Syed S Rizvi
Penn State University
H-index: 22
North America-United States
Top articles of Syed S Rizvi
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Analyzing transparency and malicious insiders prevention for cloud computing environment | Computers & Security | Syed Rizvi Iyonna Williams | 2024/2/1 |
Data Protection and Data Recovery Plan for IoT Transportation Domain | Syed Rizvi Anthony Hammill Hans Esteban Mark Ihnat | 2023/10/23 | |
Developing Data Protection and Recovery Plan for Healthcare IoT Domain | Journal of Computing Sciences in Colleges | Syed Rizvi Jessica Ayres Jessie Pensyl Mark Ihnat | 2023/10/1 |
Data Protection and Recovery Plan for Retail IoT Domain | Journal of Computing Sciences in Colleges | Syed Rizvi Justin Moore Zachary McKee Mark Ihnat | 2023/10/1 |
A modular framework for auditing IoT devices and networks | Computers & Security | Syed Rizvi Tatiana Zwerling Benjamin Thompson Shawn Faiola Shakir Campbell | 2023/9/1 |
Analysis of Mobile Threats and Security Vulnerabilities for Mobile Platforms and Devices | Syed Rizvi Gabriel Labrador Whitney Hernandez Kelsey Karpinski | 2022/9/1 | |
TUI Model for data privacy assessment in IoT networks | Internet of Things | Syed Rizvi Iyonna Williams Shakir Campbell | 2022/3/1 |
State-of-art review of information diffusion models and their impact on social network vulnerabilities | Abdul Razaque Syed Rizvi Muder Almiani Amer Al Rahayfeh | 2022/1/1 | |
Data Security and Privacy Issues in the Internet of Things Ecosystem | Journal of Computing Sciences in Colleges | Syed Rizvi Dylan Bender Devon Claudino Joshua Krish Benjamin Weiland | 2022/11/1 |
VM based Malware Security Protection on Android Platform | Anthony Avella Syed Rizvi Andrew Gibson Marcus Ryan Ryan Strimple | 2020/10/28 | |
Enhanced grey risk assessment model for support of cloud service provider | IEEE Access | Abdul Razaque Fathi Amsaad Salim Hariri Marwah Almasri Syed S Rizvi | 2020/4/13 |
Anomaly Detection to Protect Networks from Advanced Persistent Threats Using Adaptive Resonance AI Concepts | Syed Rizvi Tanner Flock Travis Flock Iyonna Williams | 2020/10/28 | |
Identifying the attack surface for IoT network | Internet of Things | Syed Rizvi RJ Orr Austin Cox Prithvee Ashokkumar Mohammad R Rizvi | 2020/3/1 |
An Internet of Things (IoT) Security Assessment for Households | William Aiken Jungwoo Ryoo Syed Rizvi | 2020/10/28 | |
Internet of Things | Christos Bouras Rafail Kalogeropoulos | 2020 | |
Protecting financial transactions through networks and point of sales | Journal of Cyber Security Technology | Syed Rizvi Andrew Kurtz Iyonna Williams Joseph Gualdoni Ilva Myzyri | 2020/10/1 |
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers | Journal of cloud computing | Syed Rizvi John Mitchell Abdul Razaque Mohammad R Rizvi Iyonna Williams | 2020/12 |
Information Systems Security Readiness Assessment for Municipalities in Pennsylvania | Jungwoo Ryoo Syed Rizvi William Aiken Brooke Long-Yarrison | 2020/9 | |
Why Compliance is needed for Internet of Things? | Syed Rizvi Shakir Campbell Kieran Alden | 2020/10/28 | |
Threat model for securing internet of things (IoT) network at device-level | Internet of Things | Syed Rizvi Ryan Pipetti Nicholas McIntyre Jonathan Todd Iyonna Williams | 2020/9/1 |