Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Atif Ahmad"
@article{DBLP:journals/access/RehmanG0S24, author = {Atif Rehman and Rimsha Ghias and Iftikhar Ahmad and Hammad Iqbal Sherazi}, title = {Advance Optimized Nonlinear Control Strategies for Manage Pressure Drilling}, journal = {{IEEE} Access}, volume = {12}, pages = {73436--73450}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3404054}, doi = {10.1109/ACCESS.2024.3404054}, timestamp = {Tue, 11 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RehmanG0S24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/RizwanKIAIK24, author = {Atif Rizwan and Anam Nawaz Khan and Muhammad Ibrahim and Rashid Ahmad and Naeem Iqbal and Do{-}Hyeun Kim}, title = {Optimal environment control and fruits delivery tracking system using blockchain for greenhouse}, journal = {Comput. Electron. Agric.}, volume = {220}, pages = {108889}, year = {2024}, url = {https://doi.org/10.1016/j.compag.2024.108889}, doi = {10.1016/J.COMPAG.2024.108889}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cea/RizwanKIAIK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/NaseerDMA24, author = {Humza Naseer and Kevin C. Desouza and Sean B. Maynard and Atif Ahmad}, title = {Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics}, journal = {Eur. J. Inf. Syst.}, volume = {33}, number = {2}, pages = {200--220}, year = {2024}, url = {https://doi.org/10.1080/0960085x.2023.2257168}, doi = {10.1080/0960085X.2023.2257168}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejis/NaseerDMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KhanRAJKLK24, author = {Anam Nawaz Khan and Atif Rizwan and Rashid Ahmad and Wenquan Jin and Qazi Waqas Khan and Sunhwan Lim and DoHyeun Kim}, title = {Hetero-FedIoT: {A} Rule-Based Interworking Architecture for Heterogeneous Federated IoT Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {4}, pages = {5920--5938}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3308579}, doi = {10.1109/JIOT.2023.3308579}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/KhanRAJKLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/peerj-cs/KhanIARKK24, author = {Qazi Waqas Khan and Khalid Iqbal and Rashid Ahmad and Atif Rizwan and Anam Nawaz Khan and DoHyeun Kim}, title = {An intelligent diabetes classification and perception framework based on ensemble and deep learning method}, journal = {PeerJ Comput. Sci.}, volume = {10}, pages = {e1914}, year = {2024}, url = {https://doi.org/10.7717/peerj-cs.1914}, doi = {10.7717/PEERJ-CS.1914}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/peerj-cs/KhanIARKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccr/AliAHBRNJA24, author = {Atif Ali and Shahzad Ahmed and Muhammad Hussain and Talat Ahmad Bhutta and Ali Raza and Muhammad Waqas Nadeem and Yasir Khan Jadoon and Farman Ali}, title = {The Synergy of Artificial Intelligence and Cybersecurity}, booktitle = {2024 2nd International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, February 26-28, 2024}, pages = {1--5}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCR61006.2024.10532953}, doi = {10.1109/ICCR61006.2024.10532953}, timestamp = {Wed, 05 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccr/AliAHBRNJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-16486, author = {Ahmad Saeed and Haasha Bin Atif and Usman Habib and Mohsin Bilal}, title = {Intelligent Known and Novel Aircraft Recognition - {A} Shift from Classification to Similarity Learning for Combat Identification}, journal = {CoRR}, volume = {abs/2402.16486}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.16486}, doi = {10.48550/ARXIV.2402.16486}, eprinttype = {arXiv}, eprint = {2402.16486}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-16486.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanKARKKK23, author = {Qazi Waqas Khan and Bong Wan Kim and Rashid Ahmed and Atif Rizwan and Anam Nawaz Khan and Kwangsoo Kim and Do{-}Hyeun Kim}, title = {Predictive Modeling of Water Table Depth, Drilling Duration, and Soil Layer Classification Using Adaptive Ensemble Learning for Cost-Effective Percussion Water Borehole Drilling}, journal = {{IEEE} Access}, volume = {11}, pages = {76703--76721}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3298225}, doi = {10.1109/ACCESS.2023.3298225}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanKARKKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanKRAKK23, author = {Qazi Waqas Khan and Anam Nawaz Khan and Atif Rizwan and Rashid Ahmad and Salabat Khan and Dohyeun Kim}, title = {Decentralized Machine Learning Training: {A} Survey on Synchronization, Consolidation, and Topologies}, journal = {{IEEE} Access}, volume = {11}, pages = {68031--68050}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3284976}, doi = {10.1109/ACCESS.2023.3284976}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanKRAKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/KhanRKAAK23, author = {Salabat Khan and Atif Rizwan and Anam Nawaz Khan and Murad Ali and Rashid Ahmed and Do Hyeun Kim}, title = {A multi-perspective revisit to the optimization methods of Neural Architecture Search and Hyper-parameter optimization for non-federated and federated learning environments}, journal = {Comput. Electr. Eng.}, volume = {110}, pages = {108867}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108867}, doi = {10.1016/J.COMPELECENG.2023.108867}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/KhanRKAAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AinslieTMA23, author = {Scott Ainslie and Dean Thompson and Sean B. Maynard and Atif Ahmad}, title = {Cyber-threat intelligence for security decision-making: {A} review and research agenda for practice}, journal = {Comput. Secur.}, volume = {132}, pages = {103352}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103352}, doi = {10.1016/J.COSE.2023.103352}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AinslieTMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NaseerNAMS23, author = {Ayesha Naseer and Humza Naseer and Atif Ahmad and Sean B. Maynard and Adil Masood Siddiqui}, title = {Moving towards agile cybersecurity incident response: {A} case study exploring the enabling role of big data analytics-embedded dynamic capabilities}, journal = {Comput. Secur.}, volume = {135}, pages = {103525}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103525}, doi = {10.1016/J.COSE.2023.103525}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NaseerNAMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssc/HayatAABU23, author = {Humera Hayat and Atif Akbar and Tanvir Ahmad and Sajjad Haider Bhatti and Muhammad Imdad Ullah}, title = {Robustness to missing observation and optimalities of response surface designs with regular and complex structure}, journal = {Commun. Stat. Simul. Comput.}, volume = {52}, number = {11}, pages = {5213--5230}, year = {2023}, url = {https://doi.org/10.1080/03610918.2021.1977954}, doi = {10.1080/03610918.2021.1977954}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cssc/HayatAABU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejis/KotsiasAS23, author = {James Kotsias and Atif Ahmad and Rens Scheepers}, title = {Adopting and integrating cyber-threat intelligence in a commercial organisation}, journal = {Eur. J. Inf. Syst.}, volume = {32}, number = {1}, pages = {35--51}, year = {2023}, url = {https://doi.org/10.1080/0960085x.2022.2088414}, doi = {10.1080/0960085X.2022.2088414}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejis/KotsiasAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/KhanRAK23, author = {Anam Nawaz Khan and Atif Rizwan and Rashid Ahmad and Do{-}Hyeun Kim}, title = {An OCF-IoTivity enabled smart-home optimal indoor environment control system for energy and comfort optimization}, journal = {Internet Things}, volume = {22}, pages = {100712}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100712}, doi = {10.1016/J.IOT.2023.100712}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/KhanRAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/KhanRAKLK23, author = {Anam Nawaz Khan and Atif Rizwan and Rashid Ahmad and Qazi Waqas Khan and Sunhwan Lim and Do{-}Hyeun Kim}, title = {A precision-centric approach to overcoming data imbalance and non-IIDness in federated learning}, journal = {Internet Things}, volume = {23}, pages = {100890}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100890}, doi = {10.1016/J.IOT.2023.100890}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/KhanRAKLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/RizwanAKXK23, author = {Atif Rizwan and Rashid Ahmad and Anam Nawaz Khan and Rongxu Xu and Dohyeun Kim}, title = {Intelligent digital twin for federated learning in AIoT networks}, journal = {Internet Things}, volume = {22}, pages = {100698}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100698}, doi = {10.1016/J.IOT.2023.100698}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/RizwanAKXK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RizwanKAK23, author = {Atif Rizwan and Anam Nawaz Khan and Rashid Ahmad and Do Hyeun Kim}, title = {Optimal Environment Control Mechanism Based on {OCF} Connectivity for Efficient Energy Consumption in Greenhouse}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {6, March 15}, pages = {5035--5049}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3222086}, doi = {10.1109/JIOT.2022.3222086}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RizwanKAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ShahidMKSYAZ23, author = {Farah Shahid and Atif Mehmood and Rizwan Khan and Ahmad Al Smadi and Muhammad Yaqub and Mutasem K. Alsmadi and Zhonglong Zheng}, title = {1D Convolutional LSTM-based wind power prediction integrated with \emph{PkNN} data imputation technique}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {35}, number = {10}, pages = {101816}, year = {2023}, url = {https://doi.org/10.1016/j.jksuci.2023.101816}, doi = {10.1016/J.JKSUCI.2023.101816}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/ShahidMKSYAZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/Dang-PhamTAM23, author = {Duy Dang{-}Pham and Nik Thompson and Atif Ahmad and Sean B. Maynard}, title = {Exploring the Antecedents of Shadow Information Security Practices}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2023, Wellington, New Zealand, December 5-8, 2023}, year = {2023}, url = {https://aisel.aisnet.org/acis2023/5}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/Dang-PhamTAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gi/SchimmlerWBDKMK23, author = {Sonja Schimmler and Bianca Wentzel and Arnim Bleier and Stefan Dietze and Saurav Karmakar and Peter Mutschke and Angelie Kraft and Tilahun Abedissa Taffa and Ricardo Usbeck and Zeyd Boukhers and S{\"{o}}ren Auer and Leyla Jael Castro and Marcel R. Ackermann and Thomas Neumuth and Daniel Schneider and Ziawasch Abedjan and Atif Latif and Fidan Limani and Raia Abu Ahmad and Georg Rehm and Sima Attar Khorasani and Matthias Lieber}, editor = {Maike Klein and Daniel Krupka and Cornelia Winter and Volker Wohlgemuth}, title = {{NFDI4DS} Infrastructure and Services}, booktitle = {53. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, {INFORMATIK} 2023, Designing Future - Zuk{\"{u}}nfte gestalten, Berlin, Germany September 26-29, 2023}, series = {{LNI}}, volume = {{P-337}}, pages = {919--924}, publisher = {Gesellschaft f{\"{u}}r Informatik, Bonn}, year = {2023}, url = {https://doi.org/10.18420/inf2023\_103}, doi = {10.18420/INF2023\_103}, timestamp = {Fri, 08 Mar 2024 15:16:29 +0100}, biburl = {https://dblp.org/rec/conf/gi/SchimmlerWBDKMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/FasihAMUHA23, author = {Syed M. Fasih and Asad Ali and Talha Mabood and Atif Ullah and Muhammad Hanif and Waqar Ahmad}, editor = {Osvaldo Gervasi and Beniamino Murgante and Ana Maria A. C. Rocha and Chiara Garau and Francesco Scorza and Yeliz Karaca and Carmelo M. Torre}, title = {Fruit Fly Detection and Classification in IoT Setup}, booktitle = {Computational Science and Its Applications - {ICCSA} 2023 Workshops - Athens, Greece, July 3-6, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14108}, pages = {593--607}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37117-2\_40}, doi = {10.1007/978-3-031-37117-2\_40}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/FasihAMUHA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metacom/QayyumIJRKAKK23, author = {Faiza Qayyum and Naeem Iqbal and Harun Jamil and Atif Rizwan and Anam Nawaz Khan and Rashid Ahmad and Salabat Khan and Do Hyeun Kim}, title = {Energy Trading Framework Based on IoT and Digital Twin for Nanogrid Environment}, booktitle = {{IEEE} International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023}, pages = {749--755}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MetaCom57706.2023.00142}, doi = {10.1109/METACOM57706.2023.00142}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/metacom/QayyumIJRKAKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/SheerazINFKSA23, author = {Muhammad Sheeraz and Atif Innayat and Muhammad Usman Nadeem and Carson Failor and Nadeem Ahmad Khan and Wala Saadeh and Muhammad Awais Bin Altaf}, title = {Flexible {EEG} Headband with Artifact Reduction and Continuous Electrode Skin Impedance Monitoring for Neurological Disorders}, booktitle = {66th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2023, Tempe, AZ, USA, August 6-9, 2023}, pages = {288--292}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MWSCAS57524.2023.10405981}, doi = {10.1109/MWSCAS57524.2023.10405981}, timestamp = {Sat, 24 Feb 2024 20:42:53 +0100}, biburl = {https://dblp.org/rec/conf/mwscas/SheerazINFKSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09516, author = {Atif Shah and Maged S. Al{-}Shaibani and Moataz Ahmad and Reem Bunyan}, title = {A Bibliography of Multiple Sclerosis Lesions Detection Methods using Brain MRIs}, journal = {CoRR}, volume = {abs/2302.09516}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09516}, doi = {10.48550/ARXIV.2302.09516}, eprinttype = {arXiv}, eprint = {2302.09516}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09516.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10689, author = {Carlos Andres Agudelo Serna and Rachelle Bosua and Atif Ahmad and Sean B. Maynard}, title = {Towards a knowledge leakage Mitigation framework for mobile Devices in knowledge-intensive Organizations}, journal = {CoRR}, volume = {abs/2308.10689}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10689}, doi = {10.48550/ARXIV.2308.10689}, eprinttype = {arXiv}, eprint = {2308.10689}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-10920, author = {Carlos Andres Agudelo Serna and Rachelle Bosua and Sean B. Maynard and Atif Ahmad}, title = {Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations}, journal = {CoRR}, volume = {abs/2308.10920}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.10920}, doi = {10.48550/ARXIV.2308.10920}, eprinttype = {arXiv}, eprint = {2308.10920}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-10920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanIRMAK22, author = {Anam Nawaz Khan and Naeem Iqbal and Atif Rizwan and Sehrish Malik and Rashid Ahmad and DoHyeun Kim}, title = {A Criticality-Aware Dynamic Task Scheduling Mechanism for Efficient Resource Load Balancing in Constrained Smart Manufacturing Environment}, journal = {{IEEE} Access}, volume = {10}, pages = {50933--50946}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3173157}, doi = {10.1109/ACCESS.2022.3173157}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhanIRMAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candc/AtifaKIAA22, author = {Asghar Atifa and Muhammad Altaf Khan and Kulpash Iskakova and Fuad S. Al{-}Duais and Irshad Ahmad}, title = {Mathematical modeling and analysis of the SARS-Cov-2 disease with reinfection}, journal = {Comput. Biol. Chem.}, volume = {98}, pages = {107678}, year = {2022}, url = {https://doi.org/10.1016/j.compbiolchem.2022.107678}, doi = {10.1016/J.COMPBIOLCHEM.2022.107678}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candc/AtifaKIAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/Al-KhasawnehUSK22, author = {Mahmoud Ahmad Al{-}Khasawneh and Irfan Uddin and Syed Atif Ali Shah and Ahmad M. Khasawneh and Laith Mohammad Abualigah and Marwan Mahmoud}, title = {An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications}, journal = {Clust. Comput.}, volume = {25}, number = {2}, pages = {999--1013}, year = {2022}, url = {https://doi.org/10.1007/s10586-021-03466-2}, doi = {10.1007/S10586-021-03466-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/Al-KhasawnehUSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/AsgharLARNAAAA22, author = {Muhammad Zubair Asghar and Adidah Lajis and Muhammad Mansoor Alam and Mohd. Khairil Rahmat and Haidawati Md Nasir and Hussain Ahmad and Mabrook S. Al{-}Rakhami and Atif Alamri and Fahad R. Albogamy}, title = {A Deep Neural Network Model for the Detection and Classification of Emotions from Textual Content}, journal = {Complex.}, volume = {2022}, pages = {8221121:1--8221121:12}, year = {2022}, url = {https://doi.org/10.1155/2022/8221121}, doi = {10.1155/2022/8221121}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/AsgharLARNAAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadMB22, author = {Atif Ahmad and Sean B. Maynard and Richard L. Baskerville}, title = {Editorial}, journal = {Comput. Secur.}, volume = {112}, pages = {102530}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102530}, doi = {10.1016/J.COSE.2021.102530}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AhmadMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HamidNHRNA22, author = {Nor Hasnul Azirah Abdul Hamid and Normalina Ibrahim @ Mat Nor and Fazlin Marini Hussain and Rajeswari Raju and Humza Naseer and Atif Ahmad}, title = {Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations}, journal = {Comput. Secur.}, volume = {122}, pages = {102893}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102893}, doi = {10.1016/J.COSE.2022.102893}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HamidNHRNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AbugabahMAS22, author = {Ahed Abugabah and Atif Mehmood and Ahmad Ali AlZubi and Louis Sanzogni}, title = {Smart {COVID-3D-SCNN:} {A} Novel Method to Classify X-ray Images of {COVID-19}}, journal = {Comput. Syst. Sci. Eng.}, volume = {41}, number = {3}, pages = {997--1008}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.021438}, doi = {10.32604/CSSE.2022.021438}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/AbugabahMAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/AbugabahMAS22, author = {Ahed Abugabah and Atif Mehmood and Sultan Almotairi and Ahmad Al Smadi}, title = {Health care intelligent system: {A} neural network based method for early diagnosis of Alzheimer's disease using {MRI} images}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {39}, number = {9}, year = {2022}, url = {https://doi.org/10.1111/exsy.13003}, doi = {10.1111/EXSY.13003}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/es/AbugabahMAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jis/UddinSAAA22, author = {Muhammad Irfan Uddin and Syed Atif Ali Shah and Mahmoud Ahmad Al{-}Khasawneh and Ala Abdulsalam Alarood and Eesa Alsolami}, title = {Optimal policy learning for {COVID-19} prevention using reinforcement learning}, journal = {J. Inf. Sci.}, volume = {48}, number = {3}, pages = {336--348}, year = {2022}, url = {https://doi.org/10.1177/0165551520959798}, doi = {10.1177/0165551520959798}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jis/UddinSAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/BakhtiarKRKAI22, author = {Sadia Bakhtiar and Farid Ullah Khan and Wahad Ur Rahman and Atif Sardar Khan and Muhammad Masood Ahmad and Muhammad Iqbal}, title = {A Pressure-Based Electromagnetic Energy Harvester for Pipeline Monitoring Applications}, journal = {J. Sensors}, volume = {2022}, pages = {1--16}, year = {2022}, url = {https://doi.org/10.1155/2022/6529623}, doi = {10.1155/2022/6529623}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/BakhtiarKRKAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/UllahSAAUKAA22, author = {Faizan Ullah and Abdu Salam and Muhammad Abrar and Masood Ahmad and Fasee Ullah and Atif Khan and Abdullah Alharbi and Wael Alosaimi}, title = {Machine health surveillance system by using deep learning sparse autoencoder}, journal = {Soft Comput.}, volume = {26}, number = {16}, pages = {7737--7750}, year = {2022}, url = {https://doi.org/10.1007/s00500-022-06755-z}, doi = {10.1007/S00500-022-06755-Z}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/UllahSAAUKAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZeeshanSAES22, author = {Ahmad Zeeshan and Nasir Shehzad and Muhammad Atif and Rahmat Ellahi and Sadiq M. Sait}, title = {Electromagnetic Flow of {SWCNT/MWCNT} Suspensions in Two Immiscible Water- and Engine-Oil-Based Newtonian Fluids through Porous Media}, journal = {Symmetry}, volume = {14}, number = {2}, pages = {406}, year = {2022}, url = {https://doi.org/10.3390/sym14020406}, doi = {10.3390/SYM14020406}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ZeeshanSAES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/MoqurrabAKAAJ22, author = {Syed Atif Moqurrab and Adeel Anjum and Abid Khan and Mansoor Ahmed and Awais Ahmad and Gwanggil Jeon}, title = {\emph{Deep-Confidentiality}: An IoT-Enabled Privacy-Preserving Framework for Unstructured Big Biomedical Data}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {42:1--42:21}, year = {2022}, url = {https://doi.org/10.1145/3421509}, doi = {10.1145/3421509}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/MoqurrabAKAAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/ONeillMAF22, author = {Ashley O'Neill and Sean B. Maynard and Atif Ahmad and Justin Filippou}, title = {Cybersecurity Incident Response in Organisations: {A} Meta-level Framework for Scenario-based Training}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2022, Melbourne, Australia, December 4-7, 2022}, pages = {35}, year = {2022}, url = {https://aisel.aisnet.org/acis2022/35}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/ONeillMAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccr/AliJFAAAA22, author = {Atif Ali and Yasir Khan Jadoon and Zulqarnain Farid and Munir Ahmad and Naseem Abidi and Haitham M. Alzoubi and Ali A. Alzoubi}, title = {The Threat of Deep Fake Technology to Trusted Identity Management}, booktitle = {2022 International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, October 6-7, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCR56254.2022.9995978}, doi = {10.1109/ICCR56254.2022.9995978}, timestamp = {Fri, 31 May 2024 12:01:49 +0200}, biburl = {https://dblp.org/rec/conf/iccr/AliJFAAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/AndersonAC22, author = {Ashley Baines Anderson and Atif Ahmad and Shanton Chang}, editor = {Niels Bj{\o}rn{-}Andersen and Roman Beck and Stacie Petter and Tina Blegind Jensen and Tilo B{\"{o}}hmann and Kai{-}Lung Hui and Viswanath Venkatesh}, title = {Competencies of Cybersecurity Leaders: {A} Review and Research Agenda}, booktitle = {Proceedings of the 43rd International Conference on Information Systems, {ICIS} 2022, Digitization for the Next Generation, Copenhagen, Denmark, December 9-14, 2022}, publisher = {Association for Information Systems}, year = {2022}, url = {https://aisel.aisnet.org/icis2022/security/security/9}, timestamp = {Tue, 14 Feb 2023 13:27:48 +0100}, biburl = {https://dblp.org/rec/conf/icis/AndersonAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/SiddiquiAMKNJ22, author = {Mohammad Atif Siddiqui and Mohammad Nishat Anwar and Ahmad Faiz Minai and Akhlaque Ahmad Khan and Mohammad Naseem and Abdul Jabbar}, title = {A Direct Synthesis based Sliding Mode Control of a Nonlinear Continuous Stirred Tank Reactor}, booktitle = {{IECON} 2022 - 48th Annual Conference of the {IEEE} Industrial Electronics Society, Brussels, Belgium, October 17-20, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IECON49645.2022.9969082}, doi = {10.1109/IECON49645.2022.9969082}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/SiddiquiAMKNJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-02454, author = {Arslan Ahmad and Atif Bin Mansoor and Alcardo Alex Barakabitze and Andrew Hines and Luigi Atzori and Ray Walshe}, title = {Supervised Learning based QoE Prediction of Video Streaming in Future Networks: {A} Tutorial with Comparative Study}, journal = {CoRR}, volume = {abs/2202.02454}, year = {2022}, url = {https://arxiv.org/abs/2202.02454}, eprinttype = {arXiv}, eprint = {2202.02454}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-02454.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12875, author = {Antra Arshad and Atif Ahmad and Sean B. Maynard}, title = {Factors Influencing the Organizational Decision to Outsource {IT} Security: {A} Review and Research Agenda}, journal = {CoRR}, volume = {abs/2208.12875}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12875}, doi = {10.48550/ARXIV.2208.12875}, eprinttype = {arXiv}, eprint = {2208.12875}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12875.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-13087, author = {Sean B. Maynard and Atif Ahmad}, title = {Information Security Management in High Quality {IS} Journals: {A} Review and Research Agenda}, journal = {CoRR}, volume = {abs/2208.13087}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.13087}, doi = {10.48550/ARXIV.2208.13087}, eprinttype = {arXiv}, eprint = {2208.13087}, timestamp = {Thu, 01 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-13087.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmadIARA21, author = {Salman Ahmad and Atif Iqbal and Mohammad Ali and Khaliqur Rahman and Abdellahi Sidi Ahmed}, title = {A Fast Convergent Homotopy Perturbation Method for Solving Selective Harmonics Elimination {PWM} Problem in Multi Level Inverter}, journal = {{IEEE} Access}, volume = {9}, pages = {113040--113051}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3104184}, doi = {10.1109/ACCESS.2021.3104184}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AhmadIARA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IqbalKRAKKK21, author = {Naeem Iqbal and Anam Nawaz Khan and Atif Rizwan and Rashid Ahmad and Bong Wan Kim and Kwangsoo Kim and Do{-}Hyeun Kim}, title = {Groundwater Level Prediction Model Using Correlation and Difference Mechanisms Based on Boreholes Data for Sustainable Hydraulic Resource Management}, journal = {{IEEE} Access}, volume = {9}, pages = {96092--96113}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3094735}, doi = {10.1109/ACCESS.2021.3094735}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IqbalKRAKKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IqbalRKAKKK21, author = {Naeem Iqbal and Atif Rizwan and Anam Nawaz Khan and Rashid Ahmad and Bong Wan Kim and Kwangsoo Kim and Do Hyeun Kim}, title = {Boreholes Data Analysis Architecture Based on Clustering and Prediction Models for Enhancing Underground Safety Verification}, journal = {{IEEE} Access}, volume = {9}, pages = {78428--78451}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3083175}, doi = {10.1109/ACCESS.2021.3083175}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IqbalRKAKKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RizwanIKAK21, author = {Atif Rizwan and Naeem Iqbal and Anam Nawaz Khan and Rashid Ahmad and Do Hyeun Kim}, title = {Toward Effective Pattern Recognition Based on Enhanced Weighted K-Mean Clustering Algorithm for Groundwater Resource Planning in Point Cloud}, journal = {{IEEE} Access}, volume = {9}, pages = {130154--130169}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3111112}, doi = {10.1109/ACCESS.2021.3111112}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RizwanIKAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RizwanKIAK21, author = {Atif Rizwan and Anam Nawaz Khan and Naeem Iqbal and Rashid Ahmad and DoHyeun Kim}, title = {Enhanced Optimization-Based Voting Classifier and Chained Multi-Objective Regressor for Effective Groundwater Resource Management}, journal = {{IEEE} Access}, volume = {9}, pages = {168329--168341}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3133889}, doi = {10.1109/ACCESS.2021.3133889}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RizwanKIAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZahidTAAHMF21, author = {Amjad Hussain Zahid and Lo'ai Tawalbeh and Musheer Ahmad and Ahmed Alkhayyat and Malik Tahir Hassan and Atif Manzoor and Alaa Kadhim Farhan}, title = {Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications}, journal = {{IEEE} Access}, volume = {9}, pages = {98460--98475}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3095618}, doi = {10.1109/ACCESS.2021.3095618}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZahidTAAHMF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/MinhasKARKAK21, author = {Sidra Minhas and Aasia Khanum and Atif Alvi and Farhan Riaz and Shoab Ahmad Khan and Fawaz Alsolami and Muazzam Ali Khan}, title = {Early MCI-to-AD Conversion Prediction Using Future Value Forecasting of Multimodal Features}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {6628036:1--6628036:12}, year = {2021}, url = {https://doi.org/10.1155/2021/6628036}, doi = {10.1155/2021/6628036}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cin/MinhasKARKAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AhmadMBHAW21, author = {Arslan Ahmad and Atif Bin Mansoor and Alcardo Alex Barakabitze and Andrew Hines and Luigi Atzori and Ray Walshe}, title = {Supervised-learning-Based QoE Prediction of Video Streaming in Future Networks: {A} Tutorial with Comparative Study}, journal = {{IEEE} Commun. Mag.}, volume = {59}, number = {11}, pages = {88--94}, year = {2021}, url = {https://doi.org/10.1109/MCOM.001.2100109}, doi = {10.1109/MCOM.001.2100109}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AhmadMBHAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/MastKUSKAM21, author = {Noor Mast and Muhammad Altaf Khan and Muhammad Irfan Uddin and Syed Atif Ali Shah and Atif Khan and Mahmoud Ahmad Al{-}Khasawneh and Marwan Mahmoud}, title = {Channel Contention-Based Routing Protocol for Wireless Ad Hoc Networks}, journal = {Complex.}, volume = {2021}, pages = {2051796:1--2051796:10}, year = {2021}, url = {https://doi.org/10.1155/2021/2051796}, doi = {10.1155/2021/2051796}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/MastKUSKAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadMDKWB21, author = {Atif Ahmad and Sean B. Maynard and Kevin C. Desouza and James Kotsias and Monica T. Whitty and Richard L. Baskerville}, title = {How can organizations develop situation awareness for incident response: {A} case study of management practice}, journal = {Comput. Secur.}, volume = {101}, pages = {102122}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102122}, doi = {10.1016/J.COSE.2020.102122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadMDKWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlshaikhMA21, author = {Moneer Alshaikh and Sean B. Maynard and Atif Ahmad}, title = {Applying social marketing to evaluate current security education training and awareness programs in organisations}, journal = {Comput. Secur.}, volume = {100}, pages = {102090}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102090}, doi = {10.1016/J.COSE.2020.102090}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlshaikhMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/SmadiYZMWA21, author = {Ahmad Al Smadi and Shuyuan Yang and Kai Zhang and Atif Mehmood and Min Wang and Ala Alsanabani}, title = {Pansharpening based on convolutional autoencoder and multi-scale guided filter}, journal = {{EURASIP} J. Image Video Process.}, volume = {2021}, number = {1}, pages = {25}, year = {2021}, url = {https://doi.org/10.1186/s13640-021-00565-3}, doi = {10.1186/S13640-021-00565-3}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejivp/SmadiYZMWA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/SmadiYMA0B21, author = {Ahmad Al Smadi and Shuyuan Yang and Atif Mehmood and Ahed Abugabah and Min Wang and Muzaffar Bashir}, title = {Smart pansharpening approach using kernel-based image filtering}, journal = {{IET} Image Process.}, volume = {15}, number = {11}, pages = {2629--2642}, year = {2021}, url = {https://doi.org/10.1049/ipr2.12251}, doi = {10.1049/IPR2.12251}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/SmadiYMA0B21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/AhmadSSLI21, author = {Javed Ahmad and Marif Daula Siddique and Adil Sarwar and Chang{-}Hua Lin and Atif Iqbal}, title = {A high gain noninverting {DC-DC} converter with low voltage stress for industrial applications}, journal = {Int. J. Circuit Theory Appl.}, volume = {49}, number = {12}, pages = {4212--4230}, year = {2021}, url = {https://doi.org/10.1002/cta.3129}, doi = {10.1002/CTA.3129}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcta/AhmadSSLI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/NaseerNAMS21, author = {Ayesha Naseer and Humza Naseer and Atif Ahmad and Sean B. Maynard and Adil Masood Siddiqui}, title = {Real-time analytics, incident response process agility and enterprise cybersecurity performance: {A} contingent resource-based analysis}, journal = {Int. J. Inf. Manag.}, volume = {59}, pages = {102334}, year = {2021}, url = {https://doi.org/10.1016/j.ijinfomgt.2021.102334}, doi = {10.1016/J.IJINFOMGT.2021.102334}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijinfoman/NaseerNAMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/ThompsonAM21, author = {Nik Thompson and Atif Ahmad and Sean B. Maynard}, title = {Do privacy concerns determine online information disclosure? The case of internet addiction}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {3}, pages = {558--569}, year = {2021}, url = {https://doi.org/10.1108/ICS-11-2020-0190}, doi = {10.1108/ICS-11-2020-0190}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/ThompsonAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/midm/NicholsAAAAAAAA21, author = {Emma Nichols and Foad Abd{-}Allah and Amir Abdoli and Ahmed Abualhasan and Eman Abu{-}Gharbieh and Ashkan Afshin and Rufus Akinyemi and Fahad Mashhour Alanezi and Vahid Alipour and Amir Almasi{-}Hashiani and Jalal Arabloo and Amir Ashraf{-}Ganjouei and Getinet Ayano and Jos{\'{e}} Luis Ayuso{-}Mateos and Atif Amin Baig and Maciej Banach and Miguel A. Barboza and Suzanne Lyn Barker{-}Collo and Bernhard T. Baune and Akshaya Srikanth Bhagavathula and Krittika Bhattacharyya and Ali Bijani and Atanu Biswas and Archith Boloor and Carol Brayne and Hermann Brenner and Katrin Burkart and Sharath Burugina Nagaraja and Felix Carvalho and Luis F. S. Castro{-}de{-}Araujo and Ferr{\'{a}}n Catal{\'{a}}{-}L{\'{o}}pez and Ester Cerin and Nicolas Cherbuin and Dinh{-}Toi Chu and Xiaochen Dai and Antonio Reis de S{\'{a}}{-}Junior and Shirin Djalalinia and Abdel Douiri and David Edvardsson and Shaimaa I. El{-}Jaafary and Sharareh Eskandarieh and Andre Faro and Farshad Farzadfar and Valery Feigin and Seyed{-}Mohammad Fereshtehnejad and Eduarda Fernandes and Pietro Ferrara and Irina Filip and Florian Fischer and Shilpa Gaidhane and Lucia Galluzzo and Gebreamlak Gebremedhn Gebremeskel and Ahmad Ghashghaee and Alessandro Gialluisi and Elena V. Gnedovskaya and Mahaveer Golechha and Rajeev Gupta and Vladimir Hachinski and Mohammad R. Haider and Teklehaimanot Gereziher Haile and Mohammad Hamiduzzaman and Graeme J. Hankey and Simon I. Hay and Golnaz Heidari and Reza Heidari{-}Soureshjani and Hung Chak Ho and Mowafa S. Househ and Bing{-}Fang Hwang and Licia Iacoviello and Olayinka Stephen Ilesanmi and Irena M. Ilic and Milena D. Ilic and Seyed Sina Naghibi Irvani and Masao Iwagami and Ihoghosa Osamuyi Iyamu and Ravi Prakash Jha and Rizwan Kalani and Andr{\'{e}} Karch and Ayele Semachew Kasa and Yousef S. Khader and Ejaz Ahmad Khan and Mahalaqua Nazli Khatib and Yun Jin Kim and Sezer Kisa and Adnan Kisa and Mika Kivim{\"{a}}ki and Ai Koyanagi and Manasi Kumar and Iv{\'{a}}n Landires and Savita Lasrado and Bingyu Li and Stephen S. Lim and Xuefeng Liu and Shilpashree Madhava Kunjathur and Azeem Majeed and Preeti Malik and Man Mohan Mehndiratta and Ritesh G. Menezes and Yousef Mohammad and Salahuddin Mohammed and Ali H. Mokdad and Mohammad Ali Moni and Gabriele Nagel and Muhammad Naveed and Vinod C. Nayak and Cuong Tat Nguyen and Thi Lan Huong Nguyen and Virginia Nunez{-}Samudio and Andrew T. Olagunju and Samuel M. Ostroff and Nikita Otstavnov and Mayowa Owolabi and Fatemeh Pashazadeh Kan and Urvish K. Patel and Michael R. Phillips and Michael A. Piradov and Constance Dimity Pond and Faheem Hyder Pottoo and Sergio I. Prada and Amir Radfar and Fakher Rahim and Juwel Rana and Vahid Rashedi and Salman Rawaf and David Laith Rawaf and Nickolas Reinig and Andre M. N. Renzaho and Nima Rezaei and Aziz Rezapour and Michele Romoli and Gholamreza Roshandel and Perminder S. Sachdev and Amirhossein Sahebkar and Mohammad Ali Sahraian and Mehrnoosh Samaei and Mete Saylan and Feng Sha and Masood Ali Shaikh and Kenji Shibuya and Mika Shigematsu and Jae Il Shin and Rahman Shiri and Diego Augusto Santos Silva and Jasvinder A. Singh and Deepika Singhal and Valentin Yurievich Skryabin and Anna Aleksandrovna Skryabina and Amin Soheili and Houman Sotoudeh and Emma Elizabeth Spurlock and Cassandra E. I. Szoeke and Rafael Tabar{\'{e}}s{-}Seisdedos and Biruk Wogayehu Taddele and Marcos Roberto Tovani{-}Palone and Gebiyaw Wudie Tsegaye and Marco Vacante and Narayanaswamy Venketasubramanian and Simone Vidale and Vasily Vlassov and Giang Thu Vu and Yuan{-}Pang Wang and Jordan Weiss and Abrha Hailay Weldemariam and Ronny Westerman and Anders Wimo and Andrea Sylvia Winkler and Chenkai Wu and Ali Yadollahpour and Metin Yesiltepe and Naohiro Yonemoto and Chuanhua Yu and Mikhail Sergeevich Zastrozhin and Anasthasia Zastrozhina and Zhi{-}Jiang Zhang and Christopher J. L. Murray and Theo Vos}, title = {Use of multidimensional item response theory methods for dementia prevalence prediction: an example using the Health and Retirement Survey and the Aging, Demographics, and Memory Study}, journal = {{BMC} Medical Informatics Decis. Mak.}, volume = {21}, number = {1}, pages = {241}, year = {2021}, url = {https://doi.org/10.1186/s12911-021-01590-y}, doi = {10.1186/S12911-021-01590-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/midm/NicholsAAAAAAAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/AhmadMMA21, author = {Atif Ahmad and Sean B. Maynard and Sameen Motahhir and Ashley Baines Anderson}, title = {Case-based learning in the management practice of information security: an innovative pedagogical instrument}, journal = {Pers. Ubiquitous Comput.}, volume = {25}, number = {5}, pages = {853--877}, year = {2021}, url = {https://doi.org/10.1007/s00779-021-01561-0}, doi = {10.1007/S00779-021-01561-0}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/puc/AhmadMMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/AtifAA0R21, author = {Muhammad Atif and Rizwan Ahmad and Waqas Ahmed and Liang Zhao and Joel J. P. C. Rodrigues}, title = {UAV-Assisted Wireless Localization for Search and Rescue}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {3}, pages = {3261--3272}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.3041573}, doi = {10.1109/JSYST.2020.3041573}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/AtifAA0R21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/KhanGUSAFZ21, author = {Atif Khan and Muhammad Adnan Gul and Muhammad Irfan Uddin and Syed Atif Ali Shah and Shafiq Ahmad and Muhammad Dzulqarnain Al Firdausi and Mazen Zaindin}, title = {Corrigendum to "Summarizing Online Movie Reviews: {A} Machine Learning Approach to Big Data Analytics"}, journal = {Sci. Program.}, volume = {2021}, pages = {7871490:1--7871490:1}, year = {2021}, url = {https://doi.org/10.1155/2021/7871490}, doi = {10.1155/2021/7871490}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sp/KhanGUSAFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/RahimHKAJSHLM21, author = {Muddasir Rahim and Riaz Hussain and Irfan Latif Khan and Ahmad Naseem Alvi and Muhammad Awais Javed and Atif Shakeel and Qadeer Ul Hasan and Byung Moo Lee and Shahzad Ali Malik}, title = {Self-Organized Efficient Spectrum Management through Parallel Sensing in Cognitive Radio Network}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {5552012:1--5552012:22}, year = {2021}, url = {https://doi.org/10.1155/2021/5552012}, doi = {10.1155/2021/5552012}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/RahimHKAJSHLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/LakshmiNMA21, author = {Ritu Lakshmi and Humza Naseer and Sean B. Maynard and Atif Ahmad}, editor = {Frantz Rowe and Redouane El Amrani and Moez Limayem and Sabine Matook and Christoph Rosenkranz and Edgar A. Whitley and Ali El Quammah}, title = {Sensemaking in Cybersecurity Incident Response: The interplay of Organizations, Technology, and Individuals}, booktitle = {29th European Conference on Information Systems - Human Values Crisis in a Digitizing World, {ECIS} 2021, Marrakech, Morocco, 2020}, year = {2021}, url = {https://aisel.aisnet.org/ecis2021\_rip/29}, timestamp = {Fri, 29 Jul 2022 11:33:36 +0200}, biburl = {https://dblp.org/rec/conf/ecis/LakshmiNMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/SmadiAMY21, author = {Ahmad Al Smadi and Ahed Abugabah and Atif Mehmood and Shuyuan Yang}, editor = {Nuno Varandas and Ansar{-}Ul{-}Haque Yasar and Haroon Malik and St{\'{e}}phane Galland}, title = {Brain Image Fusion Approach based on Side Window Filtering}, booktitle = {The 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN} 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), Leuven, Belgium, November 1-4, 2021}, series = {Procedia Computer Science}, volume = {198}, pages = {295--300}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.12.243}, doi = {10.1016/J.PROCS.2021.12.243}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euspn/SmadiAMY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ico/MehmoodASA21, author = {Atif Mehmood and Ahed Abugabah and Ahmad Al Smadi and Reyad Alkhawaldeh}, title = {An Intelligent Information System and Application for the Diagnosis and Analysis of {COVID-19}}, booktitle = {{ICO}}, pages = {391--396}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93247-3\_38}, doi = {10.1007/978-3-030-93247-3\_38}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ico/MehmoodASA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/RahmanGKTKI21, author = {Syed Rahman and Jonathan Ghering and Irfan Ahmad Khan and Mohd Tariq and Akhtar Kalam and Atif Iqbal}, title = {Novel Dynamic Power Balancing Solution for Minimization Overdesigning in Military Aircraft Power System Architecture}, booktitle = {{IECON} 2021 - 47th Annual Conference of the {IEEE} Industrial Electronics Society, Toronto, ON, Canada, October 13-16, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IECON48115.2021.9589867}, doi = {10.1109/IECON48115.2021.9589867}, timestamp = {Mon, 04 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iecon/RahmanGKTKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-01223, author = {Atif Ikram and Masita Abdul Jalil and Amir Bin Ngah and Ahmad Salman Khan and Tahir Iqbal}, title = {Offshore Software Maintenance Outsourcing Predicting Clients Proposal using Supervised Learning}, journal = {CoRR}, volume = {abs/2103.01223}, year = {2021}, url = {https://arxiv.org/abs/2103.01223}, eprinttype = {arXiv}, eprint = {2103.01223}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-01223.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14838, author = {Atif Ahmad and Sean B. Maynard and Sameen Motahhir and Moneer Alshaikh}, title = {Teaching Information Security Management Using an Incident of Intellectual Property Leakage}, journal = {CoRR}, volume = {abs/2103.14838}, year = {2021}, url = {https://arxiv.org/abs/2103.14838}, eprinttype = {arXiv}, eprint = {2103.14838}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14839, author = {Atif Ahmad and Sean B. Maynard and Sameen Motahhir}, title = {Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries}, journal = {CoRR}, volume = {abs/2103.14839}, year = {2021}, url = {https://arxiv.org/abs/2103.14839}, eprinttype = {arXiv}, eprint = {2103.14839}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14839.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-15005, author = {Atif Ahmad and Jeb Webb and Kevin C. Desouza and James Boorman}, title = {Strategically-Motivated Advanced Persistent Threat: Definition, Process, Tactics and a Disinformation Model of Counterattack}, journal = {CoRR}, volume = {abs/2103.15005}, year = {2021}, url = {https://arxiv.org/abs/2103.15005}, eprinttype = {arXiv}, eprint = {2103.15005}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-15005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07138, author = {Abhineet Gupta and Sean B. Maynard and Atif Ahmad}, title = {The Dark Web Phenomenon: {A} Review and Research Agenda}, journal = {CoRR}, volume = {abs/2104.07138}, year = {2021}, url = {https://arxiv.org/abs/2104.07138}, eprinttype = {arXiv}, eprint = {2104.07138}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07138.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07140, author = {Hibah Altukruni and Sean B. Maynard and Moneer Alshaikh and Atif Ahmad}, title = {Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: Behavioural aspects and Key controls}, journal = {CoRR}, volume = {abs/2104.07140}, year = {2021}, url = {https://arxiv.org/abs/2104.07140}, eprinttype = {arXiv}, eprint = {2104.07140}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07140.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07141, author = {Mazino Onibere and Atif Ahmad and Sean B. Maynard}, title = {Dynamic Information Security Management Capability: Strategising for Organisational Performance}, journal = {CoRR}, volume = {abs/2104.07141}, year = {2021}, url = {https://arxiv.org/abs/2104.07141}, eprinttype = {arXiv}, eprint = {2104.07141}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-07144, author = {Abid Hussain Shah and Atif Ahmad and Sean B. Maynard and Humza Naseer}, title = {Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices}, journal = {CoRR}, volume = {abs/2104.07144}, year = {2021}, url = {https://arxiv.org/abs/2104.07144}, eprinttype = {arXiv}, eprint = {2104.07144}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-07144.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-09627, author = {Syed Rameez Naqvi and Adnan Ahmad and S. M. Riazul Islam and Tallha Akram and Mohammad Abdullah{-}Al{-}Wadud and Atif Alamri}, title = {Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling}, journal = {CoRR}, volume = {abs/2106.09627}, year = {2021}, url = {https://arxiv.org/abs/2106.09627}, eprinttype = {arXiv}, eprint = {2106.09627}, timestamp = {Tue, 29 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-09627.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-02941, author = {Ritu Lakshmi and Humza Naseer and Sean B. Maynard and Atif Ahmad}, title = {Sensemaking in Cybersecurity Incident Response: The Interplay of Organizations, Technology and Individuals}, journal = {CoRR}, volume = {abs/2107.02941}, year = {2021}, url = {https://arxiv.org/abs/2107.02941}, eprinttype = {arXiv}, eprint = {2107.02941}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-02941.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-04996, author = {Ashley O'Neill and Atif Ahmad and Sean B. Maynard}, title = {Cybersecurity Incident Response in Organisations: {A} Meta-level Framework for Scenario-based Training}, journal = {CoRR}, volume = {abs/2108.04996}, year = {2021}, url = {https://arxiv.org/abs/2108.04996}, eprinttype = {arXiv}, eprint = {2108.04996}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-04996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-08460, author = {Tianda Li and Yassir El Mesbahi and Ivan Kobyzev and Ahmad Rashid and Atif Mahmud and Nithin Anchuri and Habib Hajimolahoseini and Yang Liu and Mehdi Rezagholizadeh}, title = {A Short Study on Compressing Decoder-Based Language Models}, journal = {CoRR}, volume = {abs/2110.08460}, year = {2021}, url = {https://arxiv.org/abs/2110.08460}, eprinttype = {arXiv}, eprint = {2110.08460}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-08460.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FelembanRBANMHQ20, author = {Emad A. Felemban and Faizan Ur Rehman and Sardar Asad Ali Biabani and Akhlaq Ahmad and Atif Naseer and Abdur Rahman Muhammad Abdul Majid and Omar K. Hussain and Ahmad Muaz Qamar and Rowid Falemban and Fakhri Zanjir}, title = {Digital Revolution for Hajj Crowd Management: {A} Technology Survey}, journal = {{IEEE} Access}, volume = {8}, pages = {208583--208609}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3037396}, doi = {10.1109/ACCESS.2020.3037396}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FelembanRBANMHQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaseriNEAM20, author = {Aimi Nadrah Maseri and Azah Anir Norman and Christopher Ifeanyi Eke and Atif Ahmad and Nurul Nuha Abdul Molok}, title = {Socio-Technical Mitigation Effort to Combat Cyber Propaganda: {A} Systematic Literature Mapping}, journal = {{IEEE} Access}, volume = {8}, pages = {92929--92944}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2994658}, doi = {10.1109/ACCESS.2020.2994658}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaseriNEAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccftpci/FayedAAHA20, author = {Mahmoud S. Fayed and Muhammad Al{-}Qurishi and Atif Alamri and M. Anwar Hossain and Ahmad A. Al{-}Daraiseh}, title = {{PWCT:} a novel general-purpose visual programming language in support of pervasive application development}, journal = {{CCF} Trans. Pervasive Comput. Interact.}, volume = {2}, number = {3}, pages = {164--177}, year = {2020}, url = {https://doi.org/10.1007/s42486-020-00038-y}, doi = {10.1007/S42486-020-00038-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccftpci/FayedAAHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/AhmadHUKAUAA20, author = {Masood Ahmad and Abdul Hameed and Fasee Ullah and Atif Khan and Hashem Alyami and Muhammad Irfan Uddin and Abdullah Alharbi and Furqan Aziz}, title = {Cluster Optimization in Mobile Ad Hoc Networks Based on Memetic Algorithm: memeHoc}, journal = {Complex.}, volume = {2020}, pages = {2528189:1--2528189:12}, year = {2020}, url = {https://doi.org/10.1155/2020/2528189}, doi = {10.1155/2020/2528189}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/AhmadHUKAUAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/AhmadUKSKZAM20, author = {Yasir Ahmad and Mohib Ullah and Rafiullah Khan and Bushra Shafi and Atif Khan and Mahdi Zareei and Abdallah Aldosary and Ehab Mahmoud Mohamed}, title = {SiFSO: Fish Swarm Optimization-Based Technique for Efficient Community Detection in Complex Networks}, journal = {Complex.}, volume = {2020}, pages = {6695032:1--6695032:9}, year = {2020}, url = {https://doi.org/10.1155/2020/6695032}, doi = {10.1155/2020/6695032}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/AhmadUKSKZAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/ShahUAAAS20, author = {Syed Atif Ali Shah and Muhammad Irfan Uddin and Furqan Aziz and Shafiq Ahmad and Mahmoud Ahmad Al{-}Khasawneh and Mohamed Sharaf}, title = {An Enhanced Deep Neural Network for Predicting Workplace Absenteeism}, journal = {Complex.}, volume = {2020}, pages = {5843932:1--5843932:12}, year = {2020}, url = {https://doi.org/10.1155/2020/5843932}, doi = {10.1155/2020/5843932}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/ShahUAAAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/UddinZASZSAM20, author = {Muhammad Irfan Uddin and Nazir Zada and Furqan Aziz and Yousaf Saeed and Asim Zeb and Syed Atif Ali Shah and Mahmoud Ahmad Al{-}Khasawneh and Marwan Mahmoud}, title = {Prediction of Future Terrorist Activities Using Deep Neural Networks}, journal = {Complex.}, volume = {2020}, pages = {1373087:1--1373087:16}, year = {2020}, url = {https://doi.org/10.1155/2020/1373087}, doi = {10.1155/2020/1373087}, timestamp = {Mon, 11 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/UddinZASZSAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DesouzaANS20, author = {Kevin C. Desouza and Atif Ahmad and Humza Naseer and Munish Sharma}, title = {Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy {(ALERT)}}, journal = {Comput. Secur.}, volume = {88}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101606}, doi = {10.1016/J.COSE.2019.101606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DesouzaANS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jasis/AhmadDMNB20, author = {Atif Ahmad and Kevin C. Desouza and Sean B. Maynard and Humza Naseer and Richard L. Baskerville}, title = {How integration of cyber security management and incident response enables organizational learning}, journal = {J. Assoc. Inf. Sci. Technol.}, volume = {71}, number = {8}, pages = {939--953}, year = {2020}, url = {https://doi.org/10.1002/asi.24311}, doi = {10.1002/ASI.24311}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jasis/AhmadDMNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/UddinSA20, author = {Muhammad Irfan Uddin and Syed Atif Ali Shah and Mahmoud Ahmad Al{-}Khasawneh}, title = {A Novel Deep Convolutional Neural Network Model to Monitor People following Guidelines to Avoid {COVID-19}}, journal = {J. Sensors}, volume = {2020}, pages = {8856801:1--8856801:15}, year = {2020}, url = {https://doi.org/10.1155/2020/8856801}, doi = {10.1155/2020/8856801}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/UddinSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ShahzadG20, author = {Muhammad Atif Shahzad and Waqar Ahmad Gulzar}, title = {Industrie 4.0 Readiness: Green Computing in Relation with Key Performance Indicator for a Manufacturing Industry}, journal = {Mob. Networks Appl.}, volume = {25}, number = {4}, pages = {1299--1306}, year = {2020}, url = {https://doi.org/10.1007/s11036-020-01548-w}, doi = {10.1007/S11036-020-01548-W}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ShahzadG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/KhanFUMSIAM20, author = {Zahid Alam Khan and Zhengyong Feng and Muhammad Irfan Uddin and Noor Mast and Syed Atif Ali Shah and Muhammad Imtiaz and Mahmoud Ahmad Al{-}Khasawneh and Marwan Mahmoud}, title = {Optimal Policy Learning for Disease Prevention Using Reinforcement Learning}, journal = {Sci. Program.}, volume = {2020}, pages = {7627290:1--7627290:13}, year = {2020}, url = {https://doi.org/10.1155/2020/7627290}, doi = {10.1155/2020/7627290}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sp/KhanFUMSIAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/KhanGUSAFZ20, author = {Atif Khan and Muhammad Adnan Gul and Muhammad Irfan Uddin and Syed Atif Ali Shah and Shafiq Ahmad and Muhammad Dzulqarnain Al Firdausi and Mazen Zaindin}, title = {Summarizing Online Movie Reviews: {A} Machine Learning Approach to Big Data Analytics}, journal = {Sci. Program.}, volume = {2020}, pages = {5812715:1--5812715:14}, year = {2020}, url = {https://doi.org/10.1155/2020/5812715}, doi = {10.1155/2020/5812715}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sp/KhanGUSAFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/KhanIUZAFZ20, author = {Atif Khan and Ibrahim Ibrahim and Muhammad Irfan Uddin and Muhammad Zubair and Shafiq Ahmad and Muhammad Dzulqarnain Al Firdausi and Mazen Zaindin}, title = {Machine Learning Approach for Answer Detection in Discussion Forums: An Application of Big Data Analytics}, journal = {Sci. Program.}, volume = {2020}, pages = {4621196:1--4621196:10}, year = {2020}, url = {https://doi.org/10.1155/2020/4621196}, doi = {10.1155/2020/4621196}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sp/KhanIUZAFZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/AhmadMM20, author = {Atif Ahmad and Sean B. Maynard and Sameen Motahhir}, title = {Teaching Information Security Management in Postgraduate Tertiary Education: The Case of Horizon Automotive Industries}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington, New Zealand, December 1-4, 2020}, pages = {54}, year = {2020}, url = {https://aisel.aisnet.org/acis2020/54}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/AhmadMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/AhmadMMA20, author = {Atif Ahmad and Sean B. Maynard and Sameen Motahhir and Moneer Alshaikh}, title = {Teaching Information Security Management Using an Incident of Intellectual Property Leakage}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington, New Zealand, December 1-4, 2020}, pages = {36}, year = {2020}, url = {https://aisel.aisnet.org/acis2020/36}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/AhmadMMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/AhmadDMWKB20, author = {Atif Ahmad and Kevin C. Desouza and Sean B. Maynard and Monica T. Whitty and James Kotsias and Richard L. Baskerville}, editor = {Joey F. George and Souren Paul and Rahul De' and Elena Karahanna and Suprateek Sarker and Gal Oestreicher{-}Singer}, title = {Situation-Awareness in Incident Response: An In-depth Case Study and Process Model}, booktitle = {Proceedings of the 41st International Conference on Information Systems, {ICIS} 2020, Making Digital Inclusive: Blending the Locak and the Global, Hyderabad, India, December 13-16, 2020}, publisher = {Association for Information Systems}, year = {2020}, url = {https://aisel.aisnet.org/icis2020/cyber\_security\_privacy/cyber\_security\_privacy/1}, timestamp = {Tue, 06 Apr 2021 14:35:57 +0200}, biburl = {https://dblp.org/rec/conf/icis/AhmadDMWKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/WongMAN20, author = {Chee Kong Wong and Sean B. Maynard and Atif Ahmad and Humza Naseer}, editor = {Joey F. George and Souren Paul and Rahul De' and Elena Karahanna and Suprateek Sarker and Gal Oestreicher{-}Singer}, title = {Information Security Governance: {A} Process Model and Pilot Case Study}, booktitle = {Proceedings of the 41st International Conference on Information Systems, {ICIS} 2020, Making Digital Inclusive: Blending the Locak and the Global, Hyderabad, India, December 13-16, 2020}, publisher = {Association for Information Systems}, year = {2020}, url = {https://aisel.aisnet.org/icis2020/cyber\_security\_privacy/cyber\_security\_privacy/3}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icis/WongMAN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AtifLAKQBIA19, author = {Muhammad Atif and Siddique Latif and Rizwan Ahmad and Adnan Khalid Kiani and Junaid Qadir and Adeel Baig and Hisao Ishibuchi and Waseem Abbas}, title = {Soft Computing Techniques for Dependable Cyber-Physical Systems}, journal = {{IEEE} Access}, volume = {7}, pages = {72030--72049}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2920317}, doi = {10.1109/ACCESS.2019.2920317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AtifLAKQBIA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RahmanIADA19, author = {Khaliqur Rahman and Atif Iqbal and Mohammed A. Al{-}Hitmi and Obrad Dordevic and Salman Ahmad}, title = {Performance Analysis of a Three-to-Five Phase Dual Matrix Converter Based on Space Vector Pulse Width Modulation}, journal = {{IEEE} Access}, volume = {7}, pages = {12307--12318}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2892514}, doi = {10.1109/ACCESS.2019.2892514}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RahmanIADA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadWDB19, author = {Atif Ahmad and Jeb Webb and Kevin C. Desouza and James Boorman}, title = {Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack}, journal = {Comput. Secur.}, volume = {86}, pages = {402--418}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.07.001}, doi = {10.1016/J.COSE.2019.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadWDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KamalAMSAN19, author = {Miraal Kamal and Manal Atif and Hafsa Mujahid and Tamer Shanableh and Abdul{-}Rahman Al{-}Ali and Ahmad Al Nabulsi}, title = {IoT Based Smart City Bus Stops}, journal = {Future Internet}, volume = {11}, number = {11}, pages = {227}, year = {2019}, url = {https://doi.org/10.3390/fi11110227}, doi = {10.3390/FI11110227}, timestamp = {Sat, 09 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KamalAMSAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jkm/ButtA19, author = {Atif Saleem Butt and Ahmad Bayiz Ahmad}, title = {Are there any antecedents of top-down knowledge hiding in firms? Evidence from the United Arab Emirates}, journal = {J. Knowl. Manag.}, volume = {23}, number = {8}, pages = {1605--1627}, year = {2019}, url = {https://doi.org/10.1108/JKM-04-2019-0204}, doi = {10.1108/JKM-04-2019-0204}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jkm/ButtA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/AbbasAAKFK19, author = {Sagheer Abbas and Tahir Alyas and Atifa Athar and Muhammad Adnan Khan and Areej Fatima and Waseem Ahmad Khan}, title = {Cloud Services Ranking by measuring Multiple Parameters using {AFIS}}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {6}, number = {22}, pages = {e4}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.159354}, doi = {10.4108/EAI.13-7-2018.159354}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sis/AbbasAAKFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/AlhindiAAATA19, author = {Ahmad Alhindi and Abrar Alhindi and Atif Alhejali and Abdullah Alsheddy and Nasser Tairan and Hosam Alhakami}, title = {{MOEA/D-GLS:} a multiobjective memetic algorithm using decomposition and guided local search}, journal = {Soft Comput.}, volume = {23}, number = {19}, pages = {9605--9615}, year = {2019}, url = {https://doi.org/10.1007/s00500-018-3524-z}, doi = {10.1007/S00500-018-3524-Z}, timestamp = {Sat, 05 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/AlhindiAAATA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/KhanKTB19, author = {Faraz Ahmad Khan and Fouad Khelifi and Muhammad Atif Tahir and Ahmed Bouridane}, title = {Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten Text-Independent Identification Using {SIFT} and RootSIFT Descriptors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {2}, pages = {289--303}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2850011}, doi = {10.1109/TIFS.2018.2850011}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/KhanKTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/AltukruniMAA19, author = {Hibah Altukruni and Sean B. Maynard and Moneer Alshaikh and Atif Ahmad}, title = {Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations: behavioural aspects and key controls}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin University, Perth, Australia, December 9-11, 2019}, pages = {8}, year = {2019}, url = {https://aisel.aisnet.org/acis2019/8}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/AltukruniMAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/GuptaMA19, author = {Abhineet Gupta and Sean B. Maynard and Atif Ahmad}, title = {The Dark Web Phenomenon: {A} Review and Research Agenda}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin University, Perth, Australia, December 9-11, 2019}, pages = {1}, year = {2019}, url = {https://aisel.aisnet.org/acis2019/1}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/GuptaMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/OnibereAM19, author = {Mazino Onibere and Atif Ahmad and Sean B. Maynard}, title = {Dynamic Information Security Management Capability: Strategising for Organisational Performance}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin University, Perth, Australia, December 9-11, 2019}, pages = {72}, year = {2019}, url = {https://aisel.aisnet.org/acis2019/72}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/OnibereAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/ShahAMN19, author = {Abid Hussain Shah and Atif Ahmad and Sean B. Maynard and Humza Naseer}, title = {Enhancing Strategic Information Security Management in Organizations through Information Warfare Practices}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin University, Perth, Australia, December 9-11, 2019}, pages = {48}, year = {2019}, url = {https://aisel.aisnet.org/acis2019/48}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/ShahAMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/AlshaikhNAM19, author = {Moneer Alshaikh and Humza Naseer and Atif Ahmad and Sean B. Maynard}, editor = {Jan vom Brocke and Shirley Gregor and Oliver M{\"{u}}ller}, title = {Toward Sustainable behaviour Change: an Approach for Cyber Security Education Training and Awareness}, booktitle = {27th European Conference on Information Systems - Information Systems for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden, June 8-14, 2019}, year = {2019}, url = {https://aisel.aisnet.org/ecis2019\_rp/100}, timestamp = {Wed, 05 Jun 2019 13:01:12 +0200}, biburl = {https://dblp.org/rec/conf/ecis/AlshaikhNAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AhmadRRJ19, author = {Qadeer Ahmad and Atif Rafiq and Muhammad Adil Raja and Noman Javed}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Evolving {MIMO} multi-layered artificial neural networks using grammatical evolution}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {1278--1285}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297408}, doi = {10.1145/3297280.3297408}, timestamp = {Sun, 02 Jun 2019 21:18:38 +0200}, biburl = {https://dblp.org/rec/conf/sac/AhmadRRJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wts/AlbehadiliAJJOD19, author = {Abdulsahib Albehadili and Atif Ali and Farha Jahan and Ahmad Y. Javaid and Jared Oluoch and Vijay Kumar Devabhaktuni}, editor = {Steven R. Powell and Thomas Ketseoglou and J. P. Shim and Zory Marantz and Albena Mihovska and Hong Zhao and Qing{-}An Zeng}, title = {Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature {(PDLS)}}, booktitle = {2019 Wireless Telecommunications Symposium, {WTS} 2019, New York City, NY, USA, April 9-12, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WTS.2019.8715527}, doi = {10.1109/WTS.2019.8715527}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wts/AlbehadiliAJJOD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HussainHJGAA18, author = {Bilal Hussain and Qadeer Ul Hasan and Nadeem Javaid and Mohsen Guizani and Ahmad Almogren and Atif Alamri}, title = {An Innovative Heuristic Algorithm for IoT-Enabled Smart Homes for Developing Countries}, journal = {{IEEE} Access}, volume = {6}, pages = {15550--15575}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2809778}, doi = {10.1109/ACCESS.2018.2809778}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HussainHJGAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JavaidJIGAA18, author = {Sakeena Javaid and Nadeem Javaid and Sohail Iqbal and Mohsen Guizani and Ahmad S. Al{-}Mogren and Atif Alamri}, title = {Energy Management With a World-Wide Adaptive Thermostat Using Fuzzy Inference System}, journal = {{IEEE} Access}, volume = {6}, pages = {33489--33502}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2828040}, doi = {10.1109/ACCESS.2018.2828040}, timestamp = {Thu, 21 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JavaidJIGAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZafarSKIAAAA18, author = {Atique Ahmad Zafar and Shahela Saif and Muzafar Khan and Javed Iqbal and Adnan Akhunzada and Wadood Abdul and Ahmad S. Al{-}Mogren and Atif Alamri}, title = {Taxonomy of Factors Causing Integration Failure during Global Software Development}, journal = {{IEEE} Access}, volume = {6}, pages = {22228--22239}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2782843}, doi = {10.1109/ACCESS.2017.2782843}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZafarSKIAAAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/AsadUllahKAARA18, author = {Muhammad AsadUllah and Muhammad Adnan Khan and Sagheer Abbas and Atifa Athar and Syed Saqib Raza and Gulzar Ahmad}, title = {Blind Channel and Data Estimation Using Fuzzy Logic-Empowered Opposite Learning-Based Mutant Particle Swarm Optimization}, journal = {Comput. Intell. Neurosci.}, volume = {2018}, pages = {6759526:1--6759526:12}, year = {2018}, url = {https://doi.org/10.1155/2018/6759526}, doi = {10.1155/2018/6759526}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cin/AsadUllahKAARA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Al-QurishiRHAAA18, author = {Muhammad Al{-}Qurishi and Sk. Md. Mizanur Rahman and M. Shamim Hossain and Ahmad Almogren and Majed A. AlRubaian and Atif Alamri and Mabrook Al{-}Rakhami and Brij B. Gupta}, title = {An efficient key agreement protocol for Sybil-precaution in online social networks}, journal = {Future Gener. Comput. Syst.}, volume = {84}, pages = {139--148}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.07.055}, doi = {10.1016/J.FUTURE.2017.07.055}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Al-QurishiRHAAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HamidAHAAKM18, author = {Md. Abdul Hamid and Mohammad Abdullah{-}Al{-}Wadud and Mohammad Mehedi Hassan and Ahmad Almogren and Atif Alamri and Abu Raihan M. Kamal and Md. Mamun{-}Or{-}Rashid}, title = {A key distribution scheme for secure communication in acoustic sensor networks}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {1209--1217}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.07.025}, doi = {10.1016/J.FUTURE.2017.07.025}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HamidAHAAKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/MolokAC18, author = {Nurul Nuha Abdul Molok and Atif Ahmad and Shanton Chang}, title = {A case analysis of securing organisations against information leakage through online social networking}, journal = {Int. J. Inf. Manag.}, volume = {43}, pages = {351--356}, year = {2018}, url = {https://doi.org/10.1016/j.ijinfomgt.2018.08.013}, doi = {10.1016/J.IJINFOMGT.2018.08.013}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/MolokAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/KhanSFKJAAP18, author = {Atif Khan and Naomie Salim and Haleem Farman and Murad Khan and Bilal Jan and Awais Ahmad and Imran Ahmed and Anand Paul}, title = {Abstractive Text Summarization based on Improved Semantic Graph Approach}, journal = {Int. J. Parallel Program.}, volume = {46}, number = {5}, pages = {992--1016}, year = {2018}, url = {https://doi.org/10.1007/s10766-018-0560-3}, doi = {10.1007/S10766-018-0560-3}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijpp/KhanSFKJAAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HossainMAMAAA18, author = {M. Shamim Hossain and Ghulam Muhammad and Muhammad Al{-}Qurishi and Mehedi Masud and Ahmad Almogren and Wadood Abdul and Atif Alamri}, title = {Cloud-oriented emotion feedback-based Exergames framework}, journal = {Multim. Tools Appl.}, volume = {77}, number = {17}, pages = {21861--21877}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4621-1}, doi = {10.1007/S11042-017-4621-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HossainMAMAAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pajais/MaynardOA18, author = {Sean B. Maynard and Mazino Onibere and Atif Ahmad}, title = {Defining the Strategic Role of the Chief Information Security Officer}, journal = {Pac. Asia J. Assoc. Inf. Syst.}, volume = {10}, number = {3}, pages = {3}, year = {2018}, url = {https://aisel.aisnet.org/pajais/vol10/iss3/3}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pajais/MaynardOA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pajais/MaynardTAR18, author = {Sean B. Maynard and Terrence H. Tan and Atif Ahmad and Tobias Ruighaver}, title = {Towards a Framework for Strategic Security Context in Information Security Governance}, journal = {Pac. Asia J. Assoc. Inf. Syst.}, volume = {10}, number = {4}, pages = {4}, year = {2018}, url = {https://aisel.aisnet.org/pajais/vol10/iss4/4}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pajais/MaynardTAR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tele/HossainHMAA18, author = {M. Shamim Hossain and Mohamad Hoda and Ghulam Muhammad and Ahmad Almogren and Atif Alamri}, title = {Cloud-supported framework for patients in post-stroke disability rehabilitation}, journal = {Telematics Informatics}, volume = {35}, number = {4}, pages = {826--836}, year = {2018}, url = {https://doi.org/10.1016/j.tele.2017.12.001}, doi = {10.1016/J.TELE.2017.12.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tele/HossainHMAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/MinhasKRKA18, author = {Sidra Minhas and Aasia Khanum and Farhan Riaz and Shoab Ahmad Khan and Atif Alvi}, title = {Predicting Progression From Mild Cognitive Impairment to Alzheimer's Disease Using Autoregressive Modelling of Longitudinal and Multimodal Biomarkers}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {22}, number = {3}, pages = {818--825}, year = {2018}, url = {https://doi.org/10.1109/JBHI.2017.2703918}, doi = {10.1109/JBHI.2017.2703918}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/MinhasKRKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/SernaBAM18, author = {Carlos Andres Agudelo Serna and Rachelle Bosua and Atif Ahmad and Sean B. Maynard}, editor = {Peter M. Bednar and Ulrich Frank and Karlheinz Kautz}, title = {Towards a Knowledge Leakage Mitigation Framework for Mobile Devices in Knowledge-Intensive Organizations}, booktitle = {26th European Conference on Information Systems: Beyond Digitization - Facets of Socio-Technical Change, {ECIS} 2018, Portsmouth, UK, June 23-28, 2018}, pages = {72}, year = {2018}, url = {https://aisel.aisnet.org/ecis2018\_rp/72}, timestamp = {Thu, 13 Dec 2018 13:03:35 +0100}, biburl = {https://dblp.org/rec/conf/ecis/SernaBAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/AlshaikhMAC18, author = {Moneer Alshaikh and Sean B. Maynard and Atif Ahmad and Shanton Chang}, editor = {Tung Bui}, title = {An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations}, booktitle = {51st Hawaii International Conference on System Sciences, {HICSS} 2018, Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018}, pages = {1--10}, publisher = {ScholarSpace / {AIS} Electronic Library (AISeL)}, year = {2018}, url = {https://hdl.handle.net/10125/50524}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/AlshaikhMAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/NaseerAMS18, author = {Humza Naseer and Atif Ahmad and Sean B. Maynard and Graeme G. Shanks}, editor = {Jan Pries{-}Heje and Sudha Ram and Michael Rosemann}, title = {Cybersecurity Risk Management Using Analytics: {A} Dynamic Capabilities Approach}, booktitle = {Proceedings of the International Conference on Information Systems - Bridging the Internet of People, Data, and Things, {ICIS} 2018, San Francisco, CA, USA, December 13-16, 2018}, publisher = {Association for Information Systems}, year = {2018}, url = {https://aisel.aisnet.org/icis2018/governance/Presentations/4}, timestamp = {Tue, 22 Jan 2019 10:41:07 +0100}, biburl = {https://dblp.org/rec/conf/icis/NaseerAMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/KhanIS18, author = {Ahmad Khan and Atif Iqbal and Mohammad B. Shadmand}, title = {Novel {LCL} Filter for Non-Isolated Photovoltaic Inverters with {CM} Current Trapping Capability for Weak Grids}, booktitle = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics Society, Washington, DC, USA, October 21-23, 2018}, pages = {6128--6132}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IECON.2018.8591076}, doi = {10.1109/IECON.2018.8591076}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/KhanIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-10472, author = {Muhammad Atif and Siddique Latif and Rizwan Ahmad and Adnan Khalid Kiani and Junaid Qadir and Adeel Baig and Hisao Ishibuchi and Waseem Abbas}, title = {Soft Computing Techniques for Dependable Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/1801.10472}, year = {2018}, url = {http://arxiv.org/abs/1801.10472}, eprinttype = {arXiv}, eprint = {1801.10472}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-10472.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AzamJAAAA17, author = {Irfan Azam and Nadeem Javaid and Ashfaq Ahmad and Wadood Abdul and Ahmad Almogren and Atif Alamri}, title = {Balanced Load Distribution With Energy Hole Avoidance in Underwater WSNs}, journal = {{IEEE} Access}, volume = {5}, pages = {15206--15221}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2660767}, doi = {10.1109/ACCESS.2017.2660767}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AzamJAAAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HamidRHAA17, author = {Hadeal Abdulaziz Al Hamid and Sk. Md. Mizanur Rahman and M. Shamim Hossain and Ahmad Almogren and Atif Alamri}, title = {A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography}, journal = {{IEEE} Access}, volume = {5}, pages = {22313--22328}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2757844}, doi = {10.1109/ACCESS.2017.2757844}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HamidRHAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/UddinHAAAF17, author = {Md. Zia Uddin and Mohammad Mehedi Hassan and Ahmad Almogren and Atif Alamri and Majed A. AlRubaian and Giancarlo Fortino}, title = {Facial Expression Recognition Utilizing Local Direction-Based Robust Features and Deep Belief Network}, journal = {{IEEE} Access}, volume = {5}, pages = {4525--4536}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2676238}, doi = {10.1109/ACCESS.2017.2676238}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/UddinHAAAF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajis/HorneMA17, author = {Craig A. Horne and Sean B. Maynard and Atif Ahmad}, title = {Organisational Information Security Strategy: Review, Discussion and Future Research}, journal = {Australas. J. Inf. Syst.}, volume = {21}, year = {2017}, url = {https://journal.acs.org.au/index.php/ajis/article/view/1427}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ajis/HorneMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/NurSHRIAHA17, author = {Fernaz Narin Nur and Selina Sharmin and Md. Ahsan Habib and Md. Abdur Razzaque and Md. Shariful Islam and Ahmad Almogren and Mohammad Mehedi Hassan and Atif Alamri}, title = {Collaborative neighbor discovery in directional wireless sensor networks: algorithm and analysis}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2017}, pages = {119}, year = {2017}, url = {https://doi.org/10.1186/s13638-017-0903-6}, doi = {10.1186/S13638-017-0903-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/NurSHRIAHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/KhanTKBA17, author = {Faraz Ahmad Khan and Muhammad Atif Tahir and Fouad Khelifi and Ahmed Bouridane and Resheed Almotaeryi}, title = {Robust off-line text independent writer identification using bagged discrete cosine transform features}, journal = {Expert Syst. Appl.}, volume = {71}, pages = {404--415}, year = {2017}, url = {https://doi.org/10.1016/j.eswa.2016.11.012}, doi = {10.1016/J.ESWA.2016.11.012}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/KhanTKBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/AhmadZSA17, author = {Uzair Ahmad and Anam Zahid and Muhammad Shoaib and Atif Alamri}, title = {HarVis: An integrated social media content analysis framework for YouTube platform}, journal = {Inf. Syst.}, volume = {69}, pages = {25--39}, year = {2017}, url = {https://doi.org/10.1016/j.is.2016.10.004}, doi = {10.1016/J.IS.2016.10.004}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/is/AhmadZSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mbec/AL-QuraishiIAHA17, author = {Maged S. Al{-}Quraishi and Asnor J. Ishak and Siti Anom Ahmad and Mohd K. Hasan and Muhammad Al{-}Qurishi and Hossein Ghapanchizadeh and Atif Alamri}, title = {Classification of ankle joint movements based on surface electromyography signals for rehabilitation robot applications}, journal = {Medical Biol. Eng. Comput.}, volume = {55}, number = {5}, pages = {747--758}, year = {2017}, url = {https://doi.org/10.1007/s11517-016-1551-4}, doi = {10.1007/S11517-016-1551-4}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mbec/AL-QuraishiIAHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/JavaidMANAAI17, author = {Nadeem Javaid and Hammad Maqsood and Wadood Abdul and Iftikhar Azim Niaz and Ahmad Almogren and Atif Alamri and Manzoor Ilahi}, title = {A Localization Based Cooperative Routing Protocol for Underwater Wireless Sensor Networks}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {7954175:1--7954175:16}, year = {2017}, url = {https://doi.org/10.1155/2017/7954175}, doi = {10.1155/2017/7954175}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/JavaidMANAAI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/JavaidEAAANG17, author = {Nadeem Javaid and Mudassir Ejaz and Wadood Abdul and Atif Alamri and Ahmad Almogren and Iftikhar Azim Niaz and Nadra Guizani}, title = {Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void Zones in Underwater WSNs}, journal = {Sensors}, volume = {17}, number = {3}, pages = {580}, year = {2017}, url = {https://doi.org/10.3390/s17030580}, doi = {10.3390/S17030580}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/JavaidEAAANG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/JavaidMSANAA17, author = {Nadeem Javaid and Muhammad and Arshad Sher and Wadood Abdul and Iftikhar Azim Niaz and Ahmad Almogren and Atif Alamri}, title = {Cooperative Opportunistic Pressure Based Routing for Underwater Wireless Sensor Networks}, journal = {Sensors}, volume = {17}, number = {3}, pages = {629}, year = {2017}, url = {https://doi.org/10.3390/s17030629}, doi = {10.3390/S17030629}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/JavaidMSANAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/HassanAASA17, author = {Mohammad Mehedi Hassan and Mohammad Abdullah{-}Al{-}Wadud and Ahmad Almogren and Biao Song and Atif Alamri}, title = {Energy-Aware Resource and Revenue Management in Federated Cloud: {A} Game-Theoretic Approach}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {951--961}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2472973}, doi = {10.1109/JSYST.2015.2472973}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/HassanAASA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/MinhasKRAK17, author = {Sidra Minhas and Aasia Khanum and Farhan Riaz and Atif Alvi and Shoab Ahmad Khan}, title = {A Nonparametric Approach for Mild Cognitive Impairment to {AD} Conversion Prediction: Results on Longitudinal Data}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {21}, number = {5}, pages = {1403--1410}, year = {2017}, url = {https://doi.org/10.1109/JBHI.2016.2608998}, doi = {10.1109/JBHI.2016.2608998}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/titb/MinhasKRAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEicci/HanPRAAWL17, author = {Qi Han and Jun Peng and Sk. Md. Mizanur Rahman and Ahmad Almogran and Atif Alamri and Tengfei Weng and Jin Liu}, editor = {Newton Howard and Yingxu Wang and Amir Hussain and Freddie Hamdy and Bernard Widrow and Lotfi A. Zadeh}, title = {A mathematical and simulation model on stability and parameters of multi-equilibrium points in CNNs}, booktitle = {16th {IEEE} International Conference on Cognitive Informatics {\&} Cognitive Computing, ICCI*CC 2017, Oxford, United Kingdom, July 26-28, 2017}, pages = {315--318}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICCI-CC.2017.8109767}, doi = {10.1109/ICCI-CC.2017.8109767}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEicci/HanPRAAWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/PitruzzelloAM17, author = {Sam Pitruzzello and Atif Ahmad and Sean B. Maynard}, title = {A Framework for Mitigating Leakage of Competitively Sensitive Knowledge in Start-ups}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2017, Hobart, Tasmania, Australia, December 4-6, 2017}, pages = {58}, year = {2017}, url = {https://aisel.aisnet.org/acis2017/58}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/PitruzzelloAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bhi/MinhasKRKA17, author = {Sidra Minhas and Aasia Khanum and Farhan Riaz and Shoab Ahmad Khan and Atif Alvi}, title = {Trajectory based predictive modeling of conversion from mild cognitive impairment to Alzheimer's disease}, booktitle = {2017 {IEEE} {EMBS} International Conference on Biomedical {\&} Health Informatics, {BHI} 2017, Orland, FL, USA, February 16-19, 2017}, pages = {385--388}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/BHI.2017.7897286}, doi = {10.1109/BHI.2017.7897286}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/bhi/MinhasKRKA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/NaseerSAM17, author = {Humza Naseer and Graeme G. Shanks and Atif Ahmad and Sean B. Maynard}, editor = {Isabel Ramos and Virpi Tuunainen and Helmut Krcmar}, title = {Towards an Analytics-Driven Information Security Risk Management: a contingent Resource based Perspective}, booktitle = {25th European Conference on Information Systems, {ECIS} 2017, Guimar{\~{a}}es, Portugal, June 5-10, 2017}, year = {2017}, url = {http://aisel.aisnet.org/ecis2017\_rip/17}, timestamp = {Thu, 13 Dec 2018 13:01:16 +0100}, biburl = {https://dblp.org/rec/conf/ecis/NaseerSAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccp2/SheikhFANGL17, author = {Adil A. Sheikh and Emad A. Felemban and Ahmad Alhindi and Atif Naseer and Mukhtar Ghaleb and Ahmed Lbath}, title = {OpToGen - {A} genetic algorithm based framework for optimal topology generation for linear networks}, booktitle = {13th {IEEE} International Conference on Intelligent Computer Communication and Processing, {ICCP} 2017, Cluj-Napoca, Romania, September 7-9, 2017}, pages = {255--262}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCP.2017.8117012}, doi = {10.1109/ICCP.2017.8117012}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccp2/SheikhFANGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/MugheesAT17, author = {Atif Mughees and Ahmad Ali and Linmi Tao}, title = {Hyperspectral image classification via shape-adaptive deep learning}, booktitle = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017, Beijing, China, September 17-20, 2017}, pages = {375--379}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICIP.2017.8296306}, doi = {10.1109/ICIP.2017.8296306}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/MugheesAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/SernaBAM17, author = {Carlos Andres Agudelo Serna and Rachelle Bosua and Atif Ahmad and Sean B. Maynard}, editor = {Yong Jin Kim and Ritu Agarwal and Jae Kyu Lee}, title = {Strategies to Mitigate Knowledge Leakage Risk caused by the use of mobile devices: {A} Preliminary Study}, booktitle = {Proceedings of the International Conference on Information Systems - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul, South Korea, December 10-13, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/icis2017/Security/Presentations/24}, timestamp = {Tue, 19 Dec 2017 17:38:41 +0100}, biburl = {https://dblp.org/rec/conf/icis/SernaBAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/WebbAMBS17, author = {Jeb Webb and Atif Ahmad and Sean B. Maynard and Richard L. Baskerville and Graeme G. Shanks}, editor = {Yong Jin Kim and Ritu Agarwal and Jae Kyu Lee}, title = {Organizational Security Learning from Incident Response}, booktitle = {Proceedings of the International Conference on Information Systems - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul, South Korea, December 10-13, 2017}, publisher = {Association for Information Systems}, year = {2017}, url = {http://aisel.aisnet.org/icis2017/Security/Presentations/4}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icis/WebbAMBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotdcc/FayedAAA17, author = {Mahmoud S. Fayed and Muhammad Al{-}Qurishi and Atif Alamri and Ahmad A. Al{-}Daraiseh}, editor = {Hani Hamdan and Djallel Eddine Boubiche and Homero Toral{-}Cruz and Sedat Akleylek and Hamid Mcheick}, title = {{PWCT:} visual language for IoT and cloud computing applications and systems}, booktitle = {Proceedings of the Second International Conference on Internet of things and Cloud Computing, {ICC} 2017, Cambridge, United Kingdom, March 22-23, 2017}, pages = {165:1--165:5}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3018896.3056782}, doi = {10.1145/3018896.3056782}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iotdcc/FayedAAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/OnibereAM17, author = {Mazino Onibere and Atif Ahmad and Sean B. Maynard}, editor = {Rose Alinda Alias and Pan Shan Ling and Shamshul Bahri and Patrick Finnegan and Choon Ling Sia}, title = {The Chief Information Security Officer and the Five Dimensions of a Strategist}, booktitle = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017, Langkawi, Malaysia, July 16-20, 2017}, pages = {77}, year = {2017}, url = {http://aisel.aisnet.org/pacis2017/77}, timestamp = {Fri, 15 Sep 2017 09:22:54 +0200}, biburl = {https://dblp.org/rec/conf/pacis/OnibereAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/SernaBMA17, author = {Carlos Andres Agudelo Serna and Rachelle Bosua and Sean B. Maynard and Atif Ahmad}, editor = {Rose Alinda Alias and Pan Shan Ling and Shamshul Bahri and Patrick Finnegan and Choon Ling Sia}, title = {Addressing Knowledge Leakage Risk caused by the use of mobile devices in Australian Organizations}, booktitle = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017, Langkawi, Malaysia, July 16-20, 2017}, pages = {224}, year = {2017}, url = {http://aisel.aisnet.org/pacis2017/224}, timestamp = {Fri, 15 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pacis/SernaBMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/TanMAR17, author = {Terrence H. Tan and Sean B. Maynard and Atif Ahmad and Tobias Ruighaver}, editor = {Rose Alinda Alias and Pan Shan Ling and Shamshul Bahri and Patrick Finnegan and Choon Ling Sia}, title = {Information Security Governance: {A} Case Study of the Strategic Context of Information Security}, booktitle = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017, Langkawi, Malaysia, July 16-20, 2017}, pages = {43}, year = {2017}, url = {http://aisel.aisnet.org/pacis2017/43}, timestamp = {Fri, 15 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pacis/TanMAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-09052, author = {Mahmoud S. Fayed and Muhammad Al{-}Qurishi and Atif Alamri and Ahmad A. Al{-}Daraiseh}, title = {{PWCT:} Visual Language for IoT and Cloud Computing Applications and Systems}, journal = {CoRR}, volume = {abs/1712.09052}, year = {2017}, url = {http://arxiv.org/abs/1712.09052}, eprinttype = {arXiv}, eprint = {1712.09052}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-09052.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cais/SheddenASTS16, author = {Piya Shedden and Atif Ahmad and Wally Smith and Heidi Tscherning and Rens Scheepers}, title = {Asset Identification in Information Security Risk Assessment: {A} Business Practice Approach}, journal = {Commun. Assoc. Inf. Syst.}, volume = {39}, pages = {15}, year = {2016}, url = {https://doi.org/10.17705/1cais.03915}, doi = {10.17705/1CAIS.03915}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/SheddenASTS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/clsr/CaronBMA16, author = {Xavier Caron and Rachelle Bosua and Sean B. Maynard and Atif Ahmad}, title = {The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective}, journal = {Comput. Law Secur. Rev.}, volume = {32}, number = {1}, pages = {4--15}, year = {2016}, url = {https://doi.org/10.1016/j.clsr.2015.12.001}, doi = {10.1016/J.CLSR.2015.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/clsr/CaronBMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MehajabinRHAA16, author = {Nusrat Mehajabin and Md. Abdur Razzaque and Mohammad Mehedi Hassan and Ahmad Almogren and Atif Alamri}, title = {Energy-sustainable relay node deployment in wireless sensor networks}, journal = {Comput. Networks}, volume = {104}, pages = {108--121}, year = {2016}, url = {https://doi.org/10.1016/j.comnet.2016.05.014}, doi = {10.1016/J.COMNET.2016.05.014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MehajabinRHAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/SongHAATPA16, author = {Biao Song and Mohammad Mehedi Hassan and Atif Alamri and Abdulhameed Alelaiwi and Yuan Tian and Mukaddim Pathan and Ahmad Almogren}, title = {A two-stage approach for task and resource management in multimedia cloud environment}, journal = {Computing}, volume = {98}, number = {1-2}, pages = {119--145}, year = {2016}, url = {https://doi.org/10.1007/s00607-014-0411-z}, doi = {10.1007/S00607-014-0411-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/SongHAATPA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HassanAARAAH16, author = {Mohammad Mehedi Hassan and Mohammad Abdullah{-}Al{-}Wadud and Ahmad Almogren and Sk. Md. Mizanur Rahman and Abdulhameed Alelaiwi and Atif Alamri and Md. Abdul Hamid}, title = {QoS and trust-aware coalition formation game in data-intensive cloud federations}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {10}, pages = {2889--2905}, year = {2016}, url = {https://doi.org/10.1002/cpe.3543}, doi = {10.1002/CPE.3543}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/HassanAARAAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/TabassumRHAA16, author = {Madiha Tabassum and Md. Abdur Razzaque and Mohammad Mehedi Hassan and Ahmad Almogren and Atif Alamri}, title = {Interference-aware high-throughput channel allocation mechanism for CR-VANETs}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2016}, pages = {2}, year = {2016}, url = {https://doi.org/10.1186/s13638-015-0494-z}, doi = {10.1186/S13638-015-0494-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/TabassumRHAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jitta/WebbAMS16, author = {Jeb Webb and Atif Ahmad and Sean B. Maynard and Graeme G. Shanks}, title = {Foundations for an Intelligence-driven Information Security Risk-management System}, journal = {J. Inf. Technol. Theory Appl.}, volume = {17}, number = {3}, pages = {3}, year = {2016}, url = {https://aisel.aisnet.org/jitta/vol17/iss3/3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jitta/WebbAMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/KhodaRAHAA16, author = {Mahbub E. Khoda and Md. Abdur Razzaque and Ahmad Almogren and Mohammad Mehedi Hassan and Atif Alamri and Abdulhameed Alelaiwi}, title = {Efficient Computation Offloading Decision in Mobile Cloud Computing over 5G Network}, journal = {Mob. Networks Appl.}, volume = {21}, number = {5}, pages = {777--792}, year = {2016}, url = {https://doi.org/10.1007/s11036-016-0688-6}, doi = {10.1007/S11036-016-0688-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/KhodaRAHAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AlamriHAHAZSA16, author = {Atif Alamri and M. Shamim Hossain and Ahmad Almogren and Mohammad Mehedi Hassan and Khalid Al{-}Nafjan and Mohammed Zakariah and Lee Seyam and Abdullah Sharaf Alghamdi}, title = {QoS-adaptive service configuration framework for cloud-assisted video surveillance systems}, journal = {Multim. Tools Appl.}, volume = {75}, number = {21}, pages = {13333--13348}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-3074-7}, doi = {10.1007/S11042-015-3074-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AlamriHAHAZSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/QuddiousYKTSSC16, author = {Abdul Quddious and Shuai Yang and Munawar M. Khan and Farooq Ahmad Tahir and Atif Shamim and Khaled N. Salama and Hammad M. Cheema}, title = {Disposable, Paper-Based, Inkjet-Printed Humidity and H\({}_{\mbox{2}}\)S Gas Sensor for Passive Sensing Applications}, journal = {Sensors}, volume = {16}, number = {12}, pages = {2073}, year = {2016}, url = {https://doi.org/10.3390/s16122073}, doi = {10.3390/S16122073}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/QuddiousYKTSSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/AgudeloBMA16, author = {Carlos Andres Agudelo and Rachelle Bosua and Sean B. Maynard and Atif Ahmad}, title = {Mitigating Knowledge Leakage Risk in Organizations through Mobile Devices: {A} Contextual Approach}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong, NSW, Australia, December 5-7, 2016}, pages = {79}, year = {2016}, url = {https://aisel.aisnet.org/acis2016/79}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/AgudeloBMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/ArreguiMA16, author = {Daniel Alejandro Arregui and Sean B. Maynard and Atif Ahmad}, title = {Mitigating {BYOD} Information Security Risks}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong, NSW, Australia, December 5-7, 2016}, pages = {8}, year = {2016}, url = {https://aisel.aisnet.org/acis2016/8}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/ArreguiMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/HorneAM16, author = {Craig A. Horne and Atif Ahmad and Sean B. Maynard}, title = {A Theory on Information Security}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong, NSW, Australia, December 5-7, 2016}, pages = {87}, year = {2016}, url = {https://aisel.aisnet.org/acis2016/87}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/HorneAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/NaseerSAM16, author = {Humza Naseer and Graeme G. Shanks and Atif Ahmad and Sean B. Maynard}, title = {Enhancing Information Security Risk Management with Security Analytics: {A} Dynamic Capabilities Perspective}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong, NSW, Australia, December 5-7, 2016}, pages = {61}, year = {2016}, url = {https://aisel.aisnet.org/acis2016/61}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/NaseerSAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/NaseerMA16, author = {Humza Naseer and Sean B. Maynard and Atif Ahmad}, title = {Business Analytics in Information Security Risk Management: the contingent effect on Security Performance}, booktitle = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul, Turkey, June 12-15, 2016}, pages = {Research--in--Progress Paper 13}, year = {2016}, url = {http://aisel.aisnet.org/ecis2016\_rip/13}, timestamp = {Sat, 12 Nov 2016 17:38:24 +0100}, biburl = {https://dblp.org/rec/conf/ecis/NaseerMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euvip/KhanTKB16, author = {Faraz Ahmad Khan and Muhammad Atif Tahir and Fouad Khelifi and Ahmed Bouridane}, title = {Offline text independent writer identification using ensemble of multi-scale local ternary pattern histograms}, booktitle = {6th European Workshop on Visual Information Processing, {EUVIP} 2016, Marseille, France, October 25-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EUVIP.2016.7764587}, doi = {10.1109/EUVIP.2016.7764587}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/euvip/KhanTKB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AgudeloBAM16, author = {Carlos Andres Agudelo and Rachelle Bosua and Atif Ahmad and Sean B. Maynard}, title = {Understanding Knowledge Leakage {\&} {BYOD} (Bring Your Own Device): {A} Mobile Worker Perspective}, journal = {CoRR}, volume = {abs/1606.01450}, year = {2016}, url = {http://arxiv.org/abs/1606.01450}, eprinttype = {arXiv}, eprint = {1606.01450}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AgudeloBAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlshaikhMAC16, author = {Moneer Alshaikh and Sean B. Maynard and Atif Ahmad and Shanton Chang}, title = {Information Security Policy: {A} Management Practice Perspective}, journal = {CoRR}, volume = {abs/1606.00890}, year = {2016}, url = {http://arxiv.org/abs/1606.00890}, eprinttype = {arXiv}, eprint = {1606.00890}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlshaikhMAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HorneAM16, author = {Craig A. Horne and Atif Ahmad and Sean B. Maynard}, title = {Information Security Strategy in Organisations: Review, Discussion and Future Research Directions}, journal = {CoRR}, volume = {abs/1606.03528}, year = {2016}, url = {http://arxiv.org/abs/1606.03528}, eprinttype = {arXiv}, eprint = {1606.03528}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HorneAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZuritaMA16, author = {Harry Zurita and Sean B. Maynard and Atif Ahmad}, title = {Evaluating the Utility of Research Articles for Teaching Information Security Management}, journal = {CoRR}, volume = {abs/1606.01448}, year = {2016}, url = {http://arxiv.org/abs/1606.01448}, eprinttype = {arXiv}, eprint = {1606.01448}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZuritaMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangTCRAA15, author = {Kaibin Huang and Raylin Tso and Yu{-}Chi Chen and Sk. Md. Mizanur Rahman and Ahmad Almogren and Atif Alamri}, title = {{PKE-AET:} Public Key Encryption with Authorized Equality Test}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2686--2697}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv025}, doi = {10.1093/COMJNL/BXV025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangTCRAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ElyasAML15, author = {Mohamed Elyas and Atif Ahmad and Sean B. Maynard and Andrew Lonie}, title = {Digital forensic readiness: Expert perspectives on a theoretical framework}, journal = {Comput. Secur.}, volume = {52}, pages = {70--89}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.04.003}, doi = {10.1016/J.COSE.2015.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ElyasAML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HassanKAAAAIR15, author = {Mohammad Mehedi Hassan and S. M. Kamruzzaman and Atif Alamri and Ahmad Almogren and Abdulhameed Alelaiwi and Mohammed Abdullah Alnuem and Md. Manowarul Islam and Md. Abdur Razzaque}, title = {Design of an energy-efficient and reliable data delivery mechanism for mobile \emph{ad hoc} networks: a cross-layer approach}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {10}, pages = {2637--2655}, year = {2015}, url = {https://doi.org/10.1002/cpe.3309}, doi = {10.1002/CPE.3309}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/HassanKAAAAIR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/LimMAC15, author = {Joo Soon Lim and Sean B. Maynard and Atif Ahmad and Shanton Chang}, title = {Information Security Culture: Towards an Instrument for Assessing Security Management Practices}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {2}, pages = {31--52}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015040103}, doi = {10.4018/IJCWT.2015040103}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/LimMAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/TamaddonAB15, author = {Sohail Tamaddon and Atif Ahmad and Rachelle Bosua}, title = {Secure Knowledge Management: Influencing the Development of Human Knowledge Sharing Networks}, journal = {Int. J. Cyber Warf. Terror.}, volume = {5}, number = {2}, pages = {1--20}, year = {2015}, url = {https://doi.org/10.4018/IJCWT.2015040101}, doi = {10.4018/IJCWT.2015040101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcwt/TamaddonAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/AhmadMS15, author = {Atif Ahmad and Sean B. Maynard and Graeme G. Shanks}, title = {A case analysis of information systems and security incident responses}, journal = {Int. J. Inf. Manag.}, volume = {35}, number = {6}, pages = {717--723}, year = {2015}, url = {https://doi.org/10.1016/j.ijinfomgt.2015.08.001}, doi = {10.1016/J.IJINFOMGT.2015.08.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/AhmadMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/MasudHAAZ15, author = {Mehedi Masud and M. Shamim Hossain and Atif Alamri and Ahmad Almogren and Mohammed Zakariah}, title = {Synchronizing Data through Update Queries in Interoperable E-Health and Technology Enhanced Learning Data Sharing Systems}, journal = {J. Univers. Comput. Sci.}, volume = {21}, number = {11}, pages = {1439--1453}, year = {2015}, url = {http://www.jucs.org/jucs\_21\_11/synchronizing\_data\_through\_update}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/MasudHAAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/AlshaikhMAC15, author = {Moneer Alshaikh and Sean B. Maynard and Atif Ahmad and Shanton Chang}, title = {Information Security Policy: {A} Management Practice Perspective}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide, SA, Australia, November 30 - December 4, 2015}, pages = {12}, year = {2015}, url = {https://aisel.aisnet.org/acis2015/12}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/AlshaikhMAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/HorneAM15, author = {Craig A. Horne and Atif Ahmad and Sean B. Maynard}, title = {Information Security Strategy in Organisations: Review, Discussion and Future Research Directions}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide, SA, Australia, November 30 - December 4, 2015}, pages = {156}, year = {2015}, url = {https://aisel.aisnet.org/acis2015/156}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/HorneAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/ZuritaMA15, author = {Harry Zurita and Sean B. Maynard and Atif Ahmad}, title = {Evaluating the Utility of Research Articles for Teaching Information Security Management}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide, SA, Australia, November 30 - December 4, 2015}, pages = {47}, year = {2015}, url = {https://aisel.aisnet.org/acis2015/47}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acis/ZuritaMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl-alta/NothmanABMB15, author = {Joel Nothman and Atif Ahmad and Christoph F. Breidbach and David Malet and Timothy Baldwin}, editor = {Ben Hachey and Kellie Webster}, title = {Understanding engagement with insurgents through retweet rhetoric}, booktitle = {Proceedings of the Australasian Language Technology Association Workshop, {ALTA} 2015, Parramatta, Australia, December 8 - 9, 2015}, pages = {122--127}, publisher = {{ACL}}, year = {2015}, url = {https://aclanthology.org/U15-1015/}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl-alta/NothmanABMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icis/AhmadTBS15, author = {Atif Ahmad and Heidi Tscherning and Rachelle Bosua and Rens Scheepers}, editor = {Traci A. Carte and Armin Heinzl and Cathy Urquhart}, title = {Guarding Against the Erosion of Competitive Advantage: {A} Knowledge Leakage Mitigation Model}, booktitle = {Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas, USA, December 13-16, 2015}, publisher = {Association for Information Systems}, year = {2015}, url = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/7}, timestamp = {Wed, 09 Oct 2019 12:51:34 +0200}, biburl = {https://dblp.org/rec/conf/icis/AhmadTBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icit2/AbduallahIB15, author = {Ahmad Anad Abduallah and Atif Iqbal and Lazhar Ben{-}Brahim}, title = {Space vector pulse width modulation techniques for a five-phase impedeance source and quazi impedeance source inverters}, booktitle = {{IEEE} International Conference on Industrial Technology, {ICIT} 2015, Seville, Spain, March 17-19, 2015}, pages = {1173--1178}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICIT.2015.7125256}, doi = {10.1109/ICIT.2015.7125256}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/icit2/AbduallahIB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideal/MinhasKRAK15, author = {Sidra Minhas and Aasia Khanum and Farhan Riaz and Atif Alvi and Shoab Ahmad Khan}, editor = {Konrad Jackowski and Robert Burduk and Krzysztof Walkowiak and Michal Wozniak and Hujun Yin}, title = {Early Alzheimer's Disease Prediction in Machine Learning Setup: Empirical Analysis with Missing Value Computation}, booktitle = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2015 - 16th International Conference Wroclaw, Poland, October 14-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9375}, pages = {424--432}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24834-9\_49}, doi = {10.1007/978-3-319-24834-9\_49}, timestamp = {Thu, 07 Nov 2019 15:14:50 +0100}, biburl = {https://dblp.org/rec/conf/ideal/MinhasKRAK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/AbduallahIMBAA15, author = {Ahmad Anad Abduallah and Atif Iqbal and Mohammad Meraj and Lazhar Ben{-}Brahim and Rashid Alammari and Haitham Abu{-}Rub}, title = {Discontinuous space vector pulse width modulation techniques for a five-phase quasi Z-source inverter}, booktitle = {{IECON} 2015 - 41st Annual Conference of the {IEEE} Industrial Electronics Society, Yokohama, Japan, November 9-12, 2015}, pages = {4205--4210}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IECON.2015.7392755}, doi = {10.1109/IECON.2015.7392755}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/AbduallahIMBAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ajis/WebbMAS14, author = {Jeb Webb and Sean B. Maynard and Atif Ahmad and Graeme G. Shanks}, title = {Information Security Risk Management: An Intelligence-Driven Approach}, journal = {Australas. J. Inf. Syst.}, volume = {18}, number = {3}, year = {2014}, url = {http://journal.acs.org.au/index.php/ajis/article/view/1096}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ajis/WebbMAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadBS14, author = {Atif Ahmad and Rachelle Bosua and Rens Scheepers}, title = {Protecting organizational competitive advantage: {A} knowledge leakage perspective}, journal = {Comput. Secur.}, volume = {42}, pages = {27--39}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.001}, doi = {10.1016/J.COSE.2014.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WebbAMS14, author = {Jeb Webb and Atif Ahmad and Sean B. Maynard and Graeme G. Shanks}, title = {A situation awareness model for information security risk management}, journal = {Comput. Secur.}, volume = {44}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.04.005}, doi = {10.1016/J.COSE.2014.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WebbAMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AhmadM14, author = {Atif Ahmad and Sean B. Maynard}, title = {Teaching information security management: reflections and experiences}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {513--536}, year = {2014}, url = {https://doi.org/10.1108/IMCS-08-2013-0058}, doi = {10.1108/IMCS-08-2013-0058}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AhmadM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcis/ElyasMAL14, author = {Mohamed Elyas and Sean B. Maynard and Atif Ahmad and Andrew Lonie}, title = {Towards {A} Systemic Framework for Digital Forensic Readiness}, journal = {J. Comput. Inf. Syst.}, volume = {54}, number = {3}, pages = {97--105}, year = {2014}, url = {https://doi.org/10.1080/08874417.2014.11645708}, doi = {10.1080/08874417.2014.11645708}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcis/ElyasMAL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/AhmadMP14, author = {Atif Ahmad and Sean B. Maynard and Sangseo Park}, title = {Information security strategies: towards an organizational multi-strategy perspective}, journal = {J. Intell. Manuf.}, volume = {25}, number = {2}, pages = {357--370}, year = {2014}, url = {https://doi.org/10.1007/s10845-012-0683-0}, doi = {10.1007/S10845-012-0683-0}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/AhmadMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShoaibAA14, author = {Muhammad Shoaib and Uzair Ahmad and Atif Alamri}, title = {Multimedia framework to support eHealth applications}, journal = {Multim. Tools Appl.}, volume = {73}, number = {3}, pages = {2081--2101}, year = {2014}, url = {https://doi.org/10.1007/s11042-013-1631-5}, doi = {10.1007/S11042-013-1631-5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ShoaibAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/EnayetRHAA14, author = {Asma Enayet and Md. Abdur Razzaque and Mohammad Mehedi Hassan and Ahmad Almogren and Atif Alamri}, title = {Moving Target Tracking through Distributed Clustering in Directional Sensor Networks}, journal = {Sensors}, volume = {14}, number = {12}, pages = {24381--24407}, year = {2014}, url = {https://doi.org/10.3390/s141224381}, doi = {10.3390/S141224381}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/EnayetRHAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HossainAAHP14, author = {M. Anwar Hossain and Atif Alamri and Ahmad S. Almogren and S. K. Alamgir Hossain and Jorge Parra}, title = {A Framework for a Context-Aware Elderly Entertainment Support System}, journal = {Sensors}, volume = {14}, number = {6}, pages = {10538--10561}, year = {2014}, url = {https://doi.org/10.3390/s140610538}, doi = {10.3390/S140610538}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HossainAAHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/ButtAK14, author = {Mavera M. Butt and A. B. N. Alvi and Shoab Ahmad Khan}, title = {Integrated Development Environment for generation of middleware for hybrid processors based embedded systems}, booktitle = {11th {IEEE/ACS} International Conference on Computer Systems and Applications, {AICCSA} 2014, Doha, Qatar, November 10-13, 2014}, pages = {21--25}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AICCSA.2014.7073174}, doi = {10.1109/AICCSA.2014.7073174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/ButtAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crowncom/AhmadFHZZ14, author = {Ishtiaq Ahmad and Zhiyong Feng and Atif Hameed and Ping Zhang and Yichen Zhao}, editor = {Matti Latva{-}aho and Savo Glisic and Allen B. MacKenzie and Alhussein A. Abouzeid and Olav Tirkkonen and Markku J. Juntti and Juha R{\"{o}}ning and Hiroshi Harada}, title = {Spectrum sharing and energy-efficient power optimization for two-tier femtocell networks}, booktitle = {9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications, {CROWNCOM} 2014, Oulu, Finland, June 2-4, 2014}, pages = {156--161}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.crowncom.2014.255316}, doi = {10.4108/ICST.CROWNCOM.2014.255316}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crowncom/AhmadFHZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euvip/AhmadMMKM14, author = {Arslan Ahmad and Atif Bin Mansoor and Rafia Mumtaz and Mukaram Khan and S. H. Mirza}, title = {Image processing and classification in diabetic retinopathy: {A} review}, booktitle = {5th European Workshop on Visual Information Processing, {EUVIP} 2014, Villetaneuse, Paris, France, December 10-12, 2014}, pages = {1--6}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EUVIP.2014.7018362}, doi = {10.1109/EUVIP.2014.7018362}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/euvip/AhmadMMKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isie/StecGSIAA14, author = {Pawel Stec and Jaroslaw Guzinski and Patryk Strankowski and Atif Iqbal and Ahmad Anad Abduallah and Haitham Abu{-}Rub}, title = {Five-phase induction motor drive with sine-wave filter}, booktitle = {23rd {IEEE} International Symposium on Industrial Electronics, {ISIE} 2014, Istanbul, Turkey, June 1-4, 2014}, pages = {2111--2116}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIE.2014.6864943}, doi = {10.1109/ISIE.2014.6864943}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isie/StecGSIAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/RahmanHMCAAA14, author = {Sk. Md. Mizanur Rahman and Mohammad Anwar Hossain and Maqsood Mahmud and Muhammad Imran Chaudry and Ahmad Almogren and Mohammed Abdullah Alnuem and Atif Alamri}, title = {A Lightweight Secure Data Aggregation Technique for Wireless Sensor Network}, booktitle = {2014 {IEEE} International Symposium on Multimedia, {ISM} 2014, Taichung, Taiwan, December 10-12, 2014}, pages = {387--392}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISM.2014.84}, doi = {10.1109/ISM.2014.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ism/RahmanHMCAAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ism/RahmanKAAAA14, author = {Sk. Md. Mizanur Rahman and S. M. Kamruzzaman and Ahmad Almogren and Abdulhameed Alelaiwi and Atif Alamri and Abdullah Sharaf Alghamdi}, title = {Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks}, booktitle = {2014 {IEEE} International Symposium on Multimedia, {ISM} 2014, Taichung, Taiwan, December 10-12, 2014}, pages = {393--398}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ISM.2014.85}, doi = {10.1109/ISM.2014.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ism/RahmanKAAAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/WebbMAS13, author = {Jeb Webb and Sean B. Maynard and Atif Ahmad and Graeme G. Shanks}, title = {Towards an Intelligence-Driven Information Security Risk Management Process for Organisations}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2013, Melbourne, VIC, Australia, December 4-6, 2013}, pages = {52}, year = {2013}, url = {https://aisel.aisnet.org/acis2013/52}, timestamp = {Thu, 16 May 2024 17:06:12 +0200}, biburl = {https://dblp.org/rec/conf/acis/WebbMAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/MolokCA13, author = {Nurul Nuha Abdul Molok and Shanton Chang and Atif Ahmad}, editor = {Jae{-}Nam Lee and Ji{-}Ye Mao and James Y. L. Thong}, title = {Disclosure of Organizational Information on Social Media: Perspectives from Security Managers}, booktitle = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013, Jeju Island, Korea, June 18-22, 2013}, pages = {108}, year = {2013}, url = {http://aisel.aisnet.org/pacis2013/108}, timestamp = {Tue, 08 Apr 2014 14:41:43 +0200}, biburl = {https://dblp.org/rec/conf/pacis/MolokCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadHR12, author = {Atif Ahmad and Justin Hadgkiss and Anthonie B. Ruighaver}, title = {Incident response teams - Challenges in supporting the organisational security function}, journal = {Comput. Secur.}, volume = {31}, number = {5}, pages = {643--652}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.04.001}, doi = {10.1016/J.COSE.2012.04.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcwt/MolokAC12, author = {Nurul Nuha Abdul Molok and Atif Ahmad and Shanton Chang}, title = {Online Social Networking: {A} Source of Intelligence for Advanced Persistent Threats}, journal = {Int. J. Cyber Warf. Terror.}, volume = {2}, number = {1}, pages = {1--13}, year = {2012}, url = {https://doi.org/10.4018/ijcwt.2012010101}, doi = {10.4018/IJCWT.2012010101}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcwt/MolokAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/SheddenAR11, author = {Piya Shedden and Atif Ahmad and Anthonie B. Ruighaver}, title = {Informal Learning in Security Incident Response Teams}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2011, Sydney, Australia, November 30 - December 2, 2011}, year = {2011}, url = {https://aisel.aisnet.org/acis2011/37}, timestamp = {Thu, 16 May 2024 17:06:13 +0200}, biburl = {https://dblp.org/rec/conf/acis/SheddenAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dese/QureshiKBM11, author = {Hammad Qureshi and Shamila Keyani and Qurrat{-}Ul{-}Ain Babar and Ahmad Atif Mumtaz}, title = {Monitoring Disease Outbreak through Geographical Representation in Rural Areas}, booktitle = {2011 Developments in E-systems Engineering, DeSE 2011, Dubai, United Arab Emirates, December 6-8, 2011}, pages = {30--35}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DeSE.2011.90}, doi = {10.1109/DESE.2011.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dese/QureshiKBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkRMA11, author = {Sangseo Park and Anthonie B. Ruighaver and Sean B. Maynard and Atif Ahmad}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Towards Understanding Deterrence: Information Security Managers' Perspective}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {21--37}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_3}, doi = {10.1007/978-94-007-2911-7\_3}, timestamp = {Tue, 01 Feb 2022 08:29:46 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ParkRMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/MolokAC11, author = {Nurul Nuha Abdul Molok and Atif Ahmad and Shanton Chang}, editor = {Peter B. Seddon and Shirley Gregor}, title = {Exploring The Use Of Online Social Networking By Employees: Looking At The Potential For Information Leakage}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2011: Quality Research in Pacific Asia, Brisbane, Queensland, Australia, 7-11 July 2011}, pages = {138}, publisher = {Queensland University of Technology}, year = {2011}, url = {http://aisel.aisnet.org/pacis2011/138}, timestamp = {Tue, 28 Feb 2012 16:51:40 +0100}, biburl = {https://dblp.org/rec/conf/pacis/MolokAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/MolokAC10, author = {Nurul Nuha Abdul Molok and Atif Ahmad and Shanton Chang}, title = {Understanding the Factors of Information Leakage through Online Social Networking to Safeguard Organizational Information}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2010, Brisbane, Australia, December 1-3, 2010}, year = {2010}, url = {https://aisel.aisnet.org/acis2010/62}, timestamp = {Fri, 17 May 2024 16:58:38 +0200}, biburl = {https://dblp.org/rec/conf/acis/MolokAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SharifPA10, author = {Atif Sharif and Vidyasagar M. Potdar and Rana Fayyaz Ahmad}, title = {Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless Networks}, booktitle = {24th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13 April 2010}, pages = {200--207}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/WAINA.2010.197}, doi = {10.1109/WAINA.2010.197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SharifPA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pacis/LimACM10, author = {Joo Soon Lim and Atif Ahmad and Shanton Chang and Sean B. Maynard}, title = {Embedding Information Security Culture Emerging Concerns and Challenges}, booktitle = {Pacific Asia Conference on Information Systems, {PACIS} 2010, Taipei, Taiwan, 9-12 July 2010}, pages = {43}, publisher = {AISeL}, year = {2010}, url = {http://aisel.aisnet.org/pacis2010/43}, timestamp = {Tue, 28 Feb 2012 16:59:14 +0100}, biburl = {https://dblp.org/rec/conf/pacis/LimACM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TanRA10, author = {C. C. Terence Tan and Anthonie B. Ruighaver and Atif Ahmad}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Information Security Governance: When Compliance Becomes More Important than Security}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {55--67}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_6}, doi = {10.1007/978-3-642-15257-3\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TanRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijamc/BarghoutAEE09, author = {Ahmad Barghout and Atif Alamri and Mohamad A. Eid and Abdulmotaleb El{-}Saddik}, title = {Haptic rehabilitation exercises performance evaluation using automated inference systems}, journal = {Int. J. Adv. Media Commun.}, volume = {3}, number = {1/2}, pages = {197--214}, year = {2009}, url = {https://doi.org/10.1504/IJAMC.2009.026861}, doi = {10.1504/IJAMC.2009.026861}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijamc/BarghoutAEE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acis/SheddenSSA09, author = {Piya Shedden and Wally Smith and Rens Scheepers and Atif Ahmad}, title = {Towards a Knowledge Perspective in Information Security Risk Assessments - an Illustrative Case Study}, booktitle = {Australasian Conference on Information Systems, {ACIS} 2009, Melbourne, Australia, December 2-4, 2009}, year = {2009}, url = {https://aisel.aisnet.org/acis2009/96}, timestamp = {Tue, 21 May 2024 17:19:33 +0200}, biburl = {https://dblp.org/rec/conf/acis/SheddenSSA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/SharifANPSY09, author = {Atif Sharif and Rana Fayyaz Ahmad and Malaya Kumar Nath and Vidyasagar M. Potdar and Jaipal Singh and Yan Yang}, editor = {Arjan Durresi and Leonard Barolli and Tomoya Enokido and Minoru Uehara and Elhadi M. Shakshuki and Makoto Takizawa}, title = {Processing of Low Level Signals in Mixed Signal Environment - {A} Hardware Design for Better Performance}, booktitle = {NBiS 2009, 12th International Conference on Network-Based Information Systems, Indianapolis, Indiana, USA, 19-21 August 2009}, pages = {597--602}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NBiS.2009.38}, doi = {10.1109/NBIS.2009.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/SharifANPSY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cata/KhanAASCAM06, author = {Muzammil A. Khan and Hafiz Farooq Ahmad and Arshad Ali and Hiroki Suguri and Faran Javed Chawla and Muhammad Atif and H. Ghulam Mujtaba}, editor = {David Jeff Jackson}, title = {An Efficient Algorithm for Globally Aligning {DNA} Sequences}, booktitle = {21st International Conference on Computers and Their Applications, CATA-2006, Seattle, Washington, USA, March 23-25, 2006, Proceedings}, pages = {407--412}, publisher = {{ISCA}}, year = {2006}, timestamp = {Mon, 09 Aug 2021 16:27:34 +0200}, biburl = {https://dblp.org/rec/conf/cata/KhanAASCAM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aism/KohRMA05, author = {K. Koh and Anthonie B. Ruighaver and Sean B. Maynard and Atif Ahmad}, editor = {Craig Valli and Andrew Woodward}, title = {Security Governance: Its Impact on Security Culture}, booktitle = {Proceedings of the 3rd Australian Information Security Management Conference, Perth, Western Australia, 30th September 2005}, pages = {47--58}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2005}, timestamp = {Wed, 29 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aism/KohRMA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/AhmadR04, author = {Atif Ahmad and Anthonie B. Ruighaver}, title = {Towards Identifying Criteria for the Evidential Weight of System Event Logs}, booktitle = {2nd Australian Computer Network {\&} Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing - Evidence on the move from Desktops to Networks, Conference Proceedings}, pages = {40--47}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2004}, timestamp = {Sat, 09 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ausforensics/AhmadR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/AhmadR03, author = {Atif Ahmad and Tobias Ruighaver}, editor = {Craig Valli and Matt Warren}, title = {Design of a Network-Access Audit Log for Security Monitoring and Forensic Investigation}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 16:11:52 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/AhmadR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausforensics/RuighaverTA03, author = {Tobias Ruighaver and C. C. Terence Tan and Atif Ahmad}, editor = {Craig Valli and Matt Warren}, title = {Incident Handling: Where the need for planning is often not recognised}, booktitle = {1st Australian Computer, Network {\&} Information Forensics Conference, 25 November 2003, Perth, Western Australia}, publisher = {School of Computer and Information Science, Edith Cowan University, Western Australia}, year = {2003}, timestamp = {Tue, 14 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ausforensics/RuighaverTA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.