Habtamu Abie
Habtamu Abie
Norwegian Computing Center
Verified email at - Homepage
Cited by
Cited by
The DELPHI detector at LEP
D Collaboration
Nuclear Instruments and Methods in Physics Research Section A: Accelerators …, 1991
The DELPHI detector at LEP
P Aarnio
Nucl. Instr. Meth. A 303, 233-276, 1991
Risk-based adaptive security for smart IoT in eHealth
H Abie, I Balasingham
Proceedings of the 7th International Conference on Body Area Networks, 269-275, 2012
Game-based adaptive security in the Internet of Things for eHealth
M Hamdi, H Abie
2014 IEEE international conference on communications (ICC), 920-925, 2014
Identification of basic measurable security components for a distributed messaging system
RM Savola, H Abie
2009 Third International Conference on Emerging Security Information …, 2009
Towards metrics-driven adaptive security management in e-health IoT applications.
RM Savola, H Abie, M Sihvonen
BODYNETS, 276-281, 2012
The need for a digital rights management framework for the next generation of e-government services
H Abie, B Foyn, J Bing, B Blobel, P Pharow, J Delgado, S Karnouskos, ...
Electronic Government, an International Journal 1 (1), 8-28, 2004
Cognitive cybersecurity for CPS-IoT enabled healthcare ecosystems
H Abie
2019 13th International Symposium on Medical Information and Communication …, 2019
Risk-based adaptive authentication for internet of things in smart home eHealth
MT Gebrie, H Abie
Proceedings of the 11th European Conference on Software Architecture …, 2017
Adaptive security and trust management for autonomic message-oriented middleware
H Abie
2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009
A testbed for adaptive security for IoT in eHealth
Y Berhanu, H Abie, M Hamdi
Proceedings of the International Workshop on Adaptive Security, 1-8, 2013
Metrics-driven security objective decomposition for an e-health application with adaptive security management
RM Savola, H Abie
Proceedings of the International Workshop on Adaptive Security, 1-8, 2013
An Overview of Firewall Technologies
H Abie
Telektronikk 96 (3), 47-52, 2000
GEMOM-Significant and Measurable Progress beyond the State of the Art
H Abie, I Dattani, M Novkovic, J Bigham, S Topham, R Savola
2008 Third International Conference on Systems and Networks Communications …, 2008
An overview of firewall technologies
H Abie
Telektronikk 96 (3), 47-52, 2000
Towards run-time verification of adaptive security for IoT in eHealth
AB Torjusen, H Abie, E Paintsil, D Trcek, Å Skomedal
Proceedings of the 2014 European Conference on Software Architecture …, 2014
An evaluation framework for adaptive security for the iot in ehealth
W Leister, M Hamdi, H Abie, S Poslad, A Torjusen
International Journal on Advances in Security Volume 7, Number 3 & 4, 2014, 2014
Risk-driven security metrics development for an e-health IoT application
RM Savola, P Savolainen, A Evesti, H Abie, M Sihvonen
2015 Information Security for South Africa (ISSA), 1-6, 2015
Adaptive security and privacy management for the internet of things (ASPI 2013)
S Poslad, M Hamdi, H Abie
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing …, 2013
Robust, secure, self-adaptive and resilient messaging middleware for business critical systems
H Abie, RM Savola, I Dattani
2009 Computation World: Future Computing, Service Computation, Cognitive …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20