Abdullahi Arabo

Orcid: 0000-0002-2378-9759

According to our database1, Abdullahi Arabo authored at least 18 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
1
1
1
1
1
1
1
1
1
1
2
1
3
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics.
J. Cybersecur. Priv., June, 2024

2023
A Review of Password-less User Authentication Schemes.
CoRR, 2023

2021
COVID-19 pandemic cybersecurity issues.
Internet Technol. Lett., 2021

2019
Pedagogical Approach to Effective Cybersecurity Teaching.
Trans. Edutainment, 2019

2018
MIAEC: Missing Data Imputation Based on the Evidence Chain.
IEEE Access, 2018

2016
Mobile App Collusions and Its Cyber Security Implications.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
Cyber Security Challenges within the Connected Home Ecosystem Futures.
Proceedings of the Complex Adaptive Systems 2015 Conference, San Jose, 2015

2014
Privacy-aware IoT cloud survivability for future connected home ecosystem.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Mobile Malware and Smart Device Security: Trends, Challenges and Solutions.
Proceedings of the 19th International Conference on Control Systems and Computer Science, 2013

2012
Privacy in the Age of Mobility and Smart Devices in Smart Homes.
Proceedings of the 2012 International Conference on Privacy, 2012

Security framework for smart devices.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
User-centred and context-aware identity management in mobile ad-hoc networks.
PhD thesis, 2011

Identity management in System-of-Systems Crisis Management situation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

2010
System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Data Mishandling and Profile Building in Ubiquitous Environments.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic Device Configuration in Ubiquitous Environments.
Proceedings of the Global Security, Safety, and Sustainability, 2010

2009
Context-Aware Identity Management in Pervasive Ad-hoc Environments.
Int. J. Adv. Pervasive Ubiquitous Comput., 2009

Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets).
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009


  Loading...