• SCI 2.10

  • 2.10 Sciences

Accepting PhD Students

Calculated based on number of publications stored in Pure and citations from Scopus

Search results

  • 2006

    Individual contour extraction for robust wide area target tracking in visual sensor networks

    Wu, X., Heo, H., Shaikh, R. A., Cho, J., Chae, O. & Lee, S., 2006, Proceedings - Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, ISORC 2006. p. 179-185 7 p. 1630. (Proceedings - Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, ISORC 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • LSec: Lightweight security protocol for distributed wireless sensor network

    Shaikh, R. A., Lee, S., Khan, M. A. U. & Song, Y. J., 2006, Personal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings. Cuenca, P. & Orozco-Barbosa, L. (eds.). Springer-Verlag Berlin Heidelberg, p. 367-377 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4217 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    39 Citations (Scopus)
  • Securing distributed wireless sensor networks: Issues and guidelines

    Shaikh, R. A., Sungyoung, L., Young, J. S. & Yonil, Z., 2006, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006. p. 226-231 6 p. 1636278. (Proceedings - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing; vol. 2006 I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Trust management problem in distributed wireless sensor networks

    Shaikh, R. A., Jameel, H., Lee, S., Rajput, S. & Song, Y. J., 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2006. p. 411-414 4 p. 1691342. (Proceedings - 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Citations (Scopus)
  • 2005

    Comparative analysis and design philosophy of next generation unified enterprise application security

    Shaikh, R. A., Rajput, S., Zaidi, S. M. H. & Sharif, K., 2005, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006. p. 517-524 8 p. 1558935. (Proceedings - IEEE 2005 International Conference on Emerging Technologies, ICET 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Enterprise wide centralized logging mechanism for application level intrusion detection

    Shaikh, R. A., Rajput, S., Zaidi, S. M. H. & Sharif, K., 2005, Proceedings of The 2005 International Conference on Security and Management, SAM'05. p. 144-148 5 p. (Proceedings of The 2005 International Conference on Security and Management, SAM'05).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Performance analysis of unified enterprise application security framework

    Shaikh, R. A., Sharif, K. & Ahmed, E., 2005, 2005 Student Conference on Engineering Sciences and Technology, SCONEST. 4382878. (2005 Student Conference on Engineering Sciences and Technology, SCONEST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Review over Anomaly Detection algorithms for detecting SYN flooding attacks

    Shaikh, R. A., Iqbal, A. A. & Samad, K., 2005, 2005 Student Conference on Engineering Sciences and Technology, SCONEST. 4382870. (2005 Student Conference on Engineering Sciences and Technology, SCONEST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Taxonomy of Cyber Crimes and legislation in Pakistan

    Adeel, M., Chaudhry, A. A., Shaikh, R. A. & Shah, S. I., 2005, Proceedings of 1st International Conference on Information and Communication Technology, ICICT 2005. p. 350 1 p. 1598625. (Proceedings of 1st International Conference on Information and Communication Technology, ICICT 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)