Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments AB Garba, J Armarego, D Murray, W Kenworthy Journal of Information privacy and security 11 (1), 38-54, 2015 | 139 | 2015 |
Bring your own device organizational information security and privacy AB Garba, J Armarego, D Murray ARPN Journal of Engineering and Applied Sciences 10 (3), 1279-1287, 2015 | 72 | 2015 |
The role of user behaviour in improving cyber security management AA Moustafa, A Bello, A Maurushat Frontiers in Psychology 12, 561011, 2021 | 63 | 2021 |
A systematic approach to investigating how information security and privacy can be achieved in BYOD environments AG Bello, D Murray, J Armarego Information & Computer Security 25 (4), 475-492, 2017 | 54 | 2017 |
A policy-based framework for managing information security and privacy risks in BYOD environments A Bello, J Armarego, D Murray International Journal of Emerging Trends & Technology in Computer Science …, 2015 | 32 | 2015 |
Incorporating psychology into cyber security education: a pedagogical approach J Taylor-Jackson, J McAlaney, JL Foster, A Bello, A Maurushat, J Dale Financial Cryptography and Data Security: FC 2020 International Workshops …, 2020 | 24 | 2020 |
Technical and behavioural training and awareness solutions for mitigating ransomware attacks A Bello, A Maurushat Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020 | 14 | 2020 |
A systemic review of the cybersecurity challenges in Australian water infrastructure management A Bello, S Jahan, F Farid, F Ahamed Water 15 (1), 168, 2022 | 9 | 2022 |
Role of attention and design cues for influencing cyber-sextortion using social engineering and phishing attacks B Pethers, A Bello Future Internet 15 (1), 29, 2023 | 8 | 2023 |
A machine learning predictive model to detect water quality and pollution X Xu, T Lai, S Jahan, F Farid, A Bello Future Internet 14 (11), 324, 2022 | 8 | 2022 |
Security risks and user perception towards adopting wearable internet of medical things S Thapa, A Bello, A Maurushat, F Farid International Journal of Environmental Research and Public Health 20 (8), 5519, 2023 | 6 | 2023 |
A cloud based conceptual identity management model for secured Internet of Things operation A Bello, V Mahadevan Journal of Cyber Security and Mobility, 53-74, 2019 | 6 | 2019 |
Synthesis of evidence on existing and emerging social engineering ransomware attack vectors A Bello, A Maurushat Cybersecurity Issues, Challenges, and Solutions in the Business World, 234-254, 2023 | 5 | 2023 |
Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware A Maurushat, A Bello, B Bragg Indian JL & Tech. 15, 261, 2019 | 4 | 2019 |
Ensemble Learning based Anomaly Detection for IoT Cybersecurity via Bayesian Hyperparameters Sensitivity Analysis T Lai, F Farid, A Bello, F Sabrina arXiv preprint arXiv:2307.10596, 2023 | 3 | 2023 |
Working from home users at risk of COVID-19 ransomware attacks AA Duong, A Bello, A Maurushat Cybersecurity and Cognitive Science, 51-87, 2022 | 3 | 2022 |
BYOD security: using dual process theory to adapt effective security habits in BYOD R Zhang, A Bello, JL Foster Proceedings of the Future Technologies Conference, 372-386, 2022 | 2 | 2022 |
A framework for investigating, assessing, understanding, and controlling the information security and privacy risks in BYOD environments AG Bello Murdoch University, 2015 | 2 | 2015 |
The Roles of AI Technologies in Reducing Hospital Readmission for Chronic Diseases: A Comprehensive Analysis F Farid, A Bello, F Ahamed, F Hossain Preprints, 2023 | 1 | 2023 |
Real Time Remote Cardiac Health Monitoring Using IoT Wearable Sensors-A Review P Sharma, J Rezazadeh, A Bello, A Dawoud, AA Albabawat Proceedings of the Second International Conference on Innovations in …, 2023 | 1 | 2023 |