Follow
Syed S Rizvi
Title
Cited by
Cited by
Year
Securing the internet of things (IoT): A security taxonomy for IoT
S Rizvi, A Kurtz, J Pfeffer, M Rizvi
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
1972018
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
1242015
Identifying the attack surface for IoT network
S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi
Internet of Things 9, 100162, 2020
982020
Cloud security auditing: challenges and emerging approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
972013
Threat model for securing internet of things (IoT) network at device-level
S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams
Internet of Things 11, 100240, 2020
762020
A review of the sealworm problem: biology, implications and solutions
H Hafsteinsson, SSH Rizvi
Journal of Food Protection 50 (1), 70-84, 1987
621987
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers
S Rizvi, J Mitchell, A Razaque, MR Rizvi, I Williams
Journal of cloud computing 9, 1-17, 2020
582020
Proposing enhanced feature engineering and a selection model for machine learning processes
MF Uddin, J Lee, S Rizvi, S Hamada
Applied Sciences 8 (4), 646, 2018
512018
Privacy preserving model: a new scheme for auditing cloud stakeholders
A Razaque, SS Rizvi
Journal of Cloud Computing 6, 1-17, 2017
492017
State-of-art review of information diffusion models and their impact on social network vulnerabilities
A Razaque, S Rizvi, M Almiani, A Al Rahayfeh
Journal of King Saud University-Computer and Information Sciences 34 (1 …, 2022
482022
A threat to vehicular cyber security and the urgency for correction
S Rizvi, J Willet, D Perino, S Marasco, C Condo
Procedia computer science 114, 100-105, 2017
482017
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
482014
Secure data aggregation using access control and authentication for wireless sensor networks
A Razaque, SS Rizvi
computers & security 70, 532-545, 2017
432017
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
422018
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
A Razaque, SS Rizvi
Computers & Security 62, 328-347, 2016
392016
Application of ultrasonic waves to detect sealworms in fish tissue
H HAFSTEINSSON, K PARKER, R CHIVERS, SSH RIZVI
Journal of Food Science 54 (2), 244-247, 1989
361989
Secure online transaction algorithm: securing online transaction using two-factor authentication
J Gualdoni, A Kurtz, I Myzyri, M Wheeler, S Rizvi
Procedia computer science 114, 93-99, 2017
322017
IEEE 802.11 & Bluetooth interference: simulation and coexistence
A Mathew, N Chandrababu, K Elleithy, S Rizvi
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
312009
Utilizing third party auditing to manage trust in the cloud
S Rizvi, K Karpinski, B Kelly, T Walker
Procedia Computer Science 61, 191-197, 2015
282015
Third-party auditor (TPA): a potential solution for securing a cloud environment
S Rizvi, A Razaque, K Cover
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
262015
The system can't perform the operation now. Try again later.
Articles 1–20