Mohamed Abomhara

Orcid: 0000-0001-9151-7694

According to our database1, Mohamed Abomhara authored at least 23 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing privacy protections in national identification systems: an examination of stakeholders' knowledge, attitudes, and practices of privacy by design.
Int. J. Inf. Sec., December, 2024

Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI.
IEEE Access, 2024

Enhancing Multilingual Hate Speech Detection: From Language-Specific Insights to Cross-Linguistic Integration.
IEEE Access, 2024

2022
Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard.
CoRR, 2022

A comparison of primary stakeholders'views on the deployment of biometric technologies in border management: Case study of SMart mobILity at the European land borders.
CoRR, 2022

A Survey of Artificial Intelligence Techniques for User Perceptions' Extraction from Social Media Data.
Proceedings of the Intelligent Computing, 2022

Towards Understanding of User Perceptions for Smart Border Control Technologies using a Fine-Tuned Transformer Approach.
Proceedings of the 2022 Northern Lights Deep Learning Workshop, 2022

2020
An Example of Privacy and Data Protection Best Practices for Biometrics Data Processing in Border Control: Lesson Learned from SMILE.
Proceedings of the Intelligent Technologies and Applications, 2020

Cyber-risk identification for a digital substation.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Border Control and Use of Biometrics: Reasons Why the Right to Privacy Can Not Be Absolute.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Cybersecurity Awareness and Culture in Rural Norway.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Towards Designing a Knowledge Graph-Based Framework for Investigating and Preventing Crime on Online Social Networks.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

How to Do It Right: A Framework for Biometrics Supported Border Control.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

Data-Driven Intrusion Detection System for Small and Medium Enterprises.
Proceedings of the 24th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2019

2018
Information Requirements for Disaster Victim Identification and Emergency Medical Services: Hajj Crowd Disaster Case Study.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Sharing With Care - Multidisciplinary Teams and Secure Access to Electronic Health Records.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

2017
Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification.
J. Heal. Informatics Res., 2017

2016
Access Control Model for Cooperative Healthcare Environments: Modeling and Verification.
Proceedings of the 2016 IEEE International Conference on Healthcare Informatics, 2016

UML/OCL-based modeling of work-based access control policies for collaborative healthcare systems.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Towards an Access Control Model for Collaborative Healthcare Systems.
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016), 2016

2015
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks.
J. Cyber Secur. Mobil., 2015

2014
Security and privacy in the Internet of Things: Current status and open issues.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014


  Loading...