Publications
- Cyber Security standards for the Industrial Internet of Things (IIoT)– A Systematic Review/IEEE
- Proactive monitoring for SMEs using AppInsight
- An online SQL vulnerability assessment tools and its impact on SMEs
- Research on system communication by using unified registry model and elements
- Critical Information Infrastructure and Protection from industrial cyber threat - A Review
- The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS)/IEEE
- An approach to Privacy on Recommended Systems/IEEE
- Stability of Model that Makes Automated Comparison Between Market Demands and University Curricula Offer/Springer
- Comparison of Maturity Model frameworks in Information Security and their implementation
- Registration and Authentication Cryptosystem Using the Pentor and UltraPentor Operators
- A MODEL FOR AUTOMATED MATCHING BETWEEN JOB MARKET DEMAND AND UNIVERSITY CURRICULA OFFER
- Using Elliptic Curve Encryption and Decryption for Securing Audio Messages
- Real Time Access Control Based on Face Recognition
- The block Jacobi Method for The SVD-A Parallel Approach
- Encryption and Decryption with ECC Secured Voice Transmitter Voice Transmitter
- Factors that Affect the Successful Implementation of Information and Communication Technology in Teaching
- Expansion of a relational database to support semantic web queries
- EMBEDDED IDENTIFICATION SYSTEM BASED ON FACE RECOGNITION
- DBMS as a Cloud service: Advantages and Disadvantages