The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Riaz Ahmed Shaikh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Riaz Ahmed Shaikh, Saeed Rajput, S. M. H. Zaidi, Kashif Shairf
    Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:144-148 [Conf]
  2. Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungyoung Lee
    Human Identification Through Image Evaluation Using Secret Predicates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:67-84 [Conf]
  3. Riaz Ahmed Shaikh, Sungyoung Lee, Mohammad A. U. Khan, Young Jae Song
    LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:367-377 [Conf]
  4. Xiaoling Wu, Hoon Heo, Riaz Ahmed Shaikh, Jinsung Cho, Oksam Chae, Sungyoung Lee
    Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISORC, 2006, pp:179-185 [Conf]
  5. Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Saeed Rajput, Young Jae Song
    Trust Management Problem in Distributed Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2006, pp:411-414 [Conf]
  6. Riaz Ahmed Shaikh, Sungyoung Lee, Young Jae Song, Yonil Zhung
    Securing Distributed Wireless Sensor Networks: Issues and Guidelines. [Citation Graph (0, 0)][DBLP]
    SUTC (2), 2006, pp:226-231 [Conf]

  7. A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks. [Citation Graph (, )][DBLP]


  8. Image-Feature Based Human Identification Protocols on Limited Display Devices. [Citation Graph (, )][DBLP]


  9. Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. [Citation Graph (, )][DBLP]


  10. Network Level Privacy for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  11. Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  12. Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.018secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002