Group-based trust management scheme for clustered wireless sensor networks RA Shaikh, H Jameel, BJ d'Auriol, H Lee, S Lee, YJ Song IEEE transactions on parallel and distributed systems 20 (11), 1698-1712, 2009 | 444 | 2009 |
An analysis of fault detection strategies in wireless sensor networks T Muhammed, RA Shaikh Journal of Network and Computer Applications 78, 267-287, 2017 | 187 | 2017 |
Trust management problem in distributed wireless sensor networks RA Shaikh, H Jameel, S Lee, S Rajput, YJ Song 12th IEEE International Conference on Embedded and Real-Time Computing …, 2006 | 95 | 2006 |
Intrusion‐aware trust model for vehicular ad hoc networks RA Shaikh, AS Alzahrani Security and Communication Networks 7 (11), 1652-1669, 2014 | 90 | 2014 |
Dynamic risk-based decision methods for access control systems RA Shaikh, K Adi, L Logrippo Computers & Security 31 (4), 447-464, 2012 | 81 | 2012 |
LSec: lightweight security protocol for distributed wireless sensor network RA Shaikh, S Lee, MAU Khan, YJ Song IFIP International Conference on Personal Wireless Communications, 367-377, 2006 | 67 | 2006 |
Achieving network level privacy in wireless sensor networks RA Shaikh, H Jameel, BJ d’Auriol, H Lee, S Lee, YJ Song Sensors 10 (3), 1447-1472, 2010 | 60 | 2010 |
An anomaly mitigation framework for iot using fog computing MA Lawal, RA Shaikh, SR Hassan Electronics 9 (10), 1565, 2020 | 59 | 2020 |
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets RA Shaikh, K Adi, L Logrippo International Journal of Information Security 16 (1), 91–113, 2017 | 57 | 2017 |
Security and privacy for IoT and fog computing paradigm A Rauf, RA Shaikh, A Shah 2018 15th Learning and Technology Conference (L&T), 96-101, 2018 | 50 | 2018 |
Validation of consistency and completeness of access control policy sets RA Shaikh, K Adi, L Logrippo, S Mankovskii US Patent 8,904,472, 2014 | 43 | 2014 |
A DDoS attack mitigation framework for IoT networks using fog computing MA Lawal, RA Shaikh, SR Hassan Procedia Computer Science 182, 13-20, 2021 | 39 | 2021 |
Security analysis of network anomalies mitigation schemes in IoT networks MA Lawal, RA Shaikh, SR Hassan IEEE Access 8, 43355-43374, 2020 | 38 | 2020 |
Human identification through image evaluation using secret predicates H Jameel, RA Shaikh, H Lee, S Lee Cryptographers’ Track at the RSA Conference, 67-84, 2007 | 36 | 2007 |
Securing distributed wireless sensor networks: Issues and guidelines RA Shaikh, S Lee, YJ Song, Y Zhung IEEE International Conference on Sensor Networks, Ubiquitous, and …, 2006 | 35 | 2006 |
A privacy-preserving attack-resistant trust model for internet of vehicles ad hoc networks MH Junejo, AAH Ab Rahman, RA Shaikh, K Mohamad Yusof, I Memon, ... Scientific Programming 2020, 1-21, 2020 | 27 | 2020 |
Inconsistency detection method for access control policies RA Shaikh, K Adi, L Logrippo, S Mankovski Information Assurance and Security (IAS), 2010 Sixth International …, 2010 | 26 | 2010 |
Analysis and Comparison of Access Control Policies Validation Mechanisms M Aqib, RA Shaikh I. J. Computer Network and Information Security 7 (1), 54-69, 2015 | 25 | 2015 |
Imsi catcher detection method for cellular networks H Alrashede, RA Shaikh 2019 2nd International Conference on Computer Applications & Information …, 2019 | 24 | 2019 |
Risk-based decision method for access control systems RA Shaikh, K Adi, L Logrippo, S Mankovski 2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011 | 22 | 2011 |