Статии с изисквания за обществен достъп - Siraj Ahmed ShaikhНаучете повече
Не е налице никъде: 3
Formalising uptane in csp for security testing
R Kirk, HN Nguyen, J Bryans, S Shaikh, D Evans, D Price
2021 IEEE 21st International Conference on Software Quality, Reliability and …, 2021
Изисквания: US National Science Foundation
Imaging of contaminant plumes using ERT in Qinhuai river water and its bed caused by urban effluents at Nanjing, China
SA Junejo, QY Zhou, MA Talpur, L Debao, SA Shaikh
Environmental Earth Sciences 74, 7431-7440, 2015
Изисквания: National Natural Science Foundation of China
Cyber-specifications: capturing user requirements for cyber-security investigations
AW Stedmon, D Richards, SA Shaikh, J Huddlestone, R Davison
Cyber Crime and Cyber Terrorism Investigator's Handbook, 43-58, 2014
Изисквания: UK Engineering and Physical Sciences Research Council
Налице някъде: 14
A template-based method for the generation of attack trees
J Bryans, LS Liew, HN Nguyen, G Sabaliauskaite, S Shaikh, F Zhou
Information Security Theory and Practice: 13th IFIP WG 11.2 International …, 2020
Изисквания: European Commission
Towards a knowledge-based approach for effective decision-making in railway safety
A Garcia-Perez, SA Shaikh, HK Kalutarage, M Jahantab
Journal of knowledge Management 19 (3), 641-659, 2015
Изисквания: UK Engineering and Physical Sciences Research Council
Towards a threat assessment framework for apps collusion
HK Kalutarage, HN Nguyen, SA Shaikh
Telecommunication systems 66 (3), 417-430, 2017
Изисквания: UK Engineering and Physical Sciences Research Council
Developing a QRNG ECU for automotive security: Experience of testing in the real-world
HN Nguyen, S Tavakoli, SA Shaikh, O Maynard
2019 IEEE International Conference on Software Testing, Verification and …, 2019
Изисквания: UK Research & Innovation
Effective network security monitoring: from attribution to target-centric monitoring
SA Shaikh, HK Kalutarage
Telecommunication Systems 62, 167-178, 2016
Изисквания: UK Engineering and Physical Sciences Research Council
Drivers and barriers for secure hardware adoption across ecosystem stakeholders
A Tomlinson, S Parkin, SA Shaikh
Journal of Cybersecurity 8 (1), tyac009, 2022
Изисквания: UK Economic and Social Research Council, UK Research & Innovation
Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case
IM Asăvoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ...
Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies …, 2017
Изисквания: UK Engineering and Physical Sciences Research Council
An evidence quality assessment model for cyber security policymaking
A Hussain, S Shaikh, A Chung, S Dawda, M Carr
Critical Infrastructure Protection XII: 12th IFIP WG 11.10 International …, 2018
Изисквания: UK Engineering and Physical Sciences Research Council
Understanding Drivers’ Trust After Software Malfunctions and Cyber Intrusions of Digital Displays in Automated Cars
W Payre, JP March, G Sabaliauskaite, H Jadidbonab, S Shaikh, ...
13th International Conference on Applied Human Factors and Ergonomics, 320-328, 2022
Изисквания: UK Research & Innovation
How system failures and ransomwares affect drivers’ trust and attitudes in an automated car? A simulator study
W Payre, JP March, G Sabaliauskaite, H Jadidbonab, S Shaikh, ...
8th international Conference on Human Interaction and Emerging Technologies …, 2022
Изисквания: UK Research & Innovation
A certification process for android applications
HK Kalutarage, P Krishnan, SA Shaikh
Information Technology and Open Source: Applications for Education …, 2014
Изисквания: UK Engineering and Physical Sciences Research Council
TOMSAC-Methodology for trade-off management between automotive safety and cyber security
G Sabaliauskaite, J Bryans, H Jadidbonab, F Ahmad, S Shaikh, ...
Computers & Security 140, 103798, 2024
Изисквания: UK Engineering and Physical Sciences Research Council
Addressing automotive cybersecurity risks with an ARM Morello capability-enhanced prototype
HN Nguyen, SA Shaikh, E Kutsal, A Stylianou, R Potter, T Sors
ESS Open Archive eprints 217, 21766451, 2024
Изисквания: UK Research & Innovation
Maritime Cyber Risk Perception and Response
K Kuhn, S Bicakci, S Shaikh
4th NMIOTC Conference on Cybersecurity in the Maritime Domain, 2020
Изисквания: US Department of Defense
Информацията за публикацията и осигуреното финансиране се определя автоматично от компютърна програма