Follow
Waqas Aman
Title
Cited by
Cited by
Year
Managing security trade-offs in the Internet of Things using adaptive security
W Aman, E Snekkenes
The 10th International Conference for Internet Technology and Secured …, 2015
282015
A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools
W Aman
International Journal of Network Security & Its Applications (IJNSA) 6 (5), 12, 2014
252014
Towards a Gateway-based Context-Aware and Self-Adaptive Security Management Model for IoT-Based eHealth Systems
W Aman, F Kausar
International Journal of Advanced Computer Science And Applications 10 (1 …, 2019
142019
Event driven adaptive security in internet of things
W Aman, E Snekkenes
Proceedings of the Eighth International Conference on Mobile Ubiquitous …, 2014
142014
EDAS: An evaluation prototype for autonomic event-driven adaptive security in the internet of things
W Aman, E Snekkenes
Future Internet 7 (3), 225-256, 2015
112015
A Classification of Essential Factors for the Development and Implementation of Cyber Security Strategy in Public Sector Organizations
W Aman, J Al Shukaili
International Journal of Advanced Computer Science and Applications(IJACSA …, 2021
82021
Assessing the Feasibility of Adaptive Security Models for the Internet of Things
W Aman
International Conference on Human Aspects of Information Security, Privacy …, 2016
62016
Enhanced metamorphic techniques-a case study against havex malware
Z Mumtaz, M Afzal, W Iqbal, W Aman, N Iltaf
IEEE Access 9, 112069-112080, 2021
52021
Mutually authenticated group key management protocol for healthcare IoT networks
F Kausar, W Aman, D Al-Abri
Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 1-12, 2020
52020
Ontology-based Dynamic and Context-aware Security Assessment Automation for Critical Applications
W Aman, F Khan
IEEE 8th Global Conference on Consumer Electronics (GCCE 2019), 644-647, 2019
52019
An empirical research on InfoSec Risk Management in IoT-based eHealth
W Aman, E Snekkenes
Proceedings of the Third International Conference on Mobile Services …, 2013
52013
Adaptive security in the internet of things
W Aman
Norwegian University of Science and Technology, 2016
42016
Modeling adaptive security in IoT Driven eHealth
A Waqas
Proceeding of Norwegian Information Security Conference/Norsk …, 2013
42013
Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016 …
T Tryfonas
Springer, 2016
22016
A Comprehensive Assessment Framework for Evaluating Adaptive Security and Privacy Solutions for IoT e-Health Applications
W Aman, FN Mohammed
International Journal of Advanced Computer Science and Applications(IJACSA …, 2022
12022
Exploring Security Dynamics in SDN Controller Architectures: Threat Landscape and Implications
A Kanwal, M Nizamuddin, W Iqbal, W Aman, Y Abbas, S Mussiraliyeva
IEEE Access, 2024
2024
A two-actor model for understanding user engagement with content creators: Applying social capital theory
K Hussain, K Nusair, M Junaid, W Aman
Computers in Human Behavior, 108237, 2024
2024
BSLPSDN: Base station location privacy via software‐defined networking (SDN) in wireless sensor networks
Y Abbas Bangash, W Iqbal, S Rubab, A Waheed Khan, W Aman
International Journal of Communication Systems 36 (17), e5601, 2023
2023
MOBILITY 2015
J Noll
2015
Instituting Secure Trust Relationship in WPANs Using Bluetooth
W Aman, F Bashir, F Kausar
Proceedings of 2010 The 3rd International Conference on Computational …, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–20