A lightweight signature-based IDS for IoT environment NU Sheikh, H Rahman, S Vikram, H AlQahtani arXiv preprint arXiv:1811.04582, 2018 | 25 | 2018 |
Analysis of the technology acceptance theoretical model in examining users’ Behavioural intention to use an augmented reality app (IMAPCampus) H Alqahtani, M Kavakli, NU Sheikh International Journal of Engineering and Management Research 8 (5), 37-49, 2018 | 12 | 2018 |
Countermeasure of attack vectors using signature-based IDS in IoT environments TU Sheikh, H Rahman, HS Al-Qahtani, TK Hazra, NU Sheikh 2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019 | 9 | 2019 |
A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence N Sheikh, K Mustafi, I Mukhopadhyay Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON …, 2016 | 8 | 2016 |
Do auto-regressive models protect privacy? Inferring fine-grained energy consumption from aggregated model parameters NU Sheikh, HJ Asghar, F Farokhi, MA Kaafar IEEE Transactions on Services Computing 15 (6), 3198-3209, 2021 | 6 | 2021 |
A novel approach to enhance the security dimension of RSA algorithm using bijective function K Mustafi, N Sheikh, TK Hazra, M Mazumder, I Bhattacharya, ... 2016 IEEE 7th Annual Information Technology, Electronics and Mobile …, 2016 | 5 | 2016 |
An optimized pattern recognition algorithm for anomaly detection in IoT environment NU Sheikh, H Rahman, H Al-Qahtani arXiv preprint arXiv:1901.08729, 2019 | 3 | 2019 |
Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates. NU Sheikh, Z Lu, H Asghar, MA Kaafar SECRYPT, 283-294, 2021 | 2 | 2021 |
Multi-variable bijective mapping for secure encryption and decryption NU Sheikh, TK Hazra, H Rahman, K Mustafi, AK Chakraborty 2017 8th Annual Industrial Automation and Electromechanical Engineering …, 2017 | 2 | 2017 |
Partitioned network with Adaptive Mobile Sinks H Rahman, NU Sheikh, HS Al-Qahtani, TK Hazra 2019 IEEE 10th Annual Information Technology, Electronics and Mobile …, 2019 | 1 | 2019 |
Quantifying privacy threats in aggregated energy data analytics NU Sheikh Macquarie University, 2023 | | 2023 |
Anomaly Detection in Smart Grid Networks Using Power Consumption Data P Nanda, H Rahman, M Mohanty 20th International Conference on Security and Cryptography, 2023 | | 2023 |
Submit Anomaly Detection in Smart Grid Networks Using Power Consumption Data MMNUS Hasina Rahman, Priyadarsi Nanda Secrypt 2023 Conference, 1-8, 2023 | | 2023 |
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics NU Sheikh, Z Lu, HJ Asghar, MA Kaafar International Conference on E-Business and Telecommunications, 305-333, 2021 | | 2021 |
DO STATISTICAL MODELS REVEAL TOO MUCH? RECONSTRUCTING TRAINING DATA FROM RESULTANT MODELS NU Sheikh, H Asghar, F Farokhi, M Kaafar https://www.researchgate.net/publication …, 2021 | | 2021 |
An Optimized Pattern Recognition Algorithm for Anomaly Detection in IoT Environment N Uddin Sheikh, H Rahman, H Al-Qahtani arXiv e-prints, arXiv: 1901.08729, 2019 | | 2019 |
A Lightweight Signature-Based IDS for IoT Environment N Uddin Sheikh, H Rahman, S Vikram, H AlQahtani arXiv e-prints, arXiv: 1811.04582, 2018 | | 2018 |
Evaluating Continuous User-Authentication using Breaths under Health Conditions NU Sheikh, S Berkovsky, HJ Asghar, MA Kaafar | | |
Evaluating Membership Inference Attack Against Differentially Private Machine Learning in Digital Health NU Sheikh, S Berkovsky, HJ Asghar, M Ali | | |
AI-Enabled Privacy Preserving Energy Data Analytics: A Review NU Sheikh, D Vatsalan, HJ Asghar, MA Kaafar | | |