2009 |
10 | EE | Riaz Ahmed Shaikh,
Young-Koo Lee,
Sungyoung Lee:
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks.
ICUIMC 2009: 602-606 |
2008 |
9 | EE | Riaz Ahmed Shaikh,
Hassan Jameel,
Brian J. d'Auriol,
Sungyoung Lee,
Young Jae Song,
Heejo Lee:
Trusting Anomaly and Intrusion Claims for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks.
ICYCS 2008: 2038-2043 |
8 | EE | Hassan Jameel,
Riaz Ahmed Shaikh,
Le Xuan Hung,
Yuan Wei Wei,
Syed Muhammad Khaliq-ur-rehman Raazi,
Ngo Trong Canh,
Sungyoung Lee,
Heejo Lee,
Yuseung Son,
Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices.
WISA 2008: 211-224 |
2007 |
7 | EE | Hassan Jameel,
Riaz Ahmed Shaikh,
Heejo Lee,
Sungyoung Lee:
Human Identification Through Image Evaluation Using Secret Predicates.
CT-RSA 2007: 67-84 |
6 | | Brian J. d'Auriol,
Jie Yang,
Xiaoling Wu,
Hui Xu,
Yu Niu,
Jin Wang,
Riaz Ahmed Shaikh,
Min Meng,
Sungyoung Lee,
Young-Koo Lee:
A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks.
ICWN 2007: 468-473 |
2006 |
5 | EE | Xiaoling Wu,
Hoon Heo,
Riaz Ahmed Shaikh,
Jinsung Cho,
Oksam Chae,
Sungyoung Lee:
Individual Contour Extraction for Robust Wide Area Target Tracking in Visual Sensor Networks.
ISORC 2006: 179-185 |
4 | EE | Riaz Ahmed Shaikh,
Sungyoung Lee,
Mohammad A. U. Khan,
Young Jae Song:
LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network.
PWC 2006: 367-377 |
3 | EE | Riaz Ahmed Shaikh,
Hassan Jameel,
Sungyoung Lee,
Saeed Rajput,
Young Jae Song:
Trust Management Problem in Distributed Wireless Sensor Networks.
RTCSA 2006: 411-414 |
2 | EE | Riaz Ahmed Shaikh,
Sungyoung Lee,
Young Jae Song,
Yonil Zhung:
Securing Distributed Wireless Sensor Networks: Issues and Guidelines.
SUTC (2) 2006: 226-231 |
2005 |
1 | | Riaz Ahmed Shaikh,
Saeed Rajput,
S. M. H. Zaidi,
Kashif Shairf:
Enterprise Wide Centralized Logging Mechanism for Application Level Intrusion Detection.
Security and Management 2005: 144-148 |