Amar Seeam
Middlesex University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Amar Seeam.
2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA) | 2016
Xavier J. A. Bellekens; Andrew Hamilton; Preetila Seeam; Kamila Nieradzinska; Quentin Franssen; Amar Seeam
The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.
ieee aiaa digital avionics systems conference | 2015
Raja Naeem Akram; Konstantinos Markantonakis; Sharadha Kariyawasam; Shahid Ayub; Amar Seeam; Robert C. Atkinson
Avionics networks have a set of stringent reliability and safety requirements. In existing deployments, most of these networks are based on wired technology which provides a high degree of reliability and safety. Furthermore, it simplifies the security management of the network since certain assumptions, including an inability for an attacker to access the network, can be safely made. The proposal for having an Avionics Wireless Network (AWN), currently being developed by multiple aerospace working groups, promises reduction in the complexity of electrical wiring harness design and fabrication, reduction in wiring weight, increased configurability, and potential monitoring of otherwise inaccessible moving or rotating aircraft parts. While providing these benefits, the AWN must ensure that it provides, at a minimum, equivalent levels of safety to those offered by the wired network. Substituting the wired network with a wireless network, even for a specific set of well-defined and non-critical tasks, brings a whole set of new challenges related to assurance, reliability, and security. In this paper, we discuss the security and trust challenges an AWN deployment might face, along with highlighting potential directions for solutions. Furthermore, as a case study we will elaborate on AWN deployment variants especially the wireless as a comm-link. Finally, the paper makes suggestions that set the agenda for security, reliability and trust work that could, if successful, provide an AWN system meeting the required safety standards.
International Journal of Computer Science & Applications | 2016
Xavier J. A. Bellekens; Kamila Nieradzinska; Alexandra Bellekens; Preetila Seeam; Andrew Hamilton; Amar Seeam
Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed. Keyword: Situational Awareness, eHealth, Wearables, Security, Privacy,
2017 1st International Conference on Next Generation Computing Applications (NextComp) | 2017
Michelle Omoogun; Visham Ramsurrun; Shivanand Prabhoolall Guness; Preetila Seeam; Xavier J. A. Bellekens; Amar Seeam
Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearable devices that can monitor patients and communicate their data remotely to medical servers over wireless networks. It is a process that involves monitoring major vital signs of a patient, to check if their health is normal or deteriorating within a period of time. In a remote situation, vital signs information, can help health care providers to easily send help to patients when their health is at immediate risk. The problem with this kind of remote monitoring system is that most times the patients must be within a specified location to either monitor their health or receive emergency help. This paper presents a potential solution in the form of a global vital sign monitoring system and consists of two components to demonstrate the functionality; a wearable wireless monitoring device that records the temperature and pulse rate of the patient wearing it and a web application, which allows the patient and the emergency response unit to interact together over cellular network.
2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security) | 2017
Michelle Omoogun; Preetila Seeam; Visham Ramsurrun; Xavier J. A. Bellekens; Amar Seeam
eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical world, assisting healthcare professionals to monitor the progress and current condition of patients. These devices often gather, transmit and analyse personal data. Healthcare data has rigid requirements for security, confidentiality, and availability, whilst access traceability and control, and long-term preservation are also highly desirable, particularly when exposed to cloud computing environments. This article explores some of the security and privacy challenges eHealth devices currently face. Legislative implications of data breaches are considered, as well as service provider accountability. The work also provides numerous security and privacy recommendations, in order to improve future implementations.
international conference on emerging technologies | 2016
Assad Mohammed; Amar Seeam; Xavier J. A. Bellekens; Kamila Nieradzinska; Visham Ramsurrun
Electronics | 2018
Catherine Rooney; Amar Seeam; Xavier J. A. Bellekens
arXiv: Cryptography and Security | 2018
Hanan Hindy; Elike Hodo; Ethan Bayne; Amar Seeam; Robert C. Atkinson; Xavier J. A. Bellekens
arXiv: Cryptography and Security | 2018
Hanan Hindy; David Brosset; Ethan Bayne; Amar Seeam; Christos Tachtatzis; Robert C. Atkinson; Xavier J. A. Bellekens
arXiv: Data Structures and Algorithms | 2017
Xavier J. A. Bellekens; Amar Seeam; Christos Tachtatzis; Robert C. Atkinson