Syed S Rizvi
Cited by
Cited by
Securing the internet of things (IoT): A security taxonomy for IoT
S Rizvi, A Kurtz, J Pfeffer, M Rizvi
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
Cloud security auditing: challenges and emerging approaches
J Ryoo, S Rizvi, W Aiken, J Kissell
IEEE Security & Privacy 12 (6), 68-74, 2013
Identifying the attack surface for IoT network
S Rizvi, RJ Orr, A Cox, P Ashokkumar, MR Rizvi
Internet of Things 9, 100162, 2020
Privacy preserving model: a new scheme for auditing cloud stakeholders
A Razaque, SS Rizvi
Journal of Cloud Computing 6 (1), 1-17, 2017
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014
Threat model for securing internet of things (IoT) network at device-level
S Rizvi, R Pipetti, N McIntyre, J Todd, I Williams
Internet of Things 11, 100240, 2020
A threat to vehicular cyber security and the urgency for correction
S Rizvi, J Willet, D Perino, S Marasco, C Condo
Procedia computer science 114, 100-105, 2017
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
A Razaque, SS Rizvi
Computers & Security 62, 328-347, 2016
Secure data aggregation using access control and authentication for wireless sensor networks
A Razaque, SS Rizvi
computers & security 70, 532-545, 2017
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers
S Rizvi, J Mitchell, A Razaque, MR Rizvi, I Williams
Journal of cloud computing 9, 1-17, 2020
Proposing enhanced feature engineering and a selection model for machine learning processes
MF Uddin, J Lee, S Rizvi, S Hamada
Applied Sciences 8 (4), 646, 2018
IEEE 802.11 & Bluetooth interference: simulation and coexistence
A Mathew, N Chandrababu, K Elleithy, S Rizvi
2009 Seventh Annual Communication Networks and Services Research Conference …, 2009
Secure online transaction algorithm: securing online transaction using two-factor authentication
J Gualdoni, A Kurtz, I Myzyri, M Wheeler, S Rizvi
Procedia computer science 114, 93-99, 2017
Third-party auditor (TPA): a potential solution for securing a cloud environment
S Rizvi, A Razaque, K Cover
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
State-of-art review of information diffusion models and their impact on social network vulnerabilities
A Razaque, S Rizvi, M Almiani, A Al Rahayfeh
Journal of King Saud University-Computer and Information Sciences 34 (1 …, 2022
Utilizing third party auditing to manage trust in the cloud
S Rizvi, K Karpinski, B Kelly, T Walker
Procedia Computer Science 61, 191-197, 2015
Cloud data integrity using a designated public verifier
S Rizvi, A Razaque, K Cover
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
A trusted third-party (TTP) based encryption scheme for ensuring data confidentiality in cloud environment
S Rizvi, K Cover, C Gates
Procedia computer science 36, 381-386, 2014
The system can't perform the operation now. Try again later.
Articles 1–20