default search action
Nader Sohrabi Safa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Mohamad Ibrahim, Nader Sohrabi Safa:
Vulnerabilities and risk in smart vehicle automatic parking assist systems. Netw. Secur. 2023(6) (2023) - 2022
- [j17]Omid Chatrabgoun, Alireza Daneshkhah, Mohsen Esmaeilbeigi, Nader Sohrabi Safa, Ali Hamdan Alenezi, Arafatur Rahman:
Predicting Primary Sequence-Based Protein-Protein Interactions Using a Mercer Series Representation of Nonlinear Support Vector Machine. IEEE Access 10: 124345-124354 (2022) - [j16]Shariq Aziz Butt, Tauseef Jamal, Muhammad Ajmal Azad, Arshad Ali, Nader Sohrabi Safa:
A multivariant secure framework for smart mobile health application. Trans. Emerg. Telecommun. Technol. 33(8) (2022) - [j15]Nader Sohrabi Safa, Faye Rona Mitchell, Carsten Maple, Muhammad Ajmal Azad, Mohammad Dabbagh:
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - 2021
- [j14]Mohammad Dabbagh, Kim-Kwang Raymond Choo, Amin Beheshti, Mohammad Tahir, Nader Sohrabi Safa:
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput. Secur. 100: 102078 (2021) - [j13]Mehdi Sookhak, Mohammad Reza Jabbarpour, Nader Sohrabi Safa, F. Richard Yu:
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues. J. Netw. Comput. Appl. 178: 102950 (2021)
2010 – 2019
- 2019
- [j12]Mohammad Dabbagh, Mehdi Sookhak, Nader Sohrabi Safa:
The Evolution of Blockchain: A Bibliometric Study. IEEE Access 7: 19212-19221 (2019) - [j11]Nader Sohrabi Safa, Carsten Maple, Mahboobeh Haghparast, Tim Watson, Mehrdad Dianati:
An opportunistic resource management model to overcome resource-constraint in the Internet of Things. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j10]Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Gener. Comput. Syst. 97: 587-597 (2019) - [i1]Nader Sohrabi Safa, Carsten Maple, Steven M. Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations. CoRR abs/1903.12079 (2019) - 2018
- [j9]Nader Sohrabi Safa, Carsten Maple, Tim Watson, Steven Furnell:
Information security collaboration formation in organisations. IET Inf. Secur. 12(3): 238-245 (2018) - [j8]Nader Sohrabi Safa, Carsten Maple, Tim Watson, Rossouw von Solms:
Motivation and opportunity based model to reduce information security insider threats in organisations. J. Inf. Secur. Appl. 40: 247-257 (2018) - 2017
- [j7]Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Nader Sohrabi Safa:
A LogitBoost-Based Algorithm for Detecting Known and Unknown Web Attacks. IEEE Access 5: 26190-26200 (2017) - [j6]Muhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Nader Sohrabi Safa:
A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks. Secur. Commun. Networks 2017: 2539034:1-2539034:18 (2017) - [j5]Mehdi Sookhak, F. Richard Yu, Ying He, Hamid Talebian, Nader Sohrabi Safa, Nan Zhao, Muhammad Khurram Khan, Neeraj Kumar:
Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing. IEEE Veh. Technol. Mag. 12(3): 55-64 (2017) - [c3]Al Tariq Sheik, Carsten Maple, Tim Watson, Hussam Alhagagi, Nader Sohrabi Safa, Sang Woo Lee:
A threat based approach to computational offloading for collaborative cruise control. ICC 2017: 175:1-175:9 - 2016
- [j4]Nader Sohrabi Safa, Rossouw von Solms:
An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57: 442-451 (2016) - [j3]Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell:
Information security policy compliance model in organizations. Comput. Secur. 56: 70-82 (2016) - [j2]Haruna Chiroma, Sameem Abdul Kareem, Ahmad Shukri Mohd Noor, Adamu I. Abubakar, Nader Sohrabi Safa, Nor Liyana Mohd Shuib, Mukhtar Fatihu Hamza, Abdulsalam Ya'u Gital, Tutut Herawan:
A Review on Artificial Intelligence Methodologies for the Forecasting of Crude Oil Price. Intell. Autom. Soft Comput. 22(3): 449-462 (2016) - [c2]Petrus M. J. Delport, Mariana Gerber, Nader Sohrabi Safa:
An interactive visual library model to improve awareness in handling of business information. ISSA 2016: 18-26 - 2015
- [j1]Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, Steven Furnell, Norjihan Binti Abdul Ghani, Tutut Herawan:
Information security conscious care behaviour formation in organizations. Comput. Secur. 53: 65-78 (2015) - 2013
- [c1]Nader Sohrabi Safa, Maizatul Akmar Ismail:
Customer E-loyalty: From an Estimate in Electronic Commerce with an Artificial Neural Fuzzy Interface System (ANFIS). DaEng 2013: 667-674
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint