Volgen
Dr. Nader Sohrabi safa
Dr. Nader Sohrabi safa
Geverifieerd e-mailadres voor mmu.ac.uk
Titel
Geciteerd door
Geciteerd door
Jaar
Information security policy compliance model in organizations
NS Safa, R Von Solms, S Furnell
computers & security 56, 70-82, 2016
7112016
Information security conscious care behaviour formation in organizations
NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan
Computers & Security 53, 65-78, 2015
5592015
An information security knowledge sharing model in organizations
NS Safa, RV Solms
Computers in Human Behavior 57, 442e451, 2016
3952016
Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing
M Sookhak, FR Yu, Y He, H Talebian, NS Safa, N Zhao, MK Khan, ...
IEEE Vehicular Technology Magazine 12 (3), 55-64, 2017
2142017
The evolution of blockchain: A bibliometric study
M Dabbagh, M Sookhak, NS Safa
IEEE Access 7, 19212-19221, 2019
2132019
Motivation and opportunity based model to reduce information security insider threats in organisations
NS Safa, C Maple, T Watson, R Von Solms
Journal of information security and applications 40, 247-257, 2018
1772018
A customer loyalty formation model in electronic commerce
NS Safa, MA Ismail
Economic Modelling 35, 559-564, 2013
1702013
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues
M Sookhak, MR Jabbarpour, N Sohrabi Safa, FR Yud
Journal of Network and Computer Applications, 2021
1502021
Human aspects of information security in organisations
NS Safa, R von Solms, L Futcher
Computer Fraud & Security 2016 (2), 15-18, 2016
1432016
Deterrence and prevention-based model to mitigate information security insider threats in organisations
NS Safa, C Maple, S Furnell, MA Azad, C Perera, M Dabbagh, M Sookhak
Future Generation Computer Systems 97, 587-597, 2019
1312019
Customers repurchase intention formation in e-commerce
NS Safa, R Von Solms
South African Journal of Information Management 18 (1), 1-9, 2016
1262016
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities
M Dabbagh, KK RaymondChoo, A Beheshti, M Tahir, NS Safa
Computers and Security, 2021
1222021
A LogitBoost-based Algorithm for Detecting Known and Unknown Web Attacks
MH Kamarudin, C Maple, T Watson, NS Safa
IEEE Access 1 (99), 1-20, 2017
1162017
A multivariant secure framework for smart mobile health application
NSS Shariq Aziz Butt, Tauseef Jamal, Muhammad Ajmal Azad, Arshad Ali
Transactions on Emerging Telecommunications Technologies, 1-18, 2019
68*2019
A review on artificial intelligence methodologies for the forecasting of crude oil price
AYGTH Haruna Chiroma, Sameem Abdul-kareem, Ahmad Shukri Mohd Noor, Adamu I ...
Intelligent Automation & Soft Computing, 1-14, 2016
46*2016
Human errors in the information security realm–and how to fix them
NS Safa, C Maple
Computer Fraud & Security 2016 (9), 17-20, 2016
442016
Trust, satisfaction, and loyalty formation in electronic commerce
MA Ismail, NS Safa
Journal of Industrial and Intelligent Information Vol 2 (3), 2014
432014
An artificial neural network classification approach for improving accuracy of customer identification in e-Commerce
NS Safa, NA Ghani, MA Ismail
Malaysian Journal of Computer Science (MJCS) 27 (3), 171-185, 2014
382014
Incremental Algorithm for Association Rule Mining Under Dynamic Threshold
I Aqra, NA Ghani, C Maple, J Machado, NS Safa
Applied Sciences 9 (24), 2019
332019
Information security collaboration formation in organisations
N Sohrabi Safa, C Maple, T Watson, S Furnell
IET Information Security 12 (3), 238-245, 2018
212018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20