default search action
Habtamu Abie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Sandeep Pirbhulal, Sabarathinam Chockalingam, Ankur Shukla, Habtamu Abie:
IoT cybersecurity in 5G and beyond: a systematic literature review. Int. J. Inf. Sec. 23(4): 2827-2879 (2024) - [c28]Sandeep Pirbhulal, Sabarathinam Chockalingam, Habtamu Abie, Nathan Lau:
Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications. HCI (46) 2024: 153-163 - [e5]Sokratis K. Katsikas, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Isabel Praça, Wenjuan Li, Weizhi Meng, Steven Furnell, Basel Katt, Sandeep Pirbhulal, Ankur Shukla, Michele Ianni, Mila Dalla Preda, Kim-Kwang Raymond Choo, Miguel Pupo Correia, Abhishta Abhishta, Giovanni Sileno, Mina Alishahi, Harsha K. Kalutarage, Naoto Yanai:
Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II. Lecture Notes in Computer Science 14399, Springer 2024, ISBN 978-3-031-54128-5 [contents] - [i3]Habtamu Abie, Sandeep Pirbhulal:
Autonomous Adaptive Security Framework for 5G-Enabled IoT. CoRR abs/2406.03186 (2024) - 2023
- [j10]Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Evidence in the fog - Triage in fog computing systems. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301506 (2023) - [e4]Sokratis K. Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8 [contents] - 2022
- [j9]Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Quantifying data volatility for IoT forensics with examples from Contiki OS. Digit. Investig. 40(Supplement): 301343 (2022) - [c27]Sandeep Pirbhulal, Habtamu Abie, Ankur Shukla:
Towards a Novel Framework for Reinforcing Cybersecurity using Digital Twins in IoT-based Healthcare Applications. VTC Spring 2022: 1-5 - [e3]Sokratis K. Katsikas, Costas Lambrinoudakis, Nora Cuppens, John Mylopoulos, Christos Kalloniatis, Weizhi Meng, Steven Furnell, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge:
Computer Security. ESORICS 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13106, Springer 2022, ISBN 978-3-030-95483-3 [contents] - [i2]Habtamu Abie, Trenton Schulz, Reijo Savola:
Adaptive Security and Trust Management for Autonomous Messaging Systems. CoRR abs/2203.03559 (2022) - [i1]Denis Trcek, Habtamu Abie, Åsmund Skomedal:
Adaptive Safety for Internet of Things in e-Health. CoRR abs/2203.05309 (2022) - 2021
- [j8]Jens-Petter Sandvik, Katrin Franke, Habtamu Abie, André Årnes:
Coffee forensics - Reconstructing data in IoT devices running Contiki OS. Digit. Investig. 37 Supplement: 301188 (2021) - [c26]Svetlana Boudko, Habtamu Abie, Ethiopia Nigussie, Reijo Savola:
Towards Federated Learning-based Collaborative Adaptive Cybersecurity for Multi-microgrids. WINSYS 2021: 83-90 - [e2]Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Maria Ugarelli, Gabriele Giunta, Isabel Praça, Federica Battisti:
Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12618, Springer 2021, ISBN 978-3-030-69780-8 [contents] - 2020
- [j7]Reijo M. Savola, Markku Kylänpää, Habtamu Abie:
Risk-driven security metrics for an Android smartphone application. Int. J. Electron. Bus. 15(4): 297-324 (2020) - [j6]Svetlana Boudko, Peder Aursand, Habtamu Abie:
Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. Inf. 11(12): 582 (2020) - [c25]Omri Soceanu, Allon Adir, Ehud Aharoni, Lev Greenberg, Habtamu Abie:
A Cloud-Based Anomaly Detection for IoT Big Data. CPS4CIP 2020: 87-104 - [e1]Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11981, Springer 2020, ISBN 978-3-030-42050-5 [contents]
2010 – 2019
- 2019
- [c24]Habtamu Abie:
Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems. ISMICT 2019: 1-6 - [c23]Svetlana Boudko, Habtamu Abie:
Adaptive Cybersecurity Framework for Healthcare Internet of Things. ISMICT 2019: 1-6 - 2018
- [c22]Svetlana Boudko, Habtamu Abie:
An evolutionary game for integrity attacks and defences for advanced metering infrastructure. ECSA (Companion) 2018: 58:1-58:7 - 2017
- [c21]Mattias T. Gebrie, Habtamu Abie:
Risk-based adaptive authentication for internet of things in smart home eHealth. ECSA (Companion) 2017: 102-108 - 2015
- [c20]Reijo M. Savola, Pekka Savolainen, Antti Evesti, Habtamu Abie, Markus Sihvonen:
Risk-driven security metrics development for an e-health IoT application. ISSA 2015: 1-6 - 2014
- [j5]Josef Noll, Iñaki Garitano, Seraj Fayyad, Erik Åsberg, Habtamu Abie:
Measurable Security, Privacy and Dependability in Smart Grids. J. Cyber Secur. Mobil. 3(4): 371-398 (2014) - [c19]Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal:
Towards Run-Time Verification of Adaptive Security for IoT in eHealth. ECSA Workshops 2014: 4:1-4:8 - [c18]Antti Evesti, Habtamu Abie, Reijo Savola:
Security Measuring for Self-adaptive Security. ECSA Workshops 2014: 5:1-5:7 - [c17]Mohamed Hamdi, Habtamu Abie:
Game-based adaptive security in the Internet of Things for eHealth. ICC 2014: 920-925 - 2013
- [c16]Yared Berhanu, Habtamu Abie, Mohamed Hamdi:
A testbed for adaptive security for IoT in eHealth. ASPI@UbiComp 2013: 5:1-5:8 - [c15]Reijo M. Savola, Habtamu Abie:
Metrics-driven security objective decomposition for an e-health application with adaptive security management. ASPI@UbiComp 2013: 6:1-6:8 - [c14]Stefan Poslad, Mohamed Hamdi, Habtamu Abie:
Adaptive security and privacy management for the internet of things (ASPI 2013). UbiComp (Adjunct Publication) 2013: 373-378 - 2012
- [c13]Habtamu Abie, Ilangko Balasingham:
Risk-based adaptive security for smart IoT in eHealth. BODYNETS 2012: 269-275 - [c12]Reijo M. Savola, Habtamu Abie, Markus Sihvonen:
Towards metrics-driven adaptive security management in e-health IoT applications. BODYNETS 2012: 276-281 - 2011
- [c11]Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
Assessment of the Trustworthiness of Digital Records. IFIPTM 2011: 300-311 - [c10]Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
A Framework for the Assessment of the Trustworthiness of Digital Records over Time. TrustCom 2011: 738-744 - 2010
- [c9]Lorenzo Blasi, Reijo Savola, Habtamu Abie, Domenico Rotondi:
Applicability of security metrics for adaptive security management in a universal banking hub system. ECSA Companion Volume 2010: 197-204 - [c8]Reijo Savola, Habtamu Abie, John Bigham, Domenico Rotondi:
Innovations and Advances in Adaptive Secure Message Oriented Middleware. ICDCS Workshops 2010: 288-289 - [c7]Mohamed Hamdi, Noureddine Boudriga, Habtamu Abie, Mieso K. Denko:
Secure Wearable and Implantable Body Sensor Networks in Hazardous Environments. DCNET/OPTICS 2010: 85-92
2000 – 2009
- 2009
- [j4]Noureddine Boudriga, Habtamu Abie:
Guest Editorial. J. Networks 4(7): 537-538 (2009) - [j3]Reijo Savola, Habtamu Abie:
On-Line and Off-Line Security Measurement Framework for Mobile Ad Hoc Networks. J. Networks 4(7): 565-579 (2009) - [c6]Jianqiang Ma, Habtamu Abie, Torbjørn Skramstad, Mads Nygård:
Requirements for Evidential Value for the Assessment of the Trustworthiness of Digital Records over Time. MASS 2009: 796-803 - [c5]Habtamu Abie:
Adaptive Security and Trust Management for Autonomic Message-Oriented Middleware. MASS 2009: 810-817 - [c4]Reijo Savola, Habtamu Abie:
Identification of Basic Measurable Security Components for a Distributed Messaging System. SECURWARE 2009: 121-128 - 2008
- [c3]Habtamu Abie, Ilesh Dattani, Milan Novkovic, John Bigham, Shaun Topham, Reijo Savola:
GEMOM - Significant and Measurable Progress beyond the State of the Art. ICSNC 2008: 191-196 - [c2]Lothar Fritsch, Habtamu Abie:
Towards a Research Road Map for the Management of Privacy Risks in Information Systems. Sicherheit 2008: 1-15 - 2004
- [j2]Habtamu Abie, Bent Foyn, Jon Bing, Bernd Blobel, Peter Pharow, Jaime Delgado, Stamatis Karnouskos, Olli Pitkänen, Dimitrios Tzovaras:
The need for a digital rights management framework for the next generation of e-government services. Electron. Gov. an Int. J. 1(1): 8-28 (2004) - [j1]Habtamu Abie, Pål Spilling, Bent Foyn:
A distributed digital rights management model for secure information-distribution systems. Int. J. Inf. Sec. 3(2): 113-128 (2004) - [c1]Habtamu Abie, Pål Spilling, Bent Foyn:
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. ICICS 2004: 546-562
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint