Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior L Li, W He, L Xu, I Ash, M Anwar, X Yuan International Journal of Information Management 45, 13-24, 2019 | 469 | 2019 |
Gender difference and employees' cybersecurity behaviors M Anwar, W He, I Ash, X Yuan, L Li, L Xu Computers in Human Behavior 69, 437–443, 2016 | 415 | 2016 |
A privacy preservation model for facebook-style social network systems PWL Fong, M Anwar, Z Zhao Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 285 | 2009 |
Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study B Davis, J Mason, M Anwar IEEE Internet of Things Journal, 2020 | 145 | 2020 |
Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0 H Elhoone, T Zhang, M Anwar, S Desai International Journal of Production Research 58 (9), 2841-2861, 2020 | 112 | 2020 |
Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges M Anwar, J Joshi, J Tan Health Policy and Technology 4 (4), 299-311, 2015 | 89 | 2015 |
Facilitating trust in privacy-preserving e-learning environments M Anwar, J Greer IEEE Transactions on Learning Technologies 5 (1), 62-73, 2011 | 81 | 2011 |
Classification for authorship of tweets by comparing logistic regression and naive bayes classifiers O Aborisade, M Anwar 2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018 | 76 | 2018 |
Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training W He, I Ash, M Anwar, L Li, X Yuan, L Xu, X Tian Journal of intellectual capital 21 (2), 203-213, 2020 | 75 | 2020 |
Nonvisual tool for navigating hierarchical structures AC Smith, JS Cook, JM Francioni, A Hossain, M Anwar, MF Rahman ACM SIGACCESS Accessibility and Computing, 133-139, 2003 | 75 | 2003 |
Security & privacy challenges in IoT-based health cloud S Alasmari, M Anwar 2016 International Conference on Computational Science and Computational …, 2016 | 57 | 2016 |
A trust-based approach against IP-spoofing attacks JM Gonzalez, M Anwar, JBD Joshi 2011 Ninth Annual International Conference on Privacy, Security and Trust, 63-70, 2011 | 52 | 2011 |
Mutual-friend based attacks in social network systems L Jin, JBD Joshi, M Anwar Computers & security 37, 15-30, 2013 | 49 | 2013 |
Monitoring COVID-19 Pandemic through the Lens of Social Media using Natural Language Processing and Machine Learning Y Liu, C Whitfield, T Zhang, A Hauser, T Reynolds, M Anwar Springer Health Information Science and Systems 9 (25), 16, 2021 | 44 | 2021 |
A visualization tool for evaluating access control policies in facebook-style social network systems M Anwar, PWL Fong Proceedings of the 27th annual ACM Symposium on Applied Computing, 1443-1450, 2012 | 44 | 2012 |
Survey of supervised learning for medical image processing A Aljuaid, M Anwar SN Computer Science 3 (4), 292, 2022 | 43 | 2022 |
Api-based ransomware detection using machine learning-based threat detection models M Almousa, S Basavaraju, M Anwar 2021 18th International Conference on Privacy, Security and Trust (PST), 1-7, 2021 | 43 | 2021 |
Digitalization in container terminal logistics: A literature review M Anwar, L Henesey, E Casalicchio 27th annual conference of international association of maritime economists …, 2019 | 42 | 2019 |
Privacy enhanced personalization in e-learning MM Anwar, J Greer, CA Brooks Proceedings of the 2006 International Conference on Privacy, Security and …, 2006 | 42 | 2006 |
Visualizing privacy implications of access control policies in social network systems M Anwar, PWL Fong, XD Yang, H Hamilton International Workshop on Data Privacy Management, 106-120, 2009 | 41 | 2009 |