Mohamed Abomhara
Mohamed Abomhara
Verified email at
Cited by
Cited by
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks
M Abomhara, GM Kĝien
Journal of Cyber Security 4, 65-88, 2015
Security and privacy in the Internet of Things: Current status and open issues
M Abomhara, GM Kĝien
2014 international conference on privacy and security in mobile systems …, 2014
Enhancing selective encryption for H. 264/AVC using advanced encryption standard
M Abomhara, O Zakaria, OO Khalifa, AA Zaidan, BB Zaidan
arXiv preprint arXiv:2201.03391, 2010
An overview of video encryption techniques
M Abomhara, O Zakaria, OO Khalifa
International Journal of Computer Theory and Engineering 2 (1), 1793-8201, 2010
A STRIDE-Based Threat Model for Telehealth Systems
M Abomhara, M Gerdes, GM K oien
Norsk Informasjonssikkerhetskonferanse (NISK), 2015
Suitability of using symmetric key to secure multimedia data: An overview
M Abomhara, OO Khalifa, O Zakaria, AA Zaidan, BB Zaidan, H O Alanazi
Journal of Applied Sciences 10 (15), 1656-1661, 2010
Video compression techniques: An overview
M Abomhara, OO Khalifa, O Zakaria, AA Zaidan, BB Zaidan, A Rame
Journal of Applied Sciences 10 (16), 1834-1840, 2010
A review on multimedia communications cryptography
Y Salem, M Abomhara, OO Khalifa, AA Zaidan, BB Zaidan
Res. J. Inf. Technol 3 (3), 146-152, 2011
GDPR compliant consent driven data protection in online social networks: A blockchain-based approach
J Ahmed, S Yildirim, M Nowostaki, R Ramachandra, O Elezaj, ...
2020 3rd International Conference on Information and Computer Technologies …, 2020
A comparison of primary stakeholders’ views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders
M Abomhara, SY Yayilgan, LO Nweke, Z Székely
Technology in Society 64, 101484, 2021
Towards an Access Control Model for Collaborative Healthcare Systems.
M Abomhara, GM Kĝien
HEALTHINF 16, 213-222, 2016
Towards designing a knowledge graph-based framework for investigating and preventing crime on online social networks
O Elezaj, SY Yayilgan, E Kalemi, L Wendelberg, M Abomhara, J Ahmed
E-Democracy–Safeguarding Democracy and Human Rights in the Digital Age: 8th …, 2020
UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems
M Abomhara, MB Lazrag
2016 IEEE 18th International Conference on e-Health Networking, Applications …, 2016
Cyber-risk identification for a digital substation
A Khodabakhsh, SY Yayilgan, M Abomhara, M Istad, N Hurzuk
Proceedings of the 15th international conference on availability …, 2020
Access control model for cooperative healthcare environments: Modeling and verification
M Abomhara, H Yang, GM Kĝien
2016 IEEE International Conference on Healthcare Informatics (ICHI), 46-54, 2016
Attribute-based authenticated access for secure sharing of healthcare records in collaborative environments
M Abomhara, H Yang
Proceedings of the eighth international conference on ehealth, telemedicine …, 2016
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): Selective cryptography
M Abomhara, OO Khalifa, AA Zaidan, BB Zaidan, O Zakaria, A Gani
International Journal of the Physical Sciences 6 (16), 4053-4063, 2011
How to do it right: a framework for biometrics supported border control
M Abomhara, SY Yayilgan, AH Nymoen, M Shalaginova, Z Székely, ...
E-Democracy–Safeguarding Democracy and Human Rights in the Digital Age: 8th …, 2020
Towards blockchain-based GDPR-compliant online social networks: challenges, opportunities and way forward
J Ahmed, S Yildirim, M Nowostawski, M Abomhara, R Ramachandra, ...
Advances in Information and Communication: Proceedings of the 2020 Future of …, 2020
Data-driven intrusion detection system for small and medium enterprises
O Elezaj, SY Yayilgan, M Abomhara, P Yeng, J Ahmed
2019 IEEE 24th international workshop on computer aided modeling and design …, 2019
The system can't perform the operation now. Try again later.
Articles 1–20