Suivre
Siraj Ahmed Shaikh
Siraj Ahmed Shaikh
Adresse e-mail validée de swansea.ac.uk
Titre
Citée par
Citée par
Année
Fuzz testing for automotive cyber-security
DS Fowler, J Bryans, SA Shaikh, P Wooderson
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
722018
Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows
A Tomlinson, J Bryans, SA Shaikh, HK Kalutarage
2018 48th Annual IEEE/IFIP international conference on dependable systems …, 2018
692018
Building an automotive security assurance case using systematic security evaluations
M Cheah, SA Shaikh, J Bryans, P Wooderson
Computers & Security 77, 360-379, 2018
612018
Towards a testbed for automotive cybersecurity
DS Fowler, M Cheah, SA Shaikh, J Bryans
2017 IEEE International Conference on Software Testing, Verification and …, 2017
612017
Towards a systematic security evaluation of the automotive Bluetooth interface
M Cheah, SA Shaikh, O Haas, A Ruddle
Vehicular Communications 9, 8-18, 2017
562017
Towards viable intrusion detection methods for the automotive controller area network
A Tomlinson, J Bryans, SA Shaikh
2nd ACM Computer Science in Cars Symposium, 1-9, 2018
542018
Network reconnaissance
SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen
Network Security 2008 (11), 12-16, 2008
522008
A method for constructing automotive cybersecurity tests, a CAN fuzz testing example
DS Fowler, J Bryans, M Cheah, P Wooderson, SA Shaikh
2019 IEEE 19th international conference on software quality, reliability and …, 2019
472019
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
H Chivers, JA Clark, P Nobles, SA Shaikh, H Chen
Information Systems Frontiers 15, 17-34, 2013
472013
Who's your best friend? Targeted privacy attacks in location-sharing social networks
V Kostakos, J Venkatanathan, B Reynolds, N Sadeh, E Toch, SA Shaikh, ...
Proceedings of the 13th international conference on Ubiquitous computing …, 2011
432011
Characteristic trade-offs in designing large-scale biometric-based identity management systems
SA Shaikh, JR Rabaiotti
Journal of Network and Computer Applications 33 (3), 342-351, 2010
372010
A new architecture for network intrusion detection and prevention
W Bul’ajoul, A James, S Shaikh
IEEE access 7, 18558-18573, 2019
362019
Evaluating the role of public agricultural extension and advisory services in promoting agro-ecology transition in Southeast Nigeria
EM Emeana, L Trenchard, K Dehnen-Schmutz, S Shaikh
Agroecology and Sustainable Food Systems 43 (2), 123-144, 2019
352019
COVID-19 digitization in maritime: understanding cyber risks
K Kuhn, S Bicakci, SA Shaikh
WMU Journal of Maritime Affairs 20 (2), 193-214, 2021
342021
Optimising IDS sensor placement
H Chen, JA Clark, SA Shaikh, H Chivers, P Nobles
2010 International Conference on Availability, Reliability and Security, 315-320, 2010
312010
Systematic threat assessment and security testing of automotive over-the-air (OTA) updates
S Mahmood, HN Nguyen, SA Shaikh
Vehicular Communications 35, 100468, 2022
282022
Formal Methods for Software Engineering
M Roggenbach, A Cerone, BH Schlingloff, G Schneider, SA Shaikh
Springer, Switzerland, 2021
282021
Using a one-class compound classifier to detect in-vehicle network attacks
A Tomlinson, J Bryans, SA Shaikh
Proceedings of the genetic and evolutionary computation conference companion …, 2018
282018
Vehicular platoon communication: Cybersecurity threats and open challenges
SJ Taylor, F Ahmad, HN Nguyen, SA Shaikh, D Evans, D Price
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
262021
Formalising systematic security evaluations using attack trees for automotive applications
M Cheah, HN Nguyen, J Bryans, SA Shaikh
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
262018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20