Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Saad Haj Bakry
@article{DBLP:journals/ijksr/BakryAB22, author = {Saad Haj Bakry and Bandar Al{-}Saud and Zeyad Haj Bakry}, title = {Directions for Developing National Cyberworld Strategies}, journal = {Int. J. Smart Educ. Urban Soc.}, volume = {13}, number = {1}, pages = {1--16}, year = {2022}, url = {https://doi.org/10.4018/ijseus.300739}, doi = {10.4018/IJSEUS.300739}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijksr/BakryAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/RusayyisBA22, author = {Wafa Nasser Al Rusayyis and Saad Haj Bakry and Mohammed Amer Arafah}, title = {E-Services Cybersecurity Assessment Model}, journal = {Int. J. Smart Educ. Urban Soc.}, volume = {13}, number = {1}, pages = {1--18}, year = {2022}, url = {https://doi.org/10.4018/ijseus.300737}, doi = {10.4018/IJSEUS.300737}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijksr/RusayyisBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/Al-HazzaaBA20, author = {Amal Abdullah Al{-}Hazzaa and Saad Haj Bakry and Nada Hussain Alqahtani}, title = {An Approach for the Assessment of the National State of Giftedness}, journal = {Int. J. Smart Educ. Urban Soc.}, volume = {11}, number = {2}, pages = {48--60}, year = {2020}, url = {https://doi.org/10.4018/IJSEUS.2020040105}, doi = {10.4018/IJSEUS.2020040105}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijksr/Al-HazzaaBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/BakryA20, author = {Saad Haj Bakry and Khaled Al{-}Ghoneim}, title = {State-Owned Enterprises: Toward Sustainable Development}, journal = {Int. J. Smart Educ. Urban Soc.}, volume = {11}, number = {4}, pages = {53--64}, year = {2020}, url = {https://doi.org/10.4018/IJSEUS.2020100104}, doi = {10.4018/IJSEUS.2020100104}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijksr/BakryA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/AlghamdiEAAB19, author = {Bader Saeed Alghamdi and Mohamed Elnamaky and Mohammed Amer Arafah and Maazen Alsabaan and Saad Haj Bakry}, title = {A Context Establishment Framework for Cloud Computing Information Security Risk Management Based on the {STOPE} View}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {1}, pages = {166--176}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p166-176.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/AlghamdiEAAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/Al-MuammarB17, author = {Abdulaziz Al{-}Muammar and Saad Haj Bakry}, title = {A Framework of Key E-Services Issues: Strategy, Architecture and Performance}, journal = {Int. J. Knowl. Soc. Res.}, volume = {8}, number = {4}, pages = {1--22}, year = {2017}, url = {https://doi.org/10.4018/IJKSR.2017100101}, doi = {10.4018/IJKSR.2017100101}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/Al-MuammarB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/AlfantookhB17, author = {Abdulkader Alfantookh and Saad Haj Bakry}, title = {The State of People and Knowledge in the {GCC} Countries per a New Index and the Future Ahead}, journal = {Int. J. Knowl. Soc. Res.}, volume = {8}, number = {4}, pages = {34--74}, year = {2017}, url = {https://doi.org/10.4018/IJKSR.2017100103}, doi = {10.4018/IJKSR.2017100103}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/AlfantookhB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/AlfantookhB16, author = {Abdulkader Alfantookh and Saad Haj Bakry}, title = {Knowledge Cooperation Opportunities between Saudi Arabia and the {BRICS}}, journal = {Int. J. Knowl. Soc. Res.}, volume = {7}, number = {3}, pages = {31--46}, year = {2016}, url = {https://doi.org/10.4018/IJKSR.2016070103}, doi = {10.4018/IJKSR.2016070103}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/AlfantookhB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/AlfantookhB15, author = {Abdulkader Alfantookh and Saad Haj Bakry}, title = {Investigation of the state of innovation in the Gulf Cooperation Council countries: Looking ahead}, journal = {Comput. Hum. Behav.}, volume = {48}, pages = {626--636}, year = {2015}, url = {https://doi.org/10.1016/j.chb.2014.11.101}, doi = {10.1016/J.CHB.2014.11.101}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/AlfantookhB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/Bin-AbbasB14, author = {Hesham Bin{-}Abbas and Saad Haj Bakry}, title = {Assessment of {IT} governance in organizations: {A} simple integrated approach}, journal = {Comput. Hum. Behav.}, volume = {32}, pages = {261--267}, year = {2014}, url = {https://doi.org/10.1016/j.chb.2013.12.019}, doi = {10.1016/J.CHB.2013.12.019}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/Bin-AbbasB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/BakryB14, author = {Zeyad Haj Bakry and Saad Haj Bakry}, title = {Identifying People's Responsibilities for the Global Knowledge Societies: {A} Framework and a Survey}, journal = {Int. J. Knowl. Soc. Res.}, volume = {5}, number = {4}, pages = {11--25}, year = {2014}, url = {https://doi.org/10.4018/IJKSR.2014100102}, doi = {10.4018/IJKSR.2014100102}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/BakryB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/AlfantookhB13, author = {Abdulkader Alfantookh and Saad Haj Bakry}, title = {Creativity and Innovation in Higher Education Research: Problems and Solutions}, journal = {Int. J. Knowl. Soc. Res.}, volume = {4}, number = {1}, pages = {90--107}, year = {2013}, url = {https://doi.org/10.4018/jksr.2013010107}, doi = {10.4018/JKSR.2013010107}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/AlfantookhB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/BakryA12, author = {Saad Haj Bakry and Ali Al{-}Ghamdi}, title = {The Role of Education in the Advancement of Cultural Harmony {(REACH):} Toward a Global Initiative}, journal = {Int. J. Knowl. Soc. Res.}, volume = {3}, number = {1}, pages = {40--51}, year = {2012}, url = {https://doi.org/10.4018/jksr.2012010104}, doi = {10.4018/JKSR.2012010104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/BakryA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/Bin-AbbasB12, author = {Hesham Bin{-}Abbas and Saad Haj Bakry}, title = {Knowledge Management: An Instrument for the Development of the Knowledge Society}, journal = {Int. J. Knowl. Soc. Res.}, volume = {3}, number = {3}, pages = {58--67}, year = {2012}, url = {https://doi.org/10.4018/jksr.2012070105}, doi = {10.4018/JKSR.2012070105}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/Bin-AbbasB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/BakryA11, author = {Saad Haj Bakry and Ali Al{-}Ghamdi}, title = {Cultural Pluralism in the Context of the Knowledge Society Ecosystem: Reviews and Views}, journal = {Int. J. Knowl. Soc. Res.}, volume = {2}, number = {1}, pages = {71--83}, year = {2011}, url = {https://doi.org/10.4018/jksr.2011010106}, doi = {10.4018/JKSR.2011010106}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/BakryA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijksr/BakryA10, author = {Saad Haj Bakry and Abdulkader Alfantookh}, title = {Toward Building the Knowledge Culture: Reviews and a {KC-STOPE} with Six Sigma View}, journal = {Int. J. Knowl. Soc. Res.}, volume = {1}, number = {1}, pages = {46--64}, year = {2010}, url = {https://doi.org/10.4018/jksr.2010010104}, doi = {10.4018/JKSR.2010010104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijksr/BakryA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-OsaimiAB08, author = {Khalid Al{-}Osaimi and Abdulmohsen A. Alheraish and Saad Haj Bakry}, title = {STOPE-based approach for e-readiness assessment case studies}, journal = {Int. J. Netw. Manag.}, volume = {18}, number = {1}, pages = {65--75}, year = {2008}, url = {https://doi.org/10.1002/nem.657}, doi = {10.1002/NEM.657}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-OsaimiAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/SalehAMB08, author = {Mohamed Saad Saleh and Abdulkader Alfantookh and John Mellor and Saad Haj Bakry}, editor = {Izak Benbasat and Ali R. Montazemi}, title = {An Open Reference Framework for Enterprise Information Security Risk Management Using the {STOPE} Scope and the Six-Sigma Process}, booktitle = {Learning from the past {\&} charting the future of the discipline. 14th Americas Conference on Information Systems, {AMCIS} 2008, Toronto, Ontario, Canada, August 14-17, 2008}, pages = {281}, publisher = {Association for Information Systems}, year = {2008}, url = {http://aisel.aisnet.org/amcis2008/281}, timestamp = {Tue, 03 Jan 2012 16:36:36 +0100}, biburl = {https://dblp.org/rec/conf/amcis/SalehAMB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsks/BakryA08, author = {Saad Haj Bakry and Ali Al{-}Ghamdi}, editor = {Miltiadis D. Lytras and John M. Carroll and Ernesto Damiani and Robert D. Tennyson and David E. Avison and Gottfried Vossen and Patricia Ord{\'{o}}{\~{n}}ez de Pablos}, title = {A Framework for the Knowledge Society Ecosystem: {A} Tool for Development}, booktitle = {The Open Knowlege Society. {A} Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, {WSKS} 2008, Athens, Greece, September 24-26, 2008. Proceedings}, series = {Communications in Computer and Information Science}, volume = {19}, pages = {32--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87783-7\_5}, doi = {10.1007/978-3-540-87783-7\_5}, timestamp = {Thu, 30 Mar 2023 17:48:17 +0200}, biburl = {https://dblp.org/rec/conf/wsks/BakryA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsks/AlfantookhB08, author = {Abdulkader Alfantookh and Saad Haj Bakry}, editor = {Miltiadis D. Lytras and John M. Carroll and Ernesto Damiani and Robert D. Tennyson and David E. Avison and Gottfried Vossen and Patricia Ord{\'{o}}{\~{n}}ez de Pablos}, title = {Views on Globalization of Higher Education}, booktitle = {The Open Knowlege Society. {A} Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, {WSKS} 2008, Athens, Greece, September 24-26, 2008. Proceedings}, series = {Communications in Computer and Information Science}, volume = {19}, pages = {147--152}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87783-7\_18}, doi = {10.1007/978-3-540-87783-7\_18}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsks/AlfantookhB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsks/Al-GhamdiB08, author = {Ali Al{-}Ghamdi and Saad Haj Bakry}, editor = {Miltiadis D. Lytras and John M. Carroll and Ernesto Damiani and Robert D. Tennyson and David E. Avison and Gottfried Vossen and Patricia Ord{\'{o}}{\~{n}}ez de Pablos}, title = {King Saud University Drive toward the Knowledge Society: {A} {STOPE} View}, booktitle = {The Open Knowlege Society. {A} Computer Science and Information Systems Manifesto, First World Summit on the Knowledge Society, {WSKS} 2008, Athens, Greece, September 24-26, 2008. Proceedings}, series = {Communications in Computer and Information Science}, volume = {19}, pages = {297--307}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87783-7\_38}, doi = {10.1007/978-3-540-87783-7\_38}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsks/Al-GhamdiB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SalehAB07, author = {Mohammad Saad Saleh and Abdullah Alrabiah and Saad Haj Bakry}, title = {Using {ISO} 17799: 2005 information security management: a {STOPE} view with six sigma approach}, journal = {Int. J. Netw. Manag.}, volume = {17}, number = {1}, pages = {85--97}, year = {2007}, url = {https://doi.org/10.1002/nem.616}, doi = {10.1002/NEM.616}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SalehAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/ArafahAB07, author = {Mohammad Amer Arafah and Hazza S. Al{-}Harbi and Saad Haj Bakry}, title = {Grid computing: a {STOPE} view}, journal = {Int. J. Netw. Manag.}, volume = {17}, number = {4}, pages = {295--305}, year = {2007}, url = {https://doi.org/10.1002/nem.634}, doi = {10.1002/NEM.634}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/ArafahAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SalehAB07, author = {Mohamed Saad Saleh and Abdullah Alrabiah and Saad Haj Bakry}, title = {A {STOPE} model for the investigation of compliance with {ISO} 17799-2005}, journal = {Inf. Manag. Comput. Secur.}, volume = {15}, number = {4}, pages = {283--294}, year = {2007}, url = {https://doi.org/10.1108/09685220710817806}, doi = {10.1108/09685220710817806}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/SalehAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LaithBA06, author = {Mohamed Laith and Saad Haj Bakry and Abdulmohsen A. Alheraish}, title = {A simple approach for optimum channel reservation for hand-over calls in cellular systems}, journal = {Int. J. Netw. Manag.}, volume = {16}, number = {4}, pages = {241--252}, year = {2006}, url = {https://doi.org/10.1002/nem.593}, doi = {10.1002/NEM.593}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LaithBA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-BassamAB06, author = {Bassam Al{-}Bassam and Abdulmohsen A. Alheraish and Saad Haj Bakry}, title = {A tutorial on using genetic algorithms for the design of network topology}, journal = {Int. J. Netw. Manag.}, volume = {16}, number = {4}, pages = {253--262}, year = {2006}, url = {https://doi.org/10.1002/nem.597}, doi = {10.1002/NEM.597}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-BassamAB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryB05, author = {Ali Haj Bakry and Saad Haj Bakry}, title = {Enterprise resource planning: a review and a {STOPE} view}, journal = {Int. J. Netw. Manag.}, volume = {15}, number = {5}, pages = {363--370}, year = {2005}, url = {http://doi.acm.org/10.1145/1110960.1110967}, doi = {10.1145/1110960.1110967}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Bakry04, author = {Saad Haj Bakry}, title = {Development of e-government: a {STOPE} view}, journal = {Int. J. Netw. Manag.}, volume = {14}, number = {5}, pages = {339--350}, year = {2004}, url = {http://doi.acm.org/10.1145/1024511.1024517}, doi = {10.1145/1024511.1024517}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Bakry04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryAA04, author = {Saad Haj Bakry and Bassam Al{-}Bassam and Abdulmohsen A. Alheraish}, title = {An integrated simple approach for the analysis of internet backbone networks}, journal = {Int. J. Netw. Manag.}, volume = {14}, number = {6}, pages = {391--403}, year = {2004}, url = {http://doi.acm.org/10.1145/1035731.1035735}, doi = {10.1145/1035731.1035735}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryAA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Bakry03, author = {Saad Haj Bakry}, title = {Toward the development of a standard e-readiness assessment policy}, journal = {Int. J. Netw. Manag.}, volume = {13}, number = {2}, pages = {129--137}, year = {2003}, url = {https://doi.org/10.1002/nem.466}, doi = {10.1002/NEM.466}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Bakry03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Bakry03a, author = {Saad Haj Bakry}, title = {Development of security policies for private networks}, journal = {Int. J. Netw. Manag.}, volume = {13}, number = {3}, pages = {203--210}, year = {2003}, url = {http://doi.acm.org/10.1145/794112.794117}, doi = {10.1145/794112.794117}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Bakry03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryB01, author = {Saad Haj Bakry and Fahed Haj Bakry}, title = {A strategic view for the development of E-Business}, journal = {Int. J. Netw. Manag.}, volume = {11}, number = {2}, pages = {103--112}, year = {2001}, url = {https://doi.org/10.1002/nem.395}, doi = {10.1002/NEM.395}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryB01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jamal-AldeenBN00, author = {Rafiq Jamal{-}Aldeen and Saad Haj Bakry and Adnan Andrew Nouh}, title = {Performance-based evaluations of the tangible benefits of information networks with applications}, journal = {Int. J. Netw. Manag.}, volume = {10}, number = {2}, pages = {91--101}, year = {2000}, url = {https://doi.org/10.1002/(SICI)1099-1190(200003/04)10:2\&\#60;91::AID-NEM358\&\#62;3.0.CO;2-0}, doi = {10.1002/(SICI)1099-1190(200003/04)10:2\&\#60;91::AID-NEM358\&\#62;3.0.CO;2-0}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jamal-AldeenBN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jamal-AldeenBN00a, author = {Rafiq Jamal{-}Aldeen and Saad Haj Bakry and Adnan Andrew Nouh}, title = {Analysis of the cost-effectiveness of information networks with applications}, journal = {Int. J. Netw. Manag.}, volume = {10}, number = {3}, pages = {145--156}, year = {2000}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jamal-AldeenBN00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryB00, author = {Saad Haj Bakry and Fahed Haj Bakry}, title = {Identifying information network profiles for planning management}, journal = {Int. J. Netw. Manag.}, volume = {10}, number = {6}, pages = {315--322}, year = {2000}, url = {https://doi.org/10.1002/1099-1190(200011/12)10:6\&\#60;315::AID-NEM378\&\#62;3.0.CO;2-Z}, doi = {10.1002/1099-1190(200011/12)10:6\&\#60;315::AID-NEM378\&\#62;3.0.CO;2-Z}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Jamal-AldeenBN00b, author = {Rafiq Jamal{-}Aldeen and Saad Haj Bakry and Adnan Andrew Nouh}, title = {A methodology for the evaluation of the replacement of information network technology with applications}, journal = {Int. J. Netw. Manag.}, volume = {10}, number = {6}, pages = {349--359}, year = {2000}, url = {https://doi.org/10.1002/1099-1190(200011/12)10:6\&\#60;349::AID-NEM384\&\#62;3.0.CO;2-V}, doi = {10.1002/1099-1190(200011/12)10:6\&\#60;349::AID-NEM384\&\#62;3.0.CO;2-V}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Jamal-AldeenBN00b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryA99, author = {Saad Haj Bakry and Abdullah Al{-}Dhelaan}, title = {Planning information networks: the scope and the customer issues}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {1}, pages = {28--37}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5}, doi = {10.1002/\%28SICI\%291099-1190\%28199901/02\%299:1\%3C28::AID-NEM264\%3E3.0.CO;2-5}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryZ99, author = {Saad Haj Bakry and Naim Zawawi}, title = {An initial zone-splitting design method for cellular telephone systems}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {5}, pages = {291--297}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A}, doi = {10.1002/\%28SICI\%291099-1190\%28199909/10\%299:5\%3C291::AID-NEM332\%3E3.0.CO;2-A}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-BarrakNB99, author = {Saud Andrew Al{-}Barrak and Adnan Andrew Nouh and Saad Haj Bakry}, title = {Computer simulation for the evaluation of static and dynamic priority schemes in an {ATM} multiplexer with multimedia traffic}, journal = {Int. J. Netw. Manag.}, volume = {9}, number = {6}, pages = {359--369}, year = {1999}, url = {https://doi.org/10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J}, doi = {10.1002/\%28SICI\%291099-1190\%28199911/12\%299:6\%3C359::AID-NEM342\%3E3.0.CO;2-J}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-BarrakNB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/AhmedB97, author = {Rana Ejaz Ahmed and Saad Haj Bakry}, title = {New topology designs for the future expansion of the academic network of the Gulf countries}, journal = {Int. J. Netw. Manag.}, volume = {7}, number = {1}, pages = {18--32}, year = {1997}, url = {https://doi.org/10.1002/(SICI)1099-1190(199701/02)7:1\&\#60;18::AID-NEM231\&\#62;3.0.CO;2-Q}, doi = {10.1002/(SICI)1099-1190(199701/02)7:1\&\#60;18::AID-NEM231\&\#62;3.0.CO;2-Q}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/AhmedB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-SulaiymAB97, author = {Hamad Al{-}Sulaiym and Abdulaziz Al{-}Muammar and Saad Haj Bakry}, title = {An Overview of Public, Research and Private Data Networks}, journal = {Int. J. Netw. Manag.}, volume = {7}, number = {2}, pages = {103--113}, year = {1997}, url = {https://doi.org/10.1002/(SICI)1099-1190(199703/04)7:2\&\#60;103::AID-NEM230\&\#62;3.0.CO;2-0}, doi = {10.1002/(SICI)1099-1190(199703/04)7:2\&\#60;103::AID-NEM230\&\#62;3.0.CO;2-0}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/Al-SughaiyerAB97, author = {Imad A. Al{-}Sughaiyer and Abdullah Al{-}Dhalaan and Saad Haj Bakry}, title = {Evaluation of Multi-stage Framing and Retransmission Overheads with Emphasis on {IBM-SNA}}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {9}, pages = {41--55}, year = {1997}, url = {https://doi.org/10.1016/S1319-1578(97)80004-3}, doi = {10.1016/S1319-1578(97)80004-3}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/Al-SughaiyerAB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-RumaihABA96, author = {Adel Al{-}Rumaih and Rana Ejaz Ahmed and Saad Haj Bakry and Abdullah Al{-}Dhelaan}, title = {A Methodology for Network Topology Design with Link and Node Failuresy Tolerance}, journal = {Int. J. Netw. Manag.}, volume = {6}, number = {1}, pages = {42--63}, year = {1996}, url = {https://doi.org/10.1002/(SICI)1099-1190(199601/02)6:1\&\#60;42::AID-NEM208\&\#62;3.0.CO;2-R}, doi = {10.1002/(SICI)1099-1190(199601/02)6:1\&\#60;42::AID-NEM208\&\#62;3.0.CO;2-R}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-RumaihABA96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-SulaiymAAB96, author = {Hamad Al{-}Sulaiym and Mohammed A. Al{-}Turaigi and Abdullah Al{-}Dhelaan and Saad Haj Bakry}, title = {Computer Simulation for the Evaluation of the {IBM-SNA} CongestionManagement Method on {GULFNET}}, journal = {Int. J. Netw. Manag.}, volume = {6}, number = {2}, pages = {94--107}, year = {1996}, url = {https://doi.org/10.1002/(SICI)1099-1190(199603/04)6:2\&\#60;94::AID-NEM194\&\#62;3.0.CO;2-D}, doi = {10.1002/(SICI)1099-1190(199603/04)6:2\&\#60;94::AID-NEM194\&\#62;3.0.CO;2-D}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAAB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryA96, author = {Saad Haj Bakry and Ibrahim A. Al{-}Kadi}, title = {Analysis of Public Access Provisioning Requirements for Information Networks}, journal = {Int. J. Netw. Manag.}, volume = {6}, number = {6}, pages = {327--333}, year = {1996}, url = {https://doi.org/10.1002/(SICI)1099-1190(199611/12)6:6\&\#60;327::AID-NEM224\&\#62;3.0.CO;2-2}, doi = {10.1002/(SICI)1099-1190(199611/12)6:6\&\#60;327::AID-NEM224\&\#62;3.0.CO;2-2}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryA96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/BakryA96, author = {Saad Haj Bakry and Tawfik Al{-}Kusayer}, title = {Informatics in Arabic Dictionaries}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {8}, pages = {I--XXIV}, year = {1996}, url = {https://doi.org/10.1016/S1319-1578(96)80001-2}, doi = {10.1016/S1319-1578(96)80001-2}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/BakryA96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryAA95, author = {Saad Haj Bakry and Abdullah Al{-}Dhelaan and Abdulaziz Al{-}Muammar}, title = {A Mathematical Model for the Investigations of Access Demands on Information Networks with Applications}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {2}, pages = {82--94}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050206}, doi = {10.1002/NEM.4560050206}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryAA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/TaherBAA95, author = {Hasan Taher and Saad Haj Bakry and Abdullah Al{-}Dhelaan and Abdulaziz Al{-}Muammar}, title = {Information networks awareness and utilization issues: The case of gulfnet}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {3}, pages = {115--120}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050303}, doi = {10.1002/NEM.4560050303}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/TaherBAA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/Al-SulaiymAB95, author = {Hamad Al{-}Sulaiym and Abdulaziz Al{-}Muammar and Saad Haj Bakry}, title = {{GULFNET:} The academic network of the arab gulf countries}, journal = {Int. J. Netw. Manag.}, volume = {5}, number = {5}, pages = {274--284}, year = {1995}, url = {https://doi.org/10.1002/nem.4560050506}, doi = {10.1002/NEM.4560050506}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/Al-SulaiymAB95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/BakryAS93, author = {Saad Haj Bakry and Ibrahim Al{-}Abbas and Mohammad K. Samarkandy}, title = {Analysis of the economic life and the replacement time of telecommunications equipment}, journal = {Int. J. Netw. Manag.}, volume = {3}, number = {2}, pages = {78--90}, year = {1993}, url = {https://doi.org/10.1002/nem.4560030204}, doi = {10.1002/NEM.4560030204}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/BakryAS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SaltiBA91, author = {Mounis Salti and Saad Haj Bakry and Mohammad A. Al{-}Turaigi}, title = {Simulation of congestion avoidance and routing in packet switching networks}, journal = {Comput. Commun.}, volume = {14}, number = {10}, pages = {608--614}, year = {1991}, url = {https://doi.org/10.1016/0140-3664(91)90050-B}, doi = {10.1016/0140-3664(91)90050-B}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SaltiBA91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BakryEA88, author = {Saad Haj Bakry and B. El{-}Redaisy and Mohammed A. Al{-}Turaigi}, title = {Computer simulation of a packet switching computer network}, journal = {Comput. Commun.}, volume = {11}, number = {3}, pages = {124--129}, year = {1988}, url = {https://doi.org/10.1016/0140-3664(88)90059-X}, doi = {10.1016/0140-3664(88)90059-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BakryEA88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/BakryA84, author = {Saad Haj Bakry and Martin H. Ackroyd}, title = {Author's Reply}, journal = {{IEEE} Trans. Commun.}, volume = {32}, number = {3}, pages = {301--302}, year = {1984}, url = {https://doi.org/10.1109/TCOM.1984.1096055}, doi = {10.1109/TCOM.1984.1096055}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/BakryA84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/BakryA82, author = {Saad Haj Bakry and Martin H. Ackroyd}, title = {Teletraffic Analysis for Multicell Mobile Radio Telephone Systems}, journal = {{IEEE} Trans. Commun.}, volume = {30}, number = {8}, pages = {1905--1909}, year = {1982}, url = {https://doi.org/10.1109/TCOM.1982.1095673}, doi = {10.1109/TCOM.1982.1095673}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/BakryA82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/BakryA81, author = {Saad Haj Bakry and Martin H. Ackroyd}, title = {Teletraffic Analysis for Single-Cell Mobile Radio Telephone Systems}, journal = {{IEEE} Trans. Commun.}, volume = {29}, number = {3}, pages = {298--304}, year = {1981}, url = {https://doi.org/10.1109/TCOM.1981.1094982}, doi = {10.1109/TCOM.1981.1094982}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/BakryA81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.