Who is more susceptible to phishing emails?: a Saudi Arabian study I Alseadoon, T Chan, E Foo, J Gonzalez Nieto | 60 | 2012 |
What is the influence of users’ characteristics on their ability to detect phishing emails? I Alseadoon, MFI Othman, T Chan Advanced Computer and Communication Engineering Technology: Proceedings of …, 2015 | 52 | 2015 |
Classification and mapping of adaptive security for mobile computing M Sajjad, A Ahmad, AW Malik, AB Altamimi, I Alseadoon IEEE Transactions on Emerging Topics in Computing 8 (3), 814-832, 2018 | 23 | 2018 |
Human action recognition in videos using stable features M Ullah, H Ullah, IM Alseadoon AIRCC Publishing Corporatio, 2017 | 23 | 2017 |
The impact of users' characteristics on their ability to detect phishing emails IMA Alseadoon Queensland University of Technology, 2014 | 23 | 2014 |
LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices RA Ramadan, BW Aboshosha, K Yadav, IM Alseadoon, MJ Kashout, ... CMC-COMPUTERS MATERIALS & CONTINUA 67 (3), 3563-3579, 2021 | 22 | 2021 |
Typology of phishing email victims based on their behavioural response IM Alseadoon, MFI Othman, E Foo, T Chan The 19th Americas Conference on Information Systems (AMCIS), Chicago, Illinois, 2013 | 15 | 2013 |
Cultural impact on users’ ability to protect themselves against phishing websites IM Alseadoon, RA Ramadan, AY Khedr International Journal of Computer Science and Network Security 17 (11), 1-5, 2017 | 9 | 2017 |
Migration of Existing Software Systems to Mobile Computing Platforms: A Systematic Mapping Study IM Alseadon, A Ahmad, A Alkhalil, K Sultan Frontiers of Computer Science, 1-31, 2019 | 8 | 2019 |
A framework for the evolution of legacy software towards context-aware and portable mobile computing applications A Ahmad, I Alseadoon, A Alkhalil, K Sultan Proceedings of the International Conference on Software Engineering Research …, 2019 | 7 | 2019 |
An Online Voting System using Face Recognition for Campus Election MMKMM Sulaiman, MFI Othman, WM Shah, A Hassan, N Harum, ... Journal Of Advanced Computing Technology And Application (JACTA) 3 (1), 38-45, 2021 | 3 | 2021 |
A Deep Learning Framework for COVID-19 Diagnosis from Computed Tomography N Mansouri, K Sultan, A Ahmad, I Alseadoon, A Alkhalil Intelligent Automation & Soft Computing (IASC) 34 (2), 1248-1264, 2022 | 1 | 2022 |
Secure vehicle tracking using RFID IM Alseadoon, RA Ramadan, AY Khedr, BM Alshammari International Journal of Advanced and Applied Sciences 6 (10), 1-6, 2019 | 1 | 2019 |
Language and security for none english speakers IM Alseadoon, RA Ramadan, AY Khedr International Journal of Computer Science and Information Security 14 (7), 636, 2016 | 1 | 2016 |
The power of intention in detecting social engineering attacks IM Alseadoon International Journal on Information Technologies and Security 15 (3), 75-86, 2023 | | 2023 |
An online voting system using face recognition for campus election MMK Meor Muhammad Sulaiman, MFI Othman, W Md Shah, A Hassan, ... Journal of Advanced Computing Technology and Application (JACTA) 3 (1), 38-45, 2021 | | 2021 |
Migration of existing software systems to mobile computing platforms: a systematic mapping Review I Alseadoon, A Ahmad, A Alkhalil, K Sultan Frontiers of Computer Science 15 (2), 1-25, 2021 | | 2021 |
k-Integer-Merging on Shared Memory AY Khedr, IM Alseadoon International Journal of Advanced Computer Science and Applications 12 (1 …, 2021 | | 2021 |
OPTIMIZED SECURE CLUSTERING FOR DATA EXCHANGE IN WSNS IM Alseadoon Science International 32 (1), 33-37, 2020 | | 2020 |
THE IMPACT OF SECURITY AWARENESS ON USERS’SECURE BEHAVIOUR IM Alseadoon Science International 31 (3), 473-475, 2019 | | 2019 |