Volgen
Shouki A. Ebad
Shouki A. Ebad
Northern Border University
Geverifieerd e-mailadres voor nbu.edu.sa - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
An exploratory study of ICT projects failure in emerging markets
SA Ebad
Journal of Global Information Technology Management 21 (2), 139-160, 2018
602018
Measuring software obfuscation quality—a systematic literature review
SA Ebad, A Darem, JH Abawajy
IEEE Access 9, 99024 - 99038, 2021
302021
Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector
S T. Alanazi, M Anbar, S A. Ebad, S Karuppayah, HA Al-Ani
Symmetry 12 (9), 1544, 2020
292020
Influencing factors for IT software project failures in developing countries-a critical literature survey.
SA Ebad
J. Softw. 11 (11), 1145-1153, 2016
282016
Healthcare software design and implementation—A project failure case
SA Ebad
Software: Practice and Experience 50 (7), 1258-1276, 2020
242020
Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory
SA Ebad
International Journal of System Assurance Engineering and Management 13 (1 …, 2022
192022
Deep-ensemble and multifaceted behavioral malware variant detection model
AA Al-Hashmi, FA Ghaleb, A Al-Marghilani, AE Yahya, SA Ebad, M Saqib, ...
IEEE Access 10, 42762-42777, 2022
182022
Cyber threats classifications and countermeasures in banking and financial sector
AA Darem, AA Alhashmi, TM Alkhaldi, AM Alashjaee, SM Alanazi, ...
IEEE Access 11, 125138-125158, 2023
172023
Inspection reading techniques applied to software artifacts-a systematic review
SA Ebad
Comput. Syst. Sci. Eng 32 (3), 213-226, 2017
162017
Measuring stability of object‐oriented software architectures
SA Ebad, MA Ahmed
IET Software 9 (3), 76-82, 2015
162015
Analyzing privacy requirements: A case study of healthcare in Saudi Arabia
SA Ebad, ES Jaha, MA Al-Qadhi
Informatics for Health and Social Care 41 (1), 47-63, 2016
102016
Exploring how to apply secure software design principles
SA Ebad
IEEE Access 10, 128983-128993, 2022
92022
The influencing causes of software unavailability: A case study from industry
SA Ebad
Software: Practice and Experience 48 (5), 1056-1076, 2018
92018
Towards measuring software requirements volatility: A retrospective analysis
SA Ebad
Malaysian Journal of Computer Science 30 (2), 99-116, 2017
92017
Software packaging approaches—a comparison framework
SA Ebad, M Ahmed
Software Architecture: 5th European Conference, ECSA 2011, Essen, Germany …, 2011
92011
An evaluation framework for package-level cohesion metrics
S Ebad, M Ahmed
International Proceedings of Computer Science and Information Technology 13 …, 2011
92011
Similarity-based hybrid malware detection model using API calls
AA Alhashmi, AA Darem, AM Alashjaee, SM Alanazi, TM Alkhaldi, ...
Mathematics 11 (13), 2944, 2023
82023
Investigating the effect of software packaging on modular structure stability
SA Ebad, M Ahmed
Computer Systems Science and Engineering 34 (5), 283-296, 2019
72019
Functionality-based software packaging using sequence diagrams
SA Ebad, MA Ahmed
Software Quality Journal 23, 453-481, 2015
62015
An empirical comparison of Java and C# programs in following naming conventions
SA Ebad, D Manzoor
International Journal of People-Oriented Programming (IJPOP) 5 (1), 39-60, 2016
52016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20