Waqas Aman
Cited by
Cited by
Managing security trade-offs in the Internet of Things using adaptive security
W Aman, E Snekkenes
The 10th International Conference for Internet Technology and Securedá…, 2015
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
W Aman
International Journal of Network Security & Its Applications (IJNSA) 6 (5), 12, 2014
Event driven adaptive security in internet of things
W Aman, E Snekkenes
Proceedings of the Eighth International Conference on Mobile Ubiquitousá…, 2014
EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
W Aman, E Snekkenes
Future Internet 7 (3), 225-256, 2015
An empirical research on InfoSec Risk Management in IoT-based eHealth
W Aman, E Snekkenes
Proceedings of the Third International Conference on Mobile Servicesá…, 2013
Assessing the Feasibility of Adaptive Security Models for the Internet of Things
W Aman
International Conference on Human Aspects of Information Security, Privacyá…, 2016
Adaptive Security in the Internet of Things
W Aman
Norwegian University of Science and Technology, 2016
Mutually Authenticated Group Key Management Protocol for Healthcare IoT Networks
F Kausar, W Aman, D Al-Abri
Proceedings of the Future Technologies Conference, 1-12, 2019
Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-Based eHealth Systems
W Aman, F Kausar
International Journal of Advanced Computer Science And Applications 10 (1á…, 2019
Modeling adaptive security in IoT Driven eHealth
A Waqas
Proceeding of Norwegian Information Security Conference/Norská…, 2013
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
W Aman, F Khan
IEEE 8th Global Conference on Consumer Electronics (GCCE 2019), 644-647, 2019
Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016á…
T Tryfonas
Springer, 2016
J Noll
Instituting Secure Trust Relationship in WPANs Using Bluetooth
W Aman, F Bashir, F Kausar
Proceedings of 2010 The 3rd International Conference on Computationalá…, 2010
Auxiliary reviewers
W Aman, G Blanc, F TÚlÚcom SudParis, S Dashevskyi, J Ding, L Lerman, ...
Session 14: Internet applications and technology
W Aman, E Snekkenes, F Merazka, F Babich, I Makitla, J Mtsweni
The system can't perform the operation now. Try again later.
Articles 1–16