Follow
Akram Abdul-Ghani hezam
Title
Cited by
Cited by
Year
A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model
HA Abdul-Ghani, D Konstantas, M Mahyoub
(IJACSA) International Journal of Advanced Computer Science and Applications …, 2018
1312018
A comprehensive study of security and privacy guidelines, threats, and countermeasures: An IoT perspective
HA Abdul-Ghani, D Konstantas
Journal of Sensor and Actuator Networks 8 (2), 22, 2019
582019
A study on security and privacy guidelines, countermeasures, threats: IoT data at rest perspective
HA Abdulghani, NA Nijdam, A Collen, D Konstantas
Symmetry 11 (6), 774, 2019
242019
Using security robustness analysis for early-stage validation of functional security requirements
M El-Attar, HA Abdul-Ghani
Requirements Engineering 21 (1), 1-27, 2016
122016
A comprehensive IoT attacks survey based on a building-blocked reference mode
A Hezam, D Konstantas, M Mahyoub
Int. J. Adv. Comput. Sci. Appl 9, 355-373, 2018
92018
IOT SECURITY GOALS AND ATTACKS
A Mohammed
https://www.gbnews.ch/iot-security-goals-and-attacks/, 2020
2020
INTERNET OF THINGS (IOT): THE SECURITY CHALLENGES
A Mohammed
https://www.gbnews.ch/internet-of-things-iot-the-security-challenges/, 2020
2020
THE INTERNET OF (RISKY) THINGS
A Mohammed
https://www.gbnews.ch/the-internet-of-things/, 2020
2020
A Novel Methodology for Securing IoT Objects Based on their Security Level Certificates
A abdulghani Hezam, D Konstantas, N Nijdam
Preprints, 2020
2020
A reference model for securing IoT
AAH MOHAMMED
University of Geneva, 2019
2019
Using Ex-SMCD for Developing Consistent Misuse Case Models with Extended Notation
MEAHA Abdul-Ghani
BMSD'13 Technical Program, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–11