scispace - formally typeset
Search or ask a question
Author

Saeed Rajput

Bio: Saeed Rajput is an academic researcher from Florida Atlantic University. The author has contributed to research in topics: Password & Intrusion detection system. The author has an hindex of 9, co-authored 21 publications receiving 410 citations. Previous affiliations of Saeed Rajput include Nova Southeastern University & University of Southern California.

Papers
More filters
Patent
05 Mar 1998
TL;DR: In this article, a portable digital identity of the individual that includes personal information, and may also include data representing the person's handwritten signature and one or more passwords, was created and used to bind a verifiable electronic impression with an electronic document using electronic watermarks.
Abstract: This invention creates a portable digital identity of the individual that includes personal information, and may also include data representing the person's handwritten signature and one or more passwords. The digital identity optionally includes data representing seals, fingerprints and biometric information. The digital identity can be used to bind a verifiable electronic impression with an electronic document using electronic watermarks so that any modification in the document or the electronic impression bound to the document can be detected. The personal information included in the digital identifiers can include, in addition to a password, answers to questions that are composed by the user. The digital identity of a user can be created once and stored after encryption for protection. This digital identity can then be used by the signer to bind a unique instance of an impression of the digital identity to any document. Document and digital identity verification including verifying a cryptographic digital signature that establishes the integrity of the document, and ensures non-repudiation of origin to the extent that it was signed by the user's private key.

155 citations

Proceedings ArticleDOI
16 Aug 2006
TL;DR: A novel lightweight group based trust management scheme (GTMS) for distributed wireless sensor networks in which the whole group will get a single trust value, which helps in keeping minimum resource utilization at the sensor nodes.
Abstract: Sensor network security solutions that have been proposed so far are mostly built on the assumption of a trusted environment, which is not very realistic so we need trust management before deploying any other security solution Traditional trust management schemes that have been developed for wired and wireless ad-hoc networks are not suitable for wireless sensor networks because of higher consumption of resources such as memory and power In this paper, we propose a novel lightweight group based trust management scheme (GTMS) for distributed wireless sensor networks in which the whole group will get a single trust value Instead of using completely centralized or distributed trust management schemes, GTMS uses hybrid trust management approach that helps in keeping minimum resource utilization at the sensor nodes

77 citations

Patent
05 Mar 1998
TL;DR: In this article, a system monitors a data payload that is being transmitted in a secure form over the Internet and provides rate computations for such payloads based on the size of the data.
Abstract: A system monitors a data payload that is being transmitted in a secure form over the Internet and provides rate computations for such payloads based on the size of the data. A data container may be implemented as a digital envelope with the bitmap (digital picture) of a stamp. The current rate for the data container is shown on the stamp and is dynamically updated as data files are added to the envelope. The overall cost is a function of the applied rate card, the size of the data and the type of security services provided.

44 citations

Patent
21 Sep 2009
TL;DR: In this article, a system for implementing redaction rules in compliance with an organization's privacy policy, where the system intercepts messages between an information source (103) and an information destination (102), modifies the message contents based on Redaction rules (106) and forwards the redacted contents over to the client.
Abstract: A system (101) for implementing redaction rules in compliance with an organization's privacy policy, where the system intercepts messages between an information source (103) and an information destination (102), modifies the message contents based on redaction rules (106) and forwards the redacted contents over to the client. The system also maintains a record of the redacted information and updates the contents of any message submitted by the client (102) in order to maintain database integrity.

33 citations

Patent
25 Apr 2006
TL;DR: In this paper, an interactive approach to learn the navigation and then repeat the learn sequence of actions, while monitoring for the changes in the values, is presented to deal with these issues.
Abstract: Information retrieval and consumption from the web is becoming the fundamental way we manage our lives, business and leisure. To simplify retrieving information of our interest, a lot of research has been done in the area of web crawlers, or “bots” that navigate the web automatically, read web pages, and index those web pages based on the content of web pages. Another group of utilities that monitor web page changes have also emerged. Web crawlers provide very little control to the users in the manner in which the web is navigated and they fail to work with links that have links embedded in scripts. The web page monitoring applications fail when the pages are dynamically generated, and the links to the pages change all the time. Furthermore more and more content is being protected by authentication schemes such as username and password based authentication. These issues make the conventional web navigation automation tools ineffective for most useful applications. This innovation deals with these issues by providing interactive approach to learn the navigation and then repeat the learn sequence of actions, while monitoring for the changes in the values.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper provides a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar with every aspect of network anomalies detection.
Abstract: Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS) have been proposed in the literature. In this paper, we provide a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar with every aspect of network anomaly detection. We present attacks normally encountered by network intrusion detection systems. We categorize existing network anomaly detection methods and systems based on the underlying computational techniques used. Within this framework, we briefly describe and compare a large number of network anomaly detection methods and systems. In addition, we also discuss tools that can be used by network defenders and datasets that researchers in network anomaly detection can use. We also highlight research directions in network anomaly detection.

971 citations

Journal ArticleDOI
Jing Liu1, Yang Xiao1, Shuhui Li1, Wei Liang1, C. L. Philip Chen 
TL;DR: In order to build a reliable smart grid, an overview of relevant cyber security and privacy issues is presented and several potential research fields are discussed at the end of this paper.
Abstract: Smart grid is a promising power delivery infrastructure integrated with communication and information technologies. Its bi-directional communication and electricity flow enable both utilities and customers to monitor, predict, and manage energy usage. It also advances energy and environmental sustainability through the integration of vast distributed energy resources. Deploying such a green electric system has enormous and far-reaching economic and social benefits. Nevertheless, increased interconnection and integration also introduce cyber-vulnerabilities into the grid. Failure to address these problems will hinder the modernization of the existing power system. In order to build a reliable smart grid, an overview of relevant cyber security and privacy issues is presented. Based on current literatures, several potential research fields are discussed at the end of this paper.

502 citations

Patent
09 Dec 2008
TL;DR: The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called "fingerprints") as mentioned in this paper, which is a method of generating a fingerprint associated with a content item including: pseudo-randomly selecting a segment of the content item; and utilizing a processor or electronic processing circuitry, fingerprinting the selected segment of content item as at least an identifier of the item.
Abstract: The presently claimed invention generally relates to deriving and/or utilizing content signatures (e.g., so-called “fingerprints”). One claim recites a method of generating a fingerprint associated with a content item including: pseudo-randomly selecting a segment of the content item; and utilizing a processor or electronic processing circuitry, fingerprinting the selected segment of content item as at least an identifier of the content item. Of course, other claims and combination are provided as well.

421 citations

Patent
22 Jan 2003
TL;DR: In this paper, a computer system (200) is used to authenticate users of vendors supplying services and/or products to the users, the system having programmed processors providing authentication rules (245a), authenticating users according to the authentication rules responsive to user authentication requests (300), configuring authentication rules in real-time, thereby allowing realtime customization of the system, providing multi-factor user authentication processes (100), using any data sources (230/250) providing information about and or known to users, thereby providing a data agnostic system, and authentication strategies correspond to
Abstract: A computer system (200) to authenticate users of vendors supplying services and/or products to the users, the system having programmed processors providing authentication rules (245a), authenticating users according to the authentication rules responsive to user authentication requests (300), configuring the authentication rules in real-time, thereby allowing real-time customization of the system, providing multi-factor user authentication processes (100), using any data sources (230/250) providing information about and/or known to the users to authenticate the users, thereby providing a data agnostic system, and authentication strategies correspond to the authentication rules, thereby allowing the system to support authentication strategy experimentation.

388 citations

Journal ArticleDOI
TL;DR: The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.
Abstract: Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security.

384 citations