关注
Siraj Ahmed Shaikh
Siraj Ahmed Shaikh
在 swansea.ac.uk 的电子邮件经过验证
标题
引用次数
年份
‘Using Cisco network components to improve NIDPS performance
W Bul’ajoul, A James, S Shaikh, M Pannu
Comput. Sci. Inf. Technol, 137-157, 2016
22016
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)| 978-1-6654-3950-3/21/$31.00© 2021 IEEE| DOI: 10.1109/DSN-W52860. 2021 …
F Ahmad, Y Amir, E Asselin, V Bandur, TA Beyene, G Boisvert, T Braun, ...
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions.
CK Dimitriadis, SA Shaikh
Int. J. Netw. Secur. 5 (1), 99-111, 2007
122007
A certification process for android applications
HK Kalutarage, P Krishnan, SA Shaikh
Information Technology and Open Source: Applications for Education …, 2014
42014
A comparative analysis of multi‐criteria decision methods for secure beacon selection in vehicular platoons
SJ Taylor, F Ahmad, HN Nguyen, SA Shaikh, J Bryans, CE Wartnaby
Transactions on Emerging Telecommunications Technologies 34 (11), e4841, 2023
22023
A deployment value model for intrusion detection sensors
SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen
Advances in Information Security and Assurance: Third International …, 2009
122009
A formal approach to analysing knowledge transfer processes in developing countries
J Tong, SA Shaikh, AE James
Software Engineering and Formal Methods: 9th International Conference, SEFM …, 2011
32011
A formal approach to human error recovery
SA Shaikh, P Krishnan, A Cerone
The Pre-proceedings of the 2nd International Workshop on Formal Methods for …, 2007
42007
A formal approach to modelling knowledge transfer processes
J Tong, S Shaikh, A James
Coventry University, 2012
12012
A formal framework for security testing of automotive over-the-air update systems
R Kirk, HN Nguyen, J Bryans, SA Shaikh, C Wartnaby
Journal of Logical and Algebraic Methods in Programming 130, 100812, 2023
42023
A framework for analysing driver interactions with semi-autonomous vehicles
S Shaikh, P Krishnan
arXiv preprint arXiv:1301.0043, 2013
232013
A hardware-based soc monitoring in-life solution for automotive industry
H Jadidbonab, HN Nguyen, SA Shaikh, M Hlond, P Robertson, G Panesar
2022 IEEE International Conference on Pervasive Computing and Communications …, 2022
32022
A heuristic for constructing rank functions to verify authentication protocols
SA Shaikh, VJ Bush, SA Schneider
Preproceedings of the 3rd International Verification Workshop at IJCAR 2006 …, 2006
22006
A method for constructing automotive cybersecurity tests, a CAN fuzz testing example
DS Fowler, J Bryans, M Cheah, P Wooderson, SA Shaikh
2019 IEEE 19th international conference on software quality, reliability and …, 2019
422019
A model for characterizing cyberpower
A Venables, SA Shaikh, J Shuttleworth
Critical Infrastructure Protection IX: 9th IFIP 11.10 International …, 2015
12015
A model-based security testing approach for automotive over-the-air updates
S Mahmood, A Fouillade, HN Nguyen, SA Shaikh
2020 IEEE International Conference on Software Testing, Verification and …, 2020
162020
A multi-objective optimisation approach to IDS sensor placement
H Chen, JA Clark, JE Tapiador, SA Shaikh, H Chivers, P Nobles
Computational Intelligence in Security for Information Systems: CISIS’09 …, 2009
202009
A new architecture for network intrusion detection and prevention
W Bul’ajoul, A James, S Shaikh
IEEE access 7, 18558-18573, 2019
292019
A Performance Study of IPSec Protocol
SA Shaikh, SA Al-Khayatt
International Conference on Information and Computer Science (ICICS’04), 2004
12004
A realtime in-vehicle network testbed for machine learning-based ids training and validation
H Jadidbonab, A Tomlinson, HN Nguyen, T Doan, S Shaikh
Workshop on AI and Cybersecurity: co-located with 41st SGAI International …, 2022
62022
系统目前无法执行此操作,请稍后再试。
文章 1–20