Bandwidth optimization control protocol for 4G wireless mobile internet M Al-Shawabkeh, R Salleh, X Li Proceedings of the 11th WSEAS International conference on Communications 3 …, 2007 | 16 | 2007 |
Computer security self-efficacy effect: An extention of technology-to-performance chain model M Al-Shawabkeh, MM Saudi, NHM Alwi 2012 IEEE Control and System Graduate Research Colloquium, 64-69, 2012 | 9 | 2012 |
Security risk management approach for improving information security return of investment X Li, M Al-Shawabkeh, Z Li Recent Developments in Data Science and Business Analytics: Proceedings of …, 2018 | 6 | 2018 |
New Information Security Risk Management Framework as an Integral Part of Project Life Cycle MS Mahmoud Alshawabkeh, Xichun Li Advances in Social Science, Education and Humanities Research 319, 133-139, 2019 | 3* | 2019 |
Computer security factors effects towards online usage of internet banking system M Al-Shawabkeh, S MM, A NHM Asian Research Publishing Network, 2015 | 2 | 2015 |
A New Counterfeiting Approach: Computer Security Evaluation Of Fuel Rationing System XL Al-Shawabkeh Mahmoud Advances in Computer Science Research 62, 269-272, 2017 | 1* | 2017 |
Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison M Al-Shawabkeh, MM Saudi, NHM Alwi, N Azman Advanced Science Letters 23 (6), 5237-5241, 2017 | 1 | 2017 |
Leading Change: Adaption of Information Security in University Announcement System M Al-Shawabkeh, X Li, M Sullabi 2016 Joint International Information Technology, Mechanical and Electronic …, 2016 | 1 | 2016 |
Efficient Algorithm in Proyective Coordinates for EEC Over GF (2") IH Jebril, R Salleh, M Al-Shawabkeh International journal of the computer, the internet and management 15 (1), 43-50, 2007 | 1 | 2007 |
Al-Shawabkeh, Mahmoud (2014) Big data security. In: Seminar on Big data Security, 28-30 Dec 2014, Guangxi Province M Al-Shawabkeh http://irep.iium.edu.my/40663/, 2014 | | 2014 |
Programming in C for Foundation NH Bakar, NA Hassan, MN Idris, M al-Shawabkeh IIUM Press, International Islamic University Malaysia, 2014 | | 2014 |
Overview of Addition Formulas for Elliptic Curves Over GF (2n) In Cryptography IH Jebril, R Salleh, M Al-Shawabkeh CURRENT APPLIED SCIENCE AND TECHNOLOGY 5 (1), 52-61, 2005 | | 2005 |
Study of the Formulas in Projective Coordinates for Elliptic Curve Over GF (2n) in Cryptography IH Jebril, R Salleh, M Al-Shawabkeh | | 2004 |
Proposed Bluetooth Middleware Profile for On-location Universal Format Announcement M Al-Shawabkeh, R Salleh, IH Jebril | | 2004 |