Match!
Sherali Zeadally
University of Kentucky
423Publications
46H-index
7,765Citations
Publications 423
Newest
#1Muhammad Rizwan Asghar (University of Auckland)H-Index: 8
#2Qinwen Hu (University of Auckland)H-Index: 1
Last.Sherali Zeadally (UK: University of Kentucky)H-Index: 46
view all 3 authors...
Abstract Industrial Control Systems (ICSs) play an important role in today’s industry by providing process automation, distributed control, and process monitoring. ICS was designed to be used in an isolated area or connected to other systems via specialised communication mechanisms or protocols. This setup allows manufacturers to manage their production processes with great flexibility and safety. However, this design does not meet today’s business requirements to work with state-of-the-art tech...
#1Rasheed HussainH-Index: 12
#2Fatima Hussain (Royal Bank of Canada)H-Index: 1
Last.Sherali Zeadally (UK: University of Kentucky)H-Index: 46
view all 3 authors...
Abstract The commercial adaptation of Vehicular Ad hoc NETwork (VANET) to achieve secure Intelligent Transportation System (ITS) heavily depends on the security guarantees for the end-users and consumers. Current VANET security standards address most of the security challenges faced by the vehicular networks. However, with the emergence of 5th Generation (5G) networks, and the demand for a range of new applications and services through vehicular networks, it is imperative to integrate 5G and veh...
#1Sherali Zeadally (UK: University of Kentucky)H-Index: 46
#2Jacques Bou Abdo (ND: University of Notre Dame)H-Index: 8
#1Sherali ZeadallyH-Index: 46
#2Farhan SiddiquiH-Index: 11
Last.Zubair A. BaigH-Index: 13
view all 3 authors...
Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the la...
#1Malcolm Shore (Cant.: University of Canterbury)H-Index: 3
#2Sherali Zeadally (UK: University of Kentucky)H-Index: 46
Last.Andy Clark (RHUL: Royal Holloway, University of London)
view all 3 authors...
The last two decades have seen a fundamental shift in the manufacturing, sourcing and operation of technology, which has raised concerns in state security agencies about the cybersecurity risk to government and critical infrastructure. Sophisticated cyber attacks continue to be launched by state actors worldwide, while the engineering practices in common use have failed to deliver a commensurate improvement in technology cyber security. Cyber attacks continue to be successful against commercial ...
#1Farhan Siddiqui (Dickinson College)
#2Jake Beley (Dickinson College)
Last.Grant Braught (Dickinson College)H-Index: 7
view all 4 authors...
Abstract The Internet of Things (IoT) is a fast growing and rapidly evolving field. Everyday objects from smart home appliances (e.g. toasters and refrigerators) to health monitoring products (e.g. pacemakers and blood pressure monitors), to minuscule sensors and actuators, are being redesigned to be able to transfer data over a network. The connection of billions of these new objects to the Internet will cause a dramatic increase in the amount of shared data, which will simultaneously introduce...
#1Qi Feng (WHU: Wuhan University)H-Index: 3
#2He Debiao (WHU: Wuhan University)H-Index: 36
Last.Kaitai Liang (University of Surrey)H-Index: 17
view all 5 authors...
The rapid advances of wireless communication technologies along with the popularity of mobile devices are enabling users to access various web services anywhere and anytime. Due to the openness of wireless communications, security becomes a vital issue. To provide secure communication, many anonymous authentication protocols in mobile client–server environments based on classical mathematical hard assumptions (i.e., discrete logarithm problem or integer factorization problem) have been presented...
#1Anirudh Paranjothi (OU: University of Oklahoma)H-Index: 2
#2Mohammad S. Khan (ETSU: East Tennessee State University)H-Index: 5
Last.David Hicks (Texas A&M University–Kingsville)H-Index: 2
view all 5 authors...
Abstract The emergence of connected vehicles paradigm has made secure communication a key concern amongst the connected vehicles. Communication between the vehicles and Road Side Units (RSUs) is critical to disseminate message among the vehicles. We focus on secure message transmission in connected vehicles using multi-hop social networks environment to deliver the message with varying trustworthiness. We proposed a Geographic Social Trust Routing (GSTR) approach; messages are propagated using m...
12345678910