Syed S Rizvi

Syed S Rizvi
Pennsylvania State University | Penn State · College of Information Sciences and Technology

PhD., Computer Science & Engin

About

156
Publications
63,616
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
978
Citations
Citations since 2016
44 Research Items
810 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
Introduction
Syed Rizvi is an Associate Professor in the College of Information Sciences and Technology at Penn State University. He received his doctorate in Modeling and Simulation from the University of Bridgeport. His research interests lie at the intersection of computer networking, network security, and modeling/simulation. Recently, he has been working on security issues in cloud computing, IoT, and cognitive radios for wireless communications. He has published over 70 research papers.
Additional affiliations
August 2012 - July 2020
Pennsylvania State University
Position
  • Professor (Associate)
Description
  • Syed Rizvi is an Associate Professor in the College of Information Sciences and Technology at Pennsylvania State University. He received his doctorate in Modeling and Simulation from the University of Bridgeport in 2010.
August 2006 - December 2009
University of Bridgeport
Position
  • Professor (Associate)

Publications

Publications (156)
Article
The development of the Internet of Things (IoT) has been at the forefront of progressing societal functionality. However, the addition of IoT devices in conventional information technology (IT) infrastructure has raised and prioritized the concern of information security and data privacy. The Common Vulnerability Scoring System (CVSS) is a framewor...
Article
Purchasing items on the Internet with a credit card can be extremely risky. To mitigate this risk, we propose a new Multi-Layer Defense (MLD) scheme which uses two-factor authentication by instituting a random number generator that is only valid for a preset amount of time. For two-factor authentication, we use an eight-digit code that serves as a...
Article
Full-text available
Abstract Cloud computing is a model for on-demand delivery of IT resources (e.g., servers, storage, databases, etc.) over the Internet with pay-as-you-go pricing. Although it provides numerous benefits to cloud service users (CSUs) such as flexibility, elasticity, scalability, and economies of scale, there is a large trust deficit between CSUs and...
Article
The Internet of Things (IoT) creates a theoretical bridge between end users and the digital world. The IoT embodies a massive group of interconnected computing devices embedded with software, processors, and sensors capable of exchanging and transmitting data over network infrastructure. IoT technology has become prevalent among central domains suc...
Article
Full-text available
The cloud computing environment provides easy-to-access service for private and confidential data. However, there are many threats to the leakage of private data. This paper focuses on investigating the vulnerabilities of cloud service providers (CSPs) from three risk aspects: management risks, law risks, and technology risks. Additionally, this pa...
Article
For this research, our primary goal is to define an attack surface for networks utilizing the IoT (Internet of Things) devices. The IoT consists of systems of integrated objects, computing devices, digital, or mechanical machines that are given the ability to transmit and receive the data over a network without the need for human interaction. Each...
Article
Full-text available
With the development of information society and network technology, people increasingly depend on information found on the Internet. At the same time, the models of information diffusion on the Internet are changing as well. However, these models experience the problem due to the fast development of network technologies. There is no thorough resear...
Article
Full-text available
Cloud computing is clearly one of today’s most enticing technologies due to its scalable, flexible, and cost-efficient access to infrastructure and application services. Despite these benefits, cloud service users (CSUs) have serious concerns about the data security and privacy. Currently, there are several cloud service providers (CSPs) offering a...
Article
Full-text available
Machine Learning(ML) has shown enormous potential in various domains with the wide variations of underlying data types. Because of the miscellany in the datasets and the features, ML classifiers often suffer from challenges such as feature miss-classification, unfit algorithms, low accuracy, overfitting, underfitting, extreme bias, and high predict...
Article
Full-text available
Machine Learning (ML) requires a certain number of features (i.e., attributes) to train the model. One of the main challenges is to determine the right number and the type of such features out of the given dataset's attributes. It is not uncommon for theML process to use dataset of available features without computing the predictive value of each....
Article
The internet of things (IOT) is a phenomenon in which persons, things, and all other data are provided with specific identities and sending and receiving data does not require person to person or person to computer interconnection over a network. IOT has the potential to provide unlimited benefits in daily life and the number of IOT devices is grow...
Article
Full-text available
Identity theft is a very scary and real threat to everyone. In an attempt to give people peace of mind a new algorithm of mitigating risk is presented, the Secure Online Transaction Algorithm (SOTA). The proposed SOTA seeks to use two-factor authentication with the random codes. This form of user authentication has become widely accepted and many c...
Article
Full-text available
In the past decade, technologies in vehicles have been rapidly advancing creating both a new type of “on the road” entertainment and safer environment while driving. Technologies such as anti-lock brake systems, steering assist, and in some cases autonomous driving, manufactures nearly eliminated the dangers of driving. To maintain the advances in...
Article
Cloud computing is a rapidly evolving service for potential clients who wish to outsource their data storage or subscribe to cloud services. In a data-driven society, every company needs to make cost-effective and responsible decisions in terms of how they handle their sensitive data. Should a company make the decision to use cloud services, they m...
Article
The existing secure data aggregation approaches for wireless sensor networks were not designed for authorization, energy efficiency and proper security, leaving them prone to attacks. In this paper, we introduce the secure data aggregation using the access control and authentication (SDAACA) protocol. Using this protocol, we aim to detect two sever...
Article
Full-text available
The Cloud computing paradigm provides numerous attractive services to customers such as the provision of the on-demand self-service, usage-based pricing, ubiquitous network access, transference of risk, and location independent resource sharing. However, the security of cloud computing, especially its data privacy, is a highly challengeable task. T...
Conference Paper
Cloud computing is a revolutionary breakthrough in computing technology. It allows businesses to supply their customers with a seemingly endless amount of resources on demand, so long as they are willing to pay for it. From a business perspective, cloud computing is revolutionizing profitability. From a security standpoint, cloud computing presents...
Conference Paper
Full-text available
As the automobile industry continues to incorporate more technology into cars, the security of the "automobile network" portion of that technology is in need of tremendous improvement. The communications between the in-vehicle infotainment (IVI) systems and the essential safety systems (e.g., anti-lock brake systems) should remain secure. However,...
Article
Mobile Cloud Computing (MCC) combines the features of mobile computing, cloud computing, and wireless networks to create the healthy computational resources to mobile cloud users. The MCC aims is to execute the highly attractive mobile applications on a plethora of mobile cellular telephones, with highly rich user experience. From perspective of mo...
Chapter
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometric...
Chapter
In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and e...
Article
Full-text available
The network systems of the world are fragile, and can come under attack from any source. The attack can be a denial-of-service (DoS) state or another type of threat. What keep the networks safe are the intrusion detection and prevention systems (IDPS). They constantly monitor network traffic and if a malicious threat is detected, the threat is bloc...
Conference Paper
The amount of valuable data pertaining to users, such as digital documents, images, and various other important files, has grown exceedingly and needs to be backed up safely. The two most widely used existing backup solutions are the removable devices and the online storage. Problems can arise in the external device backups, for example it takes a...
Conference Paper
A wireless modem is a device which is used to transmit and receive data over a network. Power consumption for wireless devices becomes a challenge for researchers, causing the entire research environment to shift their focus to the power usage of wireless devices. Presently, by using a class A power amplifier, a power efficient wireless modem can b...
Conference Paper
Full-text available
With emergence of the latest technology, need for digital documents, images and medias has greatly increased. On the other hand, there has been great demand of protecting those documents. The researchers proposed several approaches to protect those valuable documents. The two most exciting available approaches are to remove the devices and online s...
Conference Paper
This paper investigates the identity theft and how to effectively use the biometric technology in order to prevent it from happening. Over the past few years, identity theft has become one of the most serious financial threats to corporations in the United States. Identity theft is when a thief steals sensitive information in order to engage in lar...
Article
Cloud computing is a relatively new paradigm that provides numerous advantages to service providers, developers, and customers with respect to flexibility, scalability, and availability at a lower cost. Motivated by these technical and economical advantages, many data owners outsource their data to centralized large data centers where the data is n...
Article
Full-text available
Recent trends within the IT industry have led to a tectonic shift in the way organizations utilize information systems to yield maximum efficiency. Cloud computing is the cornerstone of the aforementioned paradigm permutation. Information security, however, continues to dominate discussion on how organizations can utilize the efficiency of the clou...
Article
Full-text available
The focus of this research paper is twofold: First, we discuss some of the critical issues and challenges currently inhibiting the realization of a cognitive radio network (CRN). Those problems include the utilization of jammers to prevent the spectrum sensing and communication. Primary User Emulation (PUE) still pose a significant mitigation chall...
Article
Full-text available
Self-organization of distributed wireless sensor nodes is a critical issue in wireless sensor networks (WSNs), since each sensor node has limited energy, bandwidth, and scalability. These issues prevent sensor nodes from actively collaborating with the other types of sensor nodes deployed in a typical heterogeneous and somewhat hostile environment....
Article
Full-text available
While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision...
Conference Paper
Cloud computing represents the next evolutionary step in the realm of IT and offers a multitude of advantages over traditional computing models. However, there is a large trust deficit between cloud service users (CSUs) and cloud service providers (CSPs) that prevents the widespread adoption of the cloud among business professionals. Businesses are...
Article
Full-text available
Cloud computing is an emerging computing model that provides numerous advantages to organizations (both service providers and customers) in terms of massive scalability, lower cost, and flexibility, to name a few. Despite these technical and economical advantages of cloud computing, many potential cloud consumers are still hesitant to adopt cloud c...
Article
Recent trends within the IT industry have led to a tectonic shift in the way organisations utilise information systems to yield maximum efficiency. Cloud services are the cornerstone of the aforementioned paradigm permutation. The advent of cloud computing has brought with it a multitude of new and exciting concepts that can complicate security dem...
Article
Full-text available
Cloud computing is an emerging paradigm that affects a large part of the IT industry by offering dynamically scalable resources (e.g., hardware and software) that are provisioned as a service over the Internet. Cloud computing provides numerous advantages to organizations in terms of improved scalability, lower cost, and flexibility, to name a few....
Conference Paper
Cognitive Radio (CR) is a promising solution to solve the problem of limited spectrum and poor bandwidth utilization in wireless networks by opportunistically exploiting the available wireless spectrum. Despite the numerous advantages of CR technology, it imposes unique challenges for modeling and simulation due to dynamic spectrum sensing and the...
Article
Full-text available
IT auditors collect information on an organization's information systems, practices, and operations and critically analyze the information for improvement. One of the primary goals of an IT audit is to determine if the information system and its maintainers are meeting both the legal expectations of protecting customer data and the company standard...
Conference Paper
Full-text available
In the IT world of corporate networking, how businesses store and compute data is starting to shift from in-house servers to the cloud. However, some enterprises are still hesitant to make this leap to the cloud because of their information security and data privacy concerns. Enterprises that want to invest into this service need to feel confident...
Conference Paper
Full-text available
With the rapid development of cloud computing, more users are attracted by its powerful and cost-efficient computation capability. However, whether CSPs can effectively protect CSUs’ data confidentiality remains a challenging issue. In this work, we aim at ensuring data confidentiality in the cloud environment by enabling CSUs to (1) encrypt their...
Conference Paper
Full-text available
This paper presents a solution to resolve the interference problems between the Wi-FiTM and BluetoothTM wireless technologies. A new channel selecting approach is being used to select the frequency channel. The signal strength in a channel is assessed, and that value is used to select the channels to send data without interference. Thus we are tryi...
Article
In this paper, we present different components necessary for a design of a typical cognitive radio (CR) and classify them in the context of modeling and simulation. A design of a CR network (CRN) includes the software defined radio (SDR), spectrum sensing, and communication channels. We construct a theoretical representation of a CR by specifying i...
Article
Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometric...
Article
In the present scenario, the vulnerabilities associated with cloud computing and biometric technology rank among the most vital issues in information security. In this chapter, the primary goal is to investigate the physical and informational security susceptibilities of biometrics, analyze the structure and design possibilities of the cloud, and e...
Article
Full-text available
This paper presents a new logical process (LP) simulation model for distributed simulation systems where Null Message Algorithm (NMA) is used as an underlying time management algorithm (TMA) to provide synchronization among LPs. To extend the proposed simulation model for n number of LPs, this paper provides a detailed overview of the internal arch...
Article
Full-text available
Next generation wireless receivers demand low computational complexity algorithms with high computing power in order to perform fast signal detections and error estimations. Several signal detection and estimation algorithms have been proposed for next generation wireless receivers which are primarily designed to provide reasonable performance in t...
Article
Full-text available
A wireless sensor network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the nodes into sleep mode...
Conference Paper
Full-text available
One of the most common optimistic synchronization protocols for parallel simulation is the Time Warp algorithm proposed by Jefferson [12]. Time Warp algorithm is based on the virtual time paradigm that has the potential for greater exploitation of parallelism and, perhaps more importantly, greater transparency of the synchronization mechanism to th...
Conference Paper
Full-text available
Recent evolutions in wireless networks will require more efficient use of the underlying parallel discrete-event simulation (PDES) synchronization protocols to accommodate the demand for large-scale network simulation. In this dissertation, we investigate underlying synchronization protocols to improve the performance of large-scale network simulat...