


default search action
Siraj Ahmed Shaikh
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Giedre Sabaliauskaite
, Jeremy W. Bryans
, Hesamaldin Jadidbonab, Farhan Ahmad, Siraj A. Shaikh, Paul Wooderson
:
TOMSAC - Methodology for trade-off management between automotive safety and cyber security. Comput. Secur. 140: 103798 (2024) - [j29]Don Nalin Dharshana Jayaratne
, Suraj Harsha Kamtam
, Siraj Ahmed Shaikh
, Muhamad Azfar Ramli
, Qian Lu
, Rakhi Manohar Mepparambath
, Hoang Nga Nguyen
, Abdur Rakib:
A simulation framework for automotive cybersecurity risk assessment. Simul. Model. Pract. Theory 136: 103005 (2024) - [i4]Alireza Nezhadettehad, Arkady B. Zaslavsky, Abdur Rakib, Siraj Ahmed Shaikh, Seng W. Loke, Guang-Li Huang, Alireza Hassani:
Predicting Next Useful Location With Context-Awareness: The State-Of-The-Art. CoRR abs/2401.08081 (2024) - [i3]Ricardo M. Czekster
, Alexeis Garcia-Perez
, Manolya Kavakli-Thorne
, Seif Allah El Mesloul Nasri, Siraj A. Shaikh:
Cyber-physical and business perspectives using Federated Digital Twins in multinational and multimodal transportation systems. CoRR abs/2410.08479 (2024) - 2023
- [j28]Simon Parkin
, Kristen Kuhn
, Siraj Ahmed Shaikh
:
Executive decision-makers: a scenario-based approach to assessing organizational cyber-risk perception. J. Cybersecur. 9(1) (2023) - [j27]Sean Joe Taylor
, Farhan Ahmad, Hoang Nga Nguyen, Siraj Ahmed Shaikh
, Jeremy W. Bryans
, Charles Wartnaby:
A comparative analysis of multi-criteria decision methods for secure beacon selection in vehicular platoons. Trans. Emerg. Telecommun. Technol. 34(11) (2023) - [j26]Jeremy W. Bryans
, Lin Shen Liew, Hoang Nga Nguyen
, Giedre Sabaliauskaite
, Siraj Ahmed Shaikh:
Formal Template-Based Generation of Attack-Defence Trees for Automated Security Analysis. Inf. 14(9): 481 (2023) - [j25]Rhys Kirk
, Hoang Nga Nguyen
, Jeremy W. Bryans, Siraj Ahmed Shaikh, Charles Wartnaby:
A formal framework for security testing of automotive over-the-air update systems. J. Log. Algebraic Methods Program. 130: 100812 (2023) - [j24]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
:
Vehicular Platoon Communication: Architecture, Security Threats and Open Challenges. Sensors 23(1): 134 (2023) - 2022
- [b1]Markus Roggenbach
, Antonio Cerone, Bernd-Holger Schlingloff
, Gerardo Schneider, Siraj Ahmed Shaikh:
Formal Methods for Software Engineering - Languages, Methods, Application Domains. Texts in Theoretical Computer Science. An EATCS Series, Springer 2022, ISBN 978-3-030-38799-0, pp. 1-488 - [j23]Andrew Tomlinson
, Simon Parkin
, Siraj Ahmed Shaikh
:
Drivers and barriers for secure hardware adoption across ecosystem stakeholders. J. Cybersecur. 8(1) (2022) - [j22]Shahid Mahmood
, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
:
Systematic threat assessment and security testing of automotive over-the-air (OTA) updates. Veh. Commun. 35: 100468 (2022) - [c47]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
, David Evans:
Safety, Stability and Environmental Impact of FDI Attacks on Vehicular Platoons. NOMS 2022: 1-6 - [c46]Hesamaldin Jadidbonab
, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
, Marcin Hlond, Peter Robertson, Gajinder Panesar:
A Hardware-based SoC Monitoring In-life Solution for Automotive Industry. PerCom Workshops 2022: 637-642 - 2021
- [j21]Andrew Tomlinson
, Jeremy W. Bryans
, Siraj Ahmed Shaikh
:
Using internal context to detect automotive controller area network attacks. Comput. Electr. Eng. 91: 107048 (2021) - [c45]Sean Joe Taylor, Farhan Ahmad, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
, David Evans, David Price:
Vehicular Platoon Communication: Cybersecurity Threats and Open Challenges. DSN Workshops 2021: 19-26 - [c44]Rhys Kirk, Hoang Nga Nguyen
, Jeremy W. Bryans, Siraj A. Shaikh, David Evans, David Price:
Formalising UPTANE in CSP for Security Testing. QRS Companion 2021: 816-824 - [c43]Hesamaldin Jadidbonab, Andrew Tomlinson, Hoang Nga Nguyen, Trang Doan, Siraj Ahmed Shaikh:
A Real-Time In-Vehicle Network Testbed for Machine Learning-Based IDS Training and Validation. AI-Cybersec@SGAI 2021: 53-68 - 2020
- [c42]Atif Hussain, Kristen Kuhn
, Siraj Ahmed Shaikh
:
Games for Cybersecurity Decision-Making. HCI (31) 2020: 411-423 - [c41]Shahid Mahmood
, Alexy Fouillade, Hoang Nga Nguyen
, Siraj A. Shaikh
:
A Model-Based Security Testing Approach for Automotive Over-The-Air Updates. ICST Workshops 2020: 6-13
2010 – 2019
- 2019
- [j20]Waleed Bul'ajoul
, Anne E. James
, Siraj Ahmed Shaikh
:
A New Architecture for Network Intrusion Detection and Prevention. IEEE Access 7: 18558-18573 (2019) - [c40]John Heneghan, Siraj Ahmed Shaikh
, Jeremy W. Bryans
, Madeline Cheah
, Paul Wooderson
:
Enabling Security Checking of Automotive ECUs with Formal CSP Models. DSN Workshops 2019: 90-97 - [c39]Jeremy W. Bryans
, Hoang Nga Nguyen
, Siraj A. Shaikh
:
Attack Defense Trees with Sequential Conjunction. HASE 2019: 247-252 - [c38]Hoang Nga Nguyen
, Siamak Tavakoli, Siraj Ahmed Shaikh
, Oliver Maynard:
Developing a QRNG ECU for Automotive Security: Experience of Testing in the Real-World. ICST Workshops 2019: 61-68 - [c37]Daniel S. Fowler
, Jeremy W. Bryans
, Madeline Cheah
, Paul Wooderson
, Siraj A. Shaikh
:
A Method for Constructing Automotive Cybersecurity Tests, a CAN Fuzz Testing Example. QRS Companion 2019: 1-8 - [c36]Jeremy W. Bryans
, Lin Shen Liew, Hoang Nga Nguyen
, Giedre Sabaliauskaite
, Siraj A. Shaikh
, Fengjun Zhou:
A Template-Based Method for the Generation of Attack Trees. WISTP 2019: 155-165 - 2018
- [j19]Madeline Cheah
, Siraj A. Shaikh
, Jeremy W. Bryans
, Paul Wooderson
:
Building an automotive security assurance case using systematic security evaluations. Comput. Secur. 77: 360-379 (2018) - [c35]Andrew Tomlinson
, Jeremy W. Bryans
, Siraj Ahmed Shaikh
, Harsha Kumara Kalutarage
:
Detection of Automotive CAN Cyber-Attacks by Identifying Packet Timing Anomalies in Time Windows. DSN Workshops 2018: 231-238 - [c34]Daniel S. Fowler
, Jeremy W. Bryans, Siraj Ahmed Shaikh
, Paul Wooderson
:
Fuzz Testing for Automotive Cyber-Security. DSN Workshops 2018: 239-246 - [c33]Andrew Tomlinson
, Jeremy W. Bryans
, Siraj Ahmed Shaikh
:
Using a one-class compound classifier to detect in-vehicle network attacks. GECCO (Companion) 2018: 1926-1929 - [c32]Atif Hussain, Siraj A. Shaikh
, Alex Chung
, Sneha Dawda, Madeline Carr:
An Evidence Quality Assessment Model for Cyber Security Policymaking. Critical Infrastructure Protection 2018: 23-38 - 2017
- [j18]Harsha Kumara Kalutarage
, Hoang Nga Nguyen
, Siraj Ahmed Shaikh
:
Towards a threat assessment framework for apps collusion. Telecommun. Syst. 66(3): 417-430 (2017) - [j17]Madeline Cheah
, Siraj A. Shaikh
, Olivier C. L. Haas
, Alastair R. Ruddle
:
Towards a systematic security evaluation of the automotive Bluetooth interface. Veh. Commun. 9: 8-18 (2017) - [c31]Madeline Cheah
, Jeremy W. Bryans
, Daniel S. Fowler
, Siraj Ahmed Shaikh
:
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study. DSN Workshops 2017: 36-43 - [c30]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach
, Siraj Ahmed Shaikh
:
Software Model Checking: A Promising Approach to Verify Mobile App Security: A Position Paper. FTfJP@ECOOP 2017: 1:1-1:2 - [c29]Daniel S. Fowler
, Madeline Cheah
, Siraj Ahmed Shaikh
, Jeremy W. Bryans
:
Towards a Testbed for Automotive Cybersecurity. ICST 2017: 540-541 - [c28]Madeline Cheah
, Hoang Nga Nguyen
, Jeremy W. Bryans, Siraj A. Shaikh
:
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. WISTP 2017: 113-129 - [i2]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Software Model Checking: A Promising Approach to Verify Mobile App Security. CoRR abs/1706.04741 (2017) - 2016
- [j16]Siraj Ahmed Shaikh
, Harsha Kumara Kalutarage
:
Effective network security monitoring: from attribution to target-centric monitoring. Telecommun. Syst. 62(1): 167-178 (2016) - [c27]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. IMPS@ESSoS 2016: 29-37 - [c26]Irina Mariuca Asavoae, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh
:
Utilising $${\mathbb {K}}$$ Semantics for Collusion Detection in Android Applications. FMICS-AVoCS 2016: 142-149 - [c25]Madeline Cheah
, Siraj A. Shaikh
, Jeremy W. Bryans
, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. WISTP 2016: 262-269 - [i1]Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh:
Towards Automated Android App Collusion Detection. CoRR abs/1603.02308 (2016) - 2015
- [j15]Harsha K. Kalutarage
, Siraj Ahmed Shaikh
, Indika P. Wickramasinghe, Qin Zhou
, Anne E. James
:
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks. Comput. Electr. Eng. 47: 327-344 (2015) - [j14]Alexeis Garcia-Perez
, Siraj Ahmed Shaikh
, Harsha K. Kalutarage
, Mahsa Jahantab:
Towards a knowledge-based approach for effective decision-making in railway safety. J. Knowl. Manag. 19(3): 641-659 (2015) - [c24]Harsha Kumara Kalutarage
, Chonho Lee, Siraj Ahmed Shaikh
, Francis Bu-Sung Lee:
Towards an Early Warning System for Network Attacks Using Bayesian Inference. CSCloud 2015: 399-404 - [c23]Adrian Venables, Siraj Ahmed Shaikh
, James Shuttleworth
:
A Model for Characterizing Cyberpower. Critical Infrastructure Protection 2015: 3-16 - [c22]Harsha K. Kalutarage
, Siraj Ahmed Shaikh
, Bu-Sung Lee, Chonho Lee, Chai Kiat Yeo:
Early Warning Systems for Cyber Defence. iNetSeC 2015: 29-42 - 2014
- [j13]Luís Soares Barbosa
, Siraj Ahmed Shaikh
:
Selected contributions from the Open Source Software Certification (OpenCert) workshops. Sci. Comput. Program. 91: 139-140 (2014) - [e1]Antonio Cerone, Donatella Persico, Sara Fernandes, Alexeis Garcia-Perez
, Panagiotis Katsaros, Siraj Ahmed Shaikh
, Ioannis Stamelos:
Information Technology and Open Source: Applications for Education, Innovation, and Sustainability - SEFM 2012 Satellite Events, InSuEdu, MoKMaDS, and OpenCert, Thessaloniki, Greece, October 1-2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7991, Springer 2014, ISBN 978-3-642-54337-1 [contents] - 2013
- [j12]Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh
, Hao Chen:
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Inf. Syst. Frontiers 15(1): 17-34 (2013) - [c21]Nicole Gempton, Stefanos Skalistis, Jane Furness, Siraj A. Shaikh, Dobrila Petrovic:
Autonomous Control in Military Logistics Vehicles: Trust and Safety Analysis. HCI (17) 2013: 253-262 - [c20]Harsha K. Kalutarage
, Siraj A. Shaikh
, Qin Zhou
, Anne E. James
:
Monitoring for Slow Suspicious Activities Using a Target Centric Approach. ICISS 2013: 163-168 - [c19]Stefanos Skalistis, Dobrila Petrovic
, Siraj Ahmed Shaikh
:
Operating heavy duty vehicles under extreme heat conditions: A fuzzy approach for smart gear-shifting strategy. ITSC 2013: 961-966 - [c18]Harsha K. Kalutarage
, Siraj A. Shaikh
, Qin Zhou
, Anne E. James
:
Tracing Sources of Anonymous Slow Suspicious Activities. NSS 2013: 122-134 - 2012
- [j11]Javed Akhtar, John Bailey, David Weatherby, Siraj Ahmed Shaikh
, David Ireland, Daniel Payne, Luke Antins, Dave Barker:
Efficient and Reliable Transportation of Consignments (ERTOC). Int. J. Appl. Logist. 3(2): 40-52 (2012) - [c17]Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James:
Sensing for suspicion at scale: A Bayesian approach for cyber conflict attribution and reasoning. CyCon 2012: 1-19 - [c16]Ettore Bolisani, Francesca Scramoncin, Siraj Ahmed Shaikh
:
Models of Knowledge Transfer for Sustainable Development. SEFM Satellite Events 2012: 198-203 - [c15]Harsha K. Kalutarage
, Padmanabhan Krishnan, Siraj Ahmed Shaikh
:
A Certification Process for Android Applications. SEFM Satellite Events 2012: 288-303 - [c14]Siraj Ahmed Shaikh
, Padmanabhan Krishnan:
A Framework for Analysing Driver Interactions with Semi-Autonomous Vehicles. FTSCS 2012: 85-99 - 2011
- [j10]Antonio Cerone, Simon Fong, Siraj Ahmed Shaikh:
Analysis of Collaboration Effectiveness and Individuals' Contribution in FLOSS Communities. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 48 (2011) - [c13]Vassilis Kostakos
, Jayant Venkatanathan, Bernardo Reynolds, Norman M. Sadeh
, Eran Toch
, Siraj A. Shaikh
, Simon L. Jones
:
Who's your best friend?: targeted privacy attacks In location-sharing social networks. UbiComp 2011: 177-186 - [c12]Jin Tong, Siraj A. Shaikh
, Anne E. James
:
A Formal Approach to Analysing Knowledge Transfer Processes in Developing Countries. SEFM 2011: 486-501 - 2010
- [j9]Luís Soares Barbosa, Antonio Cerone, Alexander K. Petrenko, Siraj A. Shaikh:
Certification of open-source software: A role for formal methods? Comput. Syst. Sci. Eng. 25(4) (2010) - [j8]Luís Soares Barbosa, Antonio Cerone, Siraj Ahmed Shaikh
:
Preface. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [j7]Zulqarnain Hashmi, Siraj Ahmed Shaikh, Naveed Ikram:
Methodologies and Tools for OSS: Current State of the Practice. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 33 (2010) - [j6]Siraj A. Shaikh
, Joseph R. Rabaiotti:
Characteristic trade-offs in designing large-scale biometric-based identity management systems. J. Netw. Comput. Appl. 33(3): 342-351 (2010) - [c11]Hao Chen, John A. Clark, Siraj A. Shaikh
, Howard Chivers, Philip Nobles:
Optimising IDS Sensor Placement. ARES 2010: 315-320 - [c10]Jin Tong, Siraj A. Shaikh
:
ICT Driven Knowledge Management in Developing Countries: A Case Study in a Chinese Organisation. WCITD/NF 2010: 60-71
2000 – 2009
- 2009
- [j5]Siraj A. Shaikh
, Vicky J. Bush
, Steve A. Schneider
:
Specifying authentication using signal events in CSP. Comput. Secur. 28(5): 310-324 (2009) - [j4]Luís Soares Barbosa, Antonio Cerone, Siraj Ahmed Shaikh:
Preface. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 20 (2009) - [j3]Siraj Ahmed Shaikh, Antonio Cerone:
Towards a metric for Open Source Software Quality. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 20 (2009) - [c9]Hao Chen, John A. Clark, Juan E. Tapiador
, Siraj A. Shaikh
, Howard Chivers, Philip Nobles:
A Multi-objective Optimisation Approach to IDS Sensor Placement. CISIS 2009: 101-108 - [c8]Siraj A. Shaikh
, Howard Chivers, Philip Nobles, John A. Clark, Hao Chen:
A Deployment Value Model for Intrusion Detection Sensors. ISA 2009: 250-259 - 2007
- [j2]Christos K. Dimitriadis, Siraj A. Shaikh:
A Biometric Authentication Protocol for 3G Mobile Systems: Modelled and Validated Using CSP and Rank Functions. Int. J. Netw. Secur. 5(1): 99-111 (2007) - 2006
- [j1]Siraj A. Shaikh, Vicky J. Bush:
Analysing the Woo-Lam Protocol Using CSP and Rank Functions. J. Res. Pract. Inf. Technol. 38(1) (2006) - [c7]Siraj A. Shaikh
, Christos K. Dimitriadis:
Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions. SPC 2006: 211-226 - 2005
- [c6]Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying Authentication Using Signal Events in CSP. CISC 2005: 63-74 - [c5]Siraj A. Shaikh, Vicky J. Bush:
Analysing the Woo-Lam Protocol Using CSP and Rank Functions. WOSIS 2005: 3-12 - 2004
- [c4]Siraj A. Shaikh, Samir Al-Khayatt:
Analysis and implementation of virtual private network support in corporate networks. Parallel and Distributed Computing and Networks 2004: 251-256 - 2002
- [c3]Samir Al-Khayatt, Siraj A. Shaikh
, Babak Akhgar, Jawed I. A. Siddiqi:
Performance of Multimedia Applications with IPSec Tunneling. ITCC 2002: 134-138 - [c2]Samir Al-Khayatt, Siraj A. Shaikh
, Babak Akhgar, Jawed I. A. Siddiqi:
A Study of Encrypted, Tunneling Models in Virtual Private Networks. ITCC 2002: 139-143 - 2001
- [c1]Samir Al-Khayatt, Mark Charlesworth, Siraj A. Shaikh:
Virtual Private Network Support in a Corporate Network. WebNet 2001: 12-14
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint