default search action
Mathew Nicho
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Mathew Nicho, Hussein Fakhry, Emad Bataineh, Shini Girija:
A Strategic Evaluation of Educational Continuity for Accessibility During Uncertainty in an Educational Practicum. Int. J. Inf. Commun. Technol. Educ. 20(1): 1-31 (2024) - [j11]Hussein Fakhry, Mathew Nicho, Emad Bataineh, Shini Girija:
The Evaluation of Internship in the Digital Information Age: A Case Study. Int. J. Online Pedagog. Course Des. 14(1): 1-25 (2024) - [j10]Tarek Gaber, Mathew Nicho, Esraa Ahmed, Ahmed Hamed:
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer. J. Inf. Secur. Appl. 85: 103838 (2024) - 2023
- [j9]Mathew Nicho, Maha Alblooki, Saeed AlMutiwei, Christopher D. McDermott, Olufemi Ilesanmi:
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study. Int. J. Digit. Crime Forensics 15(1): 1-20 (2023) - [j8]Mathew Nicho, Christopher D. McDermott, Hussein Fakhry, Shini Girija:
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors. Int. J. Inf. Secur. Priv. 17(1): 1-23 (2023) - [j7]Mathew Nicho, Tarannum Parkar, Shini Girija:
Evaluating Onsite and Online Internship Mode Using Consumptive Metrics. Int. J. Web Based Learn. Teach. Technol. 18(1): 1-25 (2023) - 2019
- [j6]Suadad Muammar, Mathew Nicho:
IT Governance Practices in the Gulf Cooperation Council Region. Int. J. Inf. Technol. Proj. Manag. 10(4): 137-159 (2019) - 2018
- [j5]Mathew Nicho:
A process model for implementing information systems security governance. Inf. Comput. Secur. 26(1): 10-38 (2018) - 2014
- [j4]Mathew Nicho, Faouzi Kamoun:
Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems. Commun. Assoc. Inf. Syst. 35: 18 (2014) - [j3]Faouzi Kamoun, Mathew Nicho:
Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention. Int. J. Heal. Inf. Syst. Informatics 9(1): 42-60 (2014) - [j2]Mathew Nicho, Shafaq Khan:
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective. Int. J. Inf. Secur. Priv. 8(1): 1-18 (2014) - 2011
- [j1]Mathew Nicho, Hussein Fakhry, Charles Haiber:
An Integrated Security Governance Framework for Effective PCI DSS Implementation. Int. J. Inf. Secur. Priv. 5(3): 50-67 (2011)
Conference and Workshop Papers
- 2023
- [c13]Mathew Nicho, Ibrahim Sabry:
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device. ICISSP 2023: 501-508 - 2022
- [c12]Mathew Nicho, Farzan Majdani, Christopher D. McDermott:
Replacing Human Input in Spam Email Detection Using Deep Learning. HCI (35) 2022: 387-404 - [c11]Mathew Nicho, Shini Girija:
Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats. HSI 2022: 1-6 - [c10]Mathew Nicho, Shini Girija:
Evaluating Machine Learning Methods for Intrusion Detection in IoT. ICICM 2022: 7-12 - 2021
- [c9]Mathew Nicho, Emad Bataineh, Tarannum Parkar:
Application of Consumptive Metrics to Measure Internship Alignment. CSCI 2021: 970-975 - [c8]Mathew Nicho, Maitha Alkhateri:
Modeling Evasive Malware Authoring Techniques. CSNet 2021: 71-75 - 2019
- [c7]Mathew Nicho, Christopher D. McDermott:
Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats. SoftCOM 2019: 1-5 - 2018
- [c6]Mathew Nicho, Shafaq Naheed Khan:
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane. MIPRO 2018: 1155-1160 - [c5]Mathew Nicho, Adelaiye Oluwasegun, Faouzi Kamoun:
Identifying Vulnerabilities in APT Attacks: A Simulated Approach. NTMS 2018: 1-4 - 2017
- [c4]Mathew Nicho, Shafaq Khan, M. S. M. K. Rahman:
Managing Information Security Risk Using Integrated Governance Risk and Compliance. ICCA 2017: 56-66 - [c3]Vasileios Mavroeidis, Mathew Nicho:
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. MMM-ACNS 2017: 313-324 - 2012
- [c2]Mathew Nicho:
An Optimized Dynamic Process Model of IS Security Governance Implementation. CONF-IRM 2012: 38 - 2007
- [c1]Mathew Nicho, Brian Cusack:
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit. HICSS 2007: 235
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint