Riaz Ahmed Shaikh

Dr

  • SCI 2.10

Accepting PhD Students

  • Source: Scopus
  • Calculated based on number of publications stored in Pure and citations from Scopus

Search results

  • 2006

    Trust management problem in distributed wireless sensor networks

    Shaikh, R. A., Jameel, H., Lee, S., Rajput, S. & Song, Y. J., 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2006. p. 411-414 4 p. 1691342. (Proceedings - 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Citations (Scopus)
  • 2005

    Comparative analysis and design philosophy of next generation unified enterprise application security

    Shaikh, R. A., Rajput, S., Zaidi, S. M. H. & Sharif, K., 2005, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006. p. 517-524 8 p. 1558935. (Proceedings - IEEE 2005 International Conference on Emerging Technologies, ICET 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Enterprise wide centralized logging mechanism for application level intrusion detection

    Shaikh, R. A., Rajput, S., Zaidi, S. M. H. & Sharif, K., 2005, Proceedings of The 2005 International Conference on Security and Management, SAM'05. p. 144-148 5 p. (Proceedings of The 2005 International Conference on Security and Management, SAM'05).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Performance analysis of unified enterprise application security framework

    Shaikh, R. A., Sharif, K. & Ahmed, E., 2005, 2005 Student Conference on Engineering Sciences and Technology, SCONEST. 4382878. (2005 Student Conference on Engineering Sciences and Technology, SCONEST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Review over Anomaly Detection algorithms for detecting SYN flooding attacks

    Shaikh, R. A., Iqbal, A. A. & Samad, K., 2005, 2005 Student Conference on Engineering Sciences and Technology, SCONEST. 4382870. (2005 Student Conference on Engineering Sciences and Technology, SCONEST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Taxonomy of Cyber Crimes and legislation in Pakistan

    Adeel, M., Chaudhry, A. A., Shaikh, R. A. & Shah, S. I., 2005, Proceedings of 1st International Conference on Information and Communication Technology, ICICT 2005. p. 350 1 p. 1598625. (Proceedings of 1st International Conference on Information and Communication Technology, ICICT 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)