A lightweight signature-based IDS for IoT environment NU Sheikh, H Rahman, S Vikram, H AlQahtani arXiv preprint arXiv:1811.04582, 2018 | 30 | 2018 |
Analysis of the Technology Acceptance Theoretical Model in Examining Users’ Behavioural Intention to Use an Augmented Reality App (IMAP-Campus) H Alqahtani, M Kavakli, NU Sheikh International Journal of Engineering and Management Research (IJEMR) 8 (5 …, 2018 | 15 | 2018 |
Countermeasure of attack vectors using signature-based IDS in IoT environments TU Sheikh, H Rahman, HS Al-Qahtani, TK Hazra, NU Sheikh 2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019 | 13 | 2019 |
A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence N Sheikh, K Mustafi, I Mukhopadhyay Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON …, 2016 | 10 | 2016 |
Do auto-regressive models protect privacy? Inferring fine-grained energy consumption from aggregated model parameters NU Sheikh, HJ Asghar, F Farokhi, MA Kaafar IEEE Transactions on Services Computing 15 (6), 3198-3209, 2021 | 7 | 2021 |
A novel approach to enhance the security dimension of RSA algorithm using bijective function K Mustafi, N Sheikh, TK Hazra, M Mazumder, I Bhattacharya, ... 2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016 | 6 | 2016 |
An optimized pattern recognition algorithm for anomaly detection in IoT environment NU Sheikh, H Rahman, H Al-Qahtani arXiv preprint arXiv:1901.08729, 2019 | 3 | 2019 |
Multi-variable bijective mapping for secure encryption and decryption NU Sheikh, TK Hazra, H Rahman, K Mustafi, AK Chakraborty 2017 8th Annual Industrial Automation and Electromechanical Engineering …, 2017 | 3 | 2017 |
Trace recovery: inferring fine-grained trace of energy data from aggregates NU Sheikh, Z Lu, HJ Asghar, MA Kaafar 18th International Conference on Security and Cryptography, SECRYPT 2021 …, 2021 | 2 | 2021 |
Partitioned network with Adaptive Mobile Sinks H Rahman, NU Sheikh, HS Al-Qahtani, TK Hazra 2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019 | 1 | 2019 |
Anomaly Detection in Smart Grid Networks Using Power Consumption Data P Nanda, H Rahman, M Mohanty 20th International Conference on Security and Cryptography, 2023 | | 2023 |
Submit Anomaly Detection in Smart Grid Networks Using Power Consumption Data MMNUS Hasina Rahman, Priyadarsi Nanda Secrypt 2023 Conference, 1-8, 2023 | | 2023 |
Quantifying privacy threats in aggregated energy data analytics NU Sheikh Macquarie University, 2021 | | 2021 |
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics NU Sheikh, Z Lu, HJ Asghar, MA Kaafar International Conference on E-Business and Telecommunications, 305-333, 2021 | | 2021 |
DO STATISTICAL MODELS REVEAL TOO MUCH? RECONSTRUCTING TRAINING DATA FROM RESULTANT MODELS NU Sheikh, H Asghar, F Farokhi, M Kaafar https://www.researchgate.net/publication …, 2021 | | 2021 |
An Optimized Pattern Recognition Algorithm for Anomaly Detection in IoT Environment N Uddin Sheikh, H Rahman, H Al-Qahtani arXiv e-prints, arXiv: 1901.08729, 2019 | | 2019 |
Evaluating Continuous User-Authentication using Breaths under Health Conditions NU Sheikh, S Berkovsky, HJ Asghar, MA Kaafar | | |
Evaluating Membership Inference Attack Against Differentially Private Machine Learning in Digital Health NU Sheikh, S Berkovsky, HJ Asghar, M Ali | | |
AI-Enabled Privacy Preserving Energy Data Analytics: A Review NU Sheikh, D Vatsalan, HJ Asghar, MA Kaafar | | |