default search action
Shahid Raza
Person information
- affiliation: RISE Research Institutes of Sweden
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza:
AutoPKI: public key infrastructure for IoT with automated trust transfer. Int. J. Inf. Sec. 23(3): 1859-1875 (2024) - [j25]Affan Yasin, Rubia Fatima, Jiangbin Zheng, Wasif Afzal, Shahid Raza:
Can serious gaming tactics bolster spear-phishing and phishing resilience? : Securing the human hacking in Information Security. Inf. Softw. Technol. 170: 107426 (2024) - [c39]August Karlsson, Rikard Höglund, Han Wang, Alfonso Iacovazzi, Shahid Raza:
Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT. CSR 2024: 82-89 - [c38]David Eklund, Alfonso Iacovazzi, Han Wang, Apostolos Pyrgelis, Shahid Raza:
BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection. ESORICS (2) 2024: 353-373 - [i9]Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza:
Towards Cyber Threat Intelligence for the IoT. CoRR abs/2406.13543 (2024) - 2023
- [j24]Anum Khurshid, Shahid Raza:
AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance. Comput. Secur. 124: 102952 (2023) - [j23]Han Wang, Luis Muñoz-González, Muhammad Zaid Hameed, David Eklund, Shahid Raza:
SparSFA: Towards robust and communication-efficient peer-to-peer federated learning. Comput. Secur. 129: 103182 (2023) - [j22]Mohammed Ramadan, Shahid Raza:
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems. IEEE Internet Things J. 10(18): 16594-16604 (2023) - [j21]Joel Höglund, Martin Furuhed, Shahid Raza:
Lightweight certificate revocation for low-power IoT with end-to-end security. J. Inf. Secur. Appl. 73: 103424 (2023) - [j20]Anum Khurshid, Sileshi Demesie Yalew, Mudassar Aslam, Shahid Raza:
ShieLD: Shielding Cross-Zone Communication Within Limited-Resourced IoT Devices Running Vulnerable Software Stack. IEEE Trans. Dependable Secur. Comput. 20(2): 1031-1047 (2023) - [j19]Han Wang, David Eklund, Alina Oprea, Shahid Raza:
FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning. ACM Trans. Internet Things 4(3): 17:1-17:24 (2023) - [c37]Rikard Höglund, Marco Tiloca, Simon Bouget, Shahid Raza:
Key Update for the IoT Security Standard OSCORE. CSR 2023: 78-85 - [c36]Alfonso Iacovazzi, Han Wang, Ismail Butun, Shahid Raza:
Towards Cyber Threat Intelligence for the IoT. DCOSS-IoT 2023: 483-490 - [c35]Shahid Raza, Salim Ahamad, Sumit Gupta, Prateek Chaturvedi:
Modeling Roadblocks of Digital Transformation Practices for Net Zero in Indian MSMEs. IC3I 2023: 246-249 - [c34]Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza:
On the Resilience of Machine Learning-Based IDS for Automotive Networks. VNC 2023: 239-246 - [i8]Alfonso Iacovazzi, Shahid Raza:
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers. CoRR abs/2306.14750 (2023) - [i7]Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza:
On the Resilience of Machine Learning-Based IDS for Automotive Networks. CoRR abs/2306.14782 (2023) - [i6]Joel Höglund, Shahid Raza:
BLEND: Efficient and blended IoT data storage and communication with application layer security. CoRR abs/2306.16540 (2023) - [i5]Joel Höglund, Shahid Raza, Martin Furuhed:
Towards Automated PKI Trust Transfer for IoT. CoRR abs/2306.16562 (2023) - 2022
- [j18]Hampus Lundberg, Nishat I. Mowla, Sarder Fakhrul Abedin, Kyi Thar, Aamir Mahmood, Mikael Gidlund, Shahid Raza:
Experimental Analysis of Trustworthy In-Vehicle Intrusion Detection System Using eXplainable Artificial Intelligence (XAI). IEEE Access 10: 102831-102841 (2022) - [j17]Anum Khurshid, Reem Alsaaidi, Mudassar Aslam, Shahid Raza:
EU Cybersecurity Act and IoT Certification: Landscape, Perspective and a Proposed Template Scheme. IEEE Access 10: 129932-129948 (2022) - [c33]Alfonso Iacovazzi, Shahid Raza:
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers. CSR 2022: 30-37 - [c32]Joel Höglund, Shahid Raza:
BLEND: Efficient and blended IoT data storage and communication with application layer security. CSR 2022: 253-260 - [c31]Mohammed Ramadan, Shahid Raza:
A Look-ahead Towards 6G Security (Abstract). CW 2022: 259-260 - [c30]Jämes Ménétrey, Christian Göttel, Anum Khurshid, Marcelo Pasin, Pascal Felber, Valerio Schiavoni, Shahid Raza:
Attestation Mechanisms for Trusted Execution Environments Demystified. DAIS 2022: 95-113 - [c29]Sérgio Figueiredo, Paulo Silva, Alfonso Iacovazzi, Vitalina Holubenko, João Casal, José M. Alcaraz Calero, Qi Wang, Pedro Colarejo, Ross Little Armitt, Giacomo Inches, Shahid Raza:
ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT. GIOTS 2022: 348-359 - [c28]Joel Höglund, Shahid Raza, Martin Furuhed:
Towards Automated PKI Trust Transfer for IoT. PKIA 2022: 1-8 - [c27]Mohammed Ramadan, Shahid Raza:
Broadband Jamming Suppression at Subarray Level for Frequency Diverse Array Antenna. SITIS 2022: 231-237 - [c26]Asreen Rostami, Minna Vigren, Shahid Raza, Barry Brown:
Being Hacked: Understanding Victims' Experiences of IoT Hacking. SOUPS @ USENIX Security Symposium 2022: 613-631 - [i4]Jämes Ménétrey, Christian Göttel, Anum Khurshid, Marcelo Pasin, Pascal Felber, Valerio Schiavoni, Shahid Raza:
Attestation Mechanisms for Trusted Execution Environments Demystified. CoRR abs/2206.03780 (2022) - [i3]Peter van der Stok, Panos Kampanakis, Michael C. Richardson, Shahid Raza:
EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol. RFC 9148: 1-41 (2022) - 2021
- [j16]Mudassar Aslam, Simon Bouget, Shahid Raza:
Security and trust preserving inter- and intra-cloud VM migrations. Int. J. Netw. Manag. 31(2) (2021) - [c25]Joel Höglund, Shahid Raza:
LICE: Lightweight certificate enrollment for IoT using application layer security. CNS 2021: 19-28 - [c24]Simon Bouget, Shahid Raza, Martin Furuhed:
Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network. VEHITS 2021: 562-570 - [c23]Han Wang, Luis Muñoz-González, David Eklund, Shahid Raza:
Non-IID data re-balancing at IoT edge with peer-to-peer federated learning for anomaly detection. WISEC 2021: 153-163 - [i2]Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst:
Quantitative System-Level Security Verification of the IoV Infrastructure. CoRR abs/2101.06137 (2021) - 2020
- [j15]Joel Höglund, Samuel Lindemer, Martin Furuhed, Shahid Raza:
PKI4IoT: Towards public key infrastructure for the Internet of Things. Comput. Secur. 89 (2020) - [j14]Mudassar Aslam, Bushra Mohsin, Abdul Nasir Khan, Shahid Raza:
FoNAC - An automated Fog Node Audit and Certification scheme. Comput. Secur. 93: 101759 (2020) - [j13]Marco Tiloca, Gianluca Dini, Kiki Rizki, Shahid Raza:
Group rekeying based on member join history. Int. J. Inf. Sec. 19(4): 343-381 (2020) - [j12]Salvador Pérez, José Luis Hernández Ramos, Shahid Raza, Antonio F. Skarmeta:
Application Layer Key Establishment for End-to-End Security in IoT. IEEE Internet Things J. 7(3): 2117-2128 (2020)
2010 – 2019
- 2019
- [j11]Kiki Rizki, Argyro Lamproudi, Marco Tiloca, Shahid Raza:
Group-IKEv2 for multicast IPsec in the internet of things. Int. J. Secur. Networks 14(1): 10-22 (2019) - [j10]Shahid Raza, Runar Mar Magnusson:
TinyIKE: Lightweight IKEv2 for Internet of Things. IEEE Internet Things J. 6(1): 856-866 (2019) - [c22]Han Wang, Luis Barriga, Arash Vahidi, Shahid Raza:
Machine Learning for Security at the IoT Edge - A Feasibility Study. MASS Workshops 2019: 7-12 - [c21]EunSeong Boo, Shahid Raza, Joel Höglund, JeongGil Ko:
FDTLS: Supporting DTLS-Based Combined Storage and Communication Security for IoT Devices. MASS 2019: 127-135 - [c20]EunSeong Boo, Shahid Raza, Joel Höglund, JeongGil Ko:
Towards Supporting IoT Device Storage and Network Security Using DTLS. MobiSys 2019: 570-571 - [c19]Zhitao He, Martin Furuhed, Shahid Raza:
Indraj: digital certificate enrollment for battery-powered wireless devices. WiSec 2019: 117-127 - 2018
- [c18]HyukSang Kwon, Shahid Raza, JeongGil Ko:
POSTER: On Compressing PKI Certificates for Resource Limited Internet of Things Devices. AsiaCCS 2018: 837-839 - [c17]Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. CNS 2018: 1-9 - [c16]Alexandre Peyrard, Nikolai Kosmatov, Simon Duquennoy, Inria Lille, Shahid Raza:
Towards Formal Verification of Contiki: Analysis of the AES-CCM* Modules with Frama-C. EWSN 2018: 264-269 - [i1]Santiago Aragon, Marco Tiloca, Max Maass, Matthias Hollick, Shahid Raza:
ACE of Spades in the IoT Security Game: A Flexible IPsec Security Profile for Access Control. CoRR abs/1808.04581 (2018) - 2017
- [j9]Shahid Raza, Prasant Misra, Zhitao He, Thiemo Voigt:
Building the Internet of Things with bluetooth smart. Ad Hoc Networks 57: 19-31 (2017) - [j8]Shahid Raza, Tómas Helgason, Panos Papadimitratos, Thiemo Voigt:
SecureSense: End-to-end secure communication architecture for the cloud-connected Internet of Things. Future Gener. Comput. Syst. 77: 40-51 (2017) - [j7]Marco Tiloca, Kirill Nikitin, Shahid Raza:
Axiom: DTLS-Based Secure IoT Group Communication. ACM Trans. Embed. Comput. Syst. 16(3): 66:1-66:29 (2017) - [c15]Dharmini Shreenivas, Shahid Raza, Thiemo Voigt:
Intrusion Detection in the RPL-connected 6LoWPAN Networks. IoTPTS@AsiaCCS 2017: 31-38 - [c14]Anass Sedrati, Mohamed Ahmed Abdelraheem, Shahid Raza:
Blockchain and IoT: Mind the Gap. InterIoT/SaSeIoT 2017: 113-122 - [c13]Filip Forsby, Martin Furuhed, Panos Papadimitratos, Shahid Raza:
Lightweight X.509 Digital Certificates for the Internet of Things. InterIoT/SaSeIoT 2017: 123-133 - [c12]Kasun Chandranath Hewage, Shahid Raza, Thiemo Voigt:
Protecting Glossy-Based Wireless Networks from Packet Injection Attacks. MASS 2017: 37-45 - 2016
- [j6]Ibrahim Ethem Bagci, Shahid Raza, Utz Roedig, Thiemo Voigt:
Fusion: coalesced confidential storage and communication framework for the IoT. Secur. Commun. Networks 9(15): 2656-2673 (2016) - [j5]Shahid Raza, Ludwig Seitz, Denis Sitenkov, Göran Selander:
S3K: Scalable Security With Symmetric Keys - DTLS Key Establishment for the Internet of Things. IEEE Trans Autom. Sci. Eng. 13(3): 1270-1280 (2016) - 2015
- [j4]Kasun Hewage, Shahid Raza, Thiemo Voigt:
An experimental study of attacks on the availability of Glossy. Comput. Electr. Eng. 41: 115-125 (2015) - [c11]Oriol Pinol Pinol, Shahid Raza, Joakim Eriksson, Thiemo Voigt:
BSD-based elliptic curve cryptography for the open Internet of Things. NTMS 2015: 1-5 - [c10]Shahid Raza, Prasant Misra, Zhitao He, Thiemo Voigt:
Bluetooth smart: An enabling technology for the Internet of Things. WiMob 2015: 155-162 - 2014
- [j3]Shahid Raza, Simon Duquennoy, Joel Höglund, Utz Roedig, Thiemo Voigt:
Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN. Secur. Commun. Networks 7(12): 2654-2668 (2014) - [c9]René Hummen, Hossein Shafagh, Shahid Raza, Thiemo Voigt, Klaus Wehrle:
Delegation-based authentication and authorization for the IP-based Internet of Things. SECON 2014: 284-292 - 2013
- [b1]Shahid Raza:
Lightweight Security Solutions for the Internet of Things. Research Institutes of Sweden, Sweden, 2013 - [j2]Shahid Raza, Linus Wallgren, Thiemo Voigt:
SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks 11(8): 2661-2674 (2013) - [j1]Linus Wallgren, Shahid Raza, Thiemo Voigt:
Routing Attacks and Countermeasures in the RPL-Based Internet of Things. Int. J. Distributed Sens. Networks 9 (2013) - [c8]Ibrahim Ethem Bagci, Shahid Raza, T. tony Chung, Utz Roedig, Thiemo Voigt:
Combined secure storage and communication for the Internet of Things. SECON 2013: 523-531 - 2012
- [c7]Shahid Raza, Daniele Trabalza, Thiemo Voigt:
6LoWPAN Compressed DTLS for CoAP. DCOSS 2012: 287-289 - [c6]Ibrahim Ethem Bagci, Mohammad Reza Pourmirza, Shahid Raza, Utz Roedig, Thiemo Voigt:
Codo: confidential data storage for wireless sensor networks. MASS Workshops 2012: 1-6 - 2011
- [c5]Shahid Raza, Simon Duquennoy, Antony Chung, Dogan Yazar, Thiemo Voigt, Utz Roedig:
Securing communication in 6LoWPAN with compressed IPsec. DCOSS 2011: 1-8 - [c4]Shahid Raza, Simon Duquennoy, Thiemo Voigt, Utz Roedig:
Demo abstract: Securing communication in 6LoWPAN with compressed IPsec. DCOSS 2011: 1-2
2000 – 2009
- 2009
- [c3]Shahid Raza, Adriaan Slabbert, Thiemo Voigt, Krister Landernäs:
Security Considerations for the WirelessHART Protocol. ETFA 2009: 1-8 - [c2]Shahid Raza, Thiemo Voigt, Adriaan Slabbert, Krister Landernäs:
Design and Implementation of a Security Manager for WirelessHART Networks. MASS 2009: 995-1004 - [c1]Joakim Eriksson, Fredrik Österlind, Thiemo Voigt, Niclas Finne, Shahid Raza, Nicolas Tsiftes, Adam Dunkels:
Accurate Power Profiling of Sensornets with the COOJA/MSPSim Simulator. MASS 2009: 1060-1061
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint