default search action
Amar A. Rasheed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Nuri Alperen Kose, Razaq Jinad, Amar Rasheed, Narasimha Shashidhar, Mohamed Baza, Hani Alshahrani:
Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning. Sensors 24(3): 983 (2024) - [j10]Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, Hani Alshahrani, Kim-Kwang Raymond Choo:
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network. IEEE Trans. Netw. Sci. Eng. 11(1): 1008-1025 (2024) - [c21]Fnu Aakanksha, Avinash Kumar, Cihan Varol, Hyuk Cho, Amar Rasheed:
Persistent Browser Storage Data Extractor. ISDFS 2024: 1-5 - [c20]Nurettin Selcuk Senol, Amar Rasheed, Narasimha Shashidar:
Mobile Forensic Investigation: Extractions and Connectivity Isolation in Phones Utilizing eSIM, iSIM Technology. ISDFS 2024: 1-6 - [c19]Wassila Lalouani, Ivan Omorogbe, Christopher Dube, Mohamed Baza, Amar Rasheed, Kim-Kwang Raymond Choo:
A Robust Physical Layer IDS for Intra-Vehicle Communication Security. SmartNets 2024: 1-6 - 2023
- [j9]Garrett Brenner, Mohamed Baza, Amar Rasheed, Wassila Lalouani, Mahmoud M. Badr, Hani Alshahrani:
DPark: Decentralized Smart Private-Parking System using Blockchains. J. Grid Comput. 21(3): 43 (2023) - [j8]Khushi Gupta, Damilola Oladimeji, Cihan Varol, Amar Rasheed, Narasimha Shahshidhar:
A Comprehensive Survey on Artifact Recovery from Social Media Platforms: Approaches and Future Research Directions. Inf. 14(12): 629 (2023) - [j7]Dan Zhou, Mohamed Baza, Amar Rasheed:
Highly Reliable Robust Mining of Educational Data Features in Universities Based on Dynamic Semantic Memory Networks. Mob. Networks Appl. 28(5): 1772-1782 (2023) - [j6]Damilola Oladimeji, Amar Rasheed, Cihan Varol, Mohamed Baza, Hani Alshahrani, Abdullah Baz:
CANAttack: Assessing Vulnerabilities within Controller Area Network. Sensors 23(19): 8223 (2023) - [c18]Damilola Oladimeji, Amar Rasheed, Narasimha K. Shashidhar, Cihan Varol:
A Testbed for a Controller Area Network Communication Protocol in Automobiles. CCNC 2023: 1-6 - [c17]Nurettin Selcuk Senol, Amar Rasheed:
A Testbed for LoRa Wireless Communication between IoT devices. ISDFS 2023: 1-6 - [c16]Amar Rasheed, Mohamed Baza, Mohammad Khan, Narasimha Karpoor, Cihan Varol, Gautam Srivastava:
Using Authenticated Encryption for Securing Controller Area Networks in Autonomous Mobile Platforms. WPMC 2023: 76-82 - [c15]Saikumar Kayam, K. Srinivas Rao, Mohamed Baza, Amar Rasheed, Sai Hanuman Akundi, Ahmed J. Obaid:
A Lite-SVM Based Semantic Search Model for Bigdata Analytics in Smart Cities. WPMC 2023: 272-277 - 2022
- [j5]Mohamed Baza, Amar Rasheed, Abdullah Alourani, Gautam Srivastava, Hani Alshahrani, Ali Alshehri:
Privacy-preserving Blockchain-assisted private-parking scheme with efficient matching. Comput. Electr. Eng. 103: 108340 (2022) - [j4]Amar Rasheed, Rabi N. Mahapatra, Cihan Varol, Narasimha Karpoor:
Exploiting Zero Knowledge Proof and Blockchains Towards the Enforcement of Anonymity, Data Integrity and Privacy (ADIP) in the IoT. IEEE Trans. Emerg. Top. Comput. 10(3): 1476-1491 (2022) - [c14]Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol, Amar Rasheed:
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools. ISDFS 2022: 1-10 - 2021
- [c13]Mohamed Baza, Ramy Amer, Amar A. Rasheed, Gautam Srivastava, Mohamed Mahmoud, Waleed Alasmary:
A Blockchain-Based Energy Trading Scheme for Electric Vehicles. CCNC 2021: 1-7 - [c12]Ibrahim Yilmaz, Mohamed Baza, Ramy Amer, Amar A. Rasheed, Fathi H. Amsaad, Rasha Morsi:
On the Assessment of Robustness of Telemedicine Applications against Adversarial Machine Learning Attacks. IEA/AIE (1) 2021: 519-529 - [c11]Amar A. Rasheed, Hacer Varol, Mohamed Baza:
Clock Gating-Assisted Malware (CGAM): Leveraging Clock Gating On ARM Cortex M* For Attacking Subsystems Availability. ISDFS 2021: 1-8 - [c10]Frank Williams, Cihan Varol, Amar Rasheed, Narasimha K. Shashidhar:
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling. ISDFS 2021: 1-7 - 2020
- [j3]Amar A. Rasheed, Rabi N. Mahapatra, Felix G. Hamza-Lup:
Adaptive Group-Based Zero Knowledge Proof-Authentication Protocol in Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 21(2): 867-881 (2020)
2010 – 2019
- 2019
- [c9]Amar Rasheed, Ray R. Hashemi, Ayman Bagabas, Jeffrey A. Young, Chanukya Badri, Keyur Patel:
Configurable Anonymous Authentication Schemes For The Internet of Things (IoT). RFID 2019: 1-8 - [i1]Amar A. Rasheed, Rabi N. Mahapatra, Felix G. Hamza-Lup:
Adaptive Group-based Zero Knowledge Proof-Authentication Protocol (AGZKP-AP) in Vehicular Ad Hoc Networks. CoRR abs/1908.09085 (2019) - 2018
- [c8]Ghanshyam Bhutra, Amar A. Rasheed, Rabi N. Mahapatra:
Privacy-Preserving ECG based Active Authentication (PPEA2) for IoT Devices. IPCCC 2018: 1-7 - 2017
- [c7]Amar A. Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal:
Private matching and set intersection computation in multi-agent and industrial control systems. CISRC 2017: 14:1-14:6 - [c6]Amar A. Rasheed:
A trusted computing architecture for health care. ICOIN 2017: 46-50 - 2016
- [c5]Amar Rasheed, M. Cotter, B. Smith, D. Levan, Shashi Phoha:
Dynamically reconfigurable AES cryptographic core for small, power limited mobile sensors. IPCCC 2016: 1-7 - 2012
- [j2]Amar A. Rasheed, Rabi N. Mahapatra:
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks. IEEE Trans. Parallel Distributed Syst. 23(5): 958-965 (2012) - 2011
- [j1]Amar A. Rasheed, Rabi N. Mahapatra:
Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 22(1): 176-184 (2011)
2000 – 2009
- 2009
- [c4]Amar A. Rasheed, Rabi N. Mahapatra:
Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks. IPCCC 2009: 216-222 - [c3]Amar A. Rasheed, Rabi N. Mahapatra:
A key pre-distribution scheme for heterogeneous sensor networks. IWCMC 2009: 263-268 - 2008
- [c2]Amar A. Rasheed, Rabi N. Mahapatra:
An Efficient Key Distribution Scheme for Establishing Pairwise Keys with a Mobile Sink in Distributed Sensor Networks. IPCCC 2008: 264-270 - [c1]Amar A. Rasheed, Rabi N. Mahapatra:
Secure Data Collection Scheme in Wireless Sensor Network with Mobile Sink. NCA 2008: 332-340
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint