Shoulder surfing defence for recall-based graphical passwords NH Zakaria, D Griffiths, S Brostoff, J Yan Proceedings of the seventh symposium on usable privacy and security, 1-12, 2011 | 183 | 2011 |
Cryptocurrency adoption: current stage, opportunities, and open challenges R Al-Amri, NH Zakaria, A Habbal, S Hassan International journal of advanced computer research 9 (44), 293-307, 2019 | 137 | 2019 |
Halal certification for tourism marketing: the attributes and attitudes of food operators in Indonesia N Katuk, KR Ku-Mahamud, K Kayat, MN Abdul Hamid, NH Zakaria, ... Journal of Islamic Marketing 12 (5), 1043-1062, 2021 | 96 | 2021 |
Hybrid machine learning technique for intrusion detection system H Mohamad Tahir, W Hasan, A Md Said, NH Zakaria, N Katuk, NF Kabir, ... | 62 | 2015 |
Factors influencing cloud computing adoption in higher education institutions of least developed countries: evidence from Republic of Yemen A Hussein Alghushami, NH Zakaria, Z Mat Aji Applied Sciences 10 (22), 8098, 2020 | 33 | 2020 |
Implementation and recent progress in cloud-based smart home automation systems N Katuk, KR Ku-Mahamud, NH Zakaria, MA Maarof 2018 IEEE Symposium on Computer Applications & Industrial Electronics …, 2018 | 30 | 2018 |
Oving K-means clustering using discretization technique in network intrusion detection system HM Tahir, AM Said, NH Osman, NH Zakaria, PNAM Sabri, N Katuk 2016 3rd International Conference on Computer and Information Sciences …, 2016 | 30 | 2016 |
A popularity based caching strategy for the future Internet S Hassan, IU Din, A Habbal, NH Zakaria 2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), 1-8, 2016 | 24 | 2016 |
Security, comfort, healthcare, and energy saving: A review on biometric factors for smart home environment TK Ghazali, NH Zakaria Journal of Computers 29 (1), 189-208, 2018 | 23 | 2018 |
Categorization refactoring techniques based on their effect on software quality attributes A Almogahed, M Omar, NH Zakaria International Journal of Innovative Technology and Exploring Engineering …, 2019 | 17 | 2019 |
Mobile phone sensing using the built-in camera N Katuk, N Zakaria, KR Ku-Mahamud International Association of Online Engineering, 2019 | 16 | 2019 |
Refactoring codes to improve software security requirements A Almogahed, M Omar, NH Zakaria Procedia Computer Science 204, 108-115, 2022 | 15 | 2022 |
Impact of software refactoring on software quality in the industrial environment: A review of empirical studies A Almogahed, M Omar, NH Zakaria | 15 | 2018 |
Social engineering awareness game (SEAG): an empirical evaluation of using game towards improving information security awareness AST Olanrewaju, NH Zakaria | 15 | 2015 |
A refactoring classification framework for efficient software maintenance A Almogahed, H Mahdin, M Omar, NH Zakaria, SA Mostafa, SA AlQahtani, ... IEEE Access, 2023 | 10 | 2023 |
Software security measurements: A survey A Almogahed, M Omar, NH Zakaria, A Alawadhi 2022 International Conference on Intelligent Technology, System and Service …, 2022 | 10 | 2022 |
Revisiting scenarios of using refactoring techniques to improve software systems quality A Almogahed, M Omar, NH Zakaria, G Muhammad, SA AlQahtani IEEE Access 11, 28800-28819, 2022 | 10 | 2022 |
The determinants impacting the adoption of cloud computing in Yemen institutions A Alghushami, NH Zakaria, ZM Aji AIP Conference Proceedings 2016 (1), 2018 | 10 | 2018 |
An overview to pre-fetching techniques for content caching of mobile applications AAM Shariff, N Katuk, NH Zakaria Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 10 | 2017 |
Identification of factors contributing to online game addiction among adolescents WMYW Yaacob, NH Zakaria, ZM Aji Journal of Information and Communication Technology 20 (4), 565-597, 2021 | 9 | 2021 |