Publications (Topic Wise)

Security and Privacy in Cloud Computing

    1. Hannah Roddy, Ilva Myzyri, Syed Rizvi, and Joseph Gualdoni, “Three-Step Approach to QoS Maintenance in Cloud Computing Using a Third Party Auditor,” 2017 Complex Adaptive System, Chicago, IL, October 30-November 1, 2017. (Accepted)

    2. Evan English, Daniel Stacey, Syed Rizvi, and Donte Perino, “Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage,” To IEEE 3rd International Conference on Software Security and Assurance, July 24th - 25th, Altoona PA. (Accepted - presented)

    3. Abdul Razaque, Syed Rizvi, Meer JK, Qassim Hani Bani, Julius P Dichter, Reza Meimandi Parizi ” Secure, Energy-Efficient and Quality-of-Service-Supported Service-Oriented Architecture for Cloud Computing Environment”, Computers & Security - Elseiver, Volume 66, May 2017, Pages 169–184. (PDF)

    4. Abdul Razaque, Syed Rizvi, "Privacy Preserving Model: A New Scheme for Auditing Cloud Stakeholders," To Journal of Cloud Computing, (2017) 6: 7. doi:10.1186/s13677-017-0076-1 (PDF)

    5. Syed Rizvi, Trent Bolish and Joseph Pfeffer, "Security Evaluation of Cloud Service Providers Using Third Party Auditors," Second International Conference on Internet of Things and Cloud Computing, Cambridge city, Churchill College. University of Cambridge, United Kingdom. 22-23 March 2017. (in press)

    6. Syed Rizvi and John K. Mitchell, "A New Access Control Scheme for Protecting Distributed Cloud Services and Resources", Services Transactions on Cloud Computing (STCC), 4(3), 2016, pp. 28-41. (PDF)

    7. Abdul Razaque, Syed S. Rizvi, “Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment,” Computers & Security, Volume 62, Pages 328-347, September 2016. (PDF).

    8. Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker. A User Oriented Cloud Security Evaluation Framework, International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 3, No. 2, 2015. (PDF).

    9. Yuhong Liu, Yan (Lindsay) Sun, Jungwoo Ryoo, Syed Rizvi, and Athanasios V. Vasilakos, “A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions,” Journal of Computing Science and Engineering, Vol. 9, No. 3, September 2015, pp. 119-133. (PDF).

    10. Syed Rizvi, Abdul Razaque, and Katie Cover, “Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment.” 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud 2015), pp. 31-36, November 3 - 5, New York USA. (PDF).

    11. Syed Rizvi, Nathan Showan, and John Mitchell, “Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking,” Complex Adaptive Systems 2015, Volume 61, Pages 206–212, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.195

    12. Syed Rizvi, Kelsey Karpinski, Taryn Walker, and Brennen Kelly, “Utilizing Third Party Auditing to Manage Trust in the Cloud,” Complex Adaptive Systems 2015, Volume 61, 2015, Pages 191–197, San Jose CA, November 2-4, 2015. (PDF). doi:10.1016/j.procs.2015.09.192

    13. John Mitchell, Syed Rizvi, and Jungwoo Ryoo, "A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider," To The 2015 The 1st International Conference on Software Security and Assurance (ICSSA'15), pp. 19-24, July 27, 2015, Sungkyunkwan University, Korea. (PDF)

    14. Syed Rizvi, Abdul Razaque and Katie Cover, "Cloud Data Integrity Using a Designated Public Verifier," in 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), pp.1361-1366, 24-26 Aug. 2015. (PDF). doi: 10.1109/HPCC-CSS-ICESS.2015.277

    15. Syed Rizvi and John Mitchell, "A Semi-Distributed Access Control Management Scheme for Securing Cloud Environment," The 8th IEEE International Conference on Cloud Computing (CLOUD 2015), pp. 501-507, New York, US, June 27 - July 2, 2015. (Acceptance Rate is 14%). [PDF]. doi: 10.1109/CLOUD.2015.73 (Paper selected for journal publication in Services Transactions on Cloud Computing).

    16. S. Rizvi, J. Ryoo, J. Kissell, and W. Aiken. A Stakeholder-Oriented Assessment Index for Cloud Security Auditing. The 9th ACM International Conference on Ubiquitous Information Management and Communication (ACM IMCOM), Bali, Indonesia, January 2015. (Received best paper award). (Paper selected for journal publication in Journal of Supercomputing - Springer). (PDF)

  1. Diamond Fair, Jaren Schugar, Syed Rizvi, Tyler Milewski, Scott Swetkowski, John Mitchell, "A DMZ based Authentication Scheme for Securing Cloud Environment," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2014), December –12-14, 2014. (accepted).

    1. Syed Rizvi, John Mitchell, and Nathan Showan. Analysis of Security Vulnerabilities and Threat Assessment in Cognitive Radio (CR) Networks. The 8th International Conference on Application of Information and Communication Technologies (AICT2014), Kazakhstan, Astana, 15-17 October 2014. (accepted)

    2. Syed Rizvi, Katie Cover and Chris Gates, “'A Trusted Third-Party (TTP) Based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment,” 2014 Complex Adaptive Systems, Procedia Computer Science, vol. 36, pp. 381 – 386, November 2014. (PDF)

    3. Natasha Csicsmann, Victoria McIntyre, Patrick Shea, and Syed Rizvi, “Cloud Security: Implementing Biometrics to Help Secure the Cloud," Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 239 – 253, October, 2014. Book Link

    4. John Regola, John Mitchell, Brandon Baez, and Syed Rizvi, “Analyzing the Security Susceptibilities of Biometrics Integrated With Cloud Computing," Securing Cloud-Based Databases with Biometric Applications, Advances in Information Security, Privacy, and Ethics (AISPE) series, pp. 194 – 211, October 2014. Book Link

    5. John Mitchell and Syed Rizvi, “A Framework for Leveraging Cloud Computing to Facilitate Biometrics,” 2014 International Conference on Security and Management (SAM'14), pp. 344 – 350, Las Vegas, USA, July 21 - 24.(PDF)

    6. Syed Rizvi; Jungwoo Ryoo; Yuhong Liu; Zazworsky, D.; Cappeta, A, "A centralized trust model approach for cloud computing," In proceedings of 23rd IEEE Wireless and Optical Communication Conference (WOCC), pp.1-6, May 2014. (PDF)

    7. Liu, Yuhong, Jungwoo Ryoo, and Syed Rizvi. Ensuring Data Confidentiality in Cloud Computing: An Encryption and Trust-based Solution." In proceedings of 23rd IEEE Wireless and Optical Communication Conference (WOCC), Newark, NJ, May 2014.

    8. Christopher Meek, Syed Rizvi, and Jungwoo Ryoo, “Integrating Software Defined Networks with Cloud Computing: Issues and Challenges,” In proceeding of International Conference on Business, Economics and Information Technology (ICBEIT 2014), March 17 and 18, 2014, Taipei City, Taiwan.

    9. Natasha Csicsmann, Victoria McIntyre, Patrick Shea, Syed Rizvi, and Jungwoo Ryoo, “Biometric Based Authentication Adoption in Cloud and its Security Challenges,” In proceeding of International Conference on Business, Economics and Information Technology (ICBEIT 2014), March 17 and 18, 2014, Taipei City, Taiwan.

    10. Syed Rizvi and Nathan Showan. “Bandwidth and End-to-End Delay Analysis of IP and End System Multicast (ESM).” Network Security Conference (FloCon 2014), Charleston, South Carolina, on January 13–16, 2014. (Poster-Presentation)

    11. J. Ryoo, Rizvi, S., Aiken, W., and Kissell, J., “Cloud Security Auditing: Challenges and Emerging Approaches”, IEEE Security and Privacy, vol. 12, no. 6, pp. 68 - 74, Nov.-Dec. 2014.

Wireless and Multiuser Communications:

      1. Syed Rizvi, Khaled Elleithy, and Mustafa Khan, “An Opportunistic Frequency Channels Selection Scheme for Interference Minimization,” In proceeding of 2014 American Society for Engineering Education Zone 1 Conference (ASEE), April 3-5, 2014 University of Bridgeport, Bridgeport, Connecticut, U.S.A. (PDF)

  1. Rashmi Hagavane, Susmitha Pati, and Syed Rizvi, “Increasing Quality of Service (QoS) in Wireless Sensor Networks (WSN) by Using Timestamp Optimization Scheme,” In proceeding of 2014 American Society for Engineering Education Zone 1 Conference (ASEE), April 3-5, 2014 University of Bridgeport, Bridgeport, Connecticut, U.S.A. (PDF)

    1. Syed Rizvi. Algorithm for Improving the Computing Power of Next Generation Wireless Receivers. Journal of Computing Science and Engineering, Vol. 6, No. 4, December 2012, pp. 310-319.[Journal Link]

    2. Syed S. Rizvi, Khaled M. Elleithy, Aasia Riasat, and Min Song. A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems. Journal of Communications, Vol. 5, No. 6, pp. 455 - 466, June 2010.[PDF]

    3. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks. International Journal of Computer Science and Information Security (IJCSIS). Vol. 3, No. 1, pp. 25-34, 2009. [PDF]

    4. Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, “Analyzing SNR Performance of a Low-Complexity Wireless Multiuser Receiver for DS-CDMA Systems,” IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 4, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]

    5. Syed S. Rizvi, Khaled Elleithy, and Aasia Riasat, “A Low Complexity Optimum Multi-user Receiver for Maximizing the BER Performance for DS-CDMA Systems,”IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]

    6. Syed S. Rizvi, Khaled. M. Elleithy, and Aasia Riasat, Transformation Matrix Algorithm for Reducing the Computational Complexity of Multiuser Receivers for DS-CDMA Wireless Systems,” 8th IEEE Wireless Telecommunication Symposium (IEEE WTS 2007), Pomona, California, April 26-28 2007. [PDF]

    7. Gowrilakshmi Ponuratinam, Bhumika Patel, Syed S. Rizvi, and Khaled M. Elleithy, “Improvement in the Spread Spectrum System in DSSS, FHSS, AND CDMA, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    8. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy, “A Closed Form Expression for BER of Synchronous DS-CDMA Multi-user Detector,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 110-114, April 24-26 2008. [PDF]

    9. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Deterministic Formalization of the Processing Gain for Reducing MAI in Wireless Multiuser DS-CDMA Systems,” 5th Annual IEEE Consumer Communications and Networking Conference (IEEE CCNC'2008), pp. 859 - 860, January 10 – 12, 2008 in Las Vegas, Nevada. [PDF]

    10. Syed S. Rizvi and Aasia Riasat, "Bit Error Rate (BER) Analysis of Synchronous DS-CDMA Multiuser Receivers," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]

    11. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-user Receivers for DS-CDMA Systems,” 5th International Conference on Information Technology: New Generations ITNG 2008, April 7-9, 2008, Las Vegas, Nevada, USA. [PDF]

    12. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “The Impact of Reduced Computational Complexity of Multiuser Detectors on the Processing Gain in a Wireless DS-CDMA Multiuser System,” Proceedings of the 2007 International Conference on Wireless Networks (ICWN’07). Part of the 2007 World Congress in Computer Science, Computer Engineering, & Applied Computing (Worldcomp’07), pp. 70 – 76, Las Vegas, Nevada, USA, June 25-28, 2007.

Modeling & Simulation for Parallel and Distributed Systems:

    1. Syed S. Rizvi and Nathan D. Showan, “A Generic Layered Modeling for Cognitive Radio Networks,” In proceeding of the 2014 Spring Simulation Multi-Conference (SpringSim'14), April 13-16, 2014. Tampa, FL, USA.(PDF)

    2. Syed Rizvi. An LP Simulation Model for conservative Distributed simulation systems. International Journal of Simulation Modelling, Vol. 12, No. 2, June 2013. [Journal Link]

    3. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. An Efficient Optimistic Time Management Algorithm for Discrete-Event Simulation System, International Journal of Simulation Modeling, Vol 9. No. 3, pp. 117 - 130, September 2010 . [PDF] [Journal Link]

    4. Hemen Patel, Syed S. Rizvi, Laiali Almazaydehand, and Aasia Riasat. Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock. International Journal of Computer Science & Information Technology. (IJCSIT), Vol. 2, No. 2, pp. 1 - 8, April, 2010. [PDF][Journal Link].

    5. Bevin Thomas, Syed S. Rizvi, and Khaled M. Elleithy, “Reducing Null Messages Using Grouping and Status Retrieval for a Conservative Discrete-Event Simulation System,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]

    6. Syed S. Rizvi, Hemen Patel, and Khaled M. Elleithy, “Parallel and Distributed Algorithms and Implementations: Time Based Mutual Exclusion,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]

    7. Syed S. Rizvi, Bevin Thomas, Khaled M. Elleithy, and Aasia Riasat, “A New Technique of Switch & Feedback Job Scheduling Mechanism in a Distributed System,” 2009 Spring Simulation Multiconference (SpringSim'09), March 22 - 27, 2009, Doubletree Hotel San Diego-Mission Valley, San Diego, CA, March 22 - 27, 2009. [PDF]

    8. Hemen Patel, Syed S. Rizvi, and Khaled M. Elleithy, “A New Approach to Avoid Deadlock in Parallel Discrete Event Simulation (PDES) System, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    9. Hiral Patel, Syed S. Rizvi, and Aasia Riasat, “Performance Model for a Conservative Distributed Simulation Environment using Null Messages to Avoid Deadlock, ”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    10. Abdelrahman Elleithy, Syed S. Rizvi, and Khaled M. Elleithy, "Optimization and Job Scheduling in Heterogeneous Networks," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]

    11. Abdelrahman Elleithy, Syed S. Rizvi, and Khaled M. Elleithy, "Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT Algorithm," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]

    12. Syed Rizvi, Dipali Shah, and Aasia Riasat, "Implementation of Tree and Butterfly Barriers with Optimistic Time Management Algorithms for Discrete Event Simulation," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008.[PDF]

    13. Syed S. Rizvi, Shalini Poathan, and Khaled M. Elleithy, "A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 08), December 5 - 13, 2008. [PDF]

    14. Syed S. Rizvi and Aasia Riasat, “Reducing Null Message Traffic in Large Parallel and Distributed Systems,” 13th IEEE Symposium on Computers and Communications (ISCC'08), July 6 - 9, 2008, Marrakech, Morocco. (Received Best Paper Award) [PDF]

    15. Syed S. Rizvi and Aasia Riasat, "Combining the Synchronous Protocol with the Optimistic Time Management Algorithm (TMA) to Improve the Latency and the Processor Idle Time," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08, Las Vegas, Navada, pp. 290-296, July 14 - 17, 2008. [PDF]

    16. Syed S. Rizvi and Aasia Riasat, "A New Architecture for Minimizing the Transmission Overhead for Large Parallel and Distributed Networks," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing. WORLDCOMP'08 - Las Vegas, Navada. pp. 270-276, July 14 - 17, 2008. [PDF]

    17. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “A New Mathematical Model for Optimizing the Performance of Parallel and Discrete Event Simulation Systems,” 11th Communications and Networking Simulation Symposium (CNS'08), Part of the 2008 Spring Simulation Multiconference (SpringSim'08). April 14-16, 2008. Crowne Plaza Ottawa, Ottawa, Ontario [PDF]

    18. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, “Trees and Butterflies Barriers in Distributed Simulation System: A Better Approach to Improve Latency and the Processor Idle Time”, IEEE International Conference on Information and Emerging Technologies (IEEE ICIET-2007), pp. 1 – 6, July 06-07, 2007, Karachi, Pakistan. [PDF]

    19. Syed S. Rizvi, K. M. Elleithy, Aasia Riasat, “Minimizing the Null Message Exchange in Conservative Distributed Simulation,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2006, pp. 443-448 ,December 4-14, Bridgeport CT, 2006. [PDF].

  1. Lee A. Belfore, Saurav Mazumdar, and Syed S. Rizvi et al., “Integrating the joint operation feasibility tool with JFAST,” Proceedings of the fall 2006 Simulation Interoperability Workshop, Orlando Fl, September 10-15 2006. [PDF]

Wireless Sensor Networks (WSN):

    1. Bryan Sarazin and Syed Rizvi. A Self-Deployment Obstacle Avoidance (SOA) Algorithm for Mobile Sensor Networks, International Journal of Computer Science and Security (IJCSS), Vol. 4, Issue. 3, 2010.

    2. Allon Rai, Sangeta Ale, Syed S. Rizvi, and Aasia Riasat. New Methodology for Self Localization in Wireless Sensor Networks. Journal of Communication and Computer, (JCC). Vol. 6, No. 11, pp. 37-44, 2009.http://www.informatics.org.cn/. [PDF]

    3. Nilay Patel, Mayuresh Bhalekar, Pandya Nirav, Syed S. Rizvi, Khaled Elleithy, “Reducing Power Consumption in Sensor Network Using Sensor MAC Protocol,”2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    4. Allon Rai, Sangita Ale, Syed Rizvi and Aasia Riasat," A New Methodology for Self Localization in Wireless Sensor Networks," 12th IEEE International Multi-topic Conference (IEEE INMIC 2008), 23-24 December 2008, Bahria University Karachi, Pakistan. [PDF]

    5. Allon Rai, Sangita Ale, and Syed S. Rizvi, and Aasia Riasat," A New Power Efficient Algorithm for Self Localization in Wireless Sensor Networks," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 08), December 5 - 13, 2008. [PDF]

    6. Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing the Energy Consumption”, International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)

    7. Syed S. Rizvi, Aasia Riasat, “Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing Energy Consumption,” IEEE International Conference on Information and Emerging Technologies (IEEE ICIET-2007), pp. 1 – 7, July 06-07, 2007, Karachi, Pakistan [PDF]

  1. Syed S. Rizvi, Khushboo Patel, and Chaitali Patel, and Khaled M. Elleithy, “An Approach to Reduce the Energy Consumption in Wireless Sensor Networks through Active Nodes Optimization,” 2007 NEW ENGLAND AMERICAN SOCIETY FOR ENGINEERING EDUCATION CONFERENCE, April 20-21, 2007.[PDF]

Wired and Wireless Networks (LAN/WLAN/ATM):

    1. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. A Quantitative Analysis of Handover Time at MAC Layer for Wireless Mobile Networks. International Journal of Wireless & Mobile Networks (IJWMN), Vol. 1, No. 3, pp. 21 - 28, 2009. [PDF] [Journal Link]

    2. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. A Quantitative Analysis of Handover Time at MAC Layer for Wireless Mobile Networks. International Journal of Wireless & Mobile Networks (IJWMN), Vol. 1, No. 3, pp. 21 - 28, 2009. http://airccse.org/journal/j3current.html. [PDF]

    3. Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Active Scanning: A Better Approach to Reduce Handover Time at MAC Layer for Wireless Networks,” IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 4, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]

    4. Syed S. Rizvi, Aasia Riasat, and Adil Sheikh, "A Mathematical Model for Reducing Handover Time at MAC Layer for Wireless Networks," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 08), December 5 - 13, 2008. [PDF]

    5. Muhammad Imran, Asif Shaikh, Syed S. Rizvi, Khaled M. Elleithy, “Performance Analysis of Switches in High Speed LAN,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    6. Yinqiu Wang, Wei Wang, and Syed S. Rizvi, “A Cross-Layer Design Approach for Improving QoS of Wireless Networks,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    7. Heven Patel, Hardik Patel, Aditya Jagannath, Syed S. Rizvi, Khaled Elleithy, “A Novel Simulation Based Methodology for the Congestion Control in ATM Networks,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    8. Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Methodology for Efficient Traffic Management in ATM Networks for ATM Switching Systems," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]

    9. Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Methodology for an Efficient Congestion Control in High Performance Packet Switching Networks," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]

    10. Syed S. Rizvi, Aasia Riasat, Muhammad S. Rashid, and Khaled M. Elleithy, “An Efficient Scheme for Traffic Management in ATM Networks,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)

  1. Syed S. Rizvi, Aasia Riasat, Muhammad S. Rashid, and Khaled M. Elleithy, “Bandwidth Problem in High Performance Packet Switching Network,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)

Wireless/Network Security:

    1. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.1, pp. 82 - 96, January 2010. -(AIRCC Publication). [PDF] [Journal Link]

    2. Jalpa Bani and Syed S. Rizvi. A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack. International Journal of Computer Science and Information Security (IJCSIS). Vol. 4, No.1, pp. 110 - 116, 2009. [PDF]

    3. Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm for Preventing Cache Timing Attack,” 9th IEEE Wireless Telecommunication Symposium (IEEE WTS 2008), Pomona, California, pp. 399-404, April 24-26 2008. [PDF]

    4. Viktorov Dmitry, Barvaliya Narendrakumar, and Syed S. Rizvi, “Teredo Security Modernization,” 2009 ASEE Northeast Section Conference, University of Bridgeport, Connecticut (2009 NE ASEE), April 3-4, 2009. [PDF]

    5. Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, "A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]

  1. Jalpa Bani and Syed S. Rizvi, “A New Dynamic Cache Flushing (DCF) Algorithm to Prevent Cache Timing Attack,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]

Mobile AdHoc Networks (MANET):

    1. Syed S. Rizvi and Khaled M. Elleithy. A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks (MANET). International Journal of Computer Science and Information Security (IJCSIS). Vol. 3, No. 1, pp. 45-54, 2009. [PDF]

    2. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET). International Journal of Communications, Network and System Sciences (IJCNS). http://www.scirp.org/journal/ijcns

    3. Syed S. Rizvi, Aasia Riasat, Khaled M. Elleithy, and Mustafa Khan, “The Worst and Best case Capacity Analysis of Mobile Ad Hoc Networks (MANET) using a 3-Phase Algorithm,” The 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad hoc Communications and Networks: IEEE SECON 2008. June 16-20, 2008, San Francisco Bay Area, 2008 [PDF]

    4. Syed S. Rizvi, Majid A. Jafri, and Khaled Elleithy, "A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]

    5. Syed S. Rizvi, Aasia Riasat, and Mustafa A. Khan, "A New Analytical Model for Maximizing the Capacity and Minimizing the Transmission Delay for MANET," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]

    6. Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Efficient 3-Phase Algorithm for Performing Capacity Analysis of Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]

    7. Ashish Vekaria and Syed S. Rizvi, "A New Efficient Routing Approach for Mobile Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF]

    8. Syed S. Rizvi and Varsha Edla, "REPU-TRUST Algorithm: An Efficient way for Minimizing the Malicious Behavior of Mobile Nodes in Ad Hoc Networks (MANET)," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD [PDF].

    9. Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “A Novel Approach for Creating Trust to Reduce Malicious Behavior in Mobile Ad Hoc Networks (MANET),” 3rd International Conference on emerging Networking Experiments and Technologies (CoNEXT), Columbia University, New York, NY, December 10 -13, 2007. [PDF] (Video Presentation)

    10. Syed S. Rizvi, Saroj Poudyal, Varsha Edla, and Ravi Nepal, “Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks (MANET),” International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)

  1. Khurram M. Rajput, Khaled M. Elleithy, and Syed S. Rizvi, “A Novel Approach for Creating Consistent Trust and Cooperation (CTC) among Mobile Nodes of Ad Hoc Network,” International Conference on Telecommunications and Networking (TeNe 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF]

IP Networks & End-System Multicasting:

    1. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for Multicast Systems, International Journal of Computer Networks, Vol. 1, No.1, pp. 1 - 20, September 2009. [PDF] [Journal Link] [Extended versions of conference are published here]

    2. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy. Deterministic Formulization of End-to-End Delay for Multicast Systems, International journal of Computer Networks & Communications (IJCNC), Vol. 2, No.1, pp. 170 - 183, January 2010. [PDF] [Journal Link] [Extended versions of conference are published here]

    3. Syed S. Rizvi, Aasia Riasat, and Mustafa Khan “Deterministic Formulization of Bandwidth Efficiency for Multicast Systems, ”IEEE International Conference on Computer, Control & Communication (IEEE-IC4 2009), pp. 1 - 6, February 17-18, 2009, Karachi, Pakistan, 2009. [PDF]

  1. Syed S. Rizvi, Aasia Riasat, and Khaled M. Elleithy, “A Mathematical Model for Evaluating the Performance of Multicast Systems,” IEEE International Workshop on IP Multimedia Communications (IPMC 2008), August 4 - 7, 2008, St. Thomas U.S. Virgin Islands in conjunction with the 17TH International Conference on Computer Communications and Networks (ICCCN). [PDF]

Mesh Networks:

    1. Syed S. Rizvi, Aasia Riasat, and Adil Sheikh, "Faulty Links Optimization for Hypercube Networks via Stored and Forward One-Bit Round Robin Routing Algorithm," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2008), December 5 - 13, 2008. [PDF]

    2. Jaiminkumar Gorasia, Syed S. Rizvi, and Aasia Riasat, "Improving the Data Rate in Wireless Mesh Networks Using Orthogonal Frequency Code Division (OFCD)," International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 08), December 5 - 13, 2008.[PDF]

  1. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat, "An Efficient Single Bit Store and Forward (SBSF) Routing Algorithm for Mesh-Hypercube (M-H) Networks," The 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing WORLDCOMP'08. Las Vegas, Navada. pp. 69 - 75, July 14 - 17, 2008. [PDF]

Minimizing Interference:

    1. Syed S. Rizvi, Khaled M. Elleithy, and Aasia Riasat. Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks. International Journal of Computer Science and Information Security (IJCSIS). Vol. 3, No. 1, pp. 25-34, 2009. [PDF]

    2. Anil Mathew, Nithin Chandrababu, Khaled Elleithy, and Syed S. Rizvi,”IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence”, 7th Annual Conference on Communication Networks and Services Research (CNSR2009) Moncton, New Brunswick, Canada, May 11 - 13, 2009. [PDF]

    3. Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, "A New Software Based Approach for Minimizing Interference in RFID Application," The 9th INFORMS Telecommunications Conference: Telecommunications Modeling, Policy, and Technology, March 27-29, 2008. Robert H. Smith School of Business, University of Maryland, College Park, MD. [PDF]

  1. Syed S. Rizvi, Eslam M. Gebriel, and Aasia Riasat, “RFID: A New Software Based Solution to Avoid Interference,” International Conference on Systems, Computing Sciences and Software Engineering (SCSS 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF]

Miscellaneous:

    1. Auf Akhtar, Syed S. Rizvi, and Laiali Almazaydeh. Data Guard: A New Approach for Disaster Recovery and Rolling Upgrades. International Journal of Database Management Systems (IJDMS). Vol. 2, No.1, pp. 30 - 37, Feb 2010, (IJDMS) - [PDF] [Journal Link]

    2. Syed S. Rizvi, Aasia Riasat, and Muhammad S. Rashid, “Analytical and Speedup Models for Performance Evaluation of a Generic Reconfigurable Coprocessor (RC) Architecture,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]

    3. Syed S. Rizvi, Aasia Riasat, and Faraz Arain, “Innovative Glass-Box Approach: A Better Way to Enhance Learning of Complex Dynamic Systems,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]

    4. Auf Akhtar, Syed S. Rizvi, and Khaled M. Elleithy, “A Novel Approach of Using Data Guard for Disaster Recovery & Rolling Upgrades,” ASEE Zone I Conference 2008, United State Military Academy, West Point, NY March 28 – 29, 2008. [PDF]

    5. Syed S. Rizvi, Syed N. Hyder, Aasia Riasat, “Performance Model for a Reconfigurable Coprocessor,” accepted in International Conference on Industrial Electronics, Technology & Automation (IETA 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF](Audio Presentation)

    6. Aasia Riasat, Syed S. Rizvi, Farheen Zehara, and Faraz Arain, “The Role of System Dynamics in Learning Environments,” International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)

    7. Aasia Riasat, Syed S. Rizvi, Faraz Arain, Rizwan M. Qureshi, “Dynamic Semantics of the Web: Useful Toll for the New Generation Agent-Based Software,” International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)

  1. Ajay Shrestha, Khaled M. Elleithy, and Syed S. Rizvi, “Investigating the effects of Encoder Schemes, WFQ & SAD on VoIP QoS,” International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 07), Bridgeport, CT, USA. December 3 - 12, 2007. [PDF] (Audio Presentation)