Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Hamid Jahankhani
2010 – today
- 2013
[j6]Reza Alavi, Shareeful Islam, Hamid Jahankhani, Ameer Al-Nemrat: Analyzing Human Factors for an Effective Information Security Management System. IJSSE 4(1): 50-74 (2013)- 2012
[c14]Hamid Jahankhani, Elias Pimenidis, Amin Hosseinian Far: A Probabilistic Knowledge-Based Information System for Environmental Policy Modeling and Decision Making. AIAI (1) 2012: 136-145
[e2]Christos K. Georgiadis, Hamid Jahankhani, Elias Pimenidis, Rabih Bashroush, Ameer Al-Nemrat (Eds.): Global Security, Safety and Sustainability & e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 99, Springer 2012, ISBN 978-3-642-33447-4- 2011
[j5]Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz, Hossein Jahankhani: A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment. IJISP 5(1): 1-13 (2011)
[j4]Nazmul Haque Siddique, Richard Mitchell, Michael J. O'Grady, Hamid Jahankhani: Cybernetic approaches to robotics. Paladyn 2(3): 109-110 (2011)
[c13]Rabih Bashroush, Ameer Al-Nemrat, M. Bachrouch, Hamid Jahankhani: Visualizing Variability Models Using Hyperbolic Trees. CAiSE Forum 2011: 113-120
[c12]Fawzi Fawzi, Rabih Bashroush, Hamid Jahankhani: GSi Compliant RAS for Public Private Sector Partnership. ICGS3/e-Democracy 2011: 67-71
[c11]Nurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani, Rabih Bashroush: Sufficiency of Windows Event Log as Evidence in Digital Forensics. ICGS3/e-Democracy 2011: 253-262
[c10]Amin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera: Financial Assessment of London Plan Policy 4A.2 by Probabilistic Inference and Influence Diagrams. EANN/AIAI (2) 2011: 51-60- 2010
[c9]Ameer Al-Nemrat, Hamid Jahankhani, David S. Preston: Cybercrime Victimisations/Criminalisation and Punishment. ICGS3 2010: 55-62
[c8]Amin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera: A Review on Sustainability Models. ICGS3 2010: 216-222
[e1]Sérgio Tenreiro de Magalhães, Hamid Jahankhani, Ali G. Hessami (Eds.): Global Security, Safety, and Sustainability - 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings. Communications in Computer and Information Science 92, Springer 2010, ISBN 978-3-642-15716-5
2000 – 2009
- 2008
[j3]Hamid Jahankhani, Elidon Beqiri: Memory-Based Antiforensic Tools and Techniques. IJISP 2(2): 1-13 (2008)
[j2]Haralambos Mouratidis, Hamid Jahankhani, Mathews Z. Nkhoma: Management versus security specialists: an empirical study on security related perceptions. Inf. Manag. Comput. Security 16(2): 187-205 (2008)- 2007
[j1]Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma, Haralambos Mouratidis: Information Systems Security: Cases of Network Administrator Threats. IJISP 1(3): 13-25 (2007)- 2005
[c7]Hamid Jahankhani, Justus I. Ekeigwe: Adaptation of the Balanced Scorecard Model to the IT Functions. ICITA (2) 2005: 784-787- 2004
[c6]Hamid Jahankhani, Mohammed Youssef: Underlying Platform of the E-Commerce System: J2EE vs. NET. ICEIS (4) 2004: 250-257- 2002
[c5]Hamid Jahankhani, John A. Lynch, Jonathan Stephenson: The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU. EurAsia-ICT 2002: 552-559
[c4]Hamid Jahankhani, Jonathan Stephenson: Web Accessibility: Impact of the Recent Law on E-Learning Provisions for the Visually Impaired. ICWI 2002: 144-151
[c3]
[c2]
[c1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:54 CEST by the dblp team



