A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools W Aman International Journal of Network Security & Its Applications (IJNSA) 6 (5), 12, 2014 | 25 | 2014 |
Managing security trade-offs in the Internet of Things using adaptive security W Aman, E Snekkenes The 10th International Conference for Internet Technology and Secured …, 2015 | 22 | 2015 |
Event driven adaptive security in internet of things W Aman, E Snekkenes Proceedings of the Eighth International Conference on Mobile Ubiquitous …, 2014 | 14 | 2014 |
Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-Based eHealth Systems W Aman, F Kausar International Journal of Advanced Computer Science And Applications 10 (1 …, 2019 | 12 | 2019 |
EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things W Aman, E Snekkenes Future Internet 7 (3), 225-256, 2015 | 10 | 2015 |
A Classification of Essential Factors for the Development and Implementation of Cyber Security Strategy in Public Sector Organizations W Aman, J Al Shukaili International Journal of Advanced Computer Science and Applications(IJACSA …, 2021 | 5 | 2021 |
Enhanced metamorphic techniques-a case study against havex malware Z Mumtaz, M Afzal, W Iqbal, W Aman, N Iltaf IEEE Access 9, 112069-112080, 2021 | 5 | 2021 |
Mutually authenticated group key management protocol for healthcare IoT networks F Kausar, W Aman, D Al-Abri Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 1-12, 2020 | 5 | 2020 |
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications W Aman, F Khan IEEE 8th Global Conference on Consumer Electronics (GCCE 2019), 644-647, 2019 | 5 | 2019 |
Assessing the Feasibility of Adaptive Security Models for the Internet of Things W Aman International Conference on Human Aspects of Information Security, Privacy …, 2016 | 5 | 2016 |
An empirical research on InfoSec Risk Management in IoT-based eHealth W Aman, E Snekkenes Proceedings of the Third International Conference on Mobile Services …, 2013 | 5 | 2013 |
Adaptive security in the internet of things W Aman Norwegian University of Science and Technology, 2016 | 4 | 2016 |
Modeling adaptive security in IoT Driven eHealth A Waqas Proceeding of Norwegian Information Security Conference/Norsk …, 2013 | 4 | 2013 |
A Comprehensive Assessment Framework for Evaluating Adaptive Security and Privacy Solutions for IoT e-Health Applications W Aman, FN Mohammed International Journal of Advanced Computer Science and Applications(IJACSA …, 2022 | 1 | 2022 |
BSLPSDN: Base station location privacy via software‐defined networking (SDN) in wireless sensor networks Y Abbas Bangash, W Iqbal, S Rubab, A Waheed Khan, W Aman International Journal of Communication Systems 36 (17), e5601, 2023 | | 2023 |
Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 … T Tryfonas Springer, 2016 | | 2016 |
MOBILITY 2015 J Noll | | 2015 |
Instituting Secure Trust Relationship in WPANs Using Bluetooth W Aman, F Bashir, F Kausar Proceedings of 2010 The 3rd International Conference on Computational …, 2010 | | 2010 |
Auxiliary reviewers DW Aha, G Alt, R Aylett, B Blumberg, M Buro, M Cavazza, A Cheok, ... | | |
Session 14: Internet applications and technology W Aman, E Snekkenes, F Merazka, F Babich, I Makitla, J Mtsweni | | |