Seguir
Habtamu Abie
Habtamu Abie
Norwegian Computing Center
Dirección de correo verificada de nr.no - Página principal
Título
Citado por
Citado por
Año
The DELPHI detector at LEP
D Collaboration
Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 1991
1232*1991
The DELPHI detector at LEP
P Aarnio
Nucl. Instr. Meth. A 303, 233-276, 1991
547*1991
Risk-based adaptive security for smart IoT in eHealth
H Abie, I Balasingham
Proceedings of the 7th international conference on body area networks, 269-275, 2012
2092012
Game-based adaptive security in the Internet of Things for eHealth
M Hamdi, H Abie
2014 IEEE international conference on communications (ICC), 920-925, 2014
922014
Identification of basic measurable security components for a distributed messaging system
RM Savola, H Abie
2009 Third International Conference on Emerging Security Information …, 2009
842009
Towards metrics-driven adaptive security management in e-health IoT applications.
RM Savola, H Abie, M Sihvonen
BODYNETS, 276-281, 2012
812012
The need for a digital rights management framework for the next generation of e-government services
H Abie, B Foyn, J Bing, B Blobel, P Pharow, J Delgado, S Karnouskos, ...
Electronic Government, an International Journal 1 (1), 8-28, 2004
742004
Cognitive cybersecurity for CPS-IoT enabled healthcare ecosystems
H Abie
2019 13th International Symposium on Medical Information and Communication …, 2019
572019
Risk-based adaptive authentication for internet of things in smart home eHealth
MT Gebrie, H Abie
Proceedings of the 11th European Conference on Software Architecture …, 2017
572017
Adaptive security and trust management for autonomic message-oriented middleware
H Abie
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
482009
A testbed for adaptive security for IoT in eHealth
Y Berhanu, H Abie, M Hamdi
Proceedings of the International Workshop on Adaptive Security, 1-8, 2013
472013
Metrics-driven security objective decomposition for an e-health application with adaptive security management
RM Savola, H Abie
Proceedings of the International Workshop on Adaptive Security, 1-8, 2013
452013
An Overview of Firewall Technologies
H Abie
Telektronikk 96 (3), 47-52, 2000
45*2000
GEMOM-Significant and Measurable Progress beyond the State of the Art
H Abie, I Dattani, M Novkovic, J Bigham, S Topham, R Savola
2008 Third International Conference on Systems and Networks Communications …, 2008
382008
An overview of firewall technologies
H Abie
Telektronikk 96 (3), 47-52, 2000
372000
Towards run-time verification of adaptive security for IoT in eHealth
AB Torjusen, H Abie, E Paintsil, D Trcek, Å Skomedal
Proceedings of the 2014 European Conference on Software Architecture …, 2014
352014
An evaluation framework for adaptive security for the iot in ehealth
W Leister, M Hamdi, H Abie, S Poslad, A Torjusen
International Journal on Advances in Security Volume 7, Number 3 & 4, 2014, 2014
302014
Robust, secure, self-adaptive and resilient messaging middleware for business critical systems
H Abie, RM Savola, I Dattani
2009 Computation World: Future Computing, Service Computation, Cognitive …, 2009
302009
Risk-driven security metrics development for an e-health IoT application
RM Savola, P Savolainen, A Evesti, H Abie, M Sihvonen
2015 Information Security for South Africa (ISSA), 1-6, 2015
292015
Adaptive security and privacy management for the internet of things (ASPI 2013)
S Poslad, M Hamdi, H Abie
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing …, 2013
292013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20