Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Amar Seeam is active.

Publication


Featured researches published by Amar Seeam.


2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA) | 2016

Pervasive eHealth services a security and privacy risk awareness survey

Xavier J. A. Bellekens; Andrew Hamilton; Preetila Seeam; Kamila Nieradzinska; Quentin Franssen; Amar Seeam

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.


ieee aiaa digital avionics systems conference | 2015

Challenges of security and trust in Avionics Wireless Networks

Raja Naeem Akram; Konstantinos Markantonakis; Sharadha Kariyawasam; Shahid Ayub; Amar Seeam; Robert C. Atkinson

Avionics networks have a set of stringent reliability and safety requirements. In existing deployments, most of these networks are based on wired technology which provides a high degree of reliability and safety. Furthermore, it simplifies the security management of the network since certain assumptions, including an inability for an attacker to access the network, can be safely made. The proposal for having an Avionics Wireless Network (AWN), currently being developed by multiple aerospace working groups, promises reduction in the complexity of electrical wiring harness design and fabrication, reduction in wiring weight, increased configurability, and potential monitoring of otherwise inaccessible moving or rotating aircraft parts. While providing these benefits, the AWN must ensure that it provides, at a minimum, equivalent levels of safety to those offered by the wired network. Substituting the wired network with a wireless network, even for a specific set of well-defined and non-critical tasks, brings a whole set of new challenges related to assurance, reliability, and security. In this paper, we discuss the security and trust challenges an AWN deployment might face, along with highlighting potential directions for solutions. Furthermore, as a case study we will elaborate on AWN deployment variants especially the wireless as a comm-link. Finally, the paper makes suggestions that set the agenda for security, reliability and trust work that could, if successful, provide an AWN system meeting the required safety standards.


International Journal of Computer Science & Applications | 2016

A study on situational awareness security and privacy of wearable health monitoring devices

Xavier J. A. Bellekens; Kamila Nieradzinska; Alexandra Bellekens; Preetila Seeam; Andrew Hamilton; Amar Seeam

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed. Keyword: Situational Awareness, eHealth, Wearables, Security, Privacy,


2017 1st International Conference on Next Generation Computing Applications (NextComp) | 2017

Critical patient eHealth monitoring system using wearable sensors

Michelle Omoogun; Visham Ramsurrun; Shivanand Prabhoolall Guness; Preetila Seeam; Xavier J. A. Bellekens; Amar Seeam

Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearable devices that can monitor patients and communicate their data remotely to medical servers over wireless networks. It is a process that involves monitoring major vital signs of a patient, to check if their health is normal or deteriorating within a period of time. In a remote situation, vital signs information, can help health care providers to easily send help to patients when their health is at immediate risk. The problem with this kind of remote monitoring system is that most times the patients must be within a specified location to either monitor their health or receive emergency help. This paper presents a potential solution in the form of a global vital sign monitoring system and consists of two components to demonstrate the functionality; a wearable wireless monitoring device that records the temperature and pulse rate of the patient wearing it and a web application, which allows the patient and the emergency response unit to interact together over cellular network.


2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security) | 2017

When eHealth meets the internet of things: Pervasive security and privacy challenges

Michelle Omoogun; Preetila Seeam; Visham Ramsurrun; Xavier J. A. Bellekens; Amar Seeam

eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical world, assisting healthcare professionals to monitor the progress and current condition of patients. These devices often gather, transmit and analyse personal data. Healthcare data has rigid requirements for security, confidentiality, and availability, whilst access traceability and control, and long-term preservation are also highly desirable, particularly when exposed to cloud computing environments. This article explores some of the security and privacy challenges eHealth devices currently face. Legislative implications of data breaches are considered, as well as service provider accountability. The work also provides numerous security and privacy recommendations, in order to improve future implementations.


international conference on emerging technologies | 2016

Gesture based IoT light control for smart clothing

Assad Mohammed; Amar Seeam; Xavier J. A. Bellekens; Kamila Nieradzinska; Visham Ramsurrun


Electronics | 2018

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies

Catherine Rooney; Amar Seeam; Xavier J. A. Bellekens


arXiv: Cryptography and Security | 2018

A Taxonomy of Malicious Traffic for Intrusion Detection Systems.

Hanan Hindy; Elike Hodo; Ethan Bayne; Amar Seeam; Robert C. Atkinson; Xavier J. A. Bellekens


arXiv: Cryptography and Security | 2018

A Taxonomy and Survey of Intrusion Detection System Design Techniques, Network Threats and Datasets.

Hanan Hindy; David Brosset; Ethan Bayne; Amar Seeam; Christos Tachtatzis; Robert C. Atkinson; Xavier J. A. Bellekens


arXiv: Data Structures and Algorithms | 2017

Trie compression for GPU accelerated multi-pattern matching

Xavier J. A. Bellekens; Amar Seeam; Christos Tachtatzis; Robert C. Atkinson

Collaboration


Dive into the Amar Seeam's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrew Hamilton

University of Strathclyde

View shared research outputs
Top Co-Authors

Avatar

Lina Stankovic

University of Strathclyde

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge