Publications

Last Updated: 18 Jan. 2017

 Patents (4)  Book Chapters (1)  Journal Papers (14)  Conference Papers (26)  Thesis (2)

46
 Thaha Muhammad, Riaz Ahmed Shaikh, "An Analysis of Fault Detection Strategies in Wireless Sensor Networks", Elsevier Journal of Network and Computer Applications, vol. 78, Jan. 2017, pp. 267-287   
45Riaz Ahmed Shaikh, Kamel Adi, and Luigi Logrippo,"A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets", International Journal of Information Security, Springer, vol. 16(1), 2017, pp. 91-113 (Related Tools)
 
https://www.site.uottawa.ca/~luigi/papers/2016_IJIS.pdf
  2016 
 44 Riaz Ahmed Shaikh, "Fuzzy Risk-based Decision Method for Vehicular Ad Hoc Networks", International Journal of Advanced Computer Science and Applications(IJACSA), Vol.7, Issue 9, pp. 54-62, 2016.  
 43  V. Thayananthan, R. A. Shaikh, “Contextual Risk-based Decision Modeling for Vehicular Networks”, International Journal of Computer Network and Information Security, vol. 8, Issue 9, pp. 1-9, 2016  
https://www.researchgate.net/publication/307889591_Contextual_Risk-based_Decision_Modeling_for_Vehicular_Networks
  2015 
 42 Riaz Ahmed Shaikh, Vijey Thayananthan, “Hop-by-Hop Trust Evaluation Algorithm for Identity Anonymous Sensor Networks”, IETE Journal of Research, vol. 61, Issue 2, pp. 154-159, 2015  
https://www.researchgate.net/publication/273165213_Hop-by-hop_trust_evaluation_algorithm_for_identity_anonymous_sensor_networks
 41 Riaz Ahmed Shaikh, Sungyoung Lee, Aiiad Albeshri, Security Completeness Problem in Wireless Sensor Networks, Intelligent Automation & Soft Computing, Taylor & Francis, vol. 21, Issue 2, pp. 235-250, 2015  
https://www.researchgate.net/publication/274197656_Security_Completeness_Problem_in_Wireless_Sensor_Networks
 40 Neeraj Kumar,  Al-Sakib Khan Pathan,  Elias P. Duarte Jr.,  Riaz Ahmed Shaikh, Critical applications in vehicular ad hoc/sensor networks, Telecommunication Systems, Springer, vol. 58, Issue 4, pp. 275-277, 2015  (Editorial article)  
https://www.researchgate.net/publication/272891397_Critical_applications_in_vehicular_ad_hocsensor_networks
 39 Muhammad Aqib, and Riaz Ahmed Shaikh, "Analysis and Comparison of Access Control Policies Validation Mechanisms", I.J.Computer Network and Information Security, vol. 7(1), pp. 54-69, 2015.  
http://www.mecs-press.org/ijcnis/ijcnis-v7-n1/IJCNIS-V7-N1-8.pdf
   2014  
 38 Riaz Ahmed Shaikh, and Ahmed Saeed Alzahrani, "Intrusion-aware trust model for vehicular ad hoc networks",  Security and Communication Networks,  vol. 7 (11),  pp. 1652-1669, Nov 2014.
http://onlinelibrary.wiley.com/doi/10.1002/sec.862/full
 
 37 Mohammad Aqib, and Riaz Ahmed Shaikh, "An Algorithm to Detect Inconsistencies in Access Control Policies ",   Proc. of the Intl. Conf. on Advances In Computing, Communication and Information Technology (CCIT 2014), London, UK, June 2014, pp. 171 - 175  
   2013  
 36 Riaz Ahmed Shaikh, and Ahmed Saeed Alzahrani, "Trust Management Method for Vehicular Ad Hoc Networks",   9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2013),   Greater Noida, India. Jan, 2013, pp. 801-815. Springer-Verlag Press  
https://www.researchgate.net/publication/299704812_Trust_Management_Method_for_Vehicular_Ad_Hoc_Networks
   2012  
35 Riaz Ahmed Shaikh, Kamel Adi, and Luigi Logrippo, "Dynamic Risk-based Decision Methods for Access Control Systems", Elsevier Computer & Security Journal, vol. 31(4), pp. 447-464, Jun 2012.  
34
US Patent: US20120124639, "Validation of Consistency and Completeness of Access Control Policy Sets", Publication Date: 17-May-2012.
   2011  
 33 Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Risk-based Decision Method for Access Control Systems", in proc. of the 9th Annual Conference on Privacy, Security and Trust (PST2011), Montreal, Canada, July 2011, pp. 189-192. IEEE Press  
https://www.researchgate.net/publication/224251218
  2010  
 32 Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Inconsistency Detection Method for Access Control Policies", 6th International Conference on Information Assurance and Security (IAS 2010), Atlanta, USA, August 2010, pp. 204-209. IEEE Press  

 31 Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Detecting Incompleteness in Access Control Policies Using Data Classification Schemes", in proc of the 5th International Conference on Digital Information Management (ICDIM 2010), Thundar Bay, Canada, July, 2010, pp. 417-422  IEEE Press  
 30 Riaz Ahmed Shaikh, Young-Koo Lee, and Sungyoung Lee, "An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks", Journal of Networks, Academy Publishers, Vol. 5(3), pp. 283-291, 2010  
 29

Riaz Ahmed ShaikhBrian J. d'Auriol, Heejo Lee, and Sungyoung Lee,  "Privacy and Trust Management Schemes of Wireless Sensor Networks: A  Survey", Chapter 13, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice,  Hai Jin and Wenbin Jiang (Eds), IGI Global Publisher, pp. 290-309, 2010, ISBN: 1615207015.
 
 28 Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song, "Achieving Network Level Privacy in Wireless Sensor Networks", Sensors,  vol. 10(3), pp. 1447-1472, 2010.   
   2009  
 27 US Patent: US20090328148, "Method of trust management in wireless sensor networks",   Publication Date: 31 Dec 2009
 
 26 Korean Patent Registration No: 1009177620000, "Method for identity, route, and location anonymity in wireless sensor networks", Korean Patent Application number: 10-2007-0133041, Publication Date: Sep 09, 2009
 
 25 Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song, "Group-based Trust Management Scheme for Clustered Wireless Sensor Networks",  IEEE Transaction on Parallel and Distributed Systems,  vol. 20(11), Nov. 2009, pp. 1698-1712. (Impact Factor: 1.916)
 
 24 Riaz Ahmed Shaikh, "Intrusion-tolerant Trust-based Privacy assuredSecurity Solution for Wireless Sensor Networks", PhD Thesis, Dept. of Computer Engg., Kyung Hee University, Korea, August 2009.  
https://sites.google.com/site/riaz289/publications/pdf_icon.gif
 23  Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song, "Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks", Sensors,  vol. 9(8), pp. 5989-6007, 2009.  (Impact Factor: 1.87).  
 22 Riaz Ahmed Shaikh, Young-Koo Lee, and Sungyoung Lee, "Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks", in proc of the 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, Jan 2009, pp 602-606. [Selected for the Special Issue of Journal of Networks] ACM Press  
 21 L. Hung, Riaz Ahmed Shaikh, Hassan J.,S.M.K. Raazi, Y. Weiwei, N. Canh, P. Truc, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Activity Oriented Access Control for Ubiquitous Environments", in proc. 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009), Las Vegas, USA, Jan, 2009, pp. 1-5., IEEE Press  
   2008  
 20 L. Hung, Hassan J., Riaz Ahmed Shaikh, S.M.K. Raazi, Y. Weiwei, N. Canh, P. Truc, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Activity-based Security Scheme for Ubiquitous Environments", in proc. of 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008), Texas, USA, Dec 2008, pp. 475-481 . IEEE Press  
 19 Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song and Heejo Lee, "Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks", in proc of the 2008 International Symposium on Trust Computing (TrustCom 2008) held in conjunction with 9th ICYCS 2008, Zhang Jia Jie, China, Nov 2008, pp. 2038-2043. IEEE Press  
 18 Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan WeiWei, S. M. K. Raazi, N. T. Canh, S. Lee, H. Lee, Y. Son, and Mi. Fernandes, "Image-Feature based Human Identification Protocols on Limited Display Devices", 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Korea, Sep 2008, pp.211-224. Springer-Verlag Press  
 17 Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song and Heejo Lee, "Network Level Privacy for Wireless Sensor Networks", in proc. of 4th International Conference on Information Assurance and Security (IAS 2008), Naples, Italy, Sep 2008, pp. 261-266. IEEE Press  
   2007  
 16 Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Sungyoung Lee, Young-Koo Lee and Heejo Lee, “A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments”, in proc. of IEEE International Conference on Pervasive Services (ICPS 2007), Istanbul, Turkey, Jul 2007, pp. 149-152. IEEE Press  
 15 Brian J. d'Auriol, Jie Yang, Xiaoling Wu, Hui Xu, Yu Niu, Jin Wang, Riaz Ahmed Shaikh, Min Meng, Sungyoung Lee, and Young-Koo Lee, "A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks", in proc. of the 2007 International Conference on Wireless Networks (ICWN'07), Las Vegas, Nevada, USA, Jun 2007, pp. 468-473. CSREA Press  
 14 Hassan Jameel, Riaz Ahmed Shaikh, Sungyoung Lee and Heejo Lee, “Human Identification through Image Evaluation using Secret Predicates”, RSA Conference 2007, Cryptographers' Track, LNCS vol. 4377, San Francisco, USA, Feb 2007, pp. 67-84. Springer-Verlag Press  
   2006  
 13 Riaz Ahmed Shaikh, Sungyoung Lee, M. A. U. Khan and Young Jae Song, “LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network”, in proc. of 11th IFIP Conference on Personal Wireless Communications (PWC 2006), LNCS vol. 4217, Spain, Sep 2006, pp. 367-377. Springer-Verlag Press  
 12 Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Young Jae Song, and Saeed Rajput, “Trust Management Problem in Distributed Wireless Sensor Networks”, in proc. of 12th IEEE International Conference on Embedded Real Time Computing Systems and its Applications (RTCSA 2006), Sydney, Australia, Aug 2006, pp. 411-415. IEEE Press  
 11 Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, and Yonil Zhung, “Securing Distributed Wireless Sensor Networks: Issues and Guidelines”, in proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006) – vol. 2 - Workshops, Taiwan, Jun 2006, pp. 226-231. IEEE Press  
 10 Xiaoling Wu, Hoon Heo, Riaz A. Shaikh, Jinsung Cho, Oksam Chae, and Sungyoung Lee, Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks”, in proc. of 9th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC 06), Gyeongju, Korea, Apr 2006, pp. 179-185. IEEE Press  
   2005  
 9 Riaz Ahmed Shaikh, "Comparative analysis and Design Philosophy of next generation unified enterprise application security",  MS Thesis, National University of Sciences and Technology (NUST), Rawalpindi, Pakistan, May 2005.  
 8 Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Comparative Analysis and Design Philosophy of Next Generation Unified Enterprise Application Security”, in proc. of IEEE International Conference on Emerging Technologies (IEEE ICET 2005), Islamabad, Pakistan, Sep 2005, pp. 517-524.  
 7  Riaz A. Shaikh, Ahmad Ali Iqbal, and Kashan Samad, “Review Over Anomaly Detection Algorithms For Detecting SYN Flooding Attacks”, in proc. of 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan, Aug 2005, pp. 1-5.  
 6 Riaz A. Shaikh, Kashif Sharif and Ejaz Ahmed. “Performance Analysis of Unified Enterprise Application Security Framework”, in proc. of 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan, Aug 2005, pp. 1-7.  
 5 Muhammad Adeel, Ahsan A. Chaudhry, Riaz A. Shaikh, and Syed Ismail Shah, “Taxonomy of Cyber Crimes and Legislation in Pakistan”, in proc. of 1st International Conference on Information and Communication Technologies (ICICT 2005), Karachi, Pakistan, Aug, 2005, pp. 350 (Poster).  
 4 Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection”, in proc. of 4th International Conference on Security and Management (SAM’05), Las Vegas, USA, Jun 2005, pp. 144-148. CSREA Press  
 3 Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Enterprise Wide Centralized Application level Access Control using XACML”, in proc. of 8th international e-Biz conference, Seoul, Korea, Mar 2005.  
 2 Kashan Samad, Riaz A. Shaikh, and Ahmad Ali Iqbal, “Analysis of DDoS attacks and Defense mechanisms”, Technical Exposition 2005, IEEEP Student Symposium, Karachi, Pakistan, Feb, 2005.  
   2004  
 1 Riaz A. Shaikh, S.M.H. Zaidi, and Kashif Sharif, “Modular Approach for unified Enterprise Application security”, in proc. of First International workshop on High Optical networks and Emerging Technologies (HONET’04), Islamabad, Pakistan, Dec 2004.