Fuzz testing for automotive cyber-security DS Fowler, J Bryans, SA Shaikh, P Wooderson 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 64 | 2018 |
Detection of automotive CAN cyber-attacks by identifying packet timing anomalies in time windows A Tomlinson, J Bryans, SA Shaikh, HK Kalutarage 2018 48th Annual IEEE/IFIP international conference on dependable systems …, 2018 | 63 | 2018 |
Building an automotive security assurance case using systematic security evaluations M Cheah, SA Shaikh, J Bryans, P Wooderson Computers & Security 77, 360-379, 2018 | 58 | 2018 |
Towards a testbed for automotive cybersecurity DS Fowler, M Cheah, SA Shaikh, J Bryans 2017 IEEE International Conference on Software Testing, Verification and …, 2017 | 57 | 2017 |
Towards a systematic security evaluation of the automotive Bluetooth interface M Cheah, SA Shaikh, O Haas, A Ruddle Vehicular Communications 9, 8-18, 2017 | 54 | 2017 |
Towards viable intrusion detection methods for the automotive controller area network A Tomlinson, J Bryans, SA Shaikh 2nd ACM Computer Science in Cars Symposium, 1-9, 2018 | 49 | 2018 |
Network reconnaissance SA Shaikh, H Chivers, P Nobles, JA Clark, H Chen Network Security 2008 (11), 12-16, 2008 | 49 | 2008 |
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise H Chivers, JA Clark, P Nobles, SA Shaikh, H Chen Information Systems Frontiers 15, 17-34, 2013 | 46 | 2013 |
A method for constructing automotive cybersecurity tests, a CAN fuzz testing example DS Fowler, J Bryans, M Cheah, P Wooderson, SA Shaikh 2019 IEEE 19th international conference on software quality, reliability and …, 2019 | 42 | 2019 |
Who's your best friend? Targeted privacy attacks in location-sharing social networks V Kostakos, J Venkatanathan, B Reynolds, N Sadeh, E Toch, SA Shaikh, ... Proceedings of the 13th international conference on Ubiquitous computing …, 2011 | 42 | 2011 |
Characteristic trade-offs in designing large-scale biometric-based identity management systems SA Shaikh, JR Rabaiotti Journal of Network and Computer Applications 33 (3), 342-351, 2010 | 37 | 2010 |
Evaluating the role of public agricultural extension and advisory services in promoting agro-ecology transition in Southeast Nigeria EM Emeana, L Trenchard, K Dehnen-Schmutz, S Shaikh Agroecology and sustainable food systems 43 (2), 123-144, 2019 | 32 | 2019 |
COVID-19 digitization in maritime: understanding cyber risks K Kuhn, S Bicakci, SA Shaikh WMU Journal of Maritime Affairs 20 (2), 193-214, 2021 | 30 | 2021 |
A new architecture for network intrusion detection and prevention W Bul’ajoul, A James, S Shaikh IEEE access 7, 18558-18573, 2019 | 29 | 2019 |
Optimising IDS sensor placement H Chen, JA Clark, SA Shaikh, H Chivers, P Nobles 2010 International Conference on Availability, Reliability and Security, 315-320, 2010 | 29 | 2010 |
Using a one-class compound classifier to detect in-vehicle network attacks A Tomlinson, J Bryans, SA Shaikh Proceedings of the genetic and evolutionary computation conference companion …, 2018 | 26 | 2018 |
Formalising systematic security evaluations using attack trees for automotive applications M Cheah, HN Nguyen, J Bryans, SA Shaikh Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018 | 26 | 2018 |
Towards automated android app collusion detection IM Asavoae, J Blasco, TM Chen, HK Kalutarage, I Muttik, HN Nguyen, ... arXiv preprint arXiv:1603.02308, 2016 | 23 | 2016 |
A framework for analysing driver interactions with semi-autonomous vehicles S Shaikh, P Krishnan arXiv preprint arXiv:1301.0043, 2013 | 23 | 2013 |
Vehicular platoon communication: Cybersecurity threats and open challenges SJ Taylor, F Ahmad, HN Nguyen, SA Shaikh, D Evans, D Price 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 22 | 2021 |