Management of information security ME Whitman, HJ Mattord Cengage Learning, 2019 | 745 | 2019 |
Antitumor perspectives of oleuropein and its metabolite hydroxytyrosol: Recent updates M Imran, M Nadeem, SA Gilani, S Khan, MW Sajid, RM Amir Journal of food science 83 (7), 1781-1791, 2018 | 134 | 2018 |
Who can you trust in the cloud? A review of security issues within cloud computing JC Roberts, W Al-Hamdani Proceedings of the 2011 Information Security Curriculum Development …, 2011 | 69 | 2011 |
Hands-on ethical hacking and network defense MT Simpson, K Backman, J Corley Cengage Learning 3, 2010 | 53 | 2010 |
A comprehensive deep learning benchmark for IoT IDS R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh Computers & Security 114, 102588, 2022 | 39 | 2022 |
Cybersecurity: The essential body of knowledge D Shoemaker, WA Conklin Delmar Learning, 2011 | 38 | 2011 |
Handbook of research on information security and assurance JND Gupta, S Sharma IGI Global, 2008 | 35 | 2008 |
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering: Information Encryption and Cyphering HR Nemati, L Yang IGI Global, 2010 | 33 | 2010 |
Assessment of need and method of delivery for information security awareness program WA Al-Hamdani Proceedings of the 3rd annual conference on Information security curriculum …, 2006 | 33 | 2006 |
Essentials of discrete mathematics DJ Hunter Jones & Bartlett Learning, 2021 | 31 | 2021 |
Teaching cryptography using design thinking approach WA Alhamdani Journal of Applied Security Research 11 (1), 78-89, 2016 | 30 | 2016 |
Cryptography based access control in healthcare web systems WA Al-Hamdani 2010 Information Security Curriculum Development Conference, 66-79, 2010 | 29 | 2010 |
Migration of Virtual Machine to improve the Security in Cloud Computing. N Chandrakala, BT Rao International Journal of Electrical & Computer Engineering (2088-8708) 8 (1), 2018 | 28 | 2018 |
Security and privacy issues in healthcare information system BK Rai, AK Srivastava Int. J. Emerg. Trends Technol. Comput. Sci 3 (6), 248-252, 2014 | 24 | 2014 |
Zero-day attack detection: a systematic literature review R Ahmad, I Alsmadi, W Alhamdani, L Tawalbeh Artificial Intelligence Review 56 (10), 10733-10811, 2023 | 21 | 2023 |
Cloud Computing Security Models, Architectures, Issues and Challenges: A Survey: A Survey MA Shahid, M Sharif SmartCR 5 (6), 602-616, 2015 | 18 | 2015 |
Implementing and improving awareness in information security H Kjørvik University of Agder, 2010 | 17 | 2010 |
SecFHIR: a security specification model for fast healthcare interoperability resources AM Altamimi International Journal of Advanced Computer Science and Applications 7 (6), 2016 | 16 | 2016 |
Information security policy in small education organization WA Al-Hamdani, WD Dixie 2009 Information Security Curriculum Development Conference, 72-78, 2009 | 15 | 2009 |
Cases on Professional Distance Education Degree Programs and Practices: Successes, Challenges, and Issues: Successes, Challenges, and Issues KPH Sullivan IGI Global, 2013 | 14 | 2013 |