Ahmad Samer Wazan
Orcid: 0000-0002-1611-2870
According to our database1,
Ahmad Samer Wazan
authored at least 37 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives.
Ann. des Télécommunications, December, 2024
On the Validity of Traditional Vulnerability Scoring Systems for Adversarial Attacks against LLMs.
CoRR, 2024
Proceedings of the 8th Cyber Security in Networking Conference, 2024
Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the General Aspects of Applying Generative AI in Higher Education: Opportunities and Challenges, 2024
Proceedings of the General Aspects of Applying Generative AI in Higher Education: Opportunities and Challenges, 2024
2023
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures.
Ann. des Télécommunications, April, 2023
How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis.
CoRR, 2023
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
2021
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context.
J. Cybersecur. Priv., July, 2021
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the IEEE Global Engineering Education Conference, 2021
2020
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
Int. Arab J. Inf. Technol., 2019
IEEE Commun. Stand. Mag., 2019
Ann. des Télécommunications, 2019
Logic-based methodology to help security architects in eliciting high-level network security requirements.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
2018
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Secur. Commun. Networks, 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
Proceedings of the International Symposium on Networks, Computers and Communications, 2015
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Information Assurance and Security Education and Training, 2013
2012
Proceedings of IEEE International Conference on Communications, 2012
2011
Secur. Commun. Networks, 2011
2009
Int. J. Web Based Communities, 2009
Proceedings of the Emerging Challenges for Security, 2009
2008
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model.
Proceedings of the Systems and Virtualization Management. Standards and New Technologies, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008