default search action
Syed Rizvi 0001
Person information
- affiliation: Pennsylvania State University, Department of Information Sciences and Technology, Altoona, PA, USA
Other persons with the same name
- Syed Rizvi — disambiguation page
- Syed Rizvi 0002 — South East Technological University, Waterford, Ireland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Syed Rizvi, Iyonna Williams:
Analyzing transparency and malicious insiders prevention for cloud computing environment. Comput. Secur. 137: 103622 (2024) - 2023
- [j19]Syed Rizvi, Tatiana Zwerling, Benjamin Thompson, Shawn Faiola, Shakir Campbell, Stephen Fisanick, Codi Hutnick:
A modular framework for auditing IoT devices and networks. Comput. Secur. 132: 103327 (2023) - [c26]Syed Rizvi, Anthony Hammill, Hans Esteban, Mark Ihnat:
Data Protection and Data Recovery Plan for IoT Transportation Domain. ISNCC 2023: 1-8 - 2022
- [j18]Syed Rizvi, Iyonna Williams, Shakir Campbell:
TUI Model for data privacy assessment in IoT networks. Internet Things 17: 100465 (2022) - [j17]Abdul Razaque, Syed Rizvi, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh:
State-of-art review of information diffusion models and their impact on social network vulnerabilities. J. King Saud Univ. Comput. Inf. Sci. 34(1): 1275-1294 (2022) - 2020
- [j16]Abdul Razaque, Fathi H. Amsaad, Salim Hariri, Marwah Almasri, Syed S. Rizvi, Mohamed Ben Haj Frej:
Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider. IEEE Access 8: 80812-80826 (2020) - [j15]Syed Rizvi, R. J. Orr, Austin Cox, Prithvee Ashokkumar, Mohammad Rizvi:
Identifying the attack surface for IoT network. Internet Things 9: 100162 (2020) - [j14]Syed Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd, Iyonna Williams:
Threat model for securing internet of things (IoT) network at device-level. Internet Things 11: 100240 (2020) - [j13]Syed Rizvi, John E. Mitchell, Abdul Razaque, Mohammad Rizvi, Iyonna Williams:
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers. J. Cloud Comput. 9: 42 (2020) - [c25]Anthony Avella, Syed Rizvi, Andrew Gibson, Marcus Ryan, Ryan Strimple, Ian Menovich:
VM based Malware Security Protection on Android Platform. ICSSA 2020: 38-45 - [c24]William Aiken, Jungwoo Ryoo, Syed Rizvi:
An Internet of Things (IoT) Security Assessment for Households. ICSSA 2020: 53-59 - [c23]Syed Rizvi, Tanner Flock, Travis Flock, Iyonna Williams:
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts. ICSSA 2020: 60-65 - [c22]Syed Rizvi, Shakir Campbell, Kieran Alden:
Why Compliance is needed for Internet of Things? ICSSA 2020: 66-71
2010 – 2019
- 2019
- [c21]Syed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar:
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication. CISS 2019: 1-6 - [c20]Syed Rizvi, Jarrett Imler, Luke Ritchey, Michael Tokar:
Securing PKES: Integrating Artificial Intelligence Into PKES Forcefield For Anomaly Detection. ICSSA 2019: 10-15 - [c19]Syed Rizvi, Nicholas McIntyre, Jungwoo Ryoo:
Computing Security Scores for IoT Device Vulnerabilities. ICSSA 2019: 52-59 - [c18]Syed Rizvi, Kieran Alden, Shakir Campbell:
A Hybrid Framework for Detecting Repackaged Applications on the Android Market. ICSSA 2019: 76-82 - 2018
- [j12]Muhammad Fahim Uddin, Syed Rizvi, Abdul Razaque:
Proposing Logical Table Constructs for Enhanced Machine Learning Process. IEEE Access 6: 47751-47769 (2018) - [j11]Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almiani, Syed Rizvi, Akshat Hans:
Token security for internet of things. Int. J. Embed. Syst. 10(4): 334-343 (2018) - [j10]Syed Rizvi, Jungwoo Ryoo, John Kissell, William Aiken, Yuhong Liu:
A security evaluation framework for cloud security auditing. J. Supercomput. 74(11): 5774-5796 (2018) - [c17]Syed Rizvi, Ryan Pipetti, Nicholas McIntyre, Jonathan Todd:
An Attack Vector for IoT Networks. ICSSA 2018: 39-44 - [c16]Syed Rizvi, Andrew Kurtz, Joseph R. Pfeffer III, Mohammad Rizvi:
Securing the Internet of Things (IoT): A Security Taxonomy for IoT. TrustCom/BigDataSE 2018: 163-168 - [c15]Syed Rizvi, Joseph Gualdoni, Abdul Razaque:
Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol. TrustCom/BigDataSE 2018: 721-726 - 2017
- [j9]Abdul Razaque, Syed S. Rizvi, Meer J. Khan, Qassim B. Hani, Julius P. Dichter, Reza M. Parizi:
Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process. Comput. Secur. 66: 169-184 (2017) - [j8]Abdul Razaque, Syed S. Rizvi:
Secure data aggregation using access control and authentication for wireless sensor networks. Comput. Secur. 70: 532-545 (2017) - [j7]Abdul Razaque, Syed S. Rizvi:
Privacy preserving model: a new scheme for auditing cloud stakeholders. J. Cloud Comput. 6: 7 (2017) - [c14]Evan Michael English, Daniel Paul Stacey, Syed Rizvi, Donte Perino:
Cloud Reliability and Independence Standard: A Three Tiered System for Optimal Cloud Storage. ICSSA 2017: 69-74 - [c13]Joseph Gualdoni, Andrew Kurtz, Ilva Myzyri, Megan Wheeler, Syed Rizvi:
Multi-Layer Defense Model for Securing Online Financial Transactions. ICSSA 2017: 75-79 - [c12]Syed S. Rizvi, Trent A. Bolish, Joseph R. Pfeffer III:
Security evaluation of cloud service providers using third party auditors. ICC 2017: 106:1-106:6 - [c11]Syed Rizvi, Jonathan Willett, Donte Perino, Tyler Vasbinder, Seth Marasco:
Protecting an automobile network using distributed firewall system. ICC 2017: 174:1-174:6 - 2016
- [j6]Abdul Razaque, Syed S. Rizvi:
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Comput. Secur. 62: 328-347 (2016) - 2015
- [j5]Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker:
A user oriented cloud security evaluation framework. Int. J. Trust. Manag. Comput. Commun. 3(2): 168-192 (2015) - [j4]Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Syed Rizvi, Athanasios V. Vasilakos:
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions. J. Comput. Sci. Eng. 9(3) (2015) - [j3]Syed Rizvi, Kelsey Karpinski, Abdul Razaque:
Novel Architecture of Self-organized Mobile Wireless Sensor Networks. J. Comput. Sci. Eng. 9(4) (2015) - [c10]Syed Rizvi, John Mitchell:
A Semi-distributed Access Control Management Scheme for Securing Cloud Environment. CLOUD 2015: 501-507 - [c9]Syed Rizvi, Kelsey Karpinski, Brennen Kelly, Taryn Walker:
Utilizing Third Party Auditing to Manage Trust in the Cloud. Complex Adaptive Systems 2015: 191-197 - [c8]Syed Rizvi, Nathan Showan, John Mitchell:
Analyzing the Integration of Cognitive Radio and Cloud Computing for Secure Networking. Complex Adaptive Systems 2015: 206-212 - [c7]Syed Rizvi, Abdul Razaque, Katie Cover:
Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment. CSCloud 2015: 31-36 - [c6]Syed Rizvi, Abdul Razaque, Katie Cover:
Cloud Data Integrity Using a Designated Public Verifier. HPCC/CSS/ICESS 2015: 1361-1366 - [c5]John Mitchell, Syed Rizvi, Jungwoo Ryoo:
A Fuzzy-Logic Approach for Evaluating a Cloud Service Provider. ICSSA 2015: 19-24 - [c4]Syed Rizvi, Jungwoo Ryoo, John Kissell, Bill Aiken:
A stakeholder-oriented assessment index for cloud security auditing. IMCOM 2015: 55:1-55:7 - 2014
- [j2]Jungwoo Ryoo, Syed Rizvi, William Aiken, John Kissell:
Cloud Security Auditing: Challenges and Emerging Approaches. IEEE Secur. Priv. 12(6): 68-74 (2014) - [c3]Syed Rizvi, Katie Cover, Christopher Gates:
A Trusted Third-party (TTP) based Encryption Scheme for Ensuring Data Confidentiality in Cloud Environment. Complex Adaptive Systems 2014: 381-386 - [c2]Syed Rizvi, Nathan Showan:
A generic layered modeling for cognitive radio networks. SpringSim (Posters) 2014: 2 - [c1]Syed Rizvi, Jungwoo Ryoo, Yuhong Liu, Dustin Zazworsky, Anthony Cappeta:
A centralized trust model approach for cloud computing. WOCC 2014: 1-6 - 2012
- [j1]Syed S. Rizvi:
Algorithm for Improving the Computing Power of Next Generation Wireless Receivers. J. Comput. Sci. Eng. 6(4): 310-319 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint