Search dblp for Publications

export results for "Atif Ahmad"

 download as .bib file

@article{DBLP:journals/access/RehmanG0S24,
  author       = {Atif Rehman and
                  Rimsha Ghias and
                  Iftikhar Ahmad and
                  Hammad Iqbal Sherazi},
  title        = {Advance Optimized Nonlinear Control Strategies for Manage Pressure
                  Drilling},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {73436--73450},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3404054},
  doi          = {10.1109/ACCESS.2024.3404054},
  timestamp    = {Tue, 11 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RehmanG0S24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/RizwanKIAIK24,
  author       = {Atif Rizwan and
                  Anam Nawaz Khan and
                  Muhammad Ibrahim and
                  Rashid Ahmad and
                  Naeem Iqbal and
                  Do{-}Hyeun Kim},
  title        = {Optimal environment control and fruits delivery tracking system using
                  blockchain for greenhouse},
  journal      = {Comput. Electron. Agric.},
  volume       = {220},
  pages        = {108889},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compag.2024.108889},
  doi          = {10.1016/J.COMPAG.2024.108889},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cea/RizwanKIAIK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/NaseerDMA24,
  author       = {Humza Naseer and
                  Kevin C. Desouza and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Enabling cybersecurity incident response agility through dynamic capabilities:
                  the role of real-time analytics},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {33},
  number       = {2},
  pages        = {200--220},
  year         = {2024},
  url          = {https://doi.org/10.1080/0960085x.2023.2257168},
  doi          = {10.1080/0960085X.2023.2257168},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejis/NaseerDMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KhanRAJKLK24,
  author       = {Anam Nawaz Khan and
                  Atif Rizwan and
                  Rashid Ahmad and
                  Wenquan Jin and
                  Qazi Waqas Khan and
                  Sunhwan Lim and
                  DoHyeun Kim},
  title        = {Hetero-FedIoT: {A} Rule-Based Interworking Architecture for Heterogeneous
                  Federated IoT Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {5920--5938},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3308579},
  doi          = {10.1109/JIOT.2023.3308579},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/KhanRAJKLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerj-cs/KhanIARKK24,
  author       = {Qazi Waqas Khan and
                  Khalid Iqbal and
                  Rashid Ahmad and
                  Atif Rizwan and
                  Anam Nawaz Khan and
                  DoHyeun Kim},
  title        = {An intelligent diabetes classification and perception framework based
                  on ensemble and deep learning method},
  journal      = {PeerJ Comput. Sci.},
  volume       = {10},
  pages        = {e1914},
  year         = {2024},
  url          = {https://doi.org/10.7717/peerj-cs.1914},
  doi          = {10.7717/PEERJ-CS.1914},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerj-cs/KhanIARKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccr/AliAHBRNJA24,
  author       = {Atif Ali and
                  Shahzad Ahmed and
                  Muhammad Hussain and
                  Talat Ahmad Bhutta and
                  Ali Raza and
                  Muhammad Waqas Nadeem and
                  Yasir Khan Jadoon and
                  Farman Ali},
  title        = {The Synergy of Artificial Intelligence and Cybersecurity},
  booktitle    = {2024 2nd International Conference on Cyber Resilience (ICCR), Dubai,
                  United Arab Emirates, February 26-28, 2024},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCR61006.2024.10532953},
  doi          = {10.1109/ICCR61006.2024.10532953},
  timestamp    = {Wed, 05 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccr/AliAHBRNJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-16486,
  author       = {Ahmad Saeed and
                  Haasha Bin Atif and
                  Usman Habib and
                  Mohsin Bilal},
  title        = {Intelligent Known and Novel Aircraft Recognition - {A} Shift from
                  Classification to Similarity Learning for Combat Identification},
  journal      = {CoRR},
  volume       = {abs/2402.16486},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.16486},
  doi          = {10.48550/ARXIV.2402.16486},
  eprinttype    = {arXiv},
  eprint       = {2402.16486},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-16486.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanKARKKK23,
  author       = {Qazi Waqas Khan and
                  Bong Wan Kim and
                  Rashid Ahmed and
                  Atif Rizwan and
                  Anam Nawaz Khan and
                  Kwangsoo Kim and
                  Do{-}Hyeun Kim},
  title        = {Predictive Modeling of Water Table Depth, Drilling Duration, and Soil
                  Layer Classification Using Adaptive Ensemble Learning for Cost-Effective
                  Percussion Water Borehole Drilling},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {76703--76721},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3298225},
  doi          = {10.1109/ACCESS.2023.3298225},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanKARKKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanKRAKK23,
  author       = {Qazi Waqas Khan and
                  Anam Nawaz Khan and
                  Atif Rizwan and
                  Rashid Ahmad and
                  Salabat Khan and
                  Dohyeun Kim},
  title        = {Decentralized Machine Learning Training: {A} Survey on Synchronization,
                  Consolidation, and Topologies},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {68031--68050},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3284976},
  doi          = {10.1109/ACCESS.2023.3284976},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanKRAKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/KhanRKAAK23,
  author       = {Salabat Khan and
                  Atif Rizwan and
                  Anam Nawaz Khan and
                  Murad Ali and
                  Rashid Ahmed and
                  Do Hyeun Kim},
  title        = {A multi-perspective revisit to the optimization methods of Neural
                  Architecture Search and Hyper-parameter optimization for non-federated
                  and federated learning environments},
  journal      = {Comput. Electr. Eng.},
  volume       = {110},
  pages        = {108867},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108867},
  doi          = {10.1016/J.COMPELECENG.2023.108867},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/KhanRKAAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AinslieTMA23,
  author       = {Scott Ainslie and
                  Dean Thompson and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Cyber-threat intelligence for security decision-making: {A} review
                  and research agenda for practice},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103352},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103352},
  doi          = {10.1016/J.COSE.2023.103352},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AinslieTMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NaseerNAMS23,
  author       = {Ayesha Naseer and
                  Humza Naseer and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Adil Masood Siddiqui},
  title        = {Moving towards agile cybersecurity incident response: {A} case study
                  exploring the enabling role of big data analytics-embedded dynamic
                  capabilities},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103525},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103525},
  doi          = {10.1016/J.COSE.2023.103525},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NaseerNAMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssc/HayatAABU23,
  author       = {Humera Hayat and
                  Atif Akbar and
                  Tanvir Ahmad and
                  Sajjad Haider Bhatti and
                  Muhammad Imdad Ullah},
  title        = {Robustness to missing observation and optimalities of response surface
                  designs with regular and complex structure},
  journal      = {Commun. Stat. Simul. Comput.},
  volume       = {52},
  number       = {11},
  pages        = {5213--5230},
  year         = {2023},
  url          = {https://doi.org/10.1080/03610918.2021.1977954},
  doi          = {10.1080/03610918.2021.1977954},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cssc/HayatAABU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/KotsiasAS23,
  author       = {James Kotsias and
                  Atif Ahmad and
                  Rens Scheepers},
  title        = {Adopting and integrating cyber-threat intelligence in a commercial
                  organisation},
  journal      = {Eur. J. Inf. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {35--51},
  year         = {2023},
  url          = {https://doi.org/10.1080/0960085x.2022.2088414},
  doi          = {10.1080/0960085X.2022.2088414},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejis/KotsiasAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/KhanRAK23,
  author       = {Anam Nawaz Khan and
                  Atif Rizwan and
                  Rashid Ahmad and
                  Do{-}Hyeun Kim},
  title        = {An OCF-IoTivity enabled smart-home optimal indoor environment control
                  system for energy and comfort optimization},
  journal      = {Internet Things},
  volume       = {22},
  pages        = {100712},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100712},
  doi          = {10.1016/J.IOT.2023.100712},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/KhanRAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/KhanRAKLK23,
  author       = {Anam Nawaz Khan and
                  Atif Rizwan and
                  Rashid Ahmad and
                  Qazi Waqas Khan and
                  Sunhwan Lim and
                  Do{-}Hyeun Kim},
  title        = {A precision-centric approach to overcoming data imbalance and non-IIDness
                  in federated learning},
  journal      = {Internet Things},
  volume       = {23},
  pages        = {100890},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100890},
  doi          = {10.1016/J.IOT.2023.100890},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/KhanRAKLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/RizwanAKXK23,
  author       = {Atif Rizwan and
                  Rashid Ahmad and
                  Anam Nawaz Khan and
                  Rongxu Xu and
                  Dohyeun Kim},
  title        = {Intelligent digital twin for federated learning in AIoT networks},
  journal      = {Internet Things},
  volume       = {22},
  pages        = {100698},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100698},
  doi          = {10.1016/J.IOT.2023.100698},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/RizwanAKXK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RizwanKAK23,
  author       = {Atif Rizwan and
                  Anam Nawaz Khan and
                  Rashid Ahmad and
                  Do Hyeun Kim},
  title        = {Optimal Environment Control Mechanism Based on {OCF} Connectivity
                  for Efficient Energy Consumption in Greenhouse},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {6, March 15},
  pages        = {5035--5049},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3222086},
  doi          = {10.1109/JIOT.2022.3222086},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RizwanKAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/ShahidMKSYAZ23,
  author       = {Farah Shahid and
                  Atif Mehmood and
                  Rizwan Khan and
                  Ahmad Al Smadi and
                  Muhammad Yaqub and
                  Mutasem K. Alsmadi and
                  Zhonglong Zheng},
  title        = {1D Convolutional LSTM-based wind power prediction integrated with
                  \emph{PkNN} data imputation technique},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {10},
  pages        = {101816},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101816},
  doi          = {10.1016/J.JKSUCI.2023.101816},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/ShahidMKSYAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/Dang-PhamTAM23,
  author       = {Duy Dang{-}Pham and
                  Nik Thompson and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Exploring the Antecedents of Shadow Information Security Practices},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2023, Wellington,
                  New Zealand, December 5-8, 2023},
  year         = {2023},
  url          = {https://aisel.aisnet.org/acis2023/5},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/Dang-PhamTAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/SchimmlerWBDKMK23,
  author       = {Sonja Schimmler and
                  Bianca Wentzel and
                  Arnim Bleier and
                  Stefan Dietze and
                  Saurav Karmakar and
                  Peter Mutschke and
                  Angelie Kraft and
                  Tilahun Abedissa Taffa and
                  Ricardo Usbeck and
                  Zeyd Boukhers and
                  S{\"{o}}ren Auer and
                  Leyla Jael Castro and
                  Marcel R. Ackermann and
                  Thomas Neumuth and
                  Daniel Schneider and
                  Ziawasch Abedjan and
                  Atif Latif and
                  Fidan Limani and
                  Raia Abu Ahmad and
                  Georg Rehm and
                  Sima Attar Khorasani and
                  Matthias Lieber},
  editor       = {Maike Klein and
                  Daniel Krupka and
                  Cornelia Winter and
                  Volker Wohlgemuth},
  title        = {{NFDI4DS} Infrastructure and Services},
  booktitle    = {53. Jahrestagung der Gesellschaft f{\"{u}}r Informatik, {INFORMATIK}
                  2023, Designing Future - Zuk{\"{u}}nfte gestalten, Berlin, Germany
                  September 26-29, 2023},
  series       = {{LNI}},
  volume       = {{P-337}},
  pages        = {919--924},
  publisher    = {Gesellschaft f{\"{u}}r Informatik, Bonn},
  year         = {2023},
  url          = {https://doi.org/10.18420/inf2023\_103},
  doi          = {10.18420/INF2023\_103},
  timestamp    = {Fri, 08 Mar 2024 15:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/gi/SchimmlerWBDKMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/FasihAMUHA23,
  author       = {Syed M. Fasih and
                  Asad Ali and
                  Talha Mabood and
                  Atif Ullah and
                  Muhammad Hanif and
                  Waqar Ahmad},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Ana Maria A. C. Rocha and
                  Chiara Garau and
                  Francesco Scorza and
                  Yeliz Karaca and
                  Carmelo M. Torre},
  title        = {Fruit Fly Detection and Classification in IoT Setup},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2023 Workshops
                  - Athens, Greece, July 3-6, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14108},
  pages        = {593--607},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37117-2\_40},
  doi          = {10.1007/978-3-031-37117-2\_40},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/FasihAMUHA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metacom/QayyumIJRKAKK23,
  author       = {Faiza Qayyum and
                  Naeem Iqbal and
                  Harun Jamil and
                  Atif Rizwan and
                  Anam Nawaz Khan and
                  Rashid Ahmad and
                  Salabat Khan and
                  Do Hyeun Kim},
  title        = {Energy Trading Framework Based on IoT and Digital Twin for Nanogrid
                  Environment},
  booktitle    = {{IEEE} International Conference on Metaverse Computing, Networking
                  and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023},
  pages        = {749--755},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MetaCom57706.2023.00142},
  doi          = {10.1109/METACOM57706.2023.00142},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/metacom/QayyumIJRKAKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/SheerazINFKSA23,
  author       = {Muhammad Sheeraz and
                  Atif Innayat and
                  Muhammad Usman Nadeem and
                  Carson Failor and
                  Nadeem Ahmad Khan and
                  Wala Saadeh and
                  Muhammad Awais Bin Altaf},
  title        = {Flexible {EEG} Headband with Artifact Reduction and Continuous Electrode
                  Skin Impedance Monitoring for Neurological Disorders},
  booktitle    = {66th {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2023, Tempe, AZ, USA, August 6-9, 2023},
  pages        = {288--292},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MWSCAS57524.2023.10405981},
  doi          = {10.1109/MWSCAS57524.2023.10405981},
  timestamp    = {Sat, 24 Feb 2024 20:42:53 +0100},
  biburl       = {https://dblp.org/rec/conf/mwscas/SheerazINFKSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09516,
  author       = {Atif Shah and
                  Maged S. Al{-}Shaibani and
                  Moataz Ahmad and
                  Reem Bunyan},
  title        = {A Bibliography of Multiple Sclerosis Lesions Detection Methods using
                  Brain MRIs},
  journal      = {CoRR},
  volume       = {abs/2302.09516},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09516},
  doi          = {10.48550/ARXIV.2302.09516},
  eprinttype    = {arXiv},
  eprint       = {2302.09516},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09516.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10689,
  author       = {Carlos Andres Agudelo Serna and
                  Rachelle Bosua and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Towards a knowledge leakage Mitigation framework for mobile Devices
                  in knowledge-intensive Organizations},
  journal      = {CoRR},
  volume       = {abs/2308.10689},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10689},
  doi          = {10.48550/ARXIV.2308.10689},
  eprinttype    = {arXiv},
  eprint       = {2308.10689},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-10920,
  author       = {Carlos Andres Agudelo Serna and
                  Rachelle Bosua and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Addressing Knowledge Leakage Risk caused by the use of mobile devices
                  in Australian Organizations},
  journal      = {CoRR},
  volume       = {abs/2308.10920},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.10920},
  doi          = {10.48550/ARXIV.2308.10920},
  eprinttype    = {arXiv},
  eprint       = {2308.10920},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-10920.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanIRMAK22,
  author       = {Anam Nawaz Khan and
                  Naeem Iqbal and
                  Atif Rizwan and
                  Sehrish Malik and
                  Rashid Ahmad and
                  DoHyeun Kim},
  title        = {A Criticality-Aware Dynamic Task Scheduling Mechanism for Efficient
                  Resource Load Balancing in Constrained Smart Manufacturing Environment},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {50933--50946},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3173157},
  doi          = {10.1109/ACCESS.2022.3173157},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhanIRMAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candc/AtifaKIAA22,
  author       = {Asghar Atifa and
                  Muhammad Altaf Khan and
                  Kulpash Iskakova and
                  Fuad S. Al{-}Duais and
                  Irshad Ahmad},
  title        = {Mathematical modeling and analysis of the SARS-Cov-2 disease with
                  reinfection},
  journal      = {Comput. Biol. Chem.},
  volume       = {98},
  pages        = {107678},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compbiolchem.2022.107678},
  doi          = {10.1016/J.COMPBIOLCHEM.2022.107678},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/candc/AtifaKIAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/Al-KhasawnehUSK22,
  author       = {Mahmoud Ahmad Al{-}Khasawneh and
                  Irfan Uddin and
                  Syed Atif Ali Shah and
                  Ahmad M. Khasawneh and
                  Laith Mohammad Abualigah and
                  Marwan Mahmoud},
  title        = {An improved chaotic image encryption algorithm using Hadoop-based
                  MapReduce framework for massive remote sensed images in parallel IoT
                  applications},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {2},
  pages        = {999--1013},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-021-03466-2},
  doi          = {10.1007/S10586-021-03466-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/Al-KhasawnehUSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/AsgharLARNAAAA22,
  author       = {Muhammad Zubair Asghar and
                  Adidah Lajis and
                  Muhammad Mansoor Alam and
                  Mohd. Khairil Rahmat and
                  Haidawati Md Nasir and
                  Hussain Ahmad and
                  Mabrook S. Al{-}Rakhami and
                  Atif Alamri and
                  Fahad R. Albogamy},
  title        = {A Deep Neural Network Model for the Detection and Classification of
                  Emotions from Textual Content},
  journal      = {Complex.},
  volume       = {2022},
  pages        = {8221121:1--8221121:12},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/8221121},
  doi          = {10.1155/2022/8221121},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/AsgharLARNAAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadMB22,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Richard L. Baskerville},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102530},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102530},
  doi          = {10.1016/J.COSE.2021.102530},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HamidNHRNA22,
  author       = {Nor Hasnul Azirah Abdul Hamid and
                  Normalina Ibrahim @ Mat Nor and
                  Fazlin Marini Hussain and
                  Rajeswari Raju and
                  Humza Naseer and
                  Atif Ahmad},
  title        = {Barriers and enablers to adoption of cyber insurance in developing
                  countries: An exploratory study of Malaysian organizations},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102893},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102893},
  doi          = {10.1016/J.COSE.2022.102893},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HamidNHRNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AbugabahMAS22,
  author       = {Ahed Abugabah and
                  Atif Mehmood and
                  Ahmad Ali AlZubi and
                  Louis Sanzogni},
  title        = {Smart {COVID-3D-SCNN:} {A} Novel Method to Classify X-ray Images of
                  {COVID-19}},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {41},
  number       = {3},
  pages        = {997--1008},
  year         = {2022},
  url          = {https://doi.org/10.32604/csse.2022.021438},
  doi          = {10.32604/CSSE.2022.021438},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/AbugabahMAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/AbugabahMAS22,
  author       = {Ahed Abugabah and
                  Atif Mehmood and
                  Sultan Almotairi and
                  Ahmad Al Smadi},
  title        = {Health care intelligent system: {A} neural network based method for
                  early diagnosis of Alzheimer's disease using {MRI} images},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {39},
  number       = {9},
  year         = {2022},
  url          = {https://doi.org/10.1111/exsy.13003},
  doi          = {10.1111/EXSY.13003},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/es/AbugabahMAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jis/UddinSAAA22,
  author       = {Muhammad Irfan Uddin and
                  Syed Atif Ali Shah and
                  Mahmoud Ahmad Al{-}Khasawneh and
                  Ala Abdulsalam Alarood and
                  Eesa Alsolami},
  title        = {Optimal policy learning for {COVID-19} prevention using reinforcement
                  learning},
  journal      = {J. Inf. Sci.},
  volume       = {48},
  number       = {3},
  pages        = {336--348},
  year         = {2022},
  url          = {https://doi.org/10.1177/0165551520959798},
  doi          = {10.1177/0165551520959798},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jis/UddinSAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/BakhtiarKRKAI22,
  author       = {Sadia Bakhtiar and
                  Farid Ullah Khan and
                  Wahad Ur Rahman and
                  Atif Sardar Khan and
                  Muhammad Masood Ahmad and
                  Muhammad Iqbal},
  title        = {A Pressure-Based Electromagnetic Energy Harvester for Pipeline Monitoring
                  Applications},
  journal      = {J. Sensors},
  volume       = {2022},
  pages        = {1--16},
  year         = {2022},
  url          = {https://doi.org/10.1155/2022/6529623},
  doi          = {10.1155/2022/6529623},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/BakhtiarKRKAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/UllahSAAUKAA22,
  author       = {Faizan Ullah and
                  Abdu Salam and
                  Muhammad Abrar and
                  Masood Ahmad and
                  Fasee Ullah and
                  Atif Khan and
                  Abdullah Alharbi and
                  Wael Alosaimi},
  title        = {Machine health surveillance system by using deep learning sparse autoencoder},
  journal      = {Soft Comput.},
  volume       = {26},
  number       = {16},
  pages        = {7737--7750},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00500-022-06755-z},
  doi          = {10.1007/S00500-022-06755-Z},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/UllahSAAUKAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZeeshanSAES22,
  author       = {Ahmad Zeeshan and
                  Nasir Shehzad and
                  Muhammad Atif and
                  Rahmat Ellahi and
                  Sadiq M. Sait},
  title        = {Electromagnetic Flow of {SWCNT/MWCNT} Suspensions in Two Immiscible
                  Water- and Engine-Oil-Based Newtonian Fluids through Porous Media},
  journal      = {Symmetry},
  volume       = {14},
  number       = {2},
  pages        = {406},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14020406},
  doi          = {10.3390/SYM14020406},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZeeshanSAES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/MoqurrabAKAAJ22,
  author       = {Syed Atif Moqurrab and
                  Adeel Anjum and
                  Abid Khan and
                  Mansoor Ahmed and
                  Awais Ahmad and
                  Gwanggil Jeon},
  title        = {\emph{Deep-Confidentiality}: An IoT-Enabled Privacy-Preserving Framework
                  for Unstructured Big Biomedical Data},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {2},
  pages        = {42:1--42:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3421509},
  doi          = {10.1145/3421509},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/MoqurrabAKAAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/ONeillMAF22,
  author       = {Ashley O'Neill and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Justin Filippou},
  title        = {Cybersecurity Incident Response in Organisations: {A} Meta-level Framework
                  for Scenario-based Training},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2022, Melbourne,
                  Australia, December 4-7, 2022},
  pages        = {35},
  year         = {2022},
  url          = {https://aisel.aisnet.org/acis2022/35},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/ONeillMAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccr/AliJFAAAA22,
  author       = {Atif Ali and
                  Yasir Khan Jadoon and
                  Zulqarnain Farid and
                  Munir Ahmad and
                  Naseem Abidi and
                  Haitham M. Alzoubi and
                  Ali A. Alzoubi},
  title        = {The Threat of Deep Fake Technology to Trusted Identity Management},
  booktitle    = {2022 International Conference on Cyber Resilience (ICCR), Dubai, United
                  Arab Emirates, October 6-7, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCR56254.2022.9995978},
  doi          = {10.1109/ICCR56254.2022.9995978},
  timestamp    = {Fri, 31 May 2024 12:01:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iccr/AliJFAAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/AndersonAC22,
  author       = {Ashley Baines Anderson and
                  Atif Ahmad and
                  Shanton Chang},
  editor       = {Niels Bj{\o}rn{-}Andersen and
                  Roman Beck and
                  Stacie Petter and
                  Tina Blegind Jensen and
                  Tilo B{\"{o}}hmann and
                  Kai{-}Lung Hui and
                  Viswanath Venkatesh},
  title        = {Competencies of Cybersecurity Leaders: {A} Review and Research Agenda},
  booktitle    = {Proceedings of the 43rd International Conference on Information Systems,
                  {ICIS} 2022, Digitization for the Next Generation, Copenhagen, Denmark,
                  December 9-14, 2022},
  publisher    = {Association for Information Systems},
  year         = {2022},
  url          = {https://aisel.aisnet.org/icis2022/security/security/9},
  timestamp    = {Tue, 14 Feb 2023 13:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/AndersonAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/SiddiquiAMKNJ22,
  author       = {Mohammad Atif Siddiqui and
                  Mohammad Nishat Anwar and
                  Ahmad Faiz Minai and
                  Akhlaque Ahmad Khan and
                  Mohammad Naseem and
                  Abdul Jabbar},
  title        = {A Direct Synthesis based Sliding Mode Control of a Nonlinear Continuous
                  Stirred Tank Reactor},
  booktitle    = {{IECON} 2022 - 48th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Brussels, Belgium, October 17-20, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IECON49645.2022.9969082},
  doi          = {10.1109/IECON49645.2022.9969082},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/SiddiquiAMKNJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-02454,
  author       = {Arslan Ahmad and
                  Atif Bin Mansoor and
                  Alcardo Alex Barakabitze and
                  Andrew Hines and
                  Luigi Atzori and
                  Ray Walshe},
  title        = {Supervised Learning based QoE Prediction of Video Streaming in Future
                  Networks: {A} Tutorial with Comparative Study},
  journal      = {CoRR},
  volume       = {abs/2202.02454},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.02454},
  eprinttype    = {arXiv},
  eprint       = {2202.02454},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-02454.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-12875,
  author       = {Antra Arshad and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Factors Influencing the Organizational Decision to Outsource {IT}
                  Security: {A} Review and Research Agenda},
  journal      = {CoRR},
  volume       = {abs/2208.12875},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.12875},
  doi          = {10.48550/ARXIV.2208.12875},
  eprinttype    = {arXiv},
  eprint       = {2208.12875},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-12875.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-13087,
  author       = {Sean B. Maynard and
                  Atif Ahmad},
  title        = {Information Security Management in High Quality {IS} Journals: {A}
                  Review and Research Agenda},
  journal      = {CoRR},
  volume       = {abs/2208.13087},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.13087},
  doi          = {10.48550/ARXIV.2208.13087},
  eprinttype    = {arXiv},
  eprint       = {2208.13087},
  timestamp    = {Thu, 01 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-13087.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmadIARA21,
  author       = {Salman Ahmad and
                  Atif Iqbal and
                  Mohammad Ali and
                  Khaliqur Rahman and
                  Abdellahi Sidi Ahmed},
  title        = {A Fast Convergent Homotopy Perturbation Method for Solving Selective
                  Harmonics Elimination {PWM} Problem in Multi Level Inverter},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {113040--113051},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3104184},
  doi          = {10.1109/ACCESS.2021.3104184},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AhmadIARA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IqbalKRAKKK21,
  author       = {Naeem Iqbal and
                  Anam Nawaz Khan and
                  Atif Rizwan and
                  Rashid Ahmad and
                  Bong Wan Kim and
                  Kwangsoo Kim and
                  Do{-}Hyeun Kim},
  title        = {Groundwater Level Prediction Model Using Correlation and Difference
                  Mechanisms Based on Boreholes Data for Sustainable Hydraulic Resource
                  Management},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {96092--96113},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3094735},
  doi          = {10.1109/ACCESS.2021.3094735},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IqbalKRAKKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IqbalRKAKKK21,
  author       = {Naeem Iqbal and
                  Atif Rizwan and
                  Anam Nawaz Khan and
                  Rashid Ahmad and
                  Bong Wan Kim and
                  Kwangsoo Kim and
                  Do Hyeun Kim},
  title        = {Boreholes Data Analysis Architecture Based on Clustering and Prediction
                  Models for Enhancing Underground Safety Verification},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {78428--78451},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3083175},
  doi          = {10.1109/ACCESS.2021.3083175},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IqbalRKAKKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RizwanIKAK21,
  author       = {Atif Rizwan and
                  Naeem Iqbal and
                  Anam Nawaz Khan and
                  Rashid Ahmad and
                  Do Hyeun Kim},
  title        = {Toward Effective Pattern Recognition Based on Enhanced Weighted K-Mean
                  Clustering Algorithm for Groundwater Resource Planning in Point Cloud},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {130154--130169},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3111112},
  doi          = {10.1109/ACCESS.2021.3111112},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RizwanIKAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RizwanKIAK21,
  author       = {Atif Rizwan and
                  Anam Nawaz Khan and
                  Naeem Iqbal and
                  Rashid Ahmad and
                  DoHyeun Kim},
  title        = {Enhanced Optimization-Based Voting Classifier and Chained Multi-Objective
                  Regressor for Effective Groundwater Resource Management},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {168329--168341},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3133889},
  doi          = {10.1109/ACCESS.2021.3133889},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RizwanKIAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZahidTAAHMF21,
  author       = {Amjad Hussain Zahid and
                  Lo'ai Tawalbeh and
                  Musheer Ahmad and
                  Ahmed Alkhayyat and
                  Malik Tahir Hassan and
                  Atif Manzoor and
                  Alaa Kadhim Farhan},
  title        = {Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation
                  for Security Applications},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {98460--98475},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3095618},
  doi          = {10.1109/ACCESS.2021.3095618},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZahidTAAHMF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/MinhasKARKAK21,
  author       = {Sidra Minhas and
                  Aasia Khanum and
                  Atif Alvi and
                  Farhan Riaz and
                  Shoab Ahmad Khan and
                  Fawaz Alsolami and
                  Muazzam Ali Khan},
  title        = {Early MCI-to-AD Conversion Prediction Using Future Value Forecasting
                  of Multimodal Features},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {6628036:1--6628036:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6628036},
  doi          = {10.1155/2021/6628036},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cin/MinhasKARKAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AhmadMBHAW21,
  author       = {Arslan Ahmad and
                  Atif Bin Mansoor and
                  Alcardo Alex Barakabitze and
                  Andrew Hines and
                  Luigi Atzori and
                  Ray Walshe},
  title        = {Supervised-learning-Based QoE Prediction of Video Streaming in Future
                  Networks: {A} Tutorial with Comparative Study},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {59},
  number       = {11},
  pages        = {88--94},
  year         = {2021},
  url          = {https://doi.org/10.1109/MCOM.001.2100109},
  doi          = {10.1109/MCOM.001.2100109},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AhmadMBHAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/MastKUSKAM21,
  author       = {Noor Mast and
                  Muhammad Altaf Khan and
                  Muhammad Irfan Uddin and
                  Syed Atif Ali Shah and
                  Atif Khan and
                  Mahmoud Ahmad Al{-}Khasawneh and
                  Marwan Mahmoud},
  title        = {Channel Contention-Based Routing Protocol for Wireless Ad Hoc Networks},
  journal      = {Complex.},
  volume       = {2021},
  pages        = {2051796:1--2051796:10},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/2051796},
  doi          = {10.1155/2021/2051796},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/MastKUSKAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadMDKWB21,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Kevin C. Desouza and
                  James Kotsias and
                  Monica T. Whitty and
                  Richard L. Baskerville},
  title        = {How can organizations develop situation awareness for incident response:
                  {A} case study of management practice},
  journal      = {Comput. Secur.},
  volume       = {101},
  pages        = {102122},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102122},
  doi          = {10.1016/J.COSE.2020.102122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadMDKWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlshaikhMA21,
  author       = {Moneer Alshaikh and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Applying social marketing to evaluate current security education training
                  and awareness programs in organisations},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102090},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102090},
  doi          = {10.1016/J.COSE.2020.102090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlshaikhMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/SmadiYZMWA21,
  author       = {Ahmad Al Smadi and
                  Shuyuan Yang and
                  Kai Zhang and
                  Atif Mehmood and
                  Min Wang and
                  Ala Alsanabani},
  title        = {Pansharpening based on convolutional autoencoder and multi-scale guided
                  filter},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2021},
  number       = {1},
  pages        = {25},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13640-021-00565-3},
  doi          = {10.1186/S13640-021-00565-3},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejivp/SmadiYZMWA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/SmadiYMA0B21,
  author       = {Ahmad Al Smadi and
                  Shuyuan Yang and
                  Atif Mehmood and
                  Ahed Abugabah and
                  Min Wang and
                  Muzaffar Bashir},
  title        = {Smart pansharpening approach using kernel-based image filtering},
  journal      = {{IET} Image Process.},
  volume       = {15},
  number       = {11},
  pages        = {2629--2642},
  year         = {2021},
  url          = {https://doi.org/10.1049/ipr2.12251},
  doi          = {10.1049/IPR2.12251},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/SmadiYMA0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/AhmadSSLI21,
  author       = {Javed Ahmad and
                  Marif Daula Siddique and
                  Adil Sarwar and
                  Chang{-}Hua Lin and
                  Atif Iqbal},
  title        = {A high gain noninverting {DC-DC} converter with low voltage stress
                  for industrial applications},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {49},
  number       = {12},
  pages        = {4212--4230},
  year         = {2021},
  url          = {https://doi.org/10.1002/cta.3129},
  doi          = {10.1002/CTA.3129},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcta/AhmadSSLI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/NaseerNAMS21,
  author       = {Ayesha Naseer and
                  Humza Naseer and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Adil Masood Siddiqui},
  title        = {Real-time analytics, incident response process agility and enterprise
                  cybersecurity performance: {A} contingent resource-based analysis},
  journal      = {Int. J. Inf. Manag.},
  volume       = {59},
  pages        = {102334},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2021.102334},
  doi          = {10.1016/J.IJINFOMGT.2021.102334},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/NaseerNAMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ThompsonAM21,
  author       = {Nik Thompson and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Do privacy concerns determine online information disclosure? The case
                  of internet addiction},
  journal      = {Inf. Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {558--569},
  year         = {2021},
  url          = {https://doi.org/10.1108/ICS-11-2020-0190},
  doi          = {10.1108/ICS-11-2020-0190},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imcs/ThompsonAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/midm/NicholsAAAAAAAA21,
  author       = {Emma Nichols and
                  Foad Abd{-}Allah and
                  Amir Abdoli and
                  Ahmed Abualhasan and
                  Eman Abu{-}Gharbieh and
                  Ashkan Afshin and
                  Rufus Akinyemi and
                  Fahad Mashhour Alanezi and
                  Vahid Alipour and
                  Amir Almasi{-}Hashiani and
                  Jalal Arabloo and
                  Amir Ashraf{-}Ganjouei and
                  Getinet Ayano and
                  Jos{\'{e}} Luis Ayuso{-}Mateos and
                  Atif Amin Baig and
                  Maciej Banach and
                  Miguel A. Barboza and
                  Suzanne Lyn Barker{-}Collo and
                  Bernhard T. Baune and
                  Akshaya Srikanth Bhagavathula and
                  Krittika Bhattacharyya and
                  Ali Bijani and
                  Atanu Biswas and
                  Archith Boloor and
                  Carol Brayne and
                  Hermann Brenner and
                  Katrin Burkart and
                  Sharath Burugina Nagaraja and
                  Felix Carvalho and
                  Luis F. S. Castro{-}de{-}Araujo and
                  Ferr{\'{a}}n Catal{\'{a}}{-}L{\'{o}}pez and
                  Ester Cerin and
                  Nicolas Cherbuin and
                  Dinh{-}Toi Chu and
                  Xiaochen Dai and
                  Antonio Reis de S{\'{a}}{-}Junior and
                  Shirin Djalalinia and
                  Abdel Douiri and
                  David Edvardsson and
                  Shaimaa I. El{-}Jaafary and
                  Sharareh Eskandarieh and
                  Andre Faro and
                  Farshad Farzadfar and
                  Valery Feigin and
                  Seyed{-}Mohammad Fereshtehnejad and
                  Eduarda Fernandes and
                  Pietro Ferrara and
                  Irina Filip and
                  Florian Fischer and
                  Shilpa Gaidhane and
                  Lucia Galluzzo and
                  Gebreamlak Gebremedhn Gebremeskel and
                  Ahmad Ghashghaee and
                  Alessandro Gialluisi and
                  Elena V. Gnedovskaya and
                  Mahaveer Golechha and
                  Rajeev Gupta and
                  Vladimir Hachinski and
                  Mohammad R. Haider and
                  Teklehaimanot Gereziher Haile and
                  Mohammad Hamiduzzaman and
                  Graeme J. Hankey and
                  Simon I. Hay and
                  Golnaz Heidari and
                  Reza Heidari{-}Soureshjani and
                  Hung Chak Ho and
                  Mowafa S. Househ and
                  Bing{-}Fang Hwang and
                  Licia Iacoviello and
                  Olayinka Stephen Ilesanmi and
                  Irena M. Ilic and
                  Milena D. Ilic and
                  Seyed Sina Naghibi Irvani and
                  Masao Iwagami and
                  Ihoghosa Osamuyi Iyamu and
                  Ravi Prakash Jha and
                  Rizwan Kalani and
                  Andr{\'{e}} Karch and
                  Ayele Semachew Kasa and
                  Yousef S. Khader and
                  Ejaz Ahmad Khan and
                  Mahalaqua Nazli Khatib and
                  Yun Jin Kim and
                  Sezer Kisa and
                  Adnan Kisa and
                  Mika Kivim{\"{a}}ki and
                  Ai Koyanagi and
                  Manasi Kumar and
                  Iv{\'{a}}n Landires and
                  Savita Lasrado and
                  Bingyu Li and
                  Stephen S. Lim and
                  Xuefeng Liu and
                  Shilpashree Madhava Kunjathur and
                  Azeem Majeed and
                  Preeti Malik and
                  Man Mohan Mehndiratta and
                  Ritesh G. Menezes and
                  Yousef Mohammad and
                  Salahuddin Mohammed and
                  Ali H. Mokdad and
                  Mohammad Ali Moni and
                  Gabriele Nagel and
                  Muhammad Naveed and
                  Vinod C. Nayak and
                  Cuong Tat Nguyen and
                  Thi Lan Huong Nguyen and
                  Virginia Nunez{-}Samudio and
                  Andrew T. Olagunju and
                  Samuel M. Ostroff and
                  Nikita Otstavnov and
                  Mayowa Owolabi and
                  Fatemeh Pashazadeh Kan and
                  Urvish K. Patel and
                  Michael R. Phillips and
                  Michael A. Piradov and
                  Constance Dimity Pond and
                  Faheem Hyder Pottoo and
                  Sergio I. Prada and
                  Amir Radfar and
                  Fakher Rahim and
                  Juwel Rana and
                  Vahid Rashedi and
                  Salman Rawaf and
                  David Laith Rawaf and
                  Nickolas Reinig and
                  Andre M. N. Renzaho and
                  Nima Rezaei and
                  Aziz Rezapour and
                  Michele Romoli and
                  Gholamreza Roshandel and
                  Perminder S. Sachdev and
                  Amirhossein Sahebkar and
                  Mohammad Ali Sahraian and
                  Mehrnoosh Samaei and
                  Mete Saylan and
                  Feng Sha and
                  Masood Ali Shaikh and
                  Kenji Shibuya and
                  Mika Shigematsu and
                  Jae Il Shin and
                  Rahman Shiri and
                  Diego Augusto Santos Silva and
                  Jasvinder A. Singh and
                  Deepika Singhal and
                  Valentin Yurievich Skryabin and
                  Anna Aleksandrovna Skryabina and
                  Amin Soheili and
                  Houman Sotoudeh and
                  Emma Elizabeth Spurlock and
                  Cassandra E. I. Szoeke and
                  Rafael Tabar{\'{e}}s{-}Seisdedos and
                  Biruk Wogayehu Taddele and
                  Marcos Roberto Tovani{-}Palone and
                  Gebiyaw Wudie Tsegaye and
                  Marco Vacante and
                  Narayanaswamy Venketasubramanian and
                  Simone Vidale and
                  Vasily Vlassov and
                  Giang Thu Vu and
                  Yuan{-}Pang Wang and
                  Jordan Weiss and
                  Abrha Hailay Weldemariam and
                  Ronny Westerman and
                  Anders Wimo and
                  Andrea Sylvia Winkler and
                  Chenkai Wu and
                  Ali Yadollahpour and
                  Metin Yesiltepe and
                  Naohiro Yonemoto and
                  Chuanhua Yu and
                  Mikhail Sergeevich Zastrozhin and
                  Anasthasia Zastrozhina and
                  Zhi{-}Jiang Zhang and
                  Christopher J. L. Murray and
                  Theo Vos},
  title        = {Use of multidimensional item response theory methods for dementia
                  prevalence prediction: an example using the Health and Retirement
                  Survey and the Aging, Demographics, and Memory Study},
  journal      = {{BMC} Medical Informatics Decis. Mak.},
  volume       = {21},
  number       = {1},
  pages        = {241},
  year         = {2021},
  url          = {https://doi.org/10.1186/s12911-021-01590-y},
  doi          = {10.1186/S12911-021-01590-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/midm/NicholsAAAAAAAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/AhmadMMA21,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Sameen Motahhir and
                  Ashley Baines Anderson},
  title        = {Case-based learning in the management practice of information security:
                  an innovative pedagogical instrument},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {25},
  number       = {5},
  pages        = {853--877},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00779-021-01561-0},
  doi          = {10.1007/S00779-021-01561-0},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/puc/AhmadMMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/AtifAA0R21,
  author       = {Muhammad Atif and
                  Rizwan Ahmad and
                  Waqas Ahmed and
                  Liang Zhao and
                  Joel J. P. C. Rodrigues},
  title        = {UAV-Assisted Wireless Localization for Search and Rescue},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {3},
  pages        = {3261--3272},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.3041573},
  doi          = {10.1109/JSYST.2020.3041573},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/AtifAA0R21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/KhanGUSAFZ21,
  author       = {Atif Khan and
                  Muhammad Adnan Gul and
                  Muhammad Irfan Uddin and
                  Syed Atif Ali Shah and
                  Shafiq Ahmad and
                  Muhammad Dzulqarnain Al Firdausi and
                  Mazen Zaindin},
  title        = {Corrigendum to "Summarizing Online Movie Reviews: {A} Machine Learning
                  Approach to Big Data Analytics"},
  journal      = {Sci. Program.},
  volume       = {2021},
  pages        = {7871490:1--7871490:1},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7871490},
  doi          = {10.1155/2021/7871490},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sp/KhanGUSAFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/RahimHKAJSHLM21,
  author       = {Muddasir Rahim and
                  Riaz Hussain and
                  Irfan Latif Khan and
                  Ahmad Naseem Alvi and
                  Muhammad Awais Javed and
                  Atif Shakeel and
                  Qadeer Ul Hasan and
                  Byung Moo Lee and
                  Shahzad Ali Malik},
  title        = {Self-Organized Efficient Spectrum Management through Parallel Sensing
                  in Cognitive Radio Network},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {5552012:1--5552012:22},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5552012},
  doi          = {10.1155/2021/5552012},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/RahimHKAJSHLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/LakshmiNMA21,
  author       = {Ritu Lakshmi and
                  Humza Naseer and
                  Sean B. Maynard and
                  Atif Ahmad},
  editor       = {Frantz Rowe and
                  Redouane El Amrani and
                  Moez Limayem and
                  Sabine Matook and
                  Christoph Rosenkranz and
                  Edgar A. Whitley and
                  Ali El Quammah},
  title        = {Sensemaking in Cybersecurity Incident Response: The interplay of Organizations,
                  Technology, and Individuals},
  booktitle    = {29th European Conference on Information Systems - Human Values Crisis
                  in a Digitizing World, {ECIS} 2021, Marrakech, Morocco, 2020},
  year         = {2021},
  url          = {https://aisel.aisnet.org/ecis2021\_rip/29},
  timestamp    = {Fri, 29 Jul 2022 11:33:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/LakshmiNMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/SmadiAMY21,
  author       = {Ahmad Al Smadi and
                  Ahed Abugabah and
                  Atif Mehmood and
                  Shuyuan Yang},
  editor       = {Nuno Varandas and
                  Ansar{-}Ul{-}Haque Yasar and
                  Haroon Malik and
                  St{\'{e}}phane Galland},
  title        = {Brain Image Fusion Approach based on Side Window Filtering},
  booktitle    = {The 12th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN} 2021) / The 11th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare (ICTH-2021), Leuven, Belgium, November 1-4, 2021},
  series       = {Procedia Computer Science},
  volume       = {198},
  pages        = {295--300},
  publisher    = {Elsevier},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.procs.2021.12.243},
  doi          = {10.1016/J.PROCS.2021.12.243},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euspn/SmadiAMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ico/MehmoodASA21,
  author       = {Atif Mehmood and
                  Ahed Abugabah and
                  Ahmad Al Smadi and
                  Reyad Alkhawaldeh},
  title        = {An Intelligent Information System and Application for the Diagnosis
                  and Analysis of {COVID-19}},
  booktitle    = {{ICO}},
  pages        = {391--396},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93247-3\_38},
  doi          = {10.1007/978-3-030-93247-3\_38},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ico/MehmoodASA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/RahmanGKTKI21,
  author       = {Syed Rahman and
                  Jonathan Ghering and
                  Irfan Ahmad Khan and
                  Mohd Tariq and
                  Akhtar Kalam and
                  Atif Iqbal},
  title        = {Novel Dynamic Power Balancing Solution for Minimization Overdesigning
                  in Military Aircraft Power System Architecture},
  booktitle    = {{IECON} 2021 - 47th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Toronto, ON, Canada, October 13-16, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IECON48115.2021.9589867},
  doi          = {10.1109/IECON48115.2021.9589867},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iecon/RahmanGKTKI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-01223,
  author       = {Atif Ikram and
                  Masita Abdul Jalil and
                  Amir Bin Ngah and
                  Ahmad Salman Khan and
                  Tahir Iqbal},
  title        = {Offshore Software Maintenance Outsourcing Predicting Clients Proposal
                  using Supervised Learning},
  journal      = {CoRR},
  volume       = {abs/2103.01223},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.01223},
  eprinttype    = {arXiv},
  eprint       = {2103.01223},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-01223.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14838,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Sameen Motahhir and
                  Moneer Alshaikh},
  title        = {Teaching Information Security Management Using an Incident of Intellectual
                  Property Leakage},
  journal      = {CoRR},
  volume       = {abs/2103.14838},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14838},
  eprinttype    = {arXiv},
  eprint       = {2103.14838},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14839,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Sameen Motahhir},
  title        = {Teaching Information Security Management in Postgraduate Tertiary
                  Education: The Case of Horizon Automotive Industries},
  journal      = {CoRR},
  volume       = {abs/2103.14839},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14839},
  eprinttype    = {arXiv},
  eprint       = {2103.14839},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14839.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-15005,
  author       = {Atif Ahmad and
                  Jeb Webb and
                  Kevin C. Desouza and
                  James Boorman},
  title        = {Strategically-Motivated Advanced Persistent Threat: Definition, Process,
                  Tactics and a Disinformation Model of Counterattack},
  journal      = {CoRR},
  volume       = {abs/2103.15005},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.15005},
  eprinttype    = {arXiv},
  eprint       = {2103.15005},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-15005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07138,
  author       = {Abhineet Gupta and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {The Dark Web Phenomenon: {A} Review and Research Agenda},
  journal      = {CoRR},
  volume       = {abs/2104.07138},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07138},
  eprinttype    = {arXiv},
  eprint       = {2104.07138},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07138.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07140,
  author       = {Hibah Altukruni and
                  Sean B. Maynard and
                  Moneer Alshaikh and
                  Atif Ahmad},
  title        = {Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations:
                  Behavioural aspects and Key controls},
  journal      = {CoRR},
  volume       = {abs/2104.07140},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07140},
  eprinttype    = {arXiv},
  eprint       = {2104.07140},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07140.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07141,
  author       = {Mazino Onibere and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Dynamic Information Security Management Capability: Strategising for
                  Organisational Performance},
  journal      = {CoRR},
  volume       = {abs/2104.07141},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07141},
  eprinttype    = {arXiv},
  eprint       = {2104.07141},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-07144,
  author       = {Abid Hussain Shah and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Humza Naseer},
  title        = {Enhancing Strategic Information Security Management in Organizations
                  through Information Warfare Practices},
  journal      = {CoRR},
  volume       = {abs/2104.07144},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.07144},
  eprinttype    = {arXiv},
  eprint       = {2104.07144},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-07144.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-09627,
  author       = {Syed Rameez Naqvi and
                  Adnan Ahmad and
                  S. M. Riazul Islam and
                  Tallha Akram and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Atif Alamri},
  title        = {Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal
                  Tournament Scheduling},
  journal      = {CoRR},
  volume       = {abs/2106.09627},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.09627},
  eprinttype    = {arXiv},
  eprint       = {2106.09627},
  timestamp    = {Tue, 29 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-09627.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-02941,
  author       = {Ritu Lakshmi and
                  Humza Naseer and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Sensemaking in Cybersecurity Incident Response: The Interplay of Organizations,
                  Technology and Individuals},
  journal      = {CoRR},
  volume       = {abs/2107.02941},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.02941},
  eprinttype    = {arXiv},
  eprint       = {2107.02941},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-02941.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-04996,
  author       = {Ashley O'Neill and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Cybersecurity Incident Response in Organisations: {A} Meta-level Framework
                  for Scenario-based Training},
  journal      = {CoRR},
  volume       = {abs/2108.04996},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.04996},
  eprinttype    = {arXiv},
  eprint       = {2108.04996},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-04996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-08460,
  author       = {Tianda Li and
                  Yassir El Mesbahi and
                  Ivan Kobyzev and
                  Ahmad Rashid and
                  Atif Mahmud and
                  Nithin Anchuri and
                  Habib Hajimolahoseini and
                  Yang Liu and
                  Mehdi Rezagholizadeh},
  title        = {A Short Study on Compressing Decoder-Based Language Models},
  journal      = {CoRR},
  volume       = {abs/2110.08460},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.08460},
  eprinttype    = {arXiv},
  eprint       = {2110.08460},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-08460.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FelembanRBANMHQ20,
  author       = {Emad A. Felemban and
                  Faizan Ur Rehman and
                  Sardar Asad Ali Biabani and
                  Akhlaq Ahmad and
                  Atif Naseer and
                  Abdur Rahman Muhammad Abdul Majid and
                  Omar K. Hussain and
                  Ahmad Muaz Qamar and
                  Rowid Falemban and
                  Fakhri Zanjir},
  title        = {Digital Revolution for Hajj Crowd Management: {A} Technology Survey},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {208583--208609},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3037396},
  doi          = {10.1109/ACCESS.2020.3037396},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FelembanRBANMHQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaseriNEAM20,
  author       = {Aimi Nadrah Maseri and
                  Azah Anir Norman and
                  Christopher Ifeanyi Eke and
                  Atif Ahmad and
                  Nurul Nuha Abdul Molok},
  title        = {Socio-Technical Mitigation Effort to Combat Cyber Propaganda: {A}
                  Systematic Literature Mapping},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {92929--92944},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2994658},
  doi          = {10.1109/ACCESS.2020.2994658},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaseriNEAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccftpci/FayedAAHA20,
  author       = {Mahmoud S. Fayed and
                  Muhammad Al{-}Qurishi and
                  Atif Alamri and
                  M. Anwar Hossain and
                  Ahmad A. Al{-}Daraiseh},
  title        = {{PWCT:} a novel general-purpose visual programming language in support
                  of pervasive application development},
  journal      = {{CCF} Trans. Pervasive Comput. Interact.},
  volume       = {2},
  number       = {3},
  pages        = {164--177},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42486-020-00038-y},
  doi          = {10.1007/S42486-020-00038-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccftpci/FayedAAHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/AhmadHUKAUAA20,
  author       = {Masood Ahmad and
                  Abdul Hameed and
                  Fasee Ullah and
                  Atif Khan and
                  Hashem Alyami and
                  Muhammad Irfan Uddin and
                  Abdullah Alharbi and
                  Furqan Aziz},
  title        = {Cluster Optimization in Mobile Ad Hoc Networks Based on Memetic Algorithm:
                  memeHoc},
  journal      = {Complex.},
  volume       = {2020},
  pages        = {2528189:1--2528189:12},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/2528189},
  doi          = {10.1155/2020/2528189},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/AhmadHUKAUAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/AhmadUKSKZAM20,
  author       = {Yasir Ahmad and
                  Mohib Ullah and
                  Rafiullah Khan and
                  Bushra Shafi and
                  Atif Khan and
                  Mahdi Zareei and
                  Abdallah Aldosary and
                  Ehab Mahmoud Mohamed},
  title        = {SiFSO: Fish Swarm Optimization-Based Technique for Efficient Community
                  Detection in Complex Networks},
  journal      = {Complex.},
  volume       = {2020},
  pages        = {6695032:1--6695032:9},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/6695032},
  doi          = {10.1155/2020/6695032},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/AhmadUKSKZAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/ShahUAAAS20,
  author       = {Syed Atif Ali Shah and
                  Muhammad Irfan Uddin and
                  Furqan Aziz and
                  Shafiq Ahmad and
                  Mahmoud Ahmad Al{-}Khasawneh and
                  Mohamed Sharaf},
  title        = {An Enhanced Deep Neural Network for Predicting Workplace Absenteeism},
  journal      = {Complex.},
  volume       = {2020},
  pages        = {5843932:1--5843932:12},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/5843932},
  doi          = {10.1155/2020/5843932},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/ShahUAAAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/UddinZASZSAM20,
  author       = {Muhammad Irfan Uddin and
                  Nazir Zada and
                  Furqan Aziz and
                  Yousaf Saeed and
                  Asim Zeb and
                  Syed Atif Ali Shah and
                  Mahmoud Ahmad Al{-}Khasawneh and
                  Marwan Mahmoud},
  title        = {Prediction of Future Terrorist Activities Using Deep Neural Networks},
  journal      = {Complex.},
  volume       = {2020},
  pages        = {1373087:1--1373087:16},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/1373087},
  doi          = {10.1155/2020/1373087},
  timestamp    = {Mon, 11 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/UddinZASZSAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DesouzaANS20,
  author       = {Kevin C. Desouza and
                  Atif Ahmad and
                  Humza Naseer and
                  Munish Sharma},
  title        = {Weaponizing information systems for political disruption: The Actor,
                  Lever, Effects, and Response Taxonomy {(ALERT)}},
  journal      = {Comput. Secur.},
  volume       = {88},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101606},
  doi          = {10.1016/J.COSE.2019.101606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DesouzaANS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jasis/AhmadDMNB20,
  author       = {Atif Ahmad and
                  Kevin C. Desouza and
                  Sean B. Maynard and
                  Humza Naseer and
                  Richard L. Baskerville},
  title        = {How integration of cyber security management and incident response
                  enables organizational learning},
  journal      = {J. Assoc. Inf. Sci. Technol.},
  volume       = {71},
  number       = {8},
  pages        = {939--953},
  year         = {2020},
  url          = {https://doi.org/10.1002/asi.24311},
  doi          = {10.1002/ASI.24311},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jasis/AhmadDMNB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/UddinSA20,
  author       = {Muhammad Irfan Uddin and
                  Syed Atif Ali Shah and
                  Mahmoud Ahmad Al{-}Khasawneh},
  title        = {A Novel Deep Convolutional Neural Network Model to Monitor People
                  following Guidelines to Avoid {COVID-19}},
  journal      = {J. Sensors},
  volume       = {2020},
  pages        = {8856801:1--8856801:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8856801},
  doi          = {10.1155/2020/8856801},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/UddinSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ShahzadG20,
  author       = {Muhammad Atif Shahzad and
                  Waqar Ahmad Gulzar},
  title        = {Industrie 4.0 Readiness: Green Computing in Relation with Key Performance
                  Indicator for a Manufacturing Industry},
  journal      = {Mob. Networks Appl.},
  volume       = {25},
  number       = {4},
  pages        = {1299--1306},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11036-020-01548-w},
  doi          = {10.1007/S11036-020-01548-W},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ShahzadG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/KhanFUMSIAM20,
  author       = {Zahid Alam Khan and
                  Zhengyong Feng and
                  Muhammad Irfan Uddin and
                  Noor Mast and
                  Syed Atif Ali Shah and
                  Muhammad Imtiaz and
                  Mahmoud Ahmad Al{-}Khasawneh and
                  Marwan Mahmoud},
  title        = {Optimal Policy Learning for Disease Prevention Using Reinforcement
                  Learning},
  journal      = {Sci. Program.},
  volume       = {2020},
  pages        = {7627290:1--7627290:13},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/7627290},
  doi          = {10.1155/2020/7627290},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sp/KhanFUMSIAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/KhanGUSAFZ20,
  author       = {Atif Khan and
                  Muhammad Adnan Gul and
                  Muhammad Irfan Uddin and
                  Syed Atif Ali Shah and
                  Shafiq Ahmad and
                  Muhammad Dzulqarnain Al Firdausi and
                  Mazen Zaindin},
  title        = {Summarizing Online Movie Reviews: {A} Machine Learning Approach to
                  Big Data Analytics},
  journal      = {Sci. Program.},
  volume       = {2020},
  pages        = {5812715:1--5812715:14},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/5812715},
  doi          = {10.1155/2020/5812715},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sp/KhanGUSAFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/KhanIUZAFZ20,
  author       = {Atif Khan and
                  Ibrahim Ibrahim and
                  Muhammad Irfan Uddin and
                  Muhammad Zubair and
                  Shafiq Ahmad and
                  Muhammad Dzulqarnain Al Firdausi and
                  Mazen Zaindin},
  title        = {Machine Learning Approach for Answer Detection in Discussion Forums:
                  An Application of Big Data Analytics},
  journal      = {Sci. Program.},
  volume       = {2020},
  pages        = {4621196:1--4621196:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/4621196},
  doi          = {10.1155/2020/4621196},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sp/KhanIUZAFZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/AhmadMM20,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Sameen Motahhir},
  title        = {Teaching Information Security Management in Postgraduate Tertiary
                  Education: The Case of Horizon Automotive Industries},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington,
                  New Zealand, December 1-4, 2020},
  pages        = {54},
  year         = {2020},
  url          = {https://aisel.aisnet.org/acis2020/54},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/AhmadMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/AhmadMMA20,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Sameen Motahhir and
                  Moneer Alshaikh},
  title        = {Teaching Information Security Management Using an Incident of Intellectual
                  Property Leakage},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2020, Wellington,
                  New Zealand, December 1-4, 2020},
  pages        = {36},
  year         = {2020},
  url          = {https://aisel.aisnet.org/acis2020/36},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/AhmadMMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/AhmadDMWKB20,
  author       = {Atif Ahmad and
                  Kevin C. Desouza and
                  Sean B. Maynard and
                  Monica T. Whitty and
                  James Kotsias and
                  Richard L. Baskerville},
  editor       = {Joey F. George and
                  Souren Paul and
                  Rahul De' and
                  Elena Karahanna and
                  Suprateek Sarker and
                  Gal Oestreicher{-}Singer},
  title        = {Situation-Awareness in Incident Response: An In-depth Case Study and
                  Process Model},
  booktitle    = {Proceedings of the 41st International Conference on Information Systems,
                  {ICIS} 2020, Making Digital Inclusive: Blending the Locak and the
                  Global, Hyderabad, India, December 13-16, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/icis2020/cyber\_security\_privacy/cyber\_security\_privacy/1},
  timestamp    = {Tue, 06 Apr 2021 14:35:57 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/AhmadDMWKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/WongMAN20,
  author       = {Chee Kong Wong and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Humza Naseer},
  editor       = {Joey F. George and
                  Souren Paul and
                  Rahul De' and
                  Elena Karahanna and
                  Suprateek Sarker and
                  Gal Oestreicher{-}Singer},
  title        = {Information Security Governance: {A} Process Model and Pilot Case
                  Study},
  booktitle    = {Proceedings of the 41st International Conference on Information Systems,
                  {ICIS} 2020, Making Digital Inclusive: Blending the Locak and the
                  Global, Hyderabad, India, December 13-16, 2020},
  publisher    = {Association for Information Systems},
  year         = {2020},
  url          = {https://aisel.aisnet.org/icis2020/cyber\_security\_privacy/cyber\_security\_privacy/3},
  timestamp    = {Tue, 06 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/WongMAN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AtifLAKQBIA19,
  author       = {Muhammad Atif and
                  Siddique Latif and
                  Rizwan Ahmad and
                  Adnan Khalid Kiani and
                  Junaid Qadir and
                  Adeel Baig and
                  Hisao Ishibuchi and
                  Waseem Abbas},
  title        = {Soft Computing Techniques for Dependable Cyber-Physical Systems},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {72030--72049},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2920317},
  doi          = {10.1109/ACCESS.2019.2920317},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AtifLAKQBIA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RahmanIADA19,
  author       = {Khaliqur Rahman and
                  Atif Iqbal and
                  Mohammed A. Al{-}Hitmi and
                  Obrad Dordevic and
                  Salman Ahmad},
  title        = {Performance Analysis of a Three-to-Five Phase Dual Matrix Converter
                  Based on Space Vector Pulse Width Modulation},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {12307--12318},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2892514},
  doi          = {10.1109/ACCESS.2019.2892514},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RahmanIADA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadWDB19,
  author       = {Atif Ahmad and
                  Jeb Webb and
                  Kevin C. Desouza and
                  James Boorman},
  title        = {Strategically-motivated advanced persistent threat: Definition, process,
                  tactics and a disinformation model of counterattack},
  journal      = {Comput. Secur.},
  volume       = {86},
  pages        = {402--418},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.07.001},
  doi          = {10.1016/J.COSE.2019.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadWDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KamalAMSAN19,
  author       = {Miraal Kamal and
                  Manal Atif and
                  Hafsa Mujahid and
                  Tamer Shanableh and
                  Abdul{-}Rahman Al{-}Ali and
                  Ahmad Al Nabulsi},
  title        = {IoT Based Smart City Bus Stops},
  journal      = {Future Internet},
  volume       = {11},
  number       = {11},
  pages        = {227},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11110227},
  doi          = {10.3390/FI11110227},
  timestamp    = {Sat, 09 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KamalAMSAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jkm/ButtA19,
  author       = {Atif Saleem Butt and
                  Ahmad Bayiz Ahmad},
  title        = {Are there any antecedents of top-down knowledge hiding in firms? Evidence
                  from the United Arab Emirates},
  journal      = {J. Knowl. Manag.},
  volume       = {23},
  number       = {8},
  pages        = {1605--1627},
  year         = {2019},
  url          = {https://doi.org/10.1108/JKM-04-2019-0204},
  doi          = {10.1108/JKM-04-2019-0204},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jkm/ButtA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sis/AbbasAAKFK19,
  author       = {Sagheer Abbas and
                  Tahir Alyas and
                  Atifa Athar and
                  Muhammad Adnan Khan and
                  Areej Fatima and
                  Waseem Ahmad Khan},
  title        = {Cloud Services Ranking by measuring Multiple Parameters using {AFIS}},
  journal      = {{EAI} Endorsed Trans. Scalable Inf. Syst.},
  volume       = {6},
  number       = {22},
  pages        = {e4},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.159354},
  doi          = {10.4108/EAI.13-7-2018.159354},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sis/AbbasAAKFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/AlhindiAAATA19,
  author       = {Ahmad Alhindi and
                  Abrar Alhindi and
                  Atif Alhejali and
                  Abdullah Alsheddy and
                  Nasser Tairan and
                  Hosam Alhakami},
  title        = {{MOEA/D-GLS:} a multiobjective memetic algorithm using decomposition
                  and guided local search},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {19},
  pages        = {9605--9615},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-018-3524-z},
  doi          = {10.1007/S00500-018-3524-Z},
  timestamp    = {Sat, 05 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/AlhindiAAATA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/KhanKTB19,
  author       = {Faraz Ahmad Khan and
                  Fouad Khelifi and
                  Muhammad Atif Tahir and
                  Ahmed Bouridane},
  title        = {Dissimilarity Gaussian Mixture Models for Efficient Offline Handwritten
                  Text-Independent Identification Using {SIFT} and RootSIFT Descriptors},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {2},
  pages        = {289--303},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2850011},
  doi          = {10.1109/TIFS.2018.2850011},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/KhanKTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/AltukruniMAA19,
  author       = {Hibah Altukruni and
                  Sean B. Maynard and
                  Moneer Alshaikh and
                  Atif Ahmad},
  title        = {Exploring Knowledge Leakage Risk in Knowledge-Intensive Organisations:
                  behavioural aspects and key controls},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin
                  University, Perth, Australia, December 9-11, 2019},
  pages        = {8},
  year         = {2019},
  url          = {https://aisel.aisnet.org/acis2019/8},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/AltukruniMAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/GuptaMA19,
  author       = {Abhineet Gupta and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {The Dark Web Phenomenon: {A} Review and Research Agenda},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin
                  University, Perth, Australia, December 9-11, 2019},
  pages        = {1},
  year         = {2019},
  url          = {https://aisel.aisnet.org/acis2019/1},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/GuptaMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/OnibereAM19,
  author       = {Mazino Onibere and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Dynamic Information Security Management Capability: Strategising for
                  Organisational Performance},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin
                  University, Perth, Australia, December 9-11, 2019},
  pages        = {72},
  year         = {2019},
  url          = {https://aisel.aisnet.org/acis2019/72},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/OnibereAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/ShahAMN19,
  author       = {Abid Hussain Shah and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Humza Naseer},
  title        = {Enhancing Strategic Information Security Management in Organizations
                  through Information Warfare Practices},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2019, Curtin
                  University, Perth, Australia, December 9-11, 2019},
  pages        = {48},
  year         = {2019},
  url          = {https://aisel.aisnet.org/acis2019/48},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/ShahAMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/AlshaikhNAM19,
  author       = {Moneer Alshaikh and
                  Humza Naseer and
                  Atif Ahmad and
                  Sean B. Maynard},
  editor       = {Jan vom Brocke and
                  Shirley Gregor and
                  Oliver M{\"{u}}ller},
  title        = {Toward Sustainable behaviour Change: an Approach for Cyber Security
                  Education Training and Awareness},
  booktitle    = {27th European Conference on Information Systems - Information Systems
                  for a Sharing Society, {ECIS} 2019, Stockholm and Uppsala, Sweden,
                  June 8-14, 2019},
  year         = {2019},
  url          = {https://aisel.aisnet.org/ecis2019\_rp/100},
  timestamp    = {Wed, 05 Jun 2019 13:01:12 +0200},
  biburl       = {https://dblp.org/rec/conf/ecis/AlshaikhNAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AhmadRRJ19,
  author       = {Qadeer Ahmad and
                  Atif Rafiq and
                  Muhammad Adil Raja and
                  Noman Javed},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Evolving {MIMO} multi-layered artificial neural networks using grammatical
                  evolution},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {1278--1285},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297408},
  doi          = {10.1145/3297280.3297408},
  timestamp    = {Sun, 02 Jun 2019 21:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/AhmadRRJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wts/AlbehadiliAJJOD19,
  author       = {Abdulsahib Albehadili and
                  Atif Ali and
                  Farha Jahan and
                  Ahmad Y. Javaid and
                  Jared Oluoch and
                  Vijay Kumar Devabhaktuni},
  editor       = {Steven R. Powell and
                  Thomas Ketseoglou and
                  J. P. Shim and
                  Zory Marantz and
                  Albena Mihovska and
                  Hong Zhao and
                  Qing{-}An Zeng},
  title        = {Machine Learning-based Primary User Emulation Attack Detection In
                  Cognitive Radio Networks using Pattern Described Link-Signature {(PDLS)}},
  booktitle    = {2019 Wireless Telecommunications Symposium, {WTS} 2019, New York City,
                  NY, USA, April 9-12, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WTS.2019.8715527},
  doi          = {10.1109/WTS.2019.8715527},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wts/AlbehadiliAJJOD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HussainHJGAA18,
  author       = {Bilal Hussain and
                  Qadeer Ul Hasan and
                  Nadeem Javaid and
                  Mohsen Guizani and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {An Innovative Heuristic Algorithm for IoT-Enabled Smart Homes for
                  Developing Countries},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {15550--15575},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2809778},
  doi          = {10.1109/ACCESS.2018.2809778},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HussainHJGAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JavaidJIGAA18,
  author       = {Sakeena Javaid and
                  Nadeem Javaid and
                  Sohail Iqbal and
                  Mohsen Guizani and
                  Ahmad S. Al{-}Mogren and
                  Atif Alamri},
  title        = {Energy Management With a World-Wide Adaptive Thermostat Using Fuzzy
                  Inference System},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {33489--33502},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2828040},
  doi          = {10.1109/ACCESS.2018.2828040},
  timestamp    = {Thu, 21 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JavaidJIGAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZafarSKIAAAA18,
  author       = {Atique Ahmad Zafar and
                  Shahela Saif and
                  Muzafar Khan and
                  Javed Iqbal and
                  Adnan Akhunzada and
                  Wadood Abdul and
                  Ahmad S. Al{-}Mogren and
                  Atif Alamri},
  title        = {Taxonomy of Factors Causing Integration Failure during Global Software
                  Development},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {22228--22239},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2782843},
  doi          = {10.1109/ACCESS.2017.2782843},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZafarSKIAAAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/AsadUllahKAARA18,
  author       = {Muhammad AsadUllah and
                  Muhammad Adnan Khan and
                  Sagheer Abbas and
                  Atifa Athar and
                  Syed Saqib Raza and
                  Gulzar Ahmad},
  title        = {Blind Channel and Data Estimation Using Fuzzy Logic-Empowered Opposite
                  Learning-Based Mutant Particle Swarm Optimization},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2018},
  pages        = {6759526:1--6759526:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/6759526},
  doi          = {10.1155/2018/6759526},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cin/AsadUllahKAARA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Al-QurishiRHAAA18,
  author       = {Muhammad Al{-}Qurishi and
                  Sk. Md. Mizanur Rahman and
                  M. Shamim Hossain and
                  Ahmad Almogren and
                  Majed A. AlRubaian and
                  Atif Alamri and
                  Mabrook Al{-}Rakhami and
                  Brij B. Gupta},
  title        = {An efficient key agreement protocol for Sybil-precaution in online
                  social networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {84},
  pages        = {139--148},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.07.055},
  doi          = {10.1016/J.FUTURE.2017.07.055},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/Al-QurishiRHAAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HamidAHAAKM18,
  author       = {Md. Abdul Hamid and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren and
                  Atif Alamri and
                  Abu Raihan M. Kamal and
                  Md. Mamun{-}Or{-}Rashid},
  title        = {A key distribution scheme for secure communication in acoustic sensor
                  networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {1209--1217},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.07.025},
  doi          = {10.1016/J.FUTURE.2017.07.025},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HamidAHAAKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/MolokAC18,
  author       = {Nurul Nuha Abdul Molok and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {A case analysis of securing organisations against information leakage
                  through online social networking},
  journal      = {Int. J. Inf. Manag.},
  volume       = {43},
  pages        = {351--356},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2018.08.013},
  doi          = {10.1016/J.IJINFOMGT.2018.08.013},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/MolokAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/KhanSFKJAAP18,
  author       = {Atif Khan and
                  Naomie Salim and
                  Haleem Farman and
                  Murad Khan and
                  Bilal Jan and
                  Awais Ahmad and
                  Imran Ahmed and
                  Anand Paul},
  title        = {Abstractive Text Summarization based on Improved Semantic Graph Approach},
  journal      = {Int. J. Parallel Program.},
  volume       = {46},
  number       = {5},
  pages        = {992--1016},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10766-018-0560-3},
  doi          = {10.1007/S10766-018-0560-3},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijpp/KhanSFKJAAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HossainMAMAAA18,
  author       = {M. Shamim Hossain and
                  Ghulam Muhammad and
                  Muhammad Al{-}Qurishi and
                  Mehedi Masud and
                  Ahmad Almogren and
                  Wadood Abdul and
                  Atif Alamri},
  title        = {Cloud-oriented emotion feedback-based Exergames framework},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {17},
  pages        = {21861--21877},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4621-1},
  doi          = {10.1007/S11042-017-4621-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HossainMAMAAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pajais/MaynardOA18,
  author       = {Sean B. Maynard and
                  Mazino Onibere and
                  Atif Ahmad},
  title        = {Defining the Strategic Role of the Chief Information Security Officer},
  journal      = {Pac. Asia J. Assoc. Inf. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {3},
  year         = {2018},
  url          = {https://aisel.aisnet.org/pajais/vol10/iss3/3},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pajais/MaynardOA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pajais/MaynardTAR18,
  author       = {Sean B. Maynard and
                  Terrence H. Tan and
                  Atif Ahmad and
                  Tobias Ruighaver},
  title        = {Towards a Framework for Strategic Security Context in Information
                  Security Governance},
  journal      = {Pac. Asia J. Assoc. Inf. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {4},
  year         = {2018},
  url          = {https://aisel.aisnet.org/pajais/vol10/iss4/4},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pajais/MaynardTAR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tele/HossainHMAA18,
  author       = {M. Shamim Hossain and
                  Mohamad Hoda and
                  Ghulam Muhammad and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {Cloud-supported framework for patients in post-stroke disability rehabilitation},
  journal      = {Telematics Informatics},
  volume       = {35},
  number       = {4},
  pages        = {826--836},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tele.2017.12.001},
  doi          = {10.1016/J.TELE.2017.12.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tele/HossainHMAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/MinhasKRKA18,
  author       = {Sidra Minhas and
                  Aasia Khanum and
                  Farhan Riaz and
                  Shoab Ahmad Khan and
                  Atif Alvi},
  title        = {Predicting Progression From Mild Cognitive Impairment to Alzheimer's
                  Disease Using Autoregressive Modelling of Longitudinal and Multimodal
                  Biomarkers},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {22},
  number       = {3},
  pages        = {818--825},
  year         = {2018},
  url          = {https://doi.org/10.1109/JBHI.2017.2703918},
  doi          = {10.1109/JBHI.2017.2703918},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/MinhasKRKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/SernaBAM18,
  author       = {Carlos Andres Agudelo Serna and
                  Rachelle Bosua and
                  Atif Ahmad and
                  Sean B. Maynard},
  editor       = {Peter M. Bednar and
                  Ulrich Frank and
                  Karlheinz Kautz},
  title        = {Towards a Knowledge Leakage Mitigation Framework for Mobile Devices
                  in Knowledge-Intensive Organizations},
  booktitle    = {26th European Conference on Information Systems: Beyond Digitization
                  - Facets of Socio-Technical Change, {ECIS} 2018, Portsmouth, UK, June
                  23-28, 2018},
  pages        = {72},
  year         = {2018},
  url          = {https://aisel.aisnet.org/ecis2018\_rp/72},
  timestamp    = {Thu, 13 Dec 2018 13:03:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/SernaBAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/AlshaikhMAC18,
  author       = {Moneer Alshaikh and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Shanton Chang},
  editor       = {Tung Bui},
  title        = {An Exploratory Study of Current Information Security Training and
                  Awareness Practices in Organizations},
  booktitle    = {51st Hawaii International Conference on System Sciences, {HICSS} 2018,
                  Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2018},
  url          = {https://hdl.handle.net/10125/50524},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/AlshaikhMAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/NaseerAMS18,
  author       = {Humza Naseer and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Graeme G. Shanks},
  editor       = {Jan Pries{-}Heje and
                  Sudha Ram and
                  Michael Rosemann},
  title        = {Cybersecurity Risk Management Using Analytics: {A} Dynamic Capabilities
                  Approach},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Bridging the Internet of People, Data, and Things, {ICIS} 2018,
                  San Francisco, CA, USA, December 13-16, 2018},
  publisher    = {Association for Information Systems},
  year         = {2018},
  url          = {https://aisel.aisnet.org/icis2018/governance/Presentations/4},
  timestamp    = {Tue, 22 Jan 2019 10:41:07 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/NaseerAMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/KhanIS18,
  author       = {Ahmad Khan and
                  Atif Iqbal and
                  Mohammad B. Shadmand},
  title        = {Novel {LCL} Filter for Non-Isolated Photovoltaic Inverters with {CM}
                  Current Trapping Capability for Weak Grids},
  booktitle    = {{IECON} 2018 - 44th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Washington, DC, USA, October 21-23, 2018},
  pages        = {6128--6132},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IECON.2018.8591076},
  doi          = {10.1109/IECON.2018.8591076},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/KhanIS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-10472,
  author       = {Muhammad Atif and
                  Siddique Latif and
                  Rizwan Ahmad and
                  Adnan Khalid Kiani and
                  Junaid Qadir and
                  Adeel Baig and
                  Hisao Ishibuchi and
                  Waseem Abbas},
  title        = {Soft Computing Techniques for Dependable Cyber-Physical Systems},
  journal      = {CoRR},
  volume       = {abs/1801.10472},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.10472},
  eprinttype    = {arXiv},
  eprint       = {1801.10472},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-10472.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AzamJAAAA17,
  author       = {Irfan Azam and
                  Nadeem Javaid and
                  Ashfaq Ahmad and
                  Wadood Abdul and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {Balanced Load Distribution With Energy Hole Avoidance in Underwater
                  WSNs},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {15206--15221},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2660767},
  doi          = {10.1109/ACCESS.2017.2660767},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AzamJAAAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HamidRHAA17,
  author       = {Hadeal Abdulaziz Al Hamid and
                  Sk. Md. Mizanur Rahman and
                  M. Shamim Hossain and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {A Security Model for Preserving the Privacy of Medical Big Data in
                  a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based
                  Cryptography},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {22313--22328},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2757844},
  doi          = {10.1109/ACCESS.2017.2757844},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HamidRHAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/UddinHAAAF17,
  author       = {Md. Zia Uddin and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren and
                  Atif Alamri and
                  Majed A. AlRubaian and
                  Giancarlo Fortino},
  title        = {Facial Expression Recognition Utilizing Local Direction-Based Robust
                  Features and Deep Belief Network},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {4525--4536},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2676238},
  doi          = {10.1109/ACCESS.2017.2676238},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/UddinHAAAF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajis/HorneMA17,
  author       = {Craig A. Horne and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Organisational Information Security Strategy: Review, Discussion and
                  Future Research},
  journal      = {Australas. J. Inf. Syst.},
  volume       = {21},
  year         = {2017},
  url          = {https://journal.acs.org.au/index.php/ajis/article/view/1427},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ajis/HorneMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/NurSHRIAHA17,
  author       = {Fernaz Narin Nur and
                  Selina Sharmin and
                  Md. Ahsan Habib and
                  Md. Abdur Razzaque and
                  Md. Shariful Islam and
                  Ahmad Almogren and
                  Mohammad Mehedi Hassan and
                  Atif Alamri},
  title        = {Collaborative neighbor discovery in directional wireless sensor networks:
                  algorithm and analysis},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2017},
  pages        = {119},
  year         = {2017},
  url          = {https://doi.org/10.1186/s13638-017-0903-6},
  doi          = {10.1186/S13638-017-0903-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/NurSHRIAHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KhanTKBA17,
  author       = {Faraz Ahmad Khan and
                  Muhammad Atif Tahir and
                  Fouad Khelifi and
                  Ahmed Bouridane and
                  Resheed Almotaeryi},
  title        = {Robust off-line text independent writer identification using bagged
                  discrete cosine transform features},
  journal      = {Expert Syst. Appl.},
  volume       = {71},
  pages        = {404--415},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.eswa.2016.11.012},
  doi          = {10.1016/J.ESWA.2016.11.012},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/KhanTKBA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/AhmadZSA17,
  author       = {Uzair Ahmad and
                  Anam Zahid and
                  Muhammad Shoaib and
                  Atif Alamri},
  title        = {HarVis: An integrated social media content analysis framework for
                  YouTube platform},
  journal      = {Inf. Syst.},
  volume       = {69},
  pages        = {25--39},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.is.2016.10.004},
  doi          = {10.1016/J.IS.2016.10.004},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/is/AhmadZSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mbec/AL-QuraishiIAHA17,
  author       = {Maged S. Al{-}Quraishi and
                  Asnor J. Ishak and
                  Siti Anom Ahmad and
                  Mohd K. Hasan and
                  Muhammad Al{-}Qurishi and
                  Hossein Ghapanchizadeh and
                  Atif Alamri},
  title        = {Classification of ankle joint movements based on surface electromyography
                  signals for rehabilitation robot applications},
  journal      = {Medical Biol. Eng. Comput.},
  volume       = {55},
  number       = {5},
  pages        = {747--758},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11517-016-1551-4},
  doi          = {10.1007/S11517-016-1551-4},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mbec/AL-QuraishiIAHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/JavaidMANAAI17,
  author       = {Nadeem Javaid and
                  Hammad Maqsood and
                  Wadood Abdul and
                  Iftikhar Azim Niaz and
                  Ahmad Almogren and
                  Atif Alamri and
                  Manzoor Ilahi},
  title        = {A Localization Based Cooperative Routing Protocol for Underwater Wireless
                  Sensor Networks},
  journal      = {Mob. Inf. Syst.},
  volume       = {2017},
  pages        = {7954175:1--7954175:16},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/7954175},
  doi          = {10.1155/2017/7954175},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/JavaidMANAAI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/JavaidEAAANG17,
  author       = {Nadeem Javaid and
                  Mudassir Ejaz and
                  Wadood Abdul and
                  Atif Alamri and
                  Ahmad Almogren and
                  Iftikhar Azim Niaz and
                  Nadra Guizani},
  title        = {Cooperative Position Aware Mobility Pattern of AUVs for Avoiding Void
                  Zones in Underwater WSNs},
  journal      = {Sensors},
  volume       = {17},
  number       = {3},
  pages        = {580},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17030580},
  doi          = {10.3390/S17030580},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/JavaidEAAANG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/JavaidMSANAA17,
  author       = {Nadeem Javaid and
                  Muhammad and
                  Arshad Sher and
                  Wadood Abdul and
                  Iftikhar Azim Niaz and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {Cooperative Opportunistic Pressure Based Routing for Underwater Wireless
                  Sensor Networks},
  journal      = {Sensors},
  volume       = {17},
  number       = {3},
  pages        = {629},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17030629},
  doi          = {10.3390/S17030629},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/JavaidMSANAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/HassanAASA17,
  author       = {Mohammad Mehedi Hassan and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Ahmad Almogren and
                  Biao Song and
                  Atif Alamri},
  title        = {Energy-Aware Resource and Revenue Management in Federated Cloud: {A}
                  Game-Theoretic Approach},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {951--961},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2472973},
  doi          = {10.1109/JSYST.2015.2472973},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/HassanAASA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/MinhasKRAK17,
  author       = {Sidra Minhas and
                  Aasia Khanum and
                  Farhan Riaz and
                  Atif Alvi and
                  Shoab Ahmad Khan},
  title        = {A Nonparametric Approach for Mild Cognitive Impairment to {AD} Conversion
                  Prediction: Results on Longitudinal Data},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {21},
  number       = {5},
  pages        = {1403--1410},
  year         = {2017},
  url          = {https://doi.org/10.1109/JBHI.2016.2608998},
  doi          = {10.1109/JBHI.2016.2608998},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/titb/MinhasKRAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEicci/HanPRAAWL17,
  author       = {Qi Han and
                  Jun Peng and
                  Sk. Md. Mizanur Rahman and
                  Ahmad Almogran and
                  Atif Alamri and
                  Tengfei Weng and
                  Jin Liu},
  editor       = {Newton Howard and
                  Yingxu Wang and
                  Amir Hussain and
                  Freddie Hamdy and
                  Bernard Widrow and
                  Lotfi A. Zadeh},
  title        = {A mathematical and simulation model on stability and parameters of
                  multi-equilibrium points in CNNs},
  booktitle    = {16th {IEEE} International Conference on Cognitive Informatics {\&}
                  Cognitive Computing, ICCI*CC 2017, Oxford, United Kingdom, July 26-28,
                  2017},
  pages        = {315--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCI-CC.2017.8109767},
  doi          = {10.1109/ICCI-CC.2017.8109767},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEicci/HanPRAAWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/PitruzzelloAM17,
  author       = {Sam Pitruzzello and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {A Framework for Mitigating Leakage of Competitively Sensitive Knowledge
                  in Start-ups},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2017, Hobart,
                  Tasmania, Australia, December 4-6, 2017},
  pages        = {58},
  year         = {2017},
  url          = {https://aisel.aisnet.org/acis2017/58},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/PitruzzelloAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bhi/MinhasKRKA17,
  author       = {Sidra Minhas and
                  Aasia Khanum and
                  Farhan Riaz and
                  Shoab Ahmad Khan and
                  Atif Alvi},
  title        = {Trajectory based predictive modeling of conversion from mild cognitive
                  impairment to Alzheimer's disease},
  booktitle    = {2017 {IEEE} {EMBS} International Conference on Biomedical {\&}
                  Health Informatics, {BHI} 2017, Orland, FL, USA, February 16-19, 2017},
  pages        = {385--388},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/BHI.2017.7897286},
  doi          = {10.1109/BHI.2017.7897286},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/bhi/MinhasKRKA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/NaseerSAM17,
  author       = {Humza Naseer and
                  Graeme G. Shanks and
                  Atif Ahmad and
                  Sean B. Maynard},
  editor       = {Isabel Ramos and
                  Virpi Tuunainen and
                  Helmut Krcmar},
  title        = {Towards an Analytics-Driven Information Security Risk Management:
                  a contingent Resource based Perspective},
  booktitle    = {25th European Conference on Information Systems, {ECIS} 2017, Guimar{\~{a}}es,
                  Portugal, June 5-10, 2017},
  year         = {2017},
  url          = {http://aisel.aisnet.org/ecis2017\_rip/17},
  timestamp    = {Thu, 13 Dec 2018 13:01:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/NaseerSAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccp2/SheikhFANGL17,
  author       = {Adil A. Sheikh and
                  Emad A. Felemban and
                  Ahmad Alhindi and
                  Atif Naseer and
                  Mukhtar Ghaleb and
                  Ahmed Lbath},
  title        = {OpToGen - {A} genetic algorithm based framework for optimal topology
                  generation for linear networks},
  booktitle    = {13th {IEEE} International Conference on Intelligent Computer Communication
                  and Processing, {ICCP} 2017, Cluj-Napoca, Romania, September 7-9,
                  2017},
  pages        = {255--262},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCP.2017.8117012},
  doi          = {10.1109/ICCP.2017.8117012},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccp2/SheikhFANGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/MugheesAT17,
  author       = {Atif Mughees and
                  Ahmad Ali and
                  Linmi Tao},
  title        = {Hyperspectral image classification via shape-adaptive deep learning},
  booktitle    = {2017 {IEEE} International Conference on Image Processing, {ICIP} 2017,
                  Beijing, China, September 17-20, 2017},
  pages        = {375--379},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIP.2017.8296306},
  doi          = {10.1109/ICIP.2017.8296306},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/MugheesAT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/SernaBAM17,
  author       = {Carlos Andres Agudelo Serna and
                  Rachelle Bosua and
                  Atif Ahmad and
                  Sean B. Maynard},
  editor       = {Yong Jin Kim and
                  Ritu Agarwal and
                  Jae Kyu Lee},
  title        = {Strategies to Mitigate Knowledge Leakage Risk caused by the use of
                  mobile devices: {A} Preliminary Study},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul,
                  South Korea, December 10-13, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/icis2017/Security/Presentations/24},
  timestamp    = {Tue, 19 Dec 2017 17:38:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/SernaBAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/WebbAMBS17,
  author       = {Jeb Webb and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Richard L. Baskerville and
                  Graeme G. Shanks},
  editor       = {Yong Jin Kim and
                  Ritu Agarwal and
                  Jae Kyu Lee},
  title        = {Organizational Security Learning from Incident Response},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Transforming Society with Digital Innovation, {ICIS} 2017, Seoul,
                  South Korea, December 10-13, 2017},
  publisher    = {Association for Information Systems},
  year         = {2017},
  url          = {http://aisel.aisnet.org/icis2017/Security/Presentations/4},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icis/WebbAMBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotdcc/FayedAAA17,
  author       = {Mahmoud S. Fayed and
                  Muhammad Al{-}Qurishi and
                  Atif Alamri and
                  Ahmad A. Al{-}Daraiseh},
  editor       = {Hani Hamdan and
                  Djallel Eddine Boubiche and
                  Homero Toral{-}Cruz and
                  Sedat Akleylek and
                  Hamid Mcheick},
  title        = {{PWCT:} visual language for IoT and cloud computing applications and
                  systems},
  booktitle    = {Proceedings of the Second International Conference on Internet of
                  things and Cloud Computing, {ICC} 2017, Cambridge, United Kingdom,
                  March 22-23, 2017},
  pages        = {165:1--165:5},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3018896.3056782},
  doi          = {10.1145/3018896.3056782},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iotdcc/FayedAAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/OnibereAM17,
  author       = {Mazino Onibere and
                  Atif Ahmad and
                  Sean B. Maynard},
  editor       = {Rose Alinda Alias and
                  Pan Shan Ling and
                  Shamshul Bahri and
                  Patrick Finnegan and
                  Choon Ling Sia},
  title        = {The Chief Information Security Officer and the Five Dimensions of
                  a Strategist},
  booktitle    = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017,
                  Langkawi, Malaysia, July 16-20, 2017},
  pages        = {77},
  year         = {2017},
  url          = {http://aisel.aisnet.org/pacis2017/77},
  timestamp    = {Fri, 15 Sep 2017 09:22:54 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/OnibereAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/SernaBMA17,
  author       = {Carlos Andres Agudelo Serna and
                  Rachelle Bosua and
                  Sean B. Maynard and
                  Atif Ahmad},
  editor       = {Rose Alinda Alias and
                  Pan Shan Ling and
                  Shamshul Bahri and
                  Patrick Finnegan and
                  Choon Ling Sia},
  title        = {Addressing Knowledge Leakage Risk caused by the use of mobile devices
                  in Australian Organizations},
  booktitle    = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017,
                  Langkawi, Malaysia, July 16-20, 2017},
  pages        = {224},
  year         = {2017},
  url          = {http://aisel.aisnet.org/pacis2017/224},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/SernaBMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/TanMAR17,
  author       = {Terrence H. Tan and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Tobias Ruighaver},
  editor       = {Rose Alinda Alias and
                  Pan Shan Ling and
                  Shamshul Bahri and
                  Patrick Finnegan and
                  Choon Ling Sia},
  title        = {Information Security Governance: {A} Case Study of the Strategic Context
                  of Information Security},
  booktitle    = {21st Pacific Asia Conference on Information Systems, {PACIS} 2017,
                  Langkawi, Malaysia, July 16-20, 2017},
  pages        = {43},
  year         = {2017},
  url          = {http://aisel.aisnet.org/pacis2017/43},
  timestamp    = {Fri, 15 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/TanMAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-09052,
  author       = {Mahmoud S. Fayed and
                  Muhammad Al{-}Qurishi and
                  Atif Alamri and
                  Ahmad A. Al{-}Daraiseh},
  title        = {{PWCT:} Visual Language for IoT and Cloud Computing Applications and
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1712.09052},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.09052},
  eprinttype    = {arXiv},
  eprint       = {1712.09052},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-09052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/SheddenASTS16,
  author       = {Piya Shedden and
                  Atif Ahmad and
                  Wally Smith and
                  Heidi Tscherning and
                  Rens Scheepers},
  title        = {Asset Identification in Information Security Risk Assessment: {A}
                  Business Practice Approach},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {39},
  pages        = {15},
  year         = {2016},
  url          = {https://doi.org/10.17705/1cais.03915},
  doi          = {10.17705/1CAIS.03915},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/SheddenASTS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/clsr/CaronBMA16,
  author       = {Xavier Caron and
                  Rachelle Bosua and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {The Internet of Things (IoT) and its impact on individual privacy:
                  An Australian perspective},
  journal      = {Comput. Law Secur. Rev.},
  volume       = {32},
  number       = {1},
  pages        = {4--15},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.clsr.2015.12.001},
  doi          = {10.1016/J.CLSR.2015.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/clsr/CaronBMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MehajabinRHAA16,
  author       = {Nusrat Mehajabin and
                  Md. Abdur Razzaque and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {Energy-sustainable relay node deployment in wireless sensor networks},
  journal      = {Comput. Networks},
  volume       = {104},
  pages        = {108--121},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.comnet.2016.05.014},
  doi          = {10.1016/J.COMNET.2016.05.014},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MehajabinRHAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/SongHAATPA16,
  author       = {Biao Song and
                  Mohammad Mehedi Hassan and
                  Atif Alamri and
                  Abdulhameed Alelaiwi and
                  Yuan Tian and
                  Mukaddim Pathan and
                  Ahmad Almogren},
  title        = {A two-stage approach for task and resource management in multimedia
                  cloud environment},
  journal      = {Computing},
  volume       = {98},
  number       = {1-2},
  pages        = {119--145},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00607-014-0411-z},
  doi          = {10.1007/S00607-014-0411-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/SongHAATPA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HassanAARAAH16,
  author       = {Mohammad Mehedi Hassan and
                  Mohammad Abdullah{-}Al{-}Wadud and
                  Ahmad Almogren and
                  Sk. Md. Mizanur Rahman and
                  Abdulhameed Alelaiwi and
                  Atif Alamri and
                  Md. Abdul Hamid},
  title        = {QoS and trust-aware coalition formation game in data-intensive cloud
                  federations},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {10},
  pages        = {2889--2905},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3543},
  doi          = {10.1002/CPE.3543},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/HassanAARAAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/TabassumRHAA16,
  author       = {Madiha Tabassum and
                  Md. Abdur Razzaque and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {Interference-aware high-throughput channel allocation mechanism for
                  CR-VANETs},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2016},
  pages        = {2},
  year         = {2016},
  url          = {https://doi.org/10.1186/s13638-015-0494-z},
  doi          = {10.1186/S13638-015-0494-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/TabassumRHAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jitta/WebbAMS16,
  author       = {Jeb Webb and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Graeme G. Shanks},
  title        = {Foundations for an Intelligence-driven Information Security Risk-management
                  System},
  journal      = {J. Inf. Technol. Theory Appl.},
  volume       = {17},
  number       = {3},
  pages        = {3},
  year         = {2016},
  url          = {https://aisel.aisnet.org/jitta/vol17/iss3/3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jitta/WebbAMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/KhodaRAHAA16,
  author       = {Mahbub E. Khoda and
                  Md. Abdur Razzaque and
                  Ahmad Almogren and
                  Mohammad Mehedi Hassan and
                  Atif Alamri and
                  Abdulhameed Alelaiwi},
  title        = {Efficient Computation Offloading Decision in Mobile Cloud Computing
                  over 5G Network},
  journal      = {Mob. Networks Appl.},
  volume       = {21},
  number       = {5},
  pages        = {777--792},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11036-016-0688-6},
  doi          = {10.1007/S11036-016-0688-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/KhodaRAHAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AlamriHAHAZSA16,
  author       = {Atif Alamri and
                  M. Shamim Hossain and
                  Ahmad Almogren and
                  Mohammad Mehedi Hassan and
                  Khalid Al{-}Nafjan and
                  Mohammed Zakariah and
                  Lee Seyam and
                  Abdullah Sharaf Alghamdi},
  title        = {QoS-adaptive service configuration framework for cloud-assisted video
                  surveillance systems},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {21},
  pages        = {13333--13348},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-3074-7},
  doi          = {10.1007/S11042-015-3074-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AlamriHAHAZSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/QuddiousYKTSSC16,
  author       = {Abdul Quddious and
                  Shuai Yang and
                  Munawar M. Khan and
                  Farooq Ahmad Tahir and
                  Atif Shamim and
                  Khaled N. Salama and
                  Hammad M. Cheema},
  title        = {Disposable, Paper-Based, Inkjet-Printed Humidity and H\({}_{\mbox{2}}\)S
                  Gas Sensor for Passive Sensing Applications},
  journal      = {Sensors},
  volume       = {16},
  number       = {12},
  pages        = {2073},
  year         = {2016},
  url          = {https://doi.org/10.3390/s16122073},
  doi          = {10.3390/S16122073},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/QuddiousYKTSSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/AgudeloBMA16,
  author       = {Carlos Andres Agudelo and
                  Rachelle Bosua and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Mitigating Knowledge Leakage Risk in Organizations through Mobile
                  Devices: {A} Contextual Approach},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong,
                  NSW, Australia, December 5-7, 2016},
  pages        = {79},
  year         = {2016},
  url          = {https://aisel.aisnet.org/acis2016/79},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/AgudeloBMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/ArreguiMA16,
  author       = {Daniel Alejandro Arregui and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Mitigating {BYOD} Information Security Risks},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong,
                  NSW, Australia, December 5-7, 2016},
  pages        = {8},
  year         = {2016},
  url          = {https://aisel.aisnet.org/acis2016/8},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/ArreguiMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/HorneAM16,
  author       = {Craig A. Horne and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {A Theory on Information Security},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong,
                  NSW, Australia, December 5-7, 2016},
  pages        = {87},
  year         = {2016},
  url          = {https://aisel.aisnet.org/acis2016/87},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/HorneAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/NaseerSAM16,
  author       = {Humza Naseer and
                  Graeme G. Shanks and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Enhancing Information Security Risk Management with Security Analytics:
                  {A} Dynamic Capabilities Perspective},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2016, Wollongong,
                  NSW, Australia, December 5-7, 2016},
  pages        = {61},
  year         = {2016},
  url          = {https://aisel.aisnet.org/acis2016/61},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/NaseerSAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/NaseerMA16,
  author       = {Humza Naseer and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Business Analytics in Information Security Risk Management: the contingent
                  effect on Security Performance},
  booktitle    = {24th European Conference on Information Systems, {ECIS} 2016, Istanbul,
                  Turkey, June 12-15, 2016},
  pages        = {Research--in--Progress Paper 13},
  year         = {2016},
  url          = {http://aisel.aisnet.org/ecis2016\_rip/13},
  timestamp    = {Sat, 12 Nov 2016 17:38:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/NaseerMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euvip/KhanTKB16,
  author       = {Faraz Ahmad Khan and
                  Muhammad Atif Tahir and
                  Fouad Khelifi and
                  Ahmed Bouridane},
  title        = {Offline text independent writer identification using ensemble of multi-scale
                  local ternary pattern histograms},
  booktitle    = {6th European Workshop on Visual Information Processing, {EUVIP} 2016,
                  Marseille, France, October 25-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EUVIP.2016.7764587},
  doi          = {10.1109/EUVIP.2016.7764587},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/euvip/KhanTKB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AgudeloBAM16,
  author       = {Carlos Andres Agudelo and
                  Rachelle Bosua and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Understanding Knowledge Leakage {\&} {BYOD} (Bring Your Own Device):
                  {A} Mobile Worker Perspective},
  journal      = {CoRR},
  volume       = {abs/1606.01450},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01450},
  eprinttype    = {arXiv},
  eprint       = {1606.01450},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AgudeloBAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlshaikhMAC16,
  author       = {Moneer Alshaikh and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Information Security Policy: {A} Management Practice Perspective},
  journal      = {CoRR},
  volume       = {abs/1606.00890},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.00890},
  eprinttype    = {arXiv},
  eprint       = {1606.00890},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlshaikhMAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HorneAM16,
  author       = {Craig A. Horne and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Information Security Strategy in Organisations: Review, Discussion
                  and Future Research Directions},
  journal      = {CoRR},
  volume       = {abs/1606.03528},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.03528},
  eprinttype    = {arXiv},
  eprint       = {1606.03528},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HorneAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZuritaMA16,
  author       = {Harry Zurita and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Evaluating the Utility of Research Articles for Teaching Information
                  Security Management},
  journal      = {CoRR},
  volume       = {abs/1606.01448},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.01448},
  eprinttype    = {arXiv},
  eprint       = {1606.01448},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZuritaMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuangTCRAA15,
  author       = {Kaibin Huang and
                  Raylin Tso and
                  Yu{-}Chi Chen and
                  Sk. Md. Mizanur Rahman and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {{PKE-AET:} Public Key Encryption with Authorized Equality Test},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2686--2697},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv025},
  doi          = {10.1093/COMJNL/BXV025},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuangTCRAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ElyasAML15,
  author       = {Mohamed Elyas and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Andrew Lonie},
  title        = {Digital forensic readiness: Expert perspectives on a theoretical framework},
  journal      = {Comput. Secur.},
  volume       = {52},
  pages        = {70--89},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.04.003},
  doi          = {10.1016/J.COSE.2015.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ElyasAML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HassanKAAAAIR15,
  author       = {Mohammad Mehedi Hassan and
                  S. M. Kamruzzaman and
                  Atif Alamri and
                  Ahmad Almogren and
                  Abdulhameed Alelaiwi and
                  Mohammed Abdullah Alnuem and
                  Md. Manowarul Islam and
                  Md. Abdur Razzaque},
  title        = {Design of an energy-efficient and reliable data delivery mechanism
                  for mobile \emph{ad hoc} networks: a cross-layer approach},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {10},
  pages        = {2637--2655},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3309},
  doi          = {10.1002/CPE.3309},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/HassanKAAAAIR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/LimMAC15,
  author       = {Joo Soon Lim and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Information Security Culture: Towards an Instrument for Assessing
                  Security Management Practices},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {2},
  pages        = {31--52},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015040103},
  doi          = {10.4018/IJCWT.2015040103},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/LimMAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/TamaddonAB15,
  author       = {Sohail Tamaddon and
                  Atif Ahmad and
                  Rachelle Bosua},
  title        = {Secure Knowledge Management: Influencing the Development of Human
                  Knowledge Sharing Networks},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {5},
  number       = {2},
  pages        = {1--20},
  year         = {2015},
  url          = {https://doi.org/10.4018/IJCWT.2015040101},
  doi          = {10.4018/IJCWT.2015040101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcwt/TamaddonAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijinfoman/AhmadMS15,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Graeme G. Shanks},
  title        = {A case analysis of information systems and security incident responses},
  journal      = {Int. J. Inf. Manag.},
  volume       = {35},
  number       = {6},
  pages        = {717--723},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijinfomgt.2015.08.001},
  doi          = {10.1016/J.IJINFOMGT.2015.08.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijinfoman/AhmadMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/MasudHAAZ15,
  author       = {Mehedi Masud and
                  M. Shamim Hossain and
                  Atif Alamri and
                  Ahmad Almogren and
                  Mohammed Zakariah},
  title        = {Synchronizing Data through Update Queries in Interoperable E-Health
                  and Technology Enhanced Learning Data Sharing Systems},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {21},
  number       = {11},
  pages        = {1439--1453},
  year         = {2015},
  url          = {http://www.jucs.org/jucs\_21\_11/synchronizing\_data\_through\_update},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/MasudHAAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/AlshaikhMAC15,
  author       = {Moneer Alshaikh and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Information Security Policy: {A} Management Practice Perspective},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide,
                  SA, Australia, November 30 - December 4, 2015},
  pages        = {12},
  year         = {2015},
  url          = {https://aisel.aisnet.org/acis2015/12},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/AlshaikhMAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/HorneAM15,
  author       = {Craig A. Horne and
                  Atif Ahmad and
                  Sean B. Maynard},
  title        = {Information Security Strategy in Organisations: Review, Discussion
                  and Future Research Directions},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide,
                  SA, Australia, November 30 - December 4, 2015},
  pages        = {156},
  year         = {2015},
  url          = {https://aisel.aisnet.org/acis2015/156},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/HorneAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/ZuritaMA15,
  author       = {Harry Zurita and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Evaluating the Utility of Research Articles for Teaching Information
                  Security Management},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2015, Adelaide,
                  SA, Australia, November 30 - December 4, 2015},
  pages        = {47},
  year         = {2015},
  url          = {https://aisel.aisnet.org/acis2015/47},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/ZuritaMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl-alta/NothmanABMB15,
  author       = {Joel Nothman and
                  Atif Ahmad and
                  Christoph F. Breidbach and
                  David Malet and
                  Timothy Baldwin},
  editor       = {Ben Hachey and
                  Kellie Webster},
  title        = {Understanding engagement with insurgents through retweet rhetoric},
  booktitle    = {Proceedings of the Australasian Language Technology Association Workshop,
                  {ALTA} 2015, Parramatta, Australia, December 8 - 9, 2015},
  pages        = {122--127},
  publisher    = {{ACL}},
  year         = {2015},
  url          = {https://aclanthology.org/U15-1015/},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl-alta/NothmanABMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/AhmadTBS15,
  author       = {Atif Ahmad and
                  Heidi Tscherning and
                  Rachelle Bosua and
                  Rens Scheepers},
  editor       = {Traci A. Carte and
                  Armin Heinzl and
                  Cathy Urquhart},
  title        = {Guarding Against the Erosion of Competitive Advantage: {A} Knowledge
                  Leakage Mitigation Model},
  booktitle    = {Proceedings of the International Conference on Information Systems
                  - Exploring the Information Frontier, {ICIS} 2015, Fort Worth, Texas,
                  USA, December 13-16, 2015},
  publisher    = {Association for Information Systems},
  year         = {2015},
  url          = {http://aisel.aisnet.org/icis2015/proceedings/SecurityIS/7},
  timestamp    = {Wed, 09 Oct 2019 12:51:34 +0200},
  biburl       = {https://dblp.org/rec/conf/icis/AhmadTBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icit2/AbduallahIB15,
  author       = {Ahmad Anad Abduallah and
                  Atif Iqbal and
                  Lazhar Ben{-}Brahim},
  title        = {Space vector pulse width modulation techniques for a five-phase impedeance
                  source and quazi impedeance source inverters},
  booktitle    = {{IEEE} International Conference on Industrial Technology, {ICIT} 2015,
                  Seville, Spain, March 17-19, 2015},
  pages        = {1173--1178},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICIT.2015.7125256},
  doi          = {10.1109/ICIT.2015.7125256},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/icit2/AbduallahIB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideal/MinhasKRAK15,
  author       = {Sidra Minhas and
                  Aasia Khanum and
                  Farhan Riaz and
                  Atif Alvi and
                  Shoab Ahmad Khan},
  editor       = {Konrad Jackowski and
                  Robert Burduk and
                  Krzysztof Walkowiak and
                  Michal Wozniak and
                  Hujun Yin},
  title        = {Early Alzheimer's Disease Prediction in Machine Learning Setup: Empirical
                  Analysis with Missing Value Computation},
  booktitle    = {Intelligent Data Engineering and Automated Learning - {IDEAL} 2015
                  - 16th International Conference Wroclaw, Poland, October 14-16, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9375},
  pages        = {424--432},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24834-9\_49},
  doi          = {10.1007/978-3-319-24834-9\_49},
  timestamp    = {Thu, 07 Nov 2019 15:14:50 +0100},
  biburl       = {https://dblp.org/rec/conf/ideal/MinhasKRAK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/AbduallahIMBAA15,
  author       = {Ahmad Anad Abduallah and
                  Atif Iqbal and
                  Mohammad Meraj and
                  Lazhar Ben{-}Brahim and
                  Rashid Alammari and
                  Haitham Abu{-}Rub},
  title        = {Discontinuous space vector pulse width modulation techniques for a
                  five-phase quasi Z-source inverter},
  booktitle    = {{IECON} 2015 - 41st Annual Conference of the {IEEE} Industrial Electronics
                  Society, Yokohama, Japan, November 9-12, 2015},
  pages        = {4205--4210},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IECON.2015.7392755},
  doi          = {10.1109/IECON.2015.7392755},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/AbduallahIMBAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ajis/WebbMAS14,
  author       = {Jeb Webb and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Graeme G. Shanks},
  title        = {Information Security Risk Management: An Intelligence-Driven Approach},
  journal      = {Australas. J. Inf. Syst.},
  volume       = {18},
  number       = {3},
  year         = {2014},
  url          = {http://journal.acs.org.au/index.php/ajis/article/view/1096},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ajis/WebbMAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadBS14,
  author       = {Atif Ahmad and
                  Rachelle Bosua and
                  Rens Scheepers},
  title        = {Protecting organizational competitive advantage: {A} knowledge leakage
                  perspective},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {27--39},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.001},
  doi          = {10.1016/J.COSE.2014.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WebbAMS14,
  author       = {Jeb Webb and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Graeme G. Shanks},
  title        = {A situation awareness model for information security risk management},
  journal      = {Comput. Secur.},
  volume       = {44},
  pages        = {1--15},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.04.005},
  doi          = {10.1016/J.COSE.2014.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WebbAMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AhmadM14,
  author       = {Atif Ahmad and
                  Sean B. Maynard},
  title        = {Teaching information security management: reflections and experiences},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {513--536},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-08-2013-0058},
  doi          = {10.1108/IMCS-08-2013-0058},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AhmadM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcis/ElyasMAL14,
  author       = {Mohamed Elyas and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Andrew Lonie},
  title        = {Towards {A} Systemic Framework for Digital Forensic Readiness},
  journal      = {J. Comput. Inf. Syst.},
  volume       = {54},
  number       = {3},
  pages        = {97--105},
  year         = {2014},
  url          = {https://doi.org/10.1080/08874417.2014.11645708},
  doi          = {10.1080/08874417.2014.11645708},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcis/ElyasMAL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/AhmadMP14,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Sangseo Park},
  title        = {Information security strategies: towards an organizational multi-strategy
                  perspective},
  journal      = {J. Intell. Manuf.},
  volume       = {25},
  number       = {2},
  pages        = {357--370},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10845-012-0683-0},
  doi          = {10.1007/S10845-012-0683-0},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/AhmadMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShoaibAA14,
  author       = {Muhammad Shoaib and
                  Uzair Ahmad and
                  Atif Alamri},
  title        = {Multimedia framework to support eHealth applications},
  journal      = {Multim. Tools Appl.},
  volume       = {73},
  number       = {3},
  pages        = {2081--2101},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11042-013-1631-5},
  doi          = {10.1007/S11042-013-1631-5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ShoaibAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/EnayetRHAA14,
  author       = {Asma Enayet and
                  Md. Abdur Razzaque and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren and
                  Atif Alamri},
  title        = {Moving Target Tracking through Distributed Clustering in Directional
                  Sensor Networks},
  journal      = {Sensors},
  volume       = {14},
  number       = {12},
  pages        = {24381--24407},
  year         = {2014},
  url          = {https://doi.org/10.3390/s141224381},
  doi          = {10.3390/S141224381},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/EnayetRHAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HossainAAHP14,
  author       = {M. Anwar Hossain and
                  Atif Alamri and
                  Ahmad S. Almogren and
                  S. K. Alamgir Hossain and
                  Jorge Parra},
  title        = {A Framework for a Context-Aware Elderly Entertainment Support System},
  journal      = {Sensors},
  volume       = {14},
  number       = {6},
  pages        = {10538--10561},
  year         = {2014},
  url          = {https://doi.org/10.3390/s140610538},
  doi          = {10.3390/S140610538},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HossainAAHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/ButtAK14,
  author       = {Mavera M. Butt and
                  A. B. N. Alvi and
                  Shoab Ahmad Khan},
  title        = {Integrated Development Environment for generation of middleware for
                  hybrid processors based embedded systems},
  booktitle    = {11th {IEEE/ACS} International Conference on Computer Systems and Applications,
                  {AICCSA} 2014, Doha, Qatar, November 10-13, 2014},
  pages        = {21--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AICCSA.2014.7073174},
  doi          = {10.1109/AICCSA.2014.7073174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/ButtAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crowncom/AhmadFHZZ14,
  author       = {Ishtiaq Ahmad and
                  Zhiyong Feng and
                  Atif Hameed and
                  Ping Zhang and
                  Yichen Zhao},
  editor       = {Matti Latva{-}aho and
                  Savo Glisic and
                  Allen B. MacKenzie and
                  Alhussein A. Abouzeid and
                  Olav Tirkkonen and
                  Markku J. Juntti and
                  Juha R{\"{o}}ning and
                  Hiroshi Harada},
  title        = {Spectrum sharing and energy-efficient power optimization for two-tier
                  femtocell networks},
  booktitle    = {9th International Conference on Cognitive Radio Oriented Wireless
                  Networks and Communications, {CROWNCOM} 2014, Oulu, Finland, June
                  2-4, 2014},
  pages        = {156--161},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.crowncom.2014.255316},
  doi          = {10.4108/ICST.CROWNCOM.2014.255316},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crowncom/AhmadFHZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euvip/AhmadMMKM14,
  author       = {Arslan Ahmad and
                  Atif Bin Mansoor and
                  Rafia Mumtaz and
                  Mukaram Khan and
                  S. H. Mirza},
  title        = {Image processing and classification in diabetic retinopathy: {A} review},
  booktitle    = {5th European Workshop on Visual Information Processing, {EUVIP} 2014,
                  Villetaneuse, Paris, France, December 10-12, 2014},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/EUVIP.2014.7018362},
  doi          = {10.1109/EUVIP.2014.7018362},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/euvip/AhmadMMKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isie/StecGSIAA14,
  author       = {Pawel Stec and
                  Jaroslaw Guzinski and
                  Patryk Strankowski and
                  Atif Iqbal and
                  Ahmad Anad Abduallah and
                  Haitham Abu{-}Rub},
  title        = {Five-phase induction motor drive with sine-wave filter},
  booktitle    = {23rd {IEEE} International Symposium on Industrial Electronics, {ISIE}
                  2014, Istanbul, Turkey, June 1-4, 2014},
  pages        = {2111--2116},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISIE.2014.6864943},
  doi          = {10.1109/ISIE.2014.6864943},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isie/StecGSIAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/RahmanHMCAAA14,
  author       = {Sk. Md. Mizanur Rahman and
                  Mohammad Anwar Hossain and
                  Maqsood Mahmud and
                  Muhammad Imran Chaudry and
                  Ahmad Almogren and
                  Mohammed Abdullah Alnuem and
                  Atif Alamri},
  title        = {A Lightweight Secure Data Aggregation Technique for Wireless Sensor
                  Network},
  booktitle    = {2014 {IEEE} International Symposium on Multimedia, {ISM} 2014, Taichung,
                  Taiwan, December 10-12, 2014},
  pages        = {387--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISM.2014.84},
  doi          = {10.1109/ISM.2014.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ism/RahmanHMCAAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ism/RahmanKAAAA14,
  author       = {Sk. Md. Mizanur Rahman and
                  S. M. Kamruzzaman and
                  Ahmad Almogren and
                  Abdulhameed Alelaiwi and
                  Atif Alamri and
                  Abdullah Sharaf Alghamdi},
  title        = {Anonymous and Secure Communication Protocol for Cognitive Radio Ad
                  Hoc Networks},
  booktitle    = {2014 {IEEE} International Symposium on Multimedia, {ISM} 2014, Taichung,
                  Taiwan, December 10-12, 2014},
  pages        = {393--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISM.2014.85},
  doi          = {10.1109/ISM.2014.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ism/RahmanKAAAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/WebbMAS13,
  author       = {Jeb Webb and
                  Sean B. Maynard and
                  Atif Ahmad and
                  Graeme G. Shanks},
  title        = {Towards an Intelligence-Driven Information Security Risk Management
                  Process for Organisations},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2013, Melbourne,
                  VIC, Australia, December 4-6, 2013},
  pages        = {52},
  year         = {2013},
  url          = {https://aisel.aisnet.org/acis2013/52},
  timestamp    = {Thu, 16 May 2024 17:06:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/WebbMAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/MolokCA13,
  author       = {Nurul Nuha Abdul Molok and
                  Shanton Chang and
                  Atif Ahmad},
  editor       = {Jae{-}Nam Lee and
                  Ji{-}Ye Mao and
                  James Y. L. Thong},
  title        = {Disclosure of Organizational Information on Social Media: Perspectives
                  from Security Managers},
  booktitle    = {17th Pacific Asia Conference on Information Systems, {PACIS} 2013,
                  Jeju Island, Korea, June 18-22, 2013},
  pages        = {108},
  year         = {2013},
  url          = {http://aisel.aisnet.org/pacis2013/108},
  timestamp    = {Tue, 08 Apr 2014 14:41:43 +0200},
  biburl       = {https://dblp.org/rec/conf/pacis/MolokCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadHR12,
  author       = {Atif Ahmad and
                  Justin Hadgkiss and
                  Anthonie B. Ruighaver},
  title        = {Incident response teams - Challenges in supporting the organisational
                  security function},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {643--652},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2012.04.001},
  doi          = {10.1016/J.COSE.2012.04.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcwt/MolokAC12,
  author       = {Nurul Nuha Abdul Molok and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Online Social Networking: {A} Source of Intelligence for Advanced
                  Persistent Threats},
  journal      = {Int. J. Cyber Warf. Terror.},
  volume       = {2},
  number       = {1},
  pages        = {1--13},
  year         = {2012},
  url          = {https://doi.org/10.4018/ijcwt.2012010101},
  doi          = {10.4018/IJCWT.2012010101},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcwt/MolokAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/SheddenAR11,
  author       = {Piya Shedden and
                  Atif Ahmad and
                  Anthonie B. Ruighaver},
  title        = {Informal Learning in Security Incident Response Teams},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2011, Sydney,
                  Australia, November 30 - December 2, 2011},
  year         = {2011},
  url          = {https://aisel.aisnet.org/acis2011/37},
  timestamp    = {Thu, 16 May 2024 17:06:13 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/SheddenAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dese/QureshiKBM11,
  author       = {Hammad Qureshi and
                  Shamila Keyani and
                  Qurrat{-}Ul{-}Ain Babar and
                  Ahmad Atif Mumtaz},
  title        = {Monitoring Disease Outbreak through Geographical Representation in
                  Rural Areas},
  booktitle    = {2011 Developments in E-systems Engineering, DeSE 2011, Dubai, United
                  Arab Emirates, December 6-8, 2011},
  pages        = {30--35},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/DeSE.2011.90},
  doi          = {10.1109/DESE.2011.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dese/QureshiKBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkRMA11,
  author       = {Sangseo Park and
                  Anthonie B. Ruighaver and
                  Sean B. Maynard and
                  Atif Ahmad},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Towards Understanding Deterrence: Information Security Managers' Perspective},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {21--37},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_3},
  doi          = {10.1007/978-94-007-2911-7\_3},
  timestamp    = {Tue, 01 Feb 2022 08:29:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkRMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/MolokAC11,
  author       = {Nurul Nuha Abdul Molok and
                  Atif Ahmad and
                  Shanton Chang},
  editor       = {Peter B. Seddon and
                  Shirley Gregor},
  title        = {Exploring The Use Of Online Social Networking By Employees: Looking
                  At The Potential For Information Leakage},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2011: Quality
                  Research in Pacific Asia, Brisbane, Queensland, Australia, 7-11 July
                  2011},
  pages        = {138},
  publisher    = {Queensland University of Technology},
  year         = {2011},
  url          = {http://aisel.aisnet.org/pacis2011/138},
  timestamp    = {Tue, 28 Feb 2012 16:51:40 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/MolokAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/MolokAC10,
  author       = {Nurul Nuha Abdul Molok and
                  Atif Ahmad and
                  Shanton Chang},
  title        = {Understanding the Factors of Information Leakage through Online Social
                  Networking to Safeguard Organizational Information},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2010, Brisbane,
                  Australia, December 1-3, 2010},
  year         = {2010},
  url          = {https://aisel.aisnet.org/acis2010/62},
  timestamp    = {Fri, 17 May 2024 16:58:38 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/MolokAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SharifPA10,
  author       = {Atif Sharif and
                  Vidyasagar M. Potdar and
                  Rana Fayyaz Ahmad},
  title        = {Adaptive Channel Coding and Modulation Scheme Selection for Achieving
                  High Throughput in Wireless Networks},
  booktitle    = {24th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2010, Perth, Australia, 20-13
                  April 2010},
  pages        = {200--207},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WAINA.2010.197},
  doi          = {10.1109/WAINA.2010.197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SharifPA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/LimACM10,
  author       = {Joo Soon Lim and
                  Atif Ahmad and
                  Shanton Chang and
                  Sean B. Maynard},
  title        = {Embedding Information Security Culture Emerging Concerns and Challenges},
  booktitle    = {Pacific Asia Conference on Information Systems, {PACIS} 2010, Taipei,
                  Taiwan, 9-12 July 2010},
  pages        = {43},
  publisher    = {AISeL},
  year         = {2010},
  url          = {http://aisel.aisnet.org/pacis2010/43},
  timestamp    = {Tue, 28 Feb 2012 16:59:14 +0100},
  biburl       = {https://dblp.org/rec/conf/pacis/LimACM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TanRA10,
  author       = {C. C. Terence Tan and
                  Anthonie B. Ruighaver and
                  Atif Ahmad},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Information Security Governance: When Compliance Becomes More Important
                  than Security},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_6},
  doi          = {10.1007/978-3-642-15257-3\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TanRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijamc/BarghoutAEE09,
  author       = {Ahmad Barghout and
                  Atif Alamri and
                  Mohamad A. Eid and
                  Abdulmotaleb El{-}Saddik},
  title        = {Haptic rehabilitation exercises performance evaluation using automated
                  inference systems},
  journal      = {Int. J. Adv. Media Commun.},
  volume       = {3},
  number       = {1/2},
  pages        = {197--214},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJAMC.2009.026861},
  doi          = {10.1504/IJAMC.2009.026861},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijamc/BarghoutAEE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acis/SheddenSSA09,
  author       = {Piya Shedden and
                  Wally Smith and
                  Rens Scheepers and
                  Atif Ahmad},
  title        = {Towards a Knowledge Perspective in Information Security Risk Assessments
                  - an Illustrative Case Study},
  booktitle    = {Australasian Conference on Information Systems, {ACIS} 2009, Melbourne,
                  Australia, December 2-4, 2009},
  year         = {2009},
  url          = {https://aisel.aisnet.org/acis2009/96},
  timestamp    = {Tue, 21 May 2024 17:19:33 +0200},
  biburl       = {https://dblp.org/rec/conf/acis/SheddenSSA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/SharifANPSY09,
  author       = {Atif Sharif and
                  Rana Fayyaz Ahmad and
                  Malaya Kumar Nath and
                  Vidyasagar M. Potdar and
                  Jaipal Singh and
                  Yan Yang},
  editor       = {Arjan Durresi and
                  Leonard Barolli and
                  Tomoya Enokido and
                  Minoru Uehara and
                  Elhadi M. Shakshuki and
                  Makoto Takizawa},
  title        = {Processing of Low Level Signals in Mixed Signal Environment - {A}
                  Hardware Design for Better Performance},
  booktitle    = {NBiS 2009, 12th International Conference on Network-Based Information
                  Systems, Indianapolis, Indiana, USA, 19-21 August 2009},
  pages        = {597--602},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NBiS.2009.38},
  doi          = {10.1109/NBIS.2009.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/SharifANPSY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/KhanAASCAM06,
  author       = {Muzammil A. Khan and
                  Hafiz Farooq Ahmad and
                  Arshad Ali and
                  Hiroki Suguri and
                  Faran Javed Chawla and
                  Muhammad Atif and
                  H. Ghulam Mujtaba},
  editor       = {David Jeff Jackson},
  title        = {An Efficient Algorithm for Globally Aligning {DNA} Sequences},
  booktitle    = {21st International Conference on Computers and Their Applications,
                  CATA-2006, Seattle, Washington, USA, March 23-25, 2006, Proceedings},
  pages        = {407--412},
  publisher    = {{ISCA}},
  year         = {2006},
  timestamp    = {Mon, 09 Aug 2021 16:27:34 +0200},
  biburl       = {https://dblp.org/rec/conf/cata/KhanAASCAM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aism/KohRMA05,
  author       = {K. Koh and
                  Anthonie B. Ruighaver and
                  Sean B. Maynard and
                  Atif Ahmad},
  editor       = {Craig Valli and
                  Andrew Woodward},
  title        = {Security Governance: Its Impact on Security Culture},
  booktitle    = {Proceedings of the 3rd Australian Information Security Management
                  Conference, Perth, Western Australia, 30th September 2005},
  pages        = {47--58},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2005},
  timestamp    = {Wed, 29 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aism/KohRMA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/AhmadR04,
  author       = {Atif Ahmad and
                  Anthonie B. Ruighaver},
  title        = {Towards Identifying Criteria for the Evidential Weight of System Event
                  Logs},
  booktitle    = {2nd Australian Computer Network {\&} Information Forensics Conference,
                  November 25th 2004, Perth, Western Australia, Forensic Computing -
                  Evidence on the move from Desktops to Networks, Conference Proceedings},
  pages        = {40--47},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2004},
  timestamp    = {Sat, 09 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ausforensics/AhmadR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/AhmadR03,
  author       = {Atif Ahmad and
                  Tobias Ruighaver},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Design of a Network-Access Audit Log for Security Monitoring and Forensic
                  Investigation},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 16:11:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/AhmadR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausforensics/RuighaverTA03,
  author       = {Tobias Ruighaver and
                  C. C. Terence Tan and
                  Atif Ahmad},
  editor       = {Craig Valli and
                  Matt Warren},
  title        = {Incident Handling: Where the need for planning is often not recognised},
  booktitle    = {1st Australian Computer, Network {\&} Information Forensics Conference,
                  25 November 2003, Perth, Western Australia},
  publisher    = {School of Computer and Information Science, Edith Cowan University,
                  Western Australia},
  year         = {2003},
  timestamp    = {Tue, 14 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ausforensics/RuighaverTA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics