Gender difference and employees' cybersecurity behaviors M Anwar, W He, I Ash, X Yuan, L Li, L Xu Computers in Human Behavior 69, 437–443, 2016 | 289 | 2016 |
A privacy preservation model for facebook-style social network systems PWL Fong, M Anwar, Z Zhao Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 282 | 2009 |
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior L Li, W He, L Xu, I Ash, M Anwar, X Yuan International Journal of Information Management 45, 13-24, 2019 | 237 | 2019 |
Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study B Davis, J Mason, M Anwar IEEE Internet of Things Journal, 2020 | 79 | 2020 |
Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges M Anwar, J Joshi, J Tan Health Policy and Technology 4 (4), 299-311, 2015 | 77 | 2015 |
Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0 H Elhoone, T Zhang, M Anwar, S Desai International Journal of Production Research 58 (9), 2841-2861, 2020 | 74 | 2020 |
Nonvisual tool for navigating hierarchical structures AC Smith, JS Cook, JM Francioni, A Hossain, M Anwar, MF Rahman ACM SIGACCESS Accessibility and Computing, 133-139, 2003 | 69 | 2003 |
Facilitating trust in privacy-preserving e-learning environments M Anwar, J Greer IEEE Transactions on Learning Technologies 5 (1), 62-73, 2011 | 67 | 2011 |
Classification for authorship of tweets by comparing logistic regression and naive bayes classifiers O Aborisade, M Anwar 2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018 | 52 | 2018 |
A trust-based approach against IP-spoofing attacks JM Gonzalez, M Anwar, JBD Joshi 2011 Ninth Annual International Conference on Privacy, Security and Trust, 63-70, 2011 | 49 | 2011 |
Mutual-friend based attacks in social network systems L Jin, JBD Joshi, M Anwar Computers & security 37, 15-30, 2013 | 46 | 2013 |
Privacy enhanced personalization in e-learning MM Anwar, J Greer, CA Brooks Proceedings of the 2006 International Conference on Privacy, Security and …, 2006 | 42 | 2006 |
Visualizing privacy implications of access control policies in social network systems M Anwar, PWL Fong, XD Yang, H Hamilton Data Privacy Management and Autonomous Spontaneous Security: 4th …, 2010 | 41 | 2010 |
Security & privacy challenges in IoT-based health cloud S Alasmari, M Anwar 2016 International Conference on Computational Science and Computational …, 2016 | 38 | 2016 |
A visualization tool for evaluating access control policies in facebook-style social network systems M Anwar, PWL Fong Proceedings of the 27th annual ACM Symposium on Applied Computing, 1443-1450, 2012 | 37 | 2012 |
Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training W He, I Ash, M Anwar, L Li, X Yuan, L Xu, X Tian Journal of intellectual capital 21 (2), 203-213, 2020 | 36 | 2020 |
Monitoring COVID-19 Pandemic through the Lens of Social Media using Natural Language Processing and Machine Learning Y Liu, C Whitfield, T Zhang, A Hauser, T Reynolds, M Anwar Springer Health Information Science and Systems 9 (25), 16, 2021 | 29 | 2021 |
Does explicit information security policy affect employees' cyber security behavior? A pilot study L Li, W He, L Xu, A Ivan, M Anwar, X Yuan 2014 Enterprise systems conference, 169-173, 2014 | 29 | 2014 |
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication. M Anwar, A Imran MAICS, 13-18, 2015 | 28 | 2015 |
Reputation management in privacy-enhanced e-learning M Anwar, J Greer Proceedings of the 3rd Annual Scientific Conference of the LORNET Research …, 2006 | 28 | 2006 |