Follow
Mahmoud Al-Shawabkeh
Title
Cited by
Cited by
Year
Bandwidth optimization control protocol for 4G wireless mobile internet
M Al-Shawabkeh, R Salleh, X Li
Proceedings of the 11th WSEAS International conference on Communications 3 …, 2007
162007
Computer security self-efficacy effect: An extention of technology-to-performance chain model
M Al-Shawabkeh, MM Saudi, NHM Alwi
2012 IEEE Control and System Graduate Research Colloquium, 64-69, 2012
72012
Security risk management approach for improving information security return of investment
X Li, M Al-Shawabkeh, Z Li
Recent Developments in Data Science and Business Analytics: Proceedings of …, 2018
62018
Computer security factors effects towards online usage of internet banking system
M Al-Shawabkeh, MM Saudi, NHM Alwi
ARPN Journal of Engineering and Applied Sciences, 2015
42015
New Information Security Risk Management Framework as an Integral Part of Project Life Cycle
MS Mahmoud Alshawabkeh, Xichun Li
Advances in Social Science, Education and Humanities Research 319, 133-139, 2019
2*2019
A New Counterfeiting Approach: Computer Security Evaluation Of Fuel Rationing System
XL Al-Shawabkeh Mahmoud
Advances in Computer Science Research 62, 269-272, 2017
1*2017
Information security management systems (ISMS) and computer security self-efficacy (CSSE) model comparison
M Al-Shawabkeh, MM Saudi, NHM Alwi, N Azman
Advanced Science Letters 23 (6), 5237-5241, 2017
12017
Leading Change: Adaption of Information Security in University Announcement System
M Al-Shawabkeh, X Li, M Sullabi
2016 Joint International Information Technology, Mechanical and Electronic …, 2016
12016
Efficient Algorithm in Proyective Coordinates for EEC Over GF (2")
IH Jebril, R Salleh, M Al-Shawabkeh
International journal of the computer, the internet and management 15 (1), 43-50, 2007
12007
Al-Shawabkeh, Mahmoud (2014) Big data security. In: Seminar on Big data Security, 28-30 Dec 2014, Guangxi Province
M Al-Shawabkeh
http://irep.iium.edu.my/40663/, 2014
2014
Programming in C for Foundation
NH Bakar, NA Hassan, MN Idris, M al-Shawabkeh
IIUM Press, International Islamic University Malaysia, 2014
2014
Overview of Addition Formulas for Elliptic Curves Over GF (2n) In Cryptography
IH Jebril, R Salleh, M Al-Shawabkeh
CURRENT APPLIED SCIENCE AND TECHNOLOGY 5 (1), 52-61, 2005
2005
Study of the Formulas in Projective Coordinates for Elliptic Curve Over GF (2n) in Cryptography
IH Jebril, R Salleh, M Al-Shawabkeh
2004
Proposed Bluetooth Middleware Profile for On-location Universal Format Announcement
M Al-Shawabkeh, R Salleh, IH Jebril
2004
The system can't perform the operation now. Try again later.
Articles 1–14