Amar Seeam
Title
Cited by
Cited by
Year
A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
482018
Pervasive eHealth services a security and privacy risk awareness survey
X Bellekens, A Hamilton, P Seeam, K Nieradzinska, Q Franssen, ...
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
232016
Cyber-physical-security model for safety-critical iot infrastructures
X Bellekens, A Seeam, K Nieradzinska, C Tachtatzis, A Cleary, ...
Wireless World Research Forum Meeting 35, 18, 2015
192015
Gesture based iot light control for smart clothing
A Mohammed, A Seeam, X Bellekens, K Nieradzinska, V Ramsurrun
2016 IEEE International Conference on Emerging Technologies and Innovative …, 2016
152016
Critical patient eHealth monitoring system using wearable sensors
M Omoogun, V Ramsurrun, S Guness, P Seeam, X Bellekens, A Seeam
2017 1st International Conference on Next Generation Computing Applications …, 2017
122017
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.
XJA Bellekens, K Nieradzinska, A Bellekens, P Seeam, AW Hamilton, ...
IJCSA 1 (1), 74-96, 2016
122016
Challenges of security and trust in avionics wireless networks
RN Akram, K Markantonakis, R Holloway, S Kariyawasam, S Ayub, ...
2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 4B1-1-4B1-12, 2015
112015
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies
C Rooney, A Seeam, X Bellekens
Electronics 7 (7), 124, 2018
92018
BIM integrated workflow management and monitoring system for modular buildings
A Seeam, T Zheng, Y Lu, A Usmani, D Laurenson
International Journal of 3-D Information Modeling (IJ3DIM) 2 (1), 17-28, 2013
82013
When eHealth meets the internet of things: Pervasive security and privacy challenges
M Omoogun, P Seeam, V Ramsurrun, X Bellekens, A Seeam
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
72017
A taxonomy and survey of intrusion detection system design techniques
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
Netw. Threats Datasets, 2018
62018
Improving SIEM for critical SCADA water infrastructures using machine learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
52018
Augmented-reality computer-vision assisted disaggregated energy monitoring and iot control platform
JA Purmaissur, P Towakel, SP Guness, A Seeam, XA Bellekens
2018 International Conference on Intelligent and Innovative Computing …, 2018
42018
Evaluating the potential of simulation assisted energy management systems: A case for electrical heating optimisation
A Seeam, D Laurenson, A Usmani
Energy and Buildings 174, 579-586, 2018
32018
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
32018
Teachers’ written formative feedback on students’ critical thinking: A case study
H Pedrosa-de-Jesus, C Guerra, R Feehily, H Williams, FC Kyomuhendo, ...
J. Educ 9 (1), 2018
32018
Knowledge sharing in academia: A case study using a SECI model approach
CK Faith, AK Seeam
J Educ 9 (1), 53-70, 2018
32018
Improving wireless charging energy efficiency of mobile phones: analysis of key practices
G Bekaroo, A Seeam
2016 IEEE International Conference on Emerging Technologies and Innovative …, 2016
32016
Improving energy efficiency with smart home appliance decision support tools
AK Seeam, J Liao, L Stankovic, V Stankovic
7th International Conference on Energy Efficiency in Domestic Appliances and …, 2013
22013
Characterization and Monitoring of Seismic Performance of Post-Tensioned Steel Modular Structures
T Zheng, Y Lu, A Usmani, A Seeam, D Laurenson
Proceedings of the 15th World Conference on Earthquake Engineering (15 WCEE …, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20