Volgen
Dr. Nazim Uddin Sheikh
Dr. Nazim Uddin Sheikh
Geverifieerd e-mailadres voor mq.edu.au
Titel
Geciteerd door
Geciteerd door
Jaar
A lightweight signature-based IDS for IoT environment
NU Sheikh, H Rahman, S Vikram, H AlQahtani
arXiv preprint arXiv:1811.04582, 2018
252018
Analysis of the technology acceptance theoretical model in examining users’ Behavioural intention to use an augmented reality app (IMAPCampus)
H Alqahtani, M Kavakli, NU Sheikh
International Journal of Engineering and Management Research 8 (5), 37-49, 2018
122018
Countermeasure of attack vectors using signature-based IDS in IoT environments
TU Sheikh, H Rahman, HS Al-Qahtani, TK Hazra, NU Sheikh
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
92019
A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence
N Sheikh, K Mustafi, I Mukhopadhyay
Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON …, 2016
82016
Do auto-regressive models protect privacy? Inferring fine-grained energy consumption from aggregated model parameters
NU Sheikh, HJ Asghar, F Farokhi, MA Kaafar
IEEE Transactions on Services Computing 15 (6), 3198-3209, 2021
62021
A novel approach to enhance the security dimension of RSA algorithm using bijective function
K Mustafi, N Sheikh, TK Hazra, M Mazumder, I Bhattacharya, ...
2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016
52016
An optimized pattern recognition algorithm for anomaly detection in IoT environment
NU Sheikh, H Rahman, H Al-Qahtani
arXiv preprint arXiv:1901.08729, 2019
32019
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates.
NU Sheikh, Z Lu, H Asghar, MA Kaafar
SECRYPT, 283-294, 2021
22021
Multi-variable bijective mapping for secure encryption and decryption
NU Sheikh, TK Hazra, H Rahman, K Mustafi, AK Chakraborty
2017 8th Annual Industrial Automation and Electromechanical Engineering …, 2017
22017
Partitioned network with Adaptive Mobile Sinks
H Rahman, NU Sheikh, HS Al-Qahtani, TK Hazra
2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019
12019
Quantifying privacy threats in aggregated energy data analytics
NU Sheikh
Macquarie University, 2023
2023
Anomaly Detection in Smart Grid Networks Using Power Consumption Data
P Nanda, H Rahman, M Mohanty
20th International Conference on Security and Cryptography, 2023
2023
Submit Anomaly Detection in Smart Grid Networks Using Power Consumption Data
MMNUS Hasina Rahman, Priyadarsi Nanda
Secrypt 2023 Conference, 1-8, 2023
2023
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
NU Sheikh, Z Lu, HJ Asghar, MA Kaafar
International Conference on E-Business and Telecommunications, 305-333, 2021
2021
DO STATISTICAL MODELS REVEAL TOO MUCH? RECONSTRUCTING TRAINING DATA FROM RESULTANT MODELS
NU Sheikh, H Asghar, F Farokhi, M Kaafar
https://www.researchgate.net/publication …, 2021
2021
An Optimized Pattern Recognition Algorithm for Anomaly Detection in IoT Environment
N Uddin Sheikh, H Rahman, H Al-Qahtani
arXiv e-prints, arXiv: 1901.08729, 2019
2019
A Lightweight Signature-Based IDS for IoT Environment
N Uddin Sheikh, H Rahman, S Vikram, H AlQahtani
arXiv e-prints, arXiv: 1811.04582, 2018
2018
Evaluating Continuous User-Authentication using Breaths under Health Conditions
NU Sheikh, S Berkovsky, HJ Asghar, MA Kaafar
Evaluating Membership Inference Attack Against Differentially Private Machine Learning in Digital Health
NU Sheikh, S Berkovsky, HJ Asghar, M Ali
AI-Enabled Privacy Preserving Energy Data Analytics: A Review
NU Sheikh, D Vatsalan, HJ Asghar, MA Kaafar
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20