Conference Papers

  • [C.33] Rai I.A., Shaikh R.A., Hassan S.R., "A Self-reliant Trust Management Model for VANETs", In: Arai K., Kapoor S., Bhatia R. (eds) Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3. FTC 2020. Advances in Intelligent Systems and Computing, vol 1290. Springer, Cham.

  • [C.32] Muhammad Aminu Lawal, Riaz Ahmed Shaikh and Syed Raheel Hassan, "A DDoS Attack Mitigation Framework for IoT Networks using Fog Computing", 17th International Learning and Technology Conference(L&T2020), Jeddah, KSA, Jan. 2020.

  • [C.31] M. H. Junejo, Ab Al-Hadi Ab Rahman, R. A. Shaikh and K. M. Yuso, "Location Closeness Model for VANETs with Integration of 5G", 17th International Learning and Technology Conference(L&T2020), Jeddah, KSA, Jan. 2020.

  • [C.30] Hamad Alrashede, Riaz A. Shaikh, "IMSI Catcher Detection Method for Cellular Networks", International conference on Computer Applications & Information Security, ICCAIS'2019, May 2019, Riyadh, Saudi Arabia, IEEE Press

  • [C.29] A. Rauf, R. A. Shaikh and A. Shah, Security and privacy for IoT and Fog Computing Paradigm, 15th International Learning and Technology Conference Internet of Things (IoT): Embedding Intelligence (L&T2018), Jeddah, KSA, Feb., 2018, pp. 96-101. IEEE Press

  • [C.28] Mohammad Aqib, and Riaz Ahmed Shaikh, "An Algorithm to Detect Inconsistencies in Access Control Policies ", Proc. of the Intl. Conf. on Advances In Computing, Communication and Information Technology (CCIT 2014), London,UK, June 2014, pp. 171 - 175

  • [C.27] Riaz Ahmed Shaikh, and Ahmed Saeed Alzahrani, "Trust Management Method for Vehicular Ad Hoc Networks", 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE 2013), Greater Noida, India, Jan, 2013, pp. 801-815. Springer-Verlag Press

  • [C.26] Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Risk-based Decision Method for Access Control Systems", in proc. of the 9th Annual Conference on Privacy, Security and Trust (PST2011), Montreal, Canada, July 2011, pp. 189-192. IEEE Press

  • [C.25] Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Inconsistency Detection Method for Access Control Policies", 6th International Conference on Information Assurance and Security (IAS 2010), Atlanta, USA, August 2010, pp. 204-209. IEEE Press

  • [C.24] Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, and Serge Mankovski, "Detecting Incompleteness in Access Control Policies Using Data Classification Schemes", in proc of the 5th International Conference on Digital Information Management (ICDIM 2010), Thundar Bay, Canada, July, 2010, pp. 417-422 IEEE Press

  • [C.23] Riaz Ahmed Shaikh, Young-Koo Lee, and Sungyoung Lee, "Energy Consumption Analysis of Reputation-based Trust Management Schemes of Wireless Sensor Networks", in proc of the 3rd International Conference on Ubiquitous Information Management and Communication , Suwon, Korea, Jan 2009, pp 602-606. [Selected for the Special Issue of Journal of Networks] ACM Press

  • [C.22] Muhammad Shoaib Siddiqui, Riaz Ahmed Shaikh, and Choong Seon Hong. 2009. Trust-based anonymity framework for wireless mesh networks. In Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3 (ICACT'09), Gangwon-Do, South Korea, 2009, pp., 1638-1642. IEEE Press

  • [C.21] M. S. Siddiqui, R. A. Shaikh and C. S. Hong, "QoS control in service delivery in IMS," 2009 11th International Conference on Advanced Communication Technology, Phoenix Park, 2009, pp. 157-160. IEEE Press

  • [C.20] L. Hung, Riaz Ahmed Shaikh, Hassan J.,S.M.K. Raazi, Y. Weiwei, N. Canh, P. Truc, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Activity Oriented Access Control for Ubiquitous Environments", in proc. 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009), Las Vegas, USA, Jan, 2009, pp. 1-5., IEEE Press

  • [C.19] L. Hung, Hassan J., Riaz Ahmed Shaikh, S.M.K. Raazi, Y. Weiwei, N. Canh, P. Truc, S. Lee, H. Lee, Y. Son, and M. Fernandes, "Activity-based Security Scheme for Ubiquitous Environments", in proc. of 27th IEEE International Performance Computing and Communications Conference (IPCCC 2008), Texas, USA, Dec 2008, pp. 475-481 . IEEE Press

  • [C.18] Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song and Heejo Lee, "Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks", in proc of the 2008 International Symposium on Trust Computing (TrustCom 2008) held in conjunction with 9th ICYCS 2008, Zhang Jia Jie, China, Nov 2008, pp. 2038-2043. IEEE Press

  • [C.17] Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Yuan WeiWei, S. M. K. Raazi, N. T. Canh, S. Lee, H. Lee, Y. Son, and Mi. Fernandes, "Image-Feature based Human Identification Protocols on Limited Display Devices", 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Korea, Sep 2008, pp.211-224. Springer-Verlag Press

  • [C.16] Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d'Auriol, Sungyoung Lee, Young-Jae Song and Heejo Lee, "Network Level Privacy for Wireless Sensor Networks", in proc. of 4th International Conference on Information Assurance and Security (IAS 2008), Naples, Italy, Sep 2008, pp. 261-266. IEEE Press

  • [C.15] Pho Duc Giang, Le Xuan Hung, Riaz Ahmed Shaikh, Sungyoung Lee, Young-Koo Lee and Heejo Lee, “A Trust-Based Approach to Control Privacy Exposure in Ubiquitous Computing Environments”, in proc. of IEEE International Conference on Pervasive Services (ICPS 2007), Istanbul, Turkey, Jul 2007, pp. 149-152. IEEE Press

  • [C.14] Brian J. d'Auriol, Jie Yang, Xiaoling Wu, Hui Xu, Yu Niu, Jin Wang, Riaz Ahmed Shaikh, Min Meng, Sungyoung Lee, and Young-Koo Lee, "A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks", in proc. of the 2007 International Conference on Wireless Networks (ICWN'07), Las Vegas, Nevada, USA, Jun 2007, pp. 468-473. CSREA Press

  • [C.13] Hassan Jameel, Riaz Ahmed Shaikh, Sungyoung Lee and Heejo Lee, “Human Identification through Image Evaluation using Secret Predicates”, RSA Conference 2007, Cryptographers' Track, LNCS vol. 4377, San Francisco, USA, Feb 2007, pp. 67-84. Springer-Verlag Press

  • [C.12] Riaz Ahmed Shaikh, Sungyoung Lee, M. A. U. Khan and Young Jae Song, “LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network”, in proc. of 11th IFIP Conference on Personal Wireless Communications (PWC 2006), LNCS vol. 4217, Spain, Sep 2006, pp. 367-377. Springer-Verlag Press

  • [C.11] Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Young Jae Song, and Saeed Rajput, “Trust Management Problem in Distributed Wireless Sensor Networks”, in proc. of 12th IEEE International Conference on Embedded Real Time Computing Systems and its Applications (RTCSA 2006), Sydney, Australia, Aug 2006, pp. 411-415. IEEE Press

  • [C.10] Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, and Yonil Zhung, “Securing Distributed Wireless Sensor Networks: Issues and Guidelines”, in proc. of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006) – vol. 2 - Workshops, Taiwan, Jun 2006, pp. 226-231. IEEE Press

  • [C.09] Xiaoling Wu, Hoon Heo, Riaz A. Shaikh, Jinsung Cho, Oksam Chae, and Sungyoung Lee, “Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks”, in proc. of 9th IEEE International Symposium on Object and component-oriented Real-time distributed Computing (ISORC 06), Gyeongju, Korea, Apr 2006, pp. 179-185. IEEE Press

  • [C.08] Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Comparative Analysis and Design Philosophy of Next Generation Unified Enterprise Application Security”, in proc. of IEEE International Conference on Emerging Technologies (IEEE ICET 2005), Islamabad, Pakistan, Sep 2005, pp. 517-524.

  • [C.07] Riaz A. Shaikh, Ahmad Ali Iqbal, and Kashan Samad, “Review Over Anomaly Detection Algorithms For Detecting SYN Flooding Attacks”, in proc. of 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan, Aug 2005, pp. 1-5.

  • [C.06] Riaz A. Shaikh, Kashif Sharif and Ejaz Ahmed. “Performance Analysis of Unified Enterprise Application Security Framework”, in proc. of 4th Annual IEEE Student Conference on Engineering Sciences and Technology (SCONEST 2005), Karachi, Pakistan, Aug 2005, pp. 1-7.

  • [C.05] Muhammad Adeel, Ahsan A. Chaudhry, Riaz A. Shaikh, and Syed Ismail Shah, “Taxonomy of Cyber Crimes and Legislation in Pakistan”, in proc. of 1st International Conference on Information and Communication Technologies (ICICT 2005), Karachi, Pakistan, Aug, 2005, pp. 350 (Poster).

  • [C.04] Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection”, in proc. of 4th International Conference on Security and Management (SAM’05), Las Vegas, USA, Jun 2005, pp. 144-148. CSREA Press

  • [C.03] Riaz A. Shaikh, S.M.H. Zaidi, Saeed Rajput and Kashif Sharif, “Enterprise Wide Centralized Application level Access Control using XACML”, in proc. of 8th international e-Biz conference, Seoul, Korea, Mar 2005.

  • [C.02] Kashan Samad, Riaz A. Shaikh, and Ahmad Ali Iqbal, “Analysis of DDoS attacks and Defense mechanisms”, Technical Exposition 2005, IEEEP Student Symposium, Karachi, Pakistan, Feb, 2005.

  • [C.01] Riaz A. Shaikh, S.M.H. Zaidi, and Kashif Sharif, “Modular Approach for unified Enterprise Application security”, in proc. of First International workshop on High Optical networks and Emerging Technologies (HONET’04), Islamabad, Pakistan, Dec 2004.