Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohammad Dabbagh
@article{DBLP:journals/access/RafsanjaniKRD23, author = {Ahmad Sahban Rafsanjani and Norshaliza Binti Kamaruddin and Hazlifah Mohd Rusli and Mohammad Dabbagh}, title = {QsecR: Secure {QR} Code Scanner According to a Novel Malicious {URL} Detection Framework}, journal = {{IEEE} Access}, volume = {11}, pages = {92523--92539}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3291811}, doi = {10.1109/ACCESS.2023.3291811}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RafsanjaniKRD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/SafaMMAD22, author = {Nader Sohrabi Safa and Faye Rona Mitchell and Carsten Maple and Muhammad Ajmal Azad and Mohammad Dabbagh}, title = {Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {10}, year = {2022}, url = {https://doi.org/10.1002/ett.4173}, doi = {10.1002/ETT.4173}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/SafaMMAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iicaiet/JienTDMF22, author = {Ng Yee Jien and Mohammad Tahir and Mohammad Dabbagh and Kian Meng Yap and Ali Farooq}, title = {Performance Evaluation of Machine Learning Algorithms for Intrusion Detection in IoT Applications}, booktitle = {{IEEE} International Conference on Artificial Intelligence in Engineering and Technology, {IICAIET} 2022, Kota Kinabalu, Malaysia, September 13-15, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IICAIET55139.2022.9936863}, doi = {10.1109/IICAIET55139.2022.9936863}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iicaiet/JienTDMF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iicaiet/XiangD22, author = {Ng Wei Xiang and Mohammad Dabbagh}, title = {Stock Market Price Prediction: Text Analytics of the GameStop Short Squeeze}, booktitle = {{IEEE} International Conference on Artificial Intelligence in Engineering and Technology, {IICAIET} 2022, Kota Kinabalu, Malaysia, September 13-15, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IICAIET55139.2022.9936756}, doi = {10.1109/IICAIET55139.2022.9936756}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iicaiet/XiangD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DabbaghCBTS21, author = {Mohammad Dabbagh and Kim{-}Kwang Raymond Choo and Amin Beheshti and Mohammad Tahir and Nader Sohrabi Safa}, title = {A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities}, journal = {Comput. Secur.}, volume = {100}, pages = {102078}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102078}, doi = {10.1016/J.COSE.2020.102078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DabbaghCBTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AmphawanCNKD21, author = {Angela Amphawan and Sushank Chaudhary and Tse{-}Kian Neo and Mohsen Kakavand and Mohammad Dabbagh}, title = {Radio-over-free space optical space division multiplexing system using 3-core photonic crystal fiber mode group multiplexers}, journal = {Wirel. Networks}, volume = {27}, number = {1}, pages = {211--225}, year = {2021}, url = {https://doi.org/10.1007/s11276-020-02447-4}, doi = {10.1007/S11276-020-02447-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AmphawanCNKD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TahirHDMAA20, author = {Mohammad Tahir and Mohamed Hadi Habaebi and Mohammad Dabbagh and Amna Mughees and Abdul Ahad and Kazi Istiaque Ahmed}, title = {A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities}, journal = {{IEEE} Access}, volume = {8}, pages = {115876--115904}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3003020}, doi = {10.1109/ACCESS.2020.3003020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TahirHDMAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iicaiet/DabbaghKTA20, author = {Mohammad Dabbagh and Mohsen Kakavand and Mohammad Tahir and Angela Amphawan}, title = {Performance Analysis of Blockchain Platforms: Empirical Evaluation of Hyperledger Fabric and Ethereum}, booktitle = {2nd {IEEE} International Conference on Artificial Intelligence in Engineering and Technology, {IICAIET} 2020, Kota Kinabalu, Malaysia, September 26-27, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IICAIET49801.2020.9257811}, doi = {10.1109/IICAIET49801.2020.9257811}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iicaiet/DabbaghKTA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DabbaghSS19, author = {Mohammad Dabbagh and Mehdi Sookhak and Nader Sohrabi Safa}, title = {The Evolution of Blockchain: {A} Bibliometric Study}, journal = {{IEEE} Access}, volume = {7}, pages = {19212--19221}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2895646}, doi = {10.1109/ACCESS.2019.2895646}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DabbaghSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/SafaMFAPDS19, author = {Nader Sohrabi Safa and Carsten Maple and Steven Furnell and Muhammad Ajmal Azad and Charith Perera and Mohammad Dabbagh and Mehdi Sookhak}, title = {Deterrence and prevention-based model to mitigate information security insider threats in organisations}, journal = {Future Gener. Comput. Syst.}, volume = {97}, pages = {587--597}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.03.024}, doi = {10.1016/J.FUTURE.2019.03.024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/SafaMFAPDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain/DabbaghKT19, author = {Mohammad Dabbagh and Mohsen Kakavand and Mohammad Tahir}, editor = {Javier Prieto and Ashok Kumar Das and Stefano Ferretti and Ant{\'{o}}nio Pinto and Juan Manuel Corchado}, title = {Towards Integration of Blockchain and IoT: {A} Bibliometric Analysis of State-of-the-Art}, booktitle = {Blockchain and Applications - International Congress, {BLOCKCHAIN} 2019, Avila, Spain, 26-28 June, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {1010}, pages = {27--35}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23813-1\_4}, doi = {10.1007/978-3-030-23813-1\_4}, timestamp = {Wed, 01 Dec 2021 08:59:05 +0100}, biburl = {https://dblp.org/rec/conf/blockchain/DabbaghKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/TahirAD19, author = {Mohammad Tahir and Qazi Mamoon Ashraf and Mohammad Dabbagh}, title = {Towards Enabling Autonomic Computing in IoT Ecosystem}, booktitle = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019}, pages = {646--651}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00122}, doi = {10.1109/DASC/PICOM/CBDCOM/CYBERSCITECH.2019.00122}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/TahirAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-12079, author = {Nader Sohrabi Safa and Carsten Maple and Steven M. Furnell and Muhammad Ajmal Azad and Charith Perera and Mohammad Dabbagh and Mehdi Sookhak}, title = {Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations}, journal = {CoRR}, volume = {abs/1903.12079}, year = {2019}, url = {http://arxiv.org/abs/1903.12079}, eprinttype = {arXiv}, eprint = {1903.12079}, timestamp = {Tue, 02 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-12079.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jzusc/KhanLDTKA16, author = {Saif ur Rehman Khan and Sai Peck Lee and Mohammad Dabbagh and Muhammad Tahir and Muzafar Khan and Muhammad Arif}, title = {RePizer: a framework for prioritization of software requirements}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {17}, number = {8}, pages = {750--765}, year = {2016}, url = {https://doi.org/10.1631/FITEE.1500162}, doi = {10.1631/FITEE.1500162}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/KhanLDTKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/DabbaghLP16, author = {Mohammad Dabbagh and Sai Peck Lee and Reza Meimandi Parizi}, title = {Functional and non-functional requirements prioritization: empirical evaluation of IPA, AHP-based, and HAM-based approaches}, journal = {Soft Comput.}, volume = {20}, number = {11}, pages = {4497--4520}, year = {2016}, url = {https://doi.org/10.1007/s00500-015-1760-z}, doi = {10.1007/S00500-015-1760-Z}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/DabbaghLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/PariziLD14, author = {Reza Meimandi Parizi and Sai Peck Lee and Mohammad Dabbagh}, title = {Achievements and Challenges in State-of-the-Art Software Traceability Between Test and Code Artifacts}, journal = {{IEEE} Trans. Reliab.}, volume = {63}, number = {4}, pages = {913--926}, year = {2014}, url = {https://doi.org/10.1109/TR.2014.2338254}, doi = {10.1109/TR.2014.2338254}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/PariziLD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/DabbaghL13, author = {Mohammad Dabbagh and Sai Peck Lee}, title = {A Consistent Approach for Prioritizing System Quality Attributes}, booktitle = {14th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2013, Honolulu, Hawaii, USA, 1-3 July, 2013}, pages = {317--322}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SNPD.2013.9}, doi = {10.1109/SNPD.2013.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/DabbaghL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.