Habtamu Abie

Orcid: 0000-0003-0866-5050

According to our database1, Habtamu Abie authored at least 42 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IoT cybersecurity in 5G and beyond: a systematic literature review.
Int. J. Inf. Sec., August, 2024

Autonomous Adaptive Security Framework for 5G-Enabled IoT.
CoRR, 2024

Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2024

2023
Evidence in the fog - Triage in fog computing systems.
Forensic Sci. Int. Digit. Investig., March, 2023

2022
Quantifying data volatility for IoT forensics with examples from Contiki OS.
Digit. Investig., 2022

Adaptive Safety for Internet of Things in e-Health.
CoRR, 2022

Adaptive Security and Trust Management for Autonomous Messaging Systems.
CoRR, 2022

Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

2021
Coffee forensics - Reconstructing data in IoT devices running Contiki OS.
Digit. Investig., 2021

Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids.
Proceedings of the 18th International Conference on Wireless Networks and Mobile Systems, 2021

2020
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids.
Inf., 2020

Risk-driven security metrics for an Android smartphone application.
Int. J. Electron. Bus., 2020

A Cloud-Based Anomaly Detection for IoT Big Data.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

2019
Adaptive Cybersecurity Framework for Healthcare Internet of Things.
Proceedings of the 13th International Symposium on Medical Information and Communication Technology, 2019

Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems.
Proceedings of the 13th International Symposium on Medical Information and Communication Technology, 2019

2018
An evolutionary game for integrity attacks and defences for advanced metering infrastructure.
Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings, 2018

2017
Risk-based adaptive authentication for internet of things in smart home eHealth.
Proceedings of the 11th European Conference on Software Architecture, 2017

2015
Risk-driven security metrics development for an e-health IoT application.
Proceedings of the 2015 Information Security for South Africa, 2015

2014
Measurable Security, Privacy and Dependability in Smart Grids.
J. Cyber Secur. Mobil., 2014

Game-based adaptive security in the Internet of Things for eHealth.
Proceedings of the IEEE International Conference on Communications, 2014

Towards Run-Time Verification of Adaptive Security for IoT in eHealth.
Proceedings of the ECSA 2014 Workshops & Tool Demos Track, 2014

Security Measuring for Self-adaptive Security.
Proceedings of the ECSA 2014 Workshops & Tool Demos Track, 2014

2013
Metrics-driven security objective decomposition for an e-health application with adaptive security management.
Proceedings of the International Workshop on Adaptive Security, 2013

Adaptive security and privacy management for the internet of things (ASPI 2013).
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

A testbed for adaptive security for IoT in eHealth.
Proceedings of the International Workshop on Adaptive Security, 2013

2012
Towards metrics-driven adaptive security management in e-health IoT applications.
Proceedings of the 7th International Conference on Body Area Networks, 2012

Risk-based adaptive security for smart IoT in eHealth.
Proceedings of the 7th International Conference on Body Area Networks, 2012

2011
A Framework for the Assessment of the Trustworthiness of Digital Records over Time.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Assessment of the Trustworthiness of Digital Records.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

2010
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

Innovations and Advances in Adaptive Secure Message Oriented Middleware.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Applicability of security metrics for adaptive security management in a universal banking hub system.
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks.
J. Networks, 2009

Guest Editorial.
J. Networks, 2009

Identification of Basic Measurable Security Components for a Distributed Messaging System.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Towards a Research Road Map for the Management of Privacy Risks in Information Systems.
Proceedings of the Sicherheit 2008: Sicherheit, 2008

GEMOM - Significant and Measurable Progress beyond the State of the Art.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

2004
A distributed digital rights management model for secure information-distribution systems.
Int. J. Inf. Sec., 2004

The need for a digital rights management framework for the next generation of e-government services.
Electron. Gov. an Int. J., 2004

Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems.
Proceedings of the Information and Communications Security, 6th International Conference, 2004


  Loading...