Publications
Last Updated: 13 November 2023
2023
M. H. Junejo, A. A. -H. B. A. Rahman, R. A. Shaikh, K. M. Yusof and S. Sadiah, "Trust Model for Reliable Grouping-Based Communications in Vehicular Ad-Hoc Networks," in IEEE Access, vol. 11, pp. 124584-124596, 2023. (ISI/JCR IF: 3.9)
2022
A. Rauf, R. A. Shaikh, A. Shah, "Trust Modelling and Management for IoT Healthcare", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.12, No.5, pp. 21-35, 2022. DOI:10.5815/ijwmt.2022.05.03
2021
S. Z. Nizamani, S. R. Hassan, R. A. Shaikh, E. A. Abozinadah and R. Mehmood, "A Novel Hybrid Textual-Graphical Authentication Scheme With Better Security, Memorability, and Usability," in IEEE Access, vol. 9, pp. 51294-51312, 2021 (ISI/JCR IF: 3.745)
2020
M. H. Junejo, A. Al-H. Rahman, R. A. Shaikh, K. M. Yusof, I. Memon, H. Fazal, D. Kumar, "A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks", Scientific Programming, vol. 2020, Article ID 8831611, 21 pages, 2020. (ISI/JCR IF: 0.963)
M. A. Lawal, R. A. Shaikh, S. R. Hassan, "An Anomaly Mitigation Framework for IoT Using Fog Computing", Electronics, vol. 9(9), pp. 1565-1588, 2020. (ISI/JCR IF: 2.412)
Ibrahim Rai, Riaz Ahmed Shaikh, Syed Raheel Hasan, "A hybrid dual-mode trust management scheme for vehicular networks", International Journal of Distributed Sensor Networks, vol. 16(7), 2020 (ISI/JCR: 1.151)
M. A. Lawal, R. A. Shaikh, S. R. Hassan “Security Analysis of Network Anomalies Mitigation Schemes in IoT Networks”, IEEE Access, vol. 8, pp. 43355 - 43374, 2020 (ISI/JCR IF: 3.745)
S. Z. Nizamani, S. R. Hassan, and R. A. Shaikh, "TQ-Model: A New Evaluation Model for Knowledge-Based Authentication Schemes", Arabian Journal for Science and Engineering, Vol. 45, pp. 2763–2778, April 2020 (ISI/JCR IF: 1.711)
Muhammad Aminu Lawal, Riaz Ahmed Shaikh and Syed Raheel Hassan, "A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing", 17th International Learning and Technology Conference(L&T2020), Jeddah, KSA, Jan. 2020.
Muhammad Haleem Junejo, Ab Al-Hadi Ab Rahman, Riaz Ahmed Shaikh and Kamaludin Mohamad Yuso, "Location Closeness Model for VANETs with Integration of 5G", 17th International Learning and Technology Conference(L&T2020), Jeddah, KSA, Jan. 2020.
2019
S. Z. Nizamani, S. R. Hassan, Riaz A. Shaikh and S. T. Bakhsh, "An Evaluation Model for Recognition-based Graphical Password Schemes", Journal of Information Assurance and Security, vol. 14(3), pp. 67-77, 2019 (Indexed in Web of Science)
R. A. Shaikh, V. Thayananthan, "Risk-Based Decision Methods for Vehicular Networks", Electronics, vol. 8(6), 2019. (ISI/JCR IF: 2.412)
H. Alrashede, R. A. Shaikh, "IMSI Catcher Detection Method for Cellular Networks", International conference on Computer Applications & Information Security, ICCAIS'2019, May 2019, Riyadh, Saudi Arabia, IEEE Press
Edited Book: Riaz A. Shaikh, "Secure Cyber-Physical Systems for Smart Cities", IGI Global, USA, March, 2019, ISBN13: 9781522571896, ISBN10: 1522571892, EISBN13: 9781522571902, DOI: 10.4018/978-1-5225-7189-6
US Patent: US10225708B2: “Trust evaluation wireless network for routing data packets”, Granted: 5 March 2019
2018
M. Aqib, R. A. Shaikh, “A Tool for Access Control Policy Validation”, Journal of Internet Technology, vol. 19(1), pp. 157-166, 2018 (Indexed in Web of Science, 1.93)
Othman Saeed, R. A. Shaikh, "A User-based Trust Model for Cloud Computing Environment", International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9(3), 2018, pp. 337-346, 2018 (Indexed in Web of Science)
A. Rauf, R. A. Shaikh and A. Shah, Security and privacy for IoT and Fog Computing Paradigm, 15th International Learning and Technology Conference Internet of Things (IoT): Embedding Intelligence (L&T2018), Jeddah, KSA, Feb., 2018, pp. 96-101. IEEE Press
2017
T. Muhammad, R. A. Shaikh, "An Analysis of Fault Detection Strategies in Wireless Sensor Networks", Elsevier Journal of Network and Computer Applications,vol. 78, pp. 267-287, 2017 (Indexed in Web of Science, 3.5)
R. A. Shaikh, K. Adi, and L. Logrippo,"A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets", International Journal of Information Security, Springer, vol. 16(1), pp. 91-113, 2017 (Related Tools) (Indexed in Web of Science, 1.915)
2016
R. A. Shaikh, "Fuzzy Risk-based Decision Method for Vehicular Ad Hoc Networks", International Journal of Advanced Computer Science and Applications(IJACSA), Vol.7, Issue 9, pp. 54-62, 2016. (Indexed in Web of Science)
V. Thayananthan, R. A. Shaikh, “Contextual Risk-based Decision Modeling for Vehicular Networks”, International Journal of Computer Network and Information Security, vol. 8, Issue 9, pp. 1-9, 2016
Y. Arfat, R. A. Shaikh, "A Survey on Secure Routing Protocols in Wireless Sensor Networks", International Journal of Wireless and Microwave Technologies (IJWMT), vol.6 (3), pp.9-19, 2016
2015
Riaz A. Shaikh, Vijey Thayananthan, “Hop-by-Hop Trust Evaluation Algorithm for Identity Anonymous Sensor Networks”, IETE Journal of Research, vol. 61, Issue 2, pp. 154-159, 2015 (Indexed in Web of Science, IF: 0.284)
Riaz A. Shaikh, Sungyoung Lee, Aiiad Albeshri, Security Completeness Problem in Wireless Sensor Networks, Intelligent Automation & Soft Computing, Taylor & Francis, vol. 21, Issue 2, pp. 235-250, 2015 (Indexed in Web of Science, IF: 0.351)
Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr., Riaz A. Shaikh, Critical applications in vehicular ad hoc/sensor networks, Telecommunication Systems, Springer, vol. 58, Issue 4, pp. 275-277, 2015 (Editorial article) (Indexed in Web of Science, IF: 0.822)
Muhammad Aqib, and Riaz A. Shaikh, "Analysis and Comparison of Access Control Policies Validation Mechanisms", I.J.Computer Network and Information Security, vol. 7(1), pp. 54-69, 2015.
2014
Riaz A. Shaikh, and Ahmed Saeed Alzahrani, "Intrusion-aware trust model for vehicular ad hoc networks", Security and Communication Networks, vol. 7 (11), pp. 1652-1669, Nov 2014. (Indexed in Web of Science, IF: 0.806)
Mohammad Aqib, and Riaz A. Shaikh, "An Algorithm to Detect Inconsistencies in Access Control Policies ", Proc. of the Intl. Conf. on Advances In Computing, Communication and Information Technology (CCIT 2014), London, UK, June 2014, pp. 171 - 175
2013
Riaz A. Shaikh, and Ahmed Saeed Alzahrani, "Trust Management Method for Vehicular Ad Hoc Networks", 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2013), Greater Noida, India. Jan, 2013, pp. 801-815. Springer-Verlag Press
2012
Riaz A. Shaikh, Kamel Adi, and Luigi Logrippo, "Dynamic Risk-based Decision Methods for Access Control Systems", Elsevier Computer & Security Journal, vol. 31(4), pp. 447-464, Jun 2012. (Indexed in Web of Science, IF: 1.172)
US Patent: US20120124639, "Validation of Consistency and Completeness of Access Control Policy Sets", Publication Date: 17-May-2012.
2011
Riaz A. Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Risk-based Decision Method for Access Control Systems", in proc. of the 9th Annual Conference on Privacy, Security and Trust (PST2011), Montreal, Canada, July 2011, pp. 189-192. IEEE Press
2010
Riaz A. Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Inconsistency Detection Method for Access Control Policies", 6th International Conference on Information Assurance and Security (IAS 2010), Atlanta, USA, August 2010, pp. 204-209. IEEE Press
Riaz A. Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Detecting Incompleteness in Access Control Policies Using Data Classification Schemes", in proc of the 5th International Conference on Digital Information Management (ICDIM 2010), Thundar Bay, Canada, July, 2010, pp. 417-422 IEEE Press
Riaz A. Shaikh, Young-Koo Lee, and Sungyoung Lee, "An Extended Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks", Journal of Networks, Academy Publishers, Vol. 5(3), pp. 283-291, 2010
Riaz A. Shaikh, Brian J. d'Auriol, Heejo Lee, and Sungyoung Lee, "Privacy and Trust Management Schemes of Wireless Sensor Networks: A Survey", Chapter 13, Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice, Hai Jin and Wenbin Jiang (Eds), IGI Global Publisher, pp. 290-309, 2010, ISBN: 1615207015.
Riaz A. Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song, "Achieving Network Level Privacy in Wireless Sensor Networks", Sensors, vol. 10(3), pp. 1447-1472, 2010. (Indexed in Web of Science, IF: 1.774)
2009
US Patent: US20090328148, "Method of trust management in wireless sensor networks", Publication Date: 31 Dec 2009
Korean Patent Registration No: 1009177620000, "Method for identity, route, and location anonymity in wireless sensor networks", Korean Patent Application number: 10-2007-0133041, Publication Date: Sep 09, 2009
Riaz A. Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song, "Group-based Trust Management Scheme for Clustered Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, vol. 20(11), Nov. 2009, pp. 1698-1712. (Indexed in Web of Science, IF: 1.733)
Riaz A. Shaikh, "Intrusion-tolerant Trust-based Privacy assuredSecurity Solution for Wireless Sensor Networks", PhD Thesis, Dept. of Computer Engg., Kyung Hee University, Korea, August 2009.
Riaz A. Shaikh, Hassan Jameel, Brian J. d'Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song, "Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks", Sensors, vol. 9(8), pp. 5989-6007, 2009. (Indexed in Web of Science, IF: 1.774)
Riaz A. Shaikh, Young-Koo Lee, and Sungyoung Lee, "Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks", in proc of the 3rd International Conference on Ubiquitous Information Management and Communication, Suwon, Korea, Jan 2009, pp 602-606. [Selected for the Special Issue of Journal of Networks] ACM Press
Muhammad Shoaib Siddiqui, Riaz A. Shaikh, and Choong Seon Hong. 2009. Trust-based anonymity framework for wireless mesh networks. In Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3 (ICACT'09), Gangwon-Do, South Korea, 2009, pp., 1638-1642. IEEE Press
M. S. Siddiqui, R. A. Shaikh and C. S. Hong, "QoS control in service delivery in IMS," 2009 11th International Conference on Advanced Communication Technology, Phoenix Park, 2009, pp. 157-160. IEEE Press
L. Hung, Riaz A. Shaikh, Hassan J.,S.M.K. Raazi, Y. Weiwei, N. Canh, P. Truc, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Activity Oriented Access Control for Ubiquitous Environments", in proc. 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009), Las Vegas, USA, Jan, 2009, pp. 1-5., IEEE Press
2008
L. Hung, Hassan J., Riaz A. Shaikh, S.M.K. Raazi, Y. Weiwei, N. Canh, P. Truc, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Activity-based Security Scheme for Ubiquitous Environments", in proc. of 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008), Texas, USA, Dec 2008, pp. 475-481 . IEEE Press
Riaz A. Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song and Heejo Lee, "Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks", in proc of the 2008 International Symposium on Trust Computing (TrustCom 2008) held in conjunction with 9th ICYCS 2008, Zhang Jia Jie, China, Nov 2008, pp. 2038-2043. IEEE Press
Hassan Jameel, Riaz A. Shaikh, Le Xuan Hung, Yuan WeiWei, S. M. K. Raazi, N. T. Canh, S. Lee, H. Lee, Y. Son, and Mi. Fernandes, "Image-Feature based Human Identification Protocols on Limited Display Devices", 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Korea, Sep 2008, pp.211-224. Springer-Verlag Press
Riaz A. Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song and Heejo Lee, "Network Level Privacy for Wireless Sensor Networks", in proc. of 4th International Conference on Information Assurance and Security (IAS 2008), Naples, Italy, Sep 2008, pp. 261-266. IEEE Press
2007
Pho Duc Giang, Le Xuan Hung, Riaz A. Shaikh, Sungyoung Lee, Young-Koo Lee and Heejo Lee, “A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments”, in proc. of IEEE International Conference on Pervasive Services (ICPS 2007), Istanbul, Turkey, Jul 2007, pp. 149-152. IEEE Press
Brian J. d'Auriol, Jie Yang, Xiaoling Wu, Hui Xu, Yu Niu, Jin Wang, Riaz A. Shaikh, Min Meng, Sungyoung Lee, and Young-Koo Lee, "A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks", in proc. of the 2007 International Conference on Wireless Networks (ICWN'07), Las Vegas, Nevada, USA, Jun 2007, pp. 468-473. CSREA Press
Hassan Jameel, Riaz A. Shaikh, Sungyoung Lee and Heejo Lee, “Human Identification through Image Evaluation using Secret Predicates”, RSA Conference 2007, Cryptographers' Track, LNCS vol. 4377, San Francisco, USA, Feb 2007, pp. 67-84. Springer-Verlag Press
2006
Riaz Ahmed Shaikh, Sungyoung Lee, M. A. U. Khan and Young Jae Song, “LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network”, in proc. of 11th IFIP Conference on Personal Wireless Communications (PWC 2006), LNCS vol. 4217, Spain, Sep 2006, pp. 367-377. Springer-Verlag Press
Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Young Jae Song, and Saeed Rajput, “Trust Management Problem in Distributed Wireless Sensor Networks”, in proc. of 12th IEEE International Conference on Embedded Real Time Computing Systems and its Applications (RTCSA 2006), Sydney, Australia, Aug 2006, pp. 411-415. IEEE Press
Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, and Yonil Zhung, “Securing Distributed Wireless Sensor Networks: Issues and Guidelines”, in proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006) – vol. 2 - Workshops, Taiwan, Jun 2006, pp. 226-231. IEEE Press
Xiaoling Wu, Hoon Heo, Riaz A. Shaikh, Jinsung Cho, Oksam Chae, and Sungyoung Lee, “Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks”, in proc. of 9th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC 06), Gyeongju, Korea, Apr 2006, pp. 179-185. IEEE Press
2005
Riaz A. Shaikh, "Comparative analysis and Design Philosophy of next generation unified enterprise application security", MS Thesis, National University of Sciences and Technology (NUST), Rawalpindi, Pakistan, May 2005.
Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Comparative Analysis and Design Philosophy of Next Generation Unified Enterprise Application Security”, in proc. of IEEE International Conference on Emerging Technologies (IEEE ICET 2005), Islamabad, Pakistan, Sep 2005, pp. 517-524.
Riaz A. Shaikh, Ahmad Ali Iqbal, and Kashan Samad, “Review Over Anomaly Detection Algorithms For Detecting SYN Flooding Attacks”, in proc. of 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan, Aug 2005, pp. 1-5.
Riaz A. Shaikh, Kashif Sharif and Ejaz Ahmed. “Performance Analysis of Unified Enterprise Application Security Framework”, in proc. of 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan, Aug 2005, pp. 1-7.
Muhammad Adeel, Ahsan A. Chaudhry, Riaz A. Shaikh, and Syed Ismail Shah, “Taxonomy of Cyber Crimes and Legislation in Pakistan”, in proc. of 1st International Conference on Information and Communication Technologies (ICICT 2005), Karachi, Pakistan, Aug, 2005, pp. 350 (Poster).
Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection”, in proc. of 4th International Conference on Security and Management (SAM’05), Las Vegas, USA, Jun 2005, pp. 144-148. CSREA Press
Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Enterprise Wide Centralized Application level Access Control using XACML”, in proc. of 8th international e-Biz conference, Seoul, Korea, Mar 2005.
Kashan Samad, Riaz A. Shaikh, and Ahmad Ali Iqbal, “Analysis of DDoS attacks and Defense mechanisms”, Technical Exposition 2005, IEEEP Student Symposium, Karachi, Pakistan, Feb, 2005.
2004
Riaz A. Shaikh, S.M.H. Zaidi, and Kashif Sharif, “Modular Approach for unified Enterprise Application security”, in proc. of First International workshop on High Optical networks and Emerging Technologies (HONET’04), Islamabad, Pakistan, Dec 2004.