Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective., and . Int. J. Inf. Secur. Priv., 8 (1): 1-18 (2014)A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study., , , , and . Int. J. Digit. Crime Forensics, 15 (1): 1-20 (2023)Bypassing Multiple Security Layers Using Malicious USB Human Interface Device., and . ICISSP, page 501-508. SciTePress, (2023)Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats., and . HSI, page 1-6. IEEE, (2022)An Optimized Dynamic Process Model of IS Security Governance Implementation.. CONF-IRM, page 38. (2012)An Integrated Security Governance Framework for Effective PCI DSS Implementation., , and . Int. J. Inf. Secur. Priv., 5 (3): 50-67 (2011)Replacing Human Input in Spam Email Detection Using Deep Learning., , and . HCI (35), volume 13336 of Lecture Notes in Computer Science, page 387-404. Springer, (2022)Modeling Evasive Malware Authoring Techniques., and . CSNet, page 71-75. IEEE, (2021)Application of Consumptive Metrics to Measure Internship Alignment., , and . CSCI, page 970-975. IEEE, (2021)IT Governance Practices in the Gulf Cooperation Council Region., and . Int. J. Inf. Technol. Proj. Manag., 10 (4): 137-159 (2019)