Web accessibility challenges HY Abuaddous, MZ Jali, N Basir International Journal of Advanced Computer Science and Applications 7 (10), 2016 | 105 | 2016 |
Impact of system quality on users' satisfaction in continuation of the use of e-learning system AE Dreheeb, N Basir, N Fabil International Journal of e-Education, e-Business, e-Management and e …, 2016 | 103 | 2016 |
Security awareness training: A review MM Al-Daeef, N Basir, MM Saudi Proceedings of the world congress on engineering 1, 5-7, 2017 | 91 | 2017 |
Deriving safety cases for hierarchical structure in model-based development N Basir, E Denney, B Fischer Computer Safety, Reliability, and Security: 29th International Conference …, 2010 | 40 | 2010 |
A simulated annealing for Tahmidi course timetabling N Basir, W Ismail, NM Norwawi Procedia Technology 11, 437-445, 2013 | 35 | 2013 |
Requirements elicitation techniques: comparative study OI Al Mrayat, N Norwawi, N Basir International Journal of Recent Development in Engineering and Technology 1 …, 2013 | 34 | 2013 |
Constructing a safety case for automatically generated code from formal program verification information N Basir, E Denney, B Fischer Computer Safety, Reliability, and Security: 27th International Conference …, 2008 | 34 | 2008 |
Deriving safety cases from automatically constructed proofs N Basir, E Denney, B Fischer IET Digital Library, 2009 | 20 | 2009 |
Hybrid search approach for retrieving Medical and Health Science knowledge from Quran MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ... Int. J. Eng. Technol 7 (4.15), 69-74, 2018 | 19 | 2018 |
Tacit requirements elicitation framework B Basir, R Salam ARPN J. Eng. Appl. Sci 10 (2), 572-578, 2015 | 19 | 2015 |
Mortality rates due to coronary heart disease by specific sex and age groups among Malaysians W Abdullah, YS Yusoff, N Basir, MM Yusuf Proceedings of the World Congress on Engineering and Computer Science, San …, 2017 | 16 | 2017 |
Study of the accessibility diagnosis on the public higher institutions website in Malaysia HY Abuaddous, MZ Jali, N Basir | 16 | 2013 |
Security metrics to improve misuse case model AA Abdulrazeg, NM Norwawi, N Basir Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 16 | 2012 |
A systematic review analysis of root exploitation for mobile botnet detection HAB Hashim, M Mohd Saudi, N Basir Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016 | 12 | 2016 |
Security measurement based on GQM to improve application security during requirements stage AA Abdulrazeg, NM Norwawi, N Basir International Journal of Cyber-security and digital forensics 1 (3), 211-221, 2012 | 11 | 2012 |
Deriving safety cases for the formal safety certification of automatically generated code N Basir, E Denney, B Fischer Electronic Notes in Theoretical Computer Science 238 (4), 19-26, 2009 | 11 | 2009 |
Quantitative metric for ranking web accessibility barriers based on their severity HY Abuaddous, MZ Jali, N Basir Journal of Information and Communication Technology 16 (1), 81-102, 2017 | 10 | 2017 |
A method to measure the efficiency of phishing emails detection features MM Al-Daeef, N Basir, MM Saudi 2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014 | 10 | 2014 |
Phishing detection and prevention using chrome extension MASR Rose, N Basir, NFNR Heng, NJM Zaizi, MM Saudi 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2022 | 8 | 2022 |
Comparative study of quality models AE Dreheeb, N Basir, N Fabil International Journal of Computer Science and Electronics Engineering …, 2016 | 8 | 2016 |