Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks M Abomhara, GM Kĝien Journal of Cyber Security 4, 65-88, 2015 | 567 | 2015 |
Security and privacy in the Internet of Things: Current status and open issues M Abomhara, GM Kĝien 2014 international conference on privacy and security in mobile systems …, 2014 | 445 | 2014 |
Enhancing selective encryption for H. 264/AVC using advanced encryption standard M Abomhara, O Zakaria, OO Khalifa, AA Zaidan, BB Zaidan arXiv preprint arXiv:2201.03391, 2010 | 84 | 2010 |
An overview of video encryption techniques M Abomhara, O Zakaria, OO Khalifa International Journal of Computer Theory and Engineering 2 (1), 103, 2010 | 73 | 2010 |
Suitability of using symmetric key to secure multimedia data: An overview M Abomhara, OO Khalifa, O Zakaria, AA Zaidan, BB Zaidan, H O Alanazi Journal of Applied Sciences 10 (15), 1656-1661, 2010 | 40 | 2010 |
A STRIDE-Based Threat Model for Telehealth Systems M Abomhara, M Gerdes, GM K oien Norsk Informasjonssikkerhetskonferanse (NISK), 2015 | 34 | 2015 |
Video compression techniques: An overview M Abomhara, OO Khalifa, O Zakaria, AA Zaidan, BB Zaidan, A Rame Journal of Applied Sciences 10 (16), 1834-1840, 2010 | 33 | 2010 |
A review on multimedia communications cryptography Y Salem, M Abomhara, OO Khalifa, AA Zaidan, BB Zaidan Res. J. Inf. Technol 3 (3), 146-152, 2011 | 32 | 2011 |
GDPR compliant consent driven data protection in online social networks: A blockchain-based approach J Ahmed, S Yildirim, M Nowostaki, R Ramachandra, O Elezaj, ... 2020 3rd International Conference on Information and Computer Technologies …, 2020 | 17 | 2020 |
UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems M Abomhara, MB Lazrag 2016 IEEE 18th International Conference on e-Health Networking, Applications …, 2016 | 12 | 2016 |
A comparison of primary stakeholders’ views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders M Abomhara, SY Yayilgan, LO Nweke, Z Székely Technology in Society 64, 101484, 2021 | 11 | 2021 |
Towards an Access Control Model for Collaborative Healthcare Systems. M Abomhara, GM Kĝien HEALTHINF 16, 213-222, 2016 | 11 | 2016 |
Access control model for cooperative healthcare environments: Modeling and verification M Abomhara, H Yang, GM Kĝien 2016 IEEE International Conference on Healthcare Informatics (ICHI), 46-54, 2016 | 10 | 2016 |
How to do it right: a framework for biometrics supported border control M Abomhara, SY Yayilgan, AH Nymoen, M Shalaginova, Z Székely, ... International Conference on e-Democracy, 94-109, 2019 | 9 | 2019 |
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): Selective cryptography M Abomhara, OO Khalifa, AA Zaidan, BB Zaidan, O Zakaria, A Gani International Journal of the Physical Sciences 6 (16), 4053-4063, 2011 | 9 | 2011 |
Towards designing a knowledge graph-based framework for investigating and preventing crime on online social networks O Elezaj, SY Yayilgan, E Kalemi, L Wendelberg, M Abomhara, J Ahmed International Conference on e-Democracy, 181-195, 2019 | 7 | 2019 |
Border control and use of biometrics: reasons why the right to privacy can not be absolute M Abomhara, SY Yayilgan, M Shalaginova, Z Székely IFIP International Summer School on Privacy and Identity Management, 259-271, 2019 | 7 | 2019 |
Attribute-based authenticated access for secure sharing of healthcare records in collaborative environments M Abomhara, H Yang Proceedings of the eighth international conference on ehealth, telemedicine …, 2016 | 7 | 2016 |
Towards blockchain-based gdpr-compliant online social networks: Challenges, opportunities and way forward J Ahmed, S Yildirim, M Nowostawski, M Abomhara, R Ramachandra, ... Future of Information and Communication Conference, 113-129, 2020 | 6 | 2020 |
Towards Risk-aware Access Control Framework for Healthcare Information Sharing M Abomhara, K Geir, O Vladimir A., H Mohamed The International Conference on Information Systems Security and Privacy …, 2019 | 6 | 2019 |