default search action
Mohammad Dabbagh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j10]Ahmad Sahban Rafsanjani, Norshaliza Binti Kamaruddin, Hazlifah Mohd Rusli, Mohammad Dabbagh:
QsecR: Secure QR Code Scanner According to a Novel Malicious URL Detection Framework. IEEE Access 11: 92523-92539 (2023) - 2022
- [j9]Nader Sohrabi Safa, Faye Rona Mitchell, Carsten Maple, Muhammad Ajmal Azad, Mohammad Dabbagh:
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - 2021
- [j8]Mohammad Dabbagh, Kim-Kwang Raymond Choo, Amin Beheshti, Mohammad Tahir, Nader Sohrabi Safa:
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. Comput. Secur. 100: 102078 (2021) - [j7]Angela Amphawan, Sushank Chaudhary, Tse-Kian Neo, Mohsen Kakavand, Mohammad Dabbagh:
Radio-over-free space optical space division multiplexing system using 3-core photonic crystal fiber mode group multiplexers. Wirel. Networks 27(1): 211-225 (2021) - 2020
- [j6]Mohammad Tahir, Mohamed Hadi Habaebi, Mohammad Dabbagh, Amna Mughees, Abdul Ahad, Kazi Istiaque Ahmed:
A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities. IEEE Access 8: 115876-115904 (2020) - 2019
- [j5]Mohammad Dabbagh, Mehdi Sookhak, Nader Sohrabi Safa:
The Evolution of Blockchain: A Bibliometric Study. IEEE Access 7: 19212-19221 (2019) - [j4]Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and prevention-based model to mitigate information security insider threats in organisations. Future Gener. Comput. Syst. 97: 587-597 (2019) - 2016
- [j3]Saif Ur Rehman Khan, Sai Peck Lee, Mohammad Dabbagh, Muhammad Tahir, Muzafar Khan, Muhammad Arif:
RePizer: a framework for prioritization of software requirements. Frontiers Inf. Technol. Electron. Eng. 17(8): 750-765 (2016) - [j2]Mohammad Dabbagh, Sai Peck Lee, Reza Meimandi Parizi:
Functional and non-functional requirements prioritization: empirical evaluation of IPA, AHP-based, and HAM-based approaches. Soft Comput. 20(11): 4497-4520 (2016) - 2014
- [j1]Reza Meimandi Parizi, Sai Peck Lee, Mohammad Dabbagh:
Achievements and Challenges in State-of-the-Art Software Traceability Between Test and Code Artifacts. IEEE Trans. Reliab. 63(4): 913-926 (2014)
Conference and Workshop Papers
- 2022
- [c6]Ng Yee Jien, Mohammad Tahir, Mohammad Dabbagh, Kian Meng Yap, Ali Farooq:
Performance Evaluation of Machine Learning Algorithms for Intrusion Detection in IoT Applications. IICAIET 2022: 1-6 - [c5]Ng Wei Xiang, Mohammad Dabbagh:
Stock Market Price Prediction: Text Analytics of the GameStop Short Squeeze. IICAIET 2022: 1-6 - 2020
- [c4]Mohammad Dabbagh, Mohsen Kakavand, Mohammad Tahir, Angela Amphawan:
Performance Analysis of Blockchain Platforms: Empirical Evaluation of Hyperledger Fabric and Ethereum. IICAIET 2020: 1-6 - 2019
- [c3]Mohammad Dabbagh, Mohsen Kakavand, Mohammad Tahir:
Towards Integration of Blockchain and IoT: A Bibliometric Analysis of State-of-the-Art. BLOCKCHAIN 2019: 27-35 - [c2]Mohammad Tahir, Qazi Mamoon Ashraf, Mohammad Dabbagh:
Towards Enabling Autonomic Computing in IoT Ecosystem. DASC/PiCom/DataCom/CyberSciTech 2019: 646-651 - 2013
- [c1]Mohammad Dabbagh, Sai Peck Lee:
A Consistent Approach for Prioritizing System Quality Attributes. SNPD 2013: 317-322
Informal and Other Publications
- 2019
- [i1]Nader Sohrabi Safa, Carsten Maple, Steven M. Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak:
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations. CoRR abs/1903.12079 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-26 19:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint