Publications
2022/2023: (student authors marked with asterisks)
Syed Rizvi, Tatiana Zwerling, Benjamin Thompson*, Shawn Faiola*, Shakir Campbell*, Stephen Fisanick*, Codi Hutnick*. A modular framework for auditing IoT devices and networks, Computers & Security, Vol. 132, Sep. 2023, https://doi.org/10.1016/j.cose.2023.103327.
Syed Rizvi and Iyonna Williams*. Analyzing Transparency and Malicious Insiders Prevention for Cloud Computing Environment. Computers & Security – Elsevier. (Accepted)
Rizvi, Syed and Bender, Dylan* and Claudino, Devon* and Krish, Joshua* and Weiland, Benjamin*. Data Security and Privacy Issues in the Internet of Things Ecosystem. Journal of Computing Sciences in Colleges, volume 38 (3), November 2022. https://dl.acm.org/doi/abs/10.5555/3580523.3580566
Syed Rizvi, Hans Esteban*, Anthony Hammil*, and Mark Ihnat*. Data Protection and Data Recovery Plan for IoT Transportation Domain. IEEE 10th International Symposium on Networks, Computers and Communications (ISNCC'23), Doha - Qatar, October 23 to 26, 2023.
Syed Rizvi, James Davis*, Shane Reigert*, and Mark Ihnat*. Data Protection and Recovery Plan for Securing Home IoT Domain. IEEE 10th International Symposium on Networks, Computers and Communications (ISNCC'23), Doha - Qatar, October 23 to 26, 2023.
Rizvi, Syed; Ayres, Jessica; Pensyl, Jessie; Ihnat, Mark. Developing Data Protection and Recovery Plan for Healthcare IoT Domain. 39th Annual Regional Conference, Bay Atlantic University, Washington, DC, October 20-21, 2023. Accepted paper will be featured in Journal of Computing Sciences in Colleges.
Rizvi, Syed; Moore, Justin; McKee, Zachary; Ihnat, Mark. Data Protection and Recovery Plan for Retail IoT Domain. 39th Annual Regional Conference, Bay Atlantic University, Washington, DC, October 20-21, 2023. Accepted paper will be featured in Journal of Computing Sciences in Colleges.
2021: (student authors marked with asterisks)
Syed Rizvi, Iyonna Williams*, Shakir Campbell*. TUI Model for data privacy assessment in IoT networks. Internet of Things, Vol. 17, March 2022. https://doi.org/10.1016/j.iot.2021.100465
Abdul Razaque, Syed Rizvi, Meer Jaro khan, Muder Almiani, Amer Al Rahayfeh, "State-of-art review of information diffusion models and their impact on social network vulnerabilities," Journal of King Saud University - Computer and Information Sciences, Vol. 34 (1), pp. 1275-1294, Jan. 2022. https://doi.org/10.1016/j.jksuci.2019.08.008
Syed Rizvi, Ryan Santos*, Bradley Cesarone*, William Gunn* and Erin McConnell*, “Reducing Software Vulnerabilities Using Machine Learning Static Application Security Testing,” IEEE 7th International Conference on Software Security and Assurance (IEEE ICSSA), November 10 -11, Altoona PA, USA. Received Best Paper Award.
Syed Rizvi, Erin McConnell*, Miles Moate*, Stephen Fisanick*, Joseph Burns*, Jeremy Jens* and Vita Staws*, "Survey: Machine Learning Algorithm Efficacy Static Software Analysis," IEEE 7th International Conference on Software Security and Assurance, November 10 -11, Altoona PA, USA.
Syed Rizvi, Aery Thrasher*, Dustin Priest*, Rafay Ahmad*, Miles Moate*, Stephen Fisanick*, and Erin McConnell*, "The Future for a Secure Internet of Things," IEEE 7th International Conference on Software Security and Assurance (IEEE ICSSA), November 10 -11, Altoona PA, USA.
2020:
Syed Rizvi, John Mitchell, Abdul Razaque, Mohammad R Rizvi, Iyonna Williams. A Fuzzy Inference System (FIS) to Evaluate the Security Readiness of Cloud Service Providers. Journal of Cloud Computing - Springer 9, 42 (2020). (PDF)
Syed Rizvi, Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, and Iyonna Williams, Protecting Financial Transactions through Networks and Point of Sales. Journal of Cyber Security Technology, 4:4, 211-239, (2020). DOI: 10.1080/23742917.2020.1796474. (PDF)
J Ryoo, S Rizvi, W Aiken, B Long-Yarrison – 2020. Information Systems Security Readiness Assessment for Municipalities in Pennsylvania. The Center for Rural Pennsylvania. September 2020. (PDF)
Syed Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd, Iyonna Williams. Threat Model for Securing Internet of Things (IoT) Network at Device-Level. Internet of Things; Engineering Cyber Physical Human Systems – Elseiver, Volume 11, September 2020. (PDF)
Abdul Razaque, Fathi Amsaad, Salim Hariri, Marwah Almasri, Syed Rizvi, Mohamed Ben Haj Frej. Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider. IEEE Access, vol. 8, pp. 80812-80826, 2020. (PDF)
Syed Rizvi, RJ Orr, Austin Cox, Prithvee Ashokkumar, and Mohammad R. Rizvi. Identifying the Attack Surface for IoT Network. Submitted to Internet of Things; Engineering Cyber Physical Human Systems – Elseiver, Volume 9, March 2020. (PDF)
Syed Rizvi, Shakir Campbell, and Kieran Alden, “Why Compliance is needed for Internet of Things?,” IEEE 6th International Conference on Software Security and Assurance (IEEE ICSSA), October 28 -30, Altoona PA, USA. (in press)
Syed Rizvi, Anthony Avella, Andrew Gibson, Marcus Ryan, Ryan Strimple, and Ian Menovich, “VM based Malware Security Protection on Android Platform,” IEEE 6th International Conference on Software Security and Assurance (IEEE ICSSA), October 28 -30, Altoona PA, USA. (in press)
Syed Rizvi, Tanner Flock, Travis Flock, and Iyonna Williams, “Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts,” IEEE 6th International Conference on Software Security and Assurance (IEEE ICSSA), October 28 -30, Altoona PA, USA. Received Best Paper Award
2019:
Syed Rizvi, Joseph Pfeffer, Andrew Kurtz, and Mohammad R. Rizvi. A Security Matrix for Internet of Things (IoT) Networks. Submitted to Internet of Things; Engineering Cyber Physical Human Systems – Elseiver, December 2019. (under review).
Syed Rizvi, Nicholas Mcintyre, and Jungwoo Ryoo, “Computing Security Scores for IoT Device Vulnerabilities,” 2019 IEEE 5th International Conference on Software Security and Assurance (IEEE ICSSA), July 25-26, St. Pölten, Lower Austria, Austria. (PDF).
Syed Rizvi, Jarrett Imler, Luke Ritchey, and Michael Tokar, “Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection,” 2019 IEEE 5th International Conference on Software Security and Assurance (IEEE ICSSA), July 25-26, St. Pölten, Lower Austria, Austria. (PDF).
Syed Rizvi, Kieran Alden, and Shakir Campbell, “A Hybrid Framework for Detecting Repackaged Applications on the Android Market,” 2019 IEEE 5th International Conference on Software Security and Assurance (IEEE ICSSA), July 25-26, St. Pölten, Lower Austria, Austria (PDF).
Syed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar, “Securing PKES Against Relay Attacks Using Coordinate Tracing and Multi-Factor Authentication,” 53rd Annual Conference on Information Sciences and Systems (CISS 2019), Baltimore – MD, March 20-22-2019. (PDF).
2018:
M. Uddin, S. Rizvi and A. Razaque. Proposinglogical table constructs for enhanced machine learning process. IEEE Access, 6, 47751-47769. 2018. (PDF).
Muhammad Fahim Uddin , Jeongkyu Lee, Syed Rizvi and Samir Hamada, “Proposing Enhanced Feature Engineering and a Selection Model for Machine Learning Processes,” Applied Sciences 2018, 8(4), 646; doi: 10.3390/app8040646 (PDF).
Ryan Pipetti, Nicholas Mcintyre, Jonathan Todd and Syed Rizvi, "An Attack Vector for IoT Networks," IEEE 4th International Conference on Software Security and Assurance (IEEE ICSSA), July 26-27 2018, Seoul, South Korea, pp. 39-44, doi: 10.1109/ICSSA45270.2018.00019. (PDF).
Syed Rizvi, Abdul Razaque and Joseph Gualdoni, "Securing Wireless Sensor Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol," 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), pp. 721-726, July 31th - August 3rd, 2018, New York, USA. doi: 10.1109/TrustCom/BigDataSE.2018.00105 .(PDF)
Syed Rizvi, Joseph Pfeffer, Andrew Kurtz, and Mohammad R. Rizvi, “Securing the Internet of Things (IoT): A Security Taxonomy and Dashboard,” 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), pp. 163-168, July 31th - August 3rd, 2018, New York, USA. doi: 10.1109/TrustCom/BigDataSE.2018.00034.Accepted. (PDF)
2017:
Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi, “Secure Online Transaction Algorithm: Securing Online Transaction Using Two-Factor Authentication,” 2017 Complex Adaptive System, Volume 114, 2017, Pages 93-99, Chicago, IL, October 30-November 1, 2017 (PDF)
Syed Rizvi, Hannah Roddy, Joseph Gualdoni, aned Ilva Myzyri, “Three-Step Approach to QoS Maintenance in Cloud Computing Using a Third Party Auditor,” 2017 Complex Adaptive System, Volume 114, 2017, Pages 83-92, Chicago, IL, October 30-November 1, 2017. (PDF)
Syed Rizvi , Jonathon Willet, Donte Perino, Chandler Condo, “A Threat to Vehicular Cyber Security and the Urgency for Correction,” 2017 Complex Adaptive System, Volume 114, 2017, Pages 100-105, Chicago, IL, October 30-November 1, 2017. (PDF)
Ray Zimmerman, Syed Rizvi, Sarah Hoover, Joseph Gualdoni, and Andrew Kurtz. 2018. Taint flow analysis to improve Android application security. J. Comput. Sci. Coll. Vol. 33, No. 3 (January 2018), pp. 83-97. (PDF)
Lamjed Zahrouni, Dayton Blackwood, Syed Rizvi, and Joseph Gualdoni, “Preventing Identity Theft Using Biometrics based Authentication System,” 2017 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT), pp. 1-6, October 11 - 13, 2017, Amman, Jordan. (PDF)
Joseph Gualdoni, Andrew Kurtz, Syed Rizvi, Ilva Myzyri, and Megan Wheeler, “Multi-Layer Defense Model for Securing Online Financial Transactions,” 2017 IEEE 3rd International Conference on Software Security and Assurance, July 24 - 25, 2017, Altoona PA. (PDF)
Evan English, Daniel Stacey, Syed Rizvi, and Donte Perino, “Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage,” 2017 IEEE 3rd International Conference on Software Security and Assurance, July 24 - 25, 2017, Altoona PA. (PDF)
S. Rizvi, J. Ryoo, J. Kissell, and W. Aiken. A Security Evaluation Framework for Cloud Security Auditing. To Special Issue of Journal of Supercomputing on ‘Everything as a Service: cloud computing for innovative services and paradigm’. doi:10.1007/s11227-017-2055-1 (PDF).
Rizvi, S. & Razaque, A. Secure Data Aggregation Using Access Control and Authentication for Wireless Sensor Networks. Submitted to Computers & Security - Elseiver, July 2017. (PDF).
Abdul Razaque, Syed Rizvi, Meer JK, Qassim Hani Bani, Julius P Dichter, Reza Meimandi Parizi ” Secure, Energy-Efficient and Quality-of-Service-Supported Service-Oriented Architecture for Cloud Computing Environment”, Computers & Security - Elseiver, Volume 66, May 2017, Pages 169–184 . (PDF).
Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almi’ani, Syed Rizvi, Akshat Hans. Token Security for the Internet of Things. International Journal of Embedded Systems (IJES) - Inderscience Publishers. (In Press - Accepted)
Abdul Razaque, Syed Rizvi, "Privacy Preserving Model: A New Scheme for Auditing Cloud Stakeholders," To Journal of Cloud Computing, (2017) 6: 7. doi:10.1186/s13677-017-0076-1 (PDF).
Syed Rizvi, Trent Bolish and Joseph Pfeffer, "Security Evaluation of Cloud Service Providers Using Third Party Auditors," Second International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (PDF).
Syed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder and Seth Marasco,"Protecting an Automobile Network Using Distributed Firewall System," Second International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (PDF).
Syed Rizvi and Jonathan Willett. 2017. A new hybrid security program for securing automobile networks: poster session. J. Comput. Sci. Coll. 32, 3 (January 2017), 77-77.(PDF)
2016:
Abdul Razaque, Muder Almani, Syed S. Rizvi and Batu Vamsi, "A New Power Efficient Wireless Modem," IEEE 19th International Multi-Topic Conference (INMIC 2016), pp. 1-5. (PDF)
Abdul Razaque, Syed S. Rizvi, "Black-Box: A New Secure Distributed Peer-to-Peer File Storage and Backup System," IEEE 19th International Multi-Topic Conference (INMIC 2016), pp. 1-6. (PDF)
Syed S. Rizvi and John K. Mitchell, "A New Access Control Scheme for Protecting Distributed Cloud Services and Resources", Services Transactions on Cloud Computing (STCC), 4(3), 2016, pp. 28-41. (PDF)
Abdul Razaque, Syed S. Rizvi, “Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment,” Computers & Security, Volume 62, Pages 328-347, September 2016. (PDF).
Syed Rizvi, Gabriel Labrador, Matt Guyan and Jeremy Savan, “Advocating for Hybrid Intrusion Detection Prevention System and Framework Improvement,” Procedia Computer Science (2016) pp. 369-374, 21 Sep 2016. (PDF).
Syed Rizvi, Gabriel Labrador, Whitney Hernandez, Kelsey Karpinski, “Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices. Security,” Privacy and Reliability in Computer Communications and Network, The River Publishers Series in Communications. Published.
Syed Rizvi, Cory Roger, Aaron Zuchelli, “The Use of Biometrics to Prevent Identity Theft,” Intelligent Systems Technologies and Applications 2016, Volume 530 of the series Advances in Intelligent Systems and Computing, pp 367-381, September 2016. (PDF)
2015:
Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker. A User Oriented Cloud Security Evaluation Framework, International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 3, No. 2, 2015. (PDF).
Syed Rizvi, Kelsey Karpinski, Abdul Razaque. Novel Architecture of Self-organized Mobile Wireless Sensor Networks, Journal of Computing Science and Engineering, Vol. 9, No. 4, December 2015, pp. 163-176. (PDF)
Yuhong Liu, Yan (Lindsay) Sun, Jungwoo Ryoo, Syed Rizvi, and Athanasios V. Vasilakos, “A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions,” Journal of Computing Science and Engineering, Vol. 9, No. 3, September 2015, pp. 119-133. (PDF).
Syed Rizvi, Abdul Razaque, and Katie Cover, “Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment.” accepted to The 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), November 3 - 5, New York USA. (in press).
Syed Rizvi, Nathan Showan, and John Mitchell, “Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking,” Complex Adaptive Systems 2015, Volume 61, Pages 206–212, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.195
Syed Rizvi, Kelsey Karpinski, Taryn Walker, and Brennen Kelly, “Utilizing Third Party Auditing to Manage Trust in the Cloud,” Complex Adaptive Systems 2015, Volume 61, 2015, Pages 191–197, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.192
John Mitchell, Syed Rizvi, and Jungwoo Ryoo, "A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider," To The 2015 The 1st International Conference on Software Security and Assurance (ICSSA'15), July 27, 2015, Sungkyunkwan University, Korea. (accepted & presented)
Syed Rizvi, Abdul Razaque and Katie Cover, "Cloud Data Integrity Using a Designated Public Verifier," in 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), pp.1361-1366, 24-26 Aug. 2015. (PDF). doi: 10.1109/HPCC-CSS-ICESS.2015.277
Syed Rizvi and John Mitchell, "A Semi-Distributed Access Control Management Scheme for Securing Cloud Environment," The 8th IEEE International Conference on Cloud Computing (CLOUD 2015), New York, US, June 27 - July 2, 2015. (Acceptance Rate is 14%). [PDF]. doi: 10.1109/CLOUD.2015.73
Syed Rizvi, Jesse Braughler, Joshua Clark, Adam Contino, and Rebecca Tsang, "Minimizing Black Hat SEO to Improve Security in Mobile Platforms," To The 5th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems (MobiPST 2015), Las Vegas, Nevada, USA, August 6, 2015. (Accepted)
S. Rizvi, J. Ryoo, J. Kissell, and W. Aiken. A Stakeholder-Oriented Assessment Index for Cloud Security Auditing. The 9th ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM), Bali, Indonesia, January 2015. [PDF] (Received best paper award).
2014:
Diamond Fair, Jaren Schugar, Syed Rizvi, Tyler Milewski, Scott Swetkowski, John Mitchell, "A DMZ based Authentication Scheme for Securing Cloud Environment," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2014), December –12-14, 2014. (accepted).
Syed Rizvi and Nathan Showan, “A Framework to Facilitate Modeling of a Cognitive Radio Networks Using Layered Architecture,” In Proceedings of the IEEE 17th International Multi-Topic Conference (INMIC), pp. 119 – 124, December 08 - 10, 2014. (PDF)
Syed Rizvi, John Mitchell, and Nathan Showan, “Analysis of Security Vulnerabilities and Threat Assessment in Cognitive Radio (CR) Networks,” In Proceedings of the IEEE 8th International Conference on Application of Information and Communication Technologies (AICT2014), Kazakhstan, Astana, pp. 1 – 6, October 15-17, 2014. (PDF)
Syed Rizvi, Katie Cover and Chris Gates, “'A Trusted Third-Party (TTP) Based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment,” 2014 Complex Adaptive Systems, Procedia Computer Science, vol. 36, pp. 381 – 386, November 2014. (PDF)
Natasha Csicsmann, Victoria McIntyre, Patrick Shea, and Syed Rizvi, “Cloud Security: Implementing Biometrics to Help Secure the Cloud," Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 239 – 253, October, 2014. Book Link
John Regola, John Mitchell, Brandon Baez, and Syed Rizvi, “Analyzing the Security Susceptibilities of Biometrics Integrated With Cloud Computing," Securing Cloud-Based Databases with Biometric Applications, Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 194 – 211, October 2014. Book Link
John Mitchell and Syed Rizvi, “A Framework for Leveraging Cloud Computing to Facilitate Biometrics,” 2014 International Conference on Security and Management (SAM'14), pp. 344 – 350, Las Vegas, USA, July 21 - 24.(PDF)
Syed Rizvi; Jungwoo Ryoo; Yuhong Liu; Zazworsky, D.; Cappeta, A, "A centralized trust model approach for cloud computing," In proceedings of 23rd IEEE Wireless and Optical Communication Conference (WOCC), pp.1-6, May 2014. (PDF)
Liu, Yuhong, Jungwoo Ryoo, and Syed Rizvi. Ensuring Data Confidentiality in Cloud Computing: An Encryption and Trust-based Solution." In proceedings of 23rd IEEE Wireless and Optical Communication Conference (WOCC), Newark, NJ, May 2014.
Syed S. Rizvi and Nathan D. Showan, “A Generic Layered Modeling for Cognitive Radio Networks,” In proceeding of the 2014 Spring Simulation Multi-Conference (SpringSim'14), April 13-16, 2014. Tampa, FL, USA.(PDF)
Syed Rizvi, Khaled Elleithy, and Mustafa Khan, “An Opportunistic Frequency Channels Selection Scheme for Interference Minimization,” In proceeding of 2014 American Society for Engineering Education Zone 1 Conference (ASEE), April 3-5, 2014 University of Bridgeport, Bridgeport, Connecticut, U.S.A. (PDF)
Rashmi Hagavane, Susmitha Pati, and Syed Rizvi, “Increasing Quality of Service (QoS) in Wireless Sensor Networks (WSN) by Using Timestamp Optimization Scheme,” In proceeding of 2014 American Society for Engineering Education Zone 1 Conference (ASEE), April 3-5, 2014 University of Bridgeport, Bridgeport, Connecticut, U.S.A. (PDF)
Christopher Meek, Syed Rizvi, and Jungwoo Ryoo, “Integrating Software Defined Networks with Cloud Computing: Issues and Challenges,” In proceeding of International Conference on Business, Economics and Information Technology (ICBEIT 2014), March 17 and 18, 2014, Taipei City, Taiwan.
Natasha Csicsmann, Victoria McIntyre, Patrick Shea, Syed Rizvi, and Jungwoo Ryoo, “Biometric Based Authentication Adoption in Cloud and its Security Challenges,” In proceeding of International Conference on Business, Economics and Information Technology (ICBEIT 2014), March 17 and 18, 2014, Taipei City, Taiwan.
Syed Rizvi and Nathan Showan. “Bandwidth and End-to-End Delay Analysis of IP and End System Multicast (ESM).” Network Security Conference (FloCon 2014), Charleston, South Carolina, on January 13–16, 2014. (Poster-Presentation)
J. Ryoo, Rizvi, S., Aiken, W., and Kissell, J., “Cloud Security Auditing: Challenges and Emerging Approaches”, IEEE Security and Privacy, vol. 12, no. 6, pp. 68 - 74, Nov.-Dec. 2014.
2013:
Varun Rao and Syed Rizvi, “An Effective Malicious Node Detection Scheme for Mobile Ad Hoc Networks”, In Proceedings of the 2013 Modern Technology and Management Institute (MTMI). Review of Business and Technology Research, Vol. 9, No. 1, pp. 341 – 347, September 2013. ISSN 1941-9414.
W. Aiken, Kissell, J., Ryoo, J., and Rizvi, S., “Auditing the Cloud for Security: Challenges and Solutions”, International Conference on Business, Economics, and Information Technology (ICBEIT). Cairns, Australia, 2013.
Syed Rizvi. An LP Simulation Model for conservative Distributed simulation systems. International Journal of Simulation Modelling, Vol. 12, No. 2, pp. 69 - 81, June 2013. [PDF] [Journal Link]
2012:
Syed Rizvi. Algorithm for Improving the Computing Power of Next Generation Wireless Receivers. Journal of Computing Science and Engineering, Vol. 6, No. 4, pp. 310-319, December 2012. (PDF)
2011:
Manal AL-Bzoor, Laiali Almazaydeh, and Syed S. Rizvi. Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks. International Journal of Computer Networks (IJCN), Vol. 5, Issue. 5, pp. 443 - 455, 2011. [PDF][Journal Link]
Syed S. Rizvi and Khaled M. Elleithy, “A Generic Optimized Time Management Algorithms (OTMA) Framework for Simulating Large-Scale Overlay Networks,” Proceedings of the 14th Communications and Networking Simulation Symposium (CNS'11) at the 2011 Spring Simulation Multiconference, pp. 27 - 34, Boston, MA, April 4 – 7, 2011.[PDF]
2010:
Bryan Sarazin and Syed Rizvi. A Self-Deployment Obstacle Avoidance (SOA) Algorithm for Mobile Sensor Networks, International Journal of Computer Science and Security (IJCSS), Vol. 4, Issue. 3, pp. 316 - 330, 2010. [PDF] [Journal Link].
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. An Efficient Optimistic Time Management Algorithm for Discrete-Event Simulation System, International Journal of Simulation Modeling, Vol 9. No. 3, pp. 117 - 130, September 2010 . [PDF] [Journal Link].
Syed S. Rizvi, Aasia Riasat, Khaled M. Elleithy, and Min Song. A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems, Journal of Communications (JCM), Vol. 5, No. 6, pp. 455 - 466, JUNE 2010. [PDF] [Journal Link]
Majid Jafri, Syed Rizvi, Laiali Almazaydeh, and Aasia Riasat. A New Scheme for Improving Route Discovery and Route Maintenance for Mobile Ad Hoc Networks (MANET), International Journal of Information Sciences and Computer Engineering, Vol. 1, No. 2, pp. 36–41, 2010. [PDF] [Journal Link]
Anil Mathew, Nithin Chandrababu, Khaled Elleithy, Syed Rizvi. IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence, International journal of Computer Networks & Communications, Vol.2, No.3, pp. 140 - 150, May 2010.[PDF] [Journal Link]
Hemen Patel, Syed S. Rizvi, Laiali Almazaydehand, and Aasia Riasat. Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock. International Journal of Computer Science & Information Technology. Vol. 2, No. 2, pp. 1 - 8, April, 2010. [PDF] [Journal Link].
Auf Akhtar, Syed S. Rizvi, and Laiali Almazaydeh. Data Guard: A New Approach for Disaster Recovery and Rolling Upgrades. International Journal of Database Management Systems. Vol. 2, No.1, pp. 30 - 37, Feb 2010. [PDF] [Journal Link]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Deterministic Formulization of End-to-End Delay for Multicast Systems, International journal of Computer Networks & Communications. Vol. 2, No.1, pp. 170 - 183, January 2010. [PDF] [Journal Link]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application, International Journal of Network Security & Its Applications. Vol.2, No.1, pp. 82 - 96, January 2010. [PDF] [Journal Link]
Abdelrehman Elleithy, Syed S. Rizvi, and Khaled M. Elleithy, “Optimization and Job Scheduling in Heterogeneous Networks,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 257 – 262, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Abdelrehman Elleithy, Syed S. Rizvi, and Khaled M. Elleithy, “Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT Algorithm,” Advanced Techniques in Computing Sciences and Software Engineering, pp. 449 – 453, Springer, 2010, ISBN:978-90-481-3659-9. [PDF]
Syed S. Rizvi, Dipali Shah, and Aasia Riasat, “Implementation of Tree and Butterfly Barriers with Optimistic Time Management Algorithms for Discrete Event Simulation,” Advanced Techniques in Computing Sciences and Software Engineering, pp. 455 – 460, Springer, 2010, ISBN:978-90-481-3659-9. [PDF]
Allon Rai, Sangita Ale, Syed S. Rizvi, and Aasia Riasat,” A New Methodology for Self Localization in Wireless Sensor Networks,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 263 – 268, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Syed S. Rizvi, Majid A. Jafri, and Khaled Elleithy, “A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET),” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 269 – 274, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, “A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 275 – 279, Springer, 2010, ISBN: 978-90-481-3662-9.[PDF]
Syed S. Rizvi, Adil Sheikh, and Aasia Riasat, “Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm," Novel Algorithms and Techniques in Telecommunications and Networking, pp. 281 – 286, Springer, 2010, ISBN: 978-90-481-3662-9.[PDF]
Jaiminkumar Gorasia, Syed S. Rizvi, and Aasia Riasat, “Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD),” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 287 – 292, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, “A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution,” Novel Algorithms and Techniques in Telecommunications and Networking, pp. 293 – 298, Springer, 2010, ISBN: 978-90-481-3662-9. [PDF]
Syed S. Rizvi, Aasia Riasat, and Mohammad Sheikh, “A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks, “Novel Algorithms and Techniques in Telecommunications and Networking, pp. 299 – 304, Springer, 2010, ISBN: 978-90-481-3662-9.[PDF]
Syed S. Rizvi, Shalini Poathan, and Khaled M. Elleithy, “A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems, “Advanced Techniques in Computing Sciences and Software Engineering, pp. 589 – 593, Springer, 2010, ISBN:978-90-481-3659-9.[PDF]
2009:
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for Multicast Systems, International Journal of Computer Networks, Vol. 1, No.1, pp. 1 - 20, September 2009. [PDF] [Journal Link]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. A Quantitative Analysis of Handover Time at MAC Layer for Wireless Mobile Networks. International Journal of Wireless & Mobile Networks (IJWMN), Vol. 1, No. 3, pp. 21 - 28, 2009. [PDF] [Journal Link]
Jalpa Bani and Syed S. Rizvi. A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack. International Journal of Computer Science and Information Security. Vol. 4, No.1, pp. 110 - 116, 2009. [PDF]
Allon Rai, Sangeta Ale, Syed S. Rizvi, and Aasia Riasat. Power Efficient Scheme for Self Localization in Wireless Sensor Networks. Journal of Communication and Computer. Vol. 6, No. 11, pp. 37-44, 2009. [PDF] [Journal Link]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks. International Journal of Computer Science and Information Security. Vol. 3, No. 1, pp. 25-34, 2009. [PDF]
Syed S. Rizvi and Khaled M. Elleithy. A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks.International Journal of Computer Science and Information Security . Vol. 3, No. 1, pp. 45-54, 2009. [PDF]
Anil Mathew, Nithin Chandrababu, Khaled Elleithy, and Syed S. Rizvi,”IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence”, 7th Annual Conference on Communication Networks and Services Research (CNSR2009) Moncton, New Brunswick, Canada, pp. 217 - 223, May 11 - 13, 2009. [PDF]
Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, “Analyzing SNR Performance of a Low-Complexity Wireless Multiuser Receiver for DS-CDMA Systems,” IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 4, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, “A Low Complexity Optimum Multi-user Receiver for Maximizing the BER Performance for DS-CDMA Systems,”IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Active Scanning: A Better Approach to Reduce Handover Time at MAC Layer for Wireless Networks,” IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 4, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Deterministic Formulization of Bandwidth Efficiency for Multicast Systems, ”IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]
Bevin Thomas, Syed S. Rizvi, and Khaled M. Elleithy, “Reducing Null Messages Using Grouping and Status Retrieval for a Conservative Discrete-Event Simulation System,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]
Syed S. Rizvi, Hemen Patel, and Khaled M. Elleithy, “Parallel and Distributed Algorithms and Implementations: Time Based Mutual Exclusion,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]
Syed S. Rizvi, Bevin Thomas, Khaled M. Elleithy, and Aasia Riasat, “A New Technique of Switch & Feedback Job Scheduling Mechanism in a Distributed System,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, Doubletree Hotel San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]
Nilay Patel, Mayuresh Bhalekar, Pandya Nirav, Syed S. Rizvi, Khaled Elleithy, “Reducing Power Consumption in Sensor Network Using Sensor MAC Protocol,”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Hemen Patel, Syed S. Rizvi, and Khaled M. Elleithy, “A New Approach to Avoid Deadlock in Parallel Discrete Event Simulation (PDES) System, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Hiral Patel, Syed S. Rizvi, and Aasia Riasat, “Performance Model for a Conservative Distributed Simulation Environment using Null Messages to Avoid Deadlock, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Gowrilakshmi Ponuratinam, Bhumika Patel, Syed S. Rizvi, and Khaled M. Elleithy, “Improvement in the Spread Spectrum System in DSSS, FHSS, AND CDMA, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Muhammad Imran, Asif Shaikh, Syed S. Rizvi, Khaled M. Elleithy, “Performance Analysis of Switches in High Speed LAN, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Viktorov Dmitry, Barvaliya Narendrakumar, and Syed S. Rizvi, “Teredo Security Modernization,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Yinqiu Wang, Wei Wang, and Syed S. Rizvi, “A Cross-Layer Design Approach for Improving QoS of Wireless Networks,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Heven Patel, Hardik Patel, Aditya Jagannath, Syed S. Rizvi, Khaled Elleithy, “A Novel Simulation Based Methodology for the Congestion Control in ATM Networks, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat,"The use of Orthogonal Frequency Code Division (OFCD) Multiplexing in Wireless Mesh Network (WMN)," Fourth-Generation (4G) Wireless Networks: Applications and Innovations. A book published by IGI Global (IDEA Group). pp. 565-581. 2010. (Book Link) [Book Description] [Book at Amazon]
2008:
Allon Rai, Sangita Ale, Syed Rizvi and Aasia Riasat," A New Methodology for Self Localization in Wireless Sensor Networks," 12th IEEE International Multi-topic Conference (IEEE INMIC 2008), pp. 260 - 265, Bahria University Karachi, Pakistan, 23-24 December 2008. [PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy, “A Mathematical Model for Evaluating the Performance of Multicast Systems,” IEEE International Workshop on IP Multimedia Communications (IPMC 2008), August 4 - 7, 2008, St. Thomas U.S. Virgin Islands in conjunction with the 17TH International Conference on Computer Communications and Networks (ICCCN). [PDF]
Syed S. Rizvi, Aasia Riasat, Khaled M. Elleithy, and Mustafa Khan, “The Worst and Best case Capacity Analysis of Mobile Ad Hoc Networks (MANET) using a 3-Phase Algorithm,” The 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks: IEEE SECON 2008. pp. 594 - 596, June 16-20, 2008, San Francisco Bay Area, 2008 [PDF]
Syed S. Rizvi and Aasia Riasat, “Reducing Null Message Traffic in Large Parallel and Distributed Systems,” 13th IEEE Symposium on Computers and Communications (ISCC'08), pp. 1115 - 1121, July 6 - 9, 2008, Marrakech, Morocco. (Received Best Paper Award) [PDF]
Syed S. Rizvi and Aasia Riasat, "Combining the Synchronous Protocol with the Optimistic Time Management Algorithm (TMA) to Improve the Latency and the Processor Idle Time," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08, Las Vegas, Navada, pp. 290-296, July 14 - 17, 2008.
Syed S. Rizvi and Aasia Riasat, "A New Architecture for Minimizing the Transmission Overhead for Large Parallel and Distributed Networks," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08 - Las Vegas, Navada. pp. 270-276, July 14 - 17, 2008.
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, "An Efficient Single Bit Store and Forward (SBSF) Routing Algorithm for Mesh-Hypercube (M-H) Networks," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP'08. Las Vegas, Navada. pp. 69 - 75, July 14 - 17, 2008.
Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 399-404, April 24-26 2008. [PDF]
Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy, “A Closed Form Expression for BER of Synchronous DS-CDMA Multi-user Detector,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 110-114, April 24-26 2008. [PDF]
Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm to Prevent Cache Timing Attack,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, “Analytical and Speedup Models for Performance Evaluation of a Generic Reconfigurable Coprocessor (RC) Architecture,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]
Syed S. Rizvi, Aasia Riasat, and Faraz Arain, “Innovative Glass-Box Approach: A Better Way to Enhance Learning of Complex Dynamic Systems,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]
Auf Akhtar, Syed S. Rizvi, and Khaled M. Elleithy, “A Novel Approach of Using Data Guard for Disaster Recovery & Rolling Upgrades,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]
2007:
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Deterministic Formalization of the Processing Gain for Reducing MAI in Wireless Multiuser DS-CDMA Systems,” 5th Annual IEEE Consumer Communications and Networking Conference (IEEE CCNC'2008), pp. 859 - 860, January 10 – 12, 2008 in Las Vegas, Nevada. [PDF]
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Methodology for Efficient Traffic Management in ATM Networks for ATM Switching Systems," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Methodology for an Efficient Congestion Control in High Performance Packet Switching Networks," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi and Aasia Riasat, "Bit Error Rate (BER) Analysis of Synchronous DS-CDMA Multiuser Receivers," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Efficient 3-Phase Algorithm for Performing Capacity Analysis of Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Ashish Vekaria and Syed S. Rizvi, "A New Efficient Routing Approach for Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi and Varsha Edla, "REPU-TRUST Algorithm: An Efficient way for Minimizing the Malicious Behavior of Mobile Nodes in Ad Hoc Networks," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]
Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Software Based Approach for Minimizing Interference in RFID Application," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-user Receivers for DS-CDMA Systems,” 5th International Conference on Information Technology: New Generations ITNG 2008, April 7-9, 2008, Las Vegas, Nevada, USA. [PDF]
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “A New Mathematical Model for Optimizing the Performance of Parallel and Discrete Event Simulation Systems,” 11th Communications and Networking Simulation Symposium (CNS'08), Part of the 2008 Spring Simulation Multiconference (SpringSim'08). April 14-16, 2008. Crowne Plaza Ottawa, Ottawa, Ontario (PDF)
Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “A Novel Approach for Creating Trust to Reduce Malicious Behavior in Mobile Ad Hoc Networks (MANET),” 3rd International Conference on emerging Networking Experiments and Technologies (CoNEXT), Columbia University, New York, NY, December 10 -13, 2007. (PDF) (Video Presentation)
Syed S. Rizvi, Syed N. Hyder, Aasia Riasat, “Performance Model for a Reconfigurable Coprocessor,” accepted in International Conference on Industrial Electronics, Technology & Automation (IETA 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF)(Audio Presentation)
Aasia Riasat, Syed S. Rizvi, Farheen Zehara, and Faraz Arain, “The Role of System Dynamics in Learning Environments,” International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Syed S. Rizvi, Eslam M. Gebriel, and Aasia Riasat, “RFID: A New Software Based Solution to Avoid Interference,” International Conference on Systems, Computing Sciences and Software Engineering (SCSS 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF)
Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks,” International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Syed S. Rizvi, Aasia Riasat, Muhammad S. Rashid, and Khaled M. Elleithy, “An Efficient Scheme for Traffic Management in ATM Networks,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing the Energy Consumption”, International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Syed S. Rizvi, Aasia Riasat, Muhammad S. Rashid, and Khaled M. Elleithy, “Bandwidth Problem in High Performance Packet Switching Network,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Aasia Riasat, Syed S. Rizvi, Faraz Arain, Rizwan M. Qureshi, “Dynamic Semantics of the Web: Useful Toll for the New Generation Agent-Based Software,” International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Khurram M. Rajput, Khaled M. Elleithy, and Syed S. Rizvi, “A Novel Approach for Creating Consistent Trust and Cooperation (CTC) among Mobile Nodes of Ad Hoc Network,” International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF)
Ajay Shrestha, Khaled M. Elleithy, and Syed S. Rizvi, “Investigating the effects of Encoder Schemes, WFQ & SAD on VoIP QoS,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 07), Bridgeport, CT, USA. December 3 - 12, 2007. (PDF) (Audio Presentation)
Syed S. Rizvi, Khaled. M. Elleithy, and Aasia Riasat, Transformation Matrix Algorithm for Reducing the Computational Complexity of Multiuser Receivers for DS-CDMA Wireless Systems,” 8th IEEE Wireless Telecommunication Symposium (IEEE WTS 2007), Pomona, California, April 26-28 2007. (PDF)
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “The Impact of Reduced Computational Complexity of Multiuser Detectors on the Processing Gain in a Wireless DS-CDMA Multiuser System,” Proceedings of the 2007 International Conference on Wireless Networks (ICWN’07). Part of the 2007 World Congress in Computer Science, Computer Engineering, & Applied Computing (Worldcomp’07), pp. 70 – 76, Las Vegas, Nevada, USA, June 25-28, 2007.
Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Trees and Butterflies Barriers in Distributed Simulation System: A Better Approach to Improve Latency and the Processor Idle Time”, IEEE International Conference on Information and Emerging Technologies (IEEE ICIET-2007), pp. 1 – 6, July 06-07, 2007, Karachi, Pakistan. (PDF)
Syed S. Rizvi, Aasia Riasat, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing Energy Consumption,” IEEE International Conference on Information and Emerging Technologies (IEEE ICIET-2007), pp. 1 – 7, July 06-07, 2007, Karachi, Pakistan (PDF)
Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, and Khaled M. Elleithy, “An Approach to Reduce the Energy Consumption in Wireless Sensor Networks through Active Nodes Optimization,” 2007 NEW ENGLAND AMERICAN SOCIETY FOR ENGINEERING EDUCATION CONFERENCE, April 20-21, 2007.(PDF)
2006:
Syed S. Rizvi, K. M. Elleithy, Aasia Riasat, “Minimizing the Null Message Exchange in Conservative Distributed Simulation,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2006, pp. 443-448, December 4-14, Bridgeport CT, 2006. (PDF)
Lee A. Belfore, Saurav Mazumdar, and Syed S. Rizvi et al., “Integrating the joint operation feasibility tool with JFAST,” Proceedings of the fall 2006 Simulation Interoperability Workshop, Orlando Fl, September 10-15 2006. (PDF)
Presentations:
Syed S. Rizvi, "Combining the Synchronous Protocol with the Optimistic Time Management Algorithm (TMA) to Improve the Latency and the Processor Idle Time," presented this paper in the 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08, Las Vegas, Navada. July 14 - 17, 2008
Syed S. Rizvi, "A New Architecture for Minimizing the Transmission Overhead for Large Parallel and Distributed Networks," presented this paper in the 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08 - Las Vegas, Navada. July 14 - 17, 2008
Syed S. Rizvi, "An Efficient Single Bit Store and Forward (SBSF) Routing Algorithm for Mesh-Hypercube (M-H) Networks," presented this paper in the 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP'08. Las Vegas, Navada. July 14 - 17, 2008
Syed S. Rizvi, "A Closed Form Expression for BER of Synchronous DS-CDMA Multi-user Detector," presented this paper in the 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, during April 24-26 2008.
Syed S. Rizvi, "A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack," presented this paper in the 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, during April 24-26 2008
Syed S. Rizvi, "Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-user Receivers for DS-CDMA Systems," presented this paper in the 5th International Conference on Information Technology: New Generations ITNG 2008, during April 7-9, 2008, Las Vegas, Nevada, USA.
Syed S. Rizvi, "Optimizing the Performance of Null Message Algorithm (NMA) for Large Parallel and Distributed Networks," presented this paper in the 9th LCI International Conference on High Performance Clustered Computing, National Center for Supercomputing Applications University of Illinois, Urbana, Illinois, USA, during April 29-May 1, 2008.
Syed S. Rizvi, "Performance Optimization of Large Parallel and Scalable Distributed Systems Using Trees and Butterflies Barriers with Optimistic Synchronization Algorithms," presented this paper in the 9th LCI International Conference on High Performance Clustered Computing, National Center for Supercomputing Applications University of Illinois, Urbana, Illinois, USA, April 29-May 1, 2008
Syed S. Rizvi, “QoS of Multiuser Communications,” presented in the WMC Lab, Tech Building, University of Bridgeport, 03 March, 2007.
Syed S. Rizvi, “Optimization of Null Message Algorithm in Large Parallel and Distributed Systems” presented in the WMC Lab, Tech Building, University of Bridgeport, on April 07, 2007
Syed S. Rizvi, “Intelligent Signal Detection and Estimation Maximum Likelihood Multiuser Receivers” presented in fall 2004 as part of Digital Signal Processing course. (PDF)
Syed S. Rizvi, “Out-of-Order Instruction Fetching using Multiple Sequencer”, presented in spring 2004 as part of COMPUTER ARCHITECTURE DESIGN course. (PDF)
Syed S. Rizvi, “Efficient Algorithm for Improving Computing Power of Wireless CD-CDMA Receivers”, presented in fall 2005 as part of High Performance Computer Architecture course. (PDF)
Syed S. Rizvi and Reneyal Castellino, “Simulation of Wire and Wireless Networks” presented in fall 2004 as part of Engineering Systems Modeling course. (PDF)
Reports:
Syed S. Rizvi, “Ontology Engineering: Construction and Intelligent Reuse of Ontology in semantic web”, research conducted as part of Intelligent Internet Database course (PDF)
Syed S. Rizvi, “Test Plan for an Implementation of a Distributed and Simulation Modeling Project” project implemented as part of Distributed Computer Simulation course. (PDF)
Syed S. Rizvi, “Role of Firewall in Network Security” presented in fall 2005 as part of N/W SECUR CNCPT-PRTCL-PRGRM course. (PDF)
Syed S. Rizvi, “A Comparative study of the Role of System Dynamics in Learning Environment”, research conducted as part of Engineering Systems Modeling course (PDF)
Syed S. Rizvi, “Reduced-Complexity Algorithm for Intelligent Signal Detection and Estimation of Maximum Likelihood Multiuser Receivers”, research conducted as part of Digital Signal Processing course. (PDF)
Syed S. Rizvi and Guillermo Loaisiga, “Performance Analysis of End-System Multicasting”, research conducted as part of Computer Networking course. (PDF)
Syed S. Rizvi, “A Critical Analysis of Out-of-Order Instruction Fetching using Multiple Sequencer”, research conducted as part of COMPUTER ARCHITECTURE DESIGN course.
Syed S. Rizvi, “Several Security Problems in 802. 11 WLAN”, research conducted as part of Advance Computer Communication & Networks course, May 2003. (PDF)