on Emerging Telecommunications Technologies 34 (11), e4841, 2023 | 2 | 2023 |
A deployment value model for intrusion detection sensors SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen Advances in Information Security and Assurance: Third International …, 2009 | 12 | 2009 |
A formal approach to analysing knowledge transfer processes in developing countries J Tong, SA Shaikh, AE James Software Engineering and Formal Methods: 9th International Conference, SEFM …, 2011 | 3 | 2011 |
A formal approach to human error recovery SA Shaikh, P Krishnan, A Cerone The Pre-proceedings of the 2nd International Workshop on Formal Methods for …, 2007 | 4 | 2007 |
A formal approach to modelling knowledge transfer processes J Tong, S Shaikh, A James Coventry University, 2012 | 1 | 2012 |
A formal framework for security testing of automotive over-the-air update systems R Kirk, HN Nguyen, J Bryans, SA Shaikh, C Wartnaby Journal of Logical and Algebraic Methods in Programming 130, 100812, 2023 | 4 | 2023 |
A framework for analysing driver interactions with semi-autonomous vehicles S Shaikh, P Krishnan arXiv preprint arXiv:1301.0043, 2013 | 23 | 2013 |
A hardware-based soc monitoring in-life solution for automotive industry H Jadidbonab, HN Nguyen, SA Shaikh, M Hlond, P Robertson, G Panesar 2022 IEEE International Conference on Pervasive Computing and Communications …, 2022 | 3 | 2022 |
A heuristic for constructing rank functions to verify authentication protocols SA Shaikh, VJ Bush, SA Schneider Preproceedings of the 3rd International Verification Workshop at IJCAR 2006 …, 2006 | 2 | 2006 |
A method for constructing automotive cybersecurity tests, a CAN fuzz testing example DS Fowler, J Bryans, M Cheah, P Wooderson, SA Shaikh 2019 IEEE 19th international conference on software quality, reliability and …, 2019 | 42 | 2019 |
A model for characterizing cyberpower A Venables, SA Shaikh, J Shuttleworth Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015 | 1 | 2015 |
A model-based security testing approach for automotive over-the-air updates S Mahmood, A Fouillade, HN Nguyen, SA Shaikh 2020 IEEE International Conference on Software Testing, Verification and …, 2020 | 16 | 2020 |
A multi-objective optimisation approach to IDS sensor placement H Chen, JA Clark, JE Tapiador, SA Shaikh, H Chivers, P Nobles Computational Intelligence in Security for Information Systems: CISIS’09 …, 2009 | 20 | 2009 |
A new architecture for network intrusion detection and prevention W Bul’ajoul, A James, S Shaikh IEEE access 7, 18558-18573, 2019 | 29 | 2019 |
A Performance Study of IPSec Protocol SA Shaikh, SA Al-Khayatt International Conference on Information and Computer Science (ICICS’04), 2004 | 1 | 2004 |
A realtime in-vehicle network testbed for machine learning-based ids training and validation H Jadidbonab, A Tomlinson, HN Nguyen, T Doan, S Shaikh Workshop on AI and Cybersecurity: co-located with 41st SGAI International …, 2022 | 6 | 2022 |