Amar Seeam
Title
Cited by
Cited by
Year
A taxonomy and survey of intrusion detection system design techniques, network threats and datasets
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
arXiv preprint arXiv:1806.03517, 2018
892018
Pervasive eHealth services a security and privacy risk awareness survey
X Bellekens, A Hamilton, P Seeam, K Nieradzinska, Q Franssen, ...
2016 International Conference On Cyber Situational Awareness, Data Analytics …, 2016
322016
A taxonomy of network threats and the effect of current datasets on intrusion detection systems
H Hindy, D Brosset, E Bayne, AK Seeam, C Tachtatzis, R Atkinson, ...
IEEE Access 8, 104650-104675, 2020
282020
Cyber-physical-security model for safety-critical iot infrastructures
X Bellekens, A Seeam, K Nieradzinska, C Tachtatzis, A Cleary, ...
Wireless World Research Forum Meeting 35, 18, 2015
262015
A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices.
XJA Bellekens, K Nieradzinska, A Bellekens, P Seeam, AW Hamilton, ...
IJCSA 1 (1), 74-96, 2016
192016
Gesture based iot light control for smart clothing
A Mohammed, A Seeam, X Bellekens, K Nieradzinska, V Ramsurrun
2016 IEEE International Conference on Emerging Technologies and Innovative …, 2016
192016
Improving SIEM for critical SCADA water infrastructures using machine learning
H Hindy, D Brosset, E Bayne, A Seeam, X Bellekens
Computer Security, 3-19, 2018
162018
Creation and detection of hardware trojans using non-invasive off-the-shelf technologies
C Rooney, A Seeam, X Bellekens
Electronics 7 (7), 124, 2018
162018
Critical patient eHealth monitoring system using wearable sensors
M Omoogun, V Ramsurrun, S Guness, P Seeam, X Bellekens, A Seeam
2017 1st International Conference on Next Generation Computing Applications …, 2017
152017
Challenges of security and trust in avionics wireless networks
RN Akram, K Markantonakis, R Holloway, S Kariyawasam, S Ayub, ...
2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 4B1-1-4B1-12, 2015
142015
A taxonomy and survey of intrusion detection system design techniques
H Hindy, D Brosset, E Bayne, A Seeam, C Tachtatzis, R Atkinson, ...
Network Threats and Datasets 1 (1), 2018
122018
Evaluating the potential of simulation assisted energy management systems: A case for electrical heating optimisation
A Seeam, D Laurenson, A Usmani
Energy and Buildings 174, 579-586, 2018
102018
A taxonomy of malicious traffic for intrusion detection systems
H Hindy, E Hodo, E Bayne, A Seeam, R Atkinson, X Bellekens
2018 International Conference On Cyber Situational Awareness, Data Analytics …, 2018
92018
When eHealth meets the internet of things: Pervasive security and privacy challenges
M Omoogun, P Seeam, V Ramsurrun, X Bellekens, A Seeam
2017 International Conference on Cyber Security And Protection Of Digital …, 2017
92017
BIM integrated workflow management and monitoring system for modular buildings
A Seeam, T Zheng, Y Lu, A Usmani, D Laurenson
International Journal of 3-D Information Modeling (IJ3DIM) 2 (1), 17-28, 2013
92013
Augmented-reality computer-vision assisted disaggregated energy monitoring and iot control platform
JA Purmaissur, P Towakel, SP Guness, A Seeam, XA Bellekens
2018 International Conference on Intelligent and Innovative Computing …, 2018
62018
Cyber-security internals of a skoda octavia vRS: A hands on approach
C Urquhart, X Bellekens, C Tachtatzis, R Atkinson, H Hindy, A Seeam
IEEE Access 7, 146057-146069, 2019
52019
Threat modeling and security issues for the internet of things
A Seeam, OS Ogbeh, S Guness, X Bellekens
2019 Conference on Next Generation Computing Applications (NextComp), 1-8, 2019
52019
Knowledge sharing in academia: A case study using a SECI model approach
CK Faith, AK Seeam
J. Educ 9, 53-70, 2018
42018
Characterization and monitoring of seismic performance of post tensioned steel modular structures
T Zheng, Y Lu, A Usmani, A Seeam, D Laurenson
Proceedings of the 15th World Conference on Earthquake Engineering (15 WCEE …, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20