An Intelligent Model for Online Recruitment Fraud Detection BAF Alharby Journal of Information Security 10 (No.3), 2019 | 77 | 2019 |
Users’ acceptance of secure biometrics authentication system: Reliability and validate of an extended UTAUT model ALH Fahad, R Qahwaji, M Kamala International Conference on Networked Digital Technologies -Springer, 254-258, 2010 | 31 | 2010 |
End-users’ acceptance of biometrics authentication to secure e-commerce within the context of Saudi culture: applying the UTAUT model FAL Harby, R Qahwaji, M Kamala Globalization, Technology Diffusion and Gender Disparity: Social Impacts of …, 2012 | 25 | 2012 |
The feasibility of biometrics authentication in e-commerce: User acceptance F Al-Harby, R Qahwaji, M Kamala IADIS International Conference WWW/Internet, 2008 | 22 | 2008 |
The effects of gender differences in the acceptance of biometrics authentication systems within online transaction F Al-Harby, R Qahwaji, M Kamala CyberWorlds, 2009. ACM/IEEE International Conference on, 203-210, 2009 | 20 | 2009 |
Globalization, Technology Diffusion and Gender Disparity: Social Impacts of ICTs: Social Impacts of ICTs R Pande IGI Global, 2012 | 18 | 2012 |
Towards an understanding of user acceptance to use biometrics authentication systems in e-commerce FAL Harby, R Qahwajim, M Kamala International Journal of E-Business Research (IJEBR), 2010 | 18 | 2010 |
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence M Ammi, O Adedugbe, FM Alharby, E Benkhelifa Cluster Computing 25 (5), 3629-3640, 2022 | 7 | 2022 |
Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review A Meryem, A Oluwasegun, A Fahad, B Elhadj International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-14, 2022 | 7 | 2022 |
Understanding and Discovering SQL Injection Vulnerabilities AA Sarhan, SA Farhan, FM Al-Harby Springer International Conference on Applied Human Factors and Ergonomics, 45-51, 2017 | 7 | 2017 |
Networked Digital Technologies, Part I: Second International Conference, NDT 2010, Prague, Czech Republic F Zavoral, J Yaghob, P Pichappan, E El-Qawasmeh Springer Science & Business Media, 2010 | 7 | 2010 |
Biometric authentication systems for secured e-transactions in Saudi Arabia. An empirical investigation of the factors affecting users' acceptance of fingerprint authentication … FM Al-Harby University of Bradford, 2010 | 6 | 2010 |
Description of security impact of drones challenges and opportunities A Sabra, H Wridan, NM Alkhatani, F Al-Harby 2018 21st Saudi Computer Society National Computer Conference (NCC), 1-5, 2018 | 5 | 2018 |
Transformations in E-Business Technologies and Commerce: Emerging Impacts: Emerging Impacts I Lee IGI Global, 2011 | 5 | 2011 |
Barriers of E-commerce and E-government in Saudi Arabia FM AL-HARBY University of Bradford, 2006 | 5 | 2006 |
The Role of User Self-Efficacy for the Acceptance of Biometrics Fingerprint Authentication System in E-commerce: The Use of UTAUT Model F Al-Harby, R Qahwaji, M Kamala Proceedings of the Saudi International Conference, 2009 | 4 | 2009 |
Towards an understanding of the intention to use biometrics authentication systems in e-commerce: Using an extension of the technology acceptance model. F Al-Harby, R Qahwaji, M Kamala International Journal of E-Business Research 6 (3), 2009 | 3 | 2009 |
Secure Biometrics Authentication: A brief review of the Literature F Al-harby, R Qahwaji, M Kamala School of Informatics, University of Bradford BD7 1DP, UK 1 2, 2004 | 2 | 2004 |
Secure Biometrics Authentication: A brief review of the Literature retrieved from http://www. scribd. com/doc/23874642 F Al-harby, R Qahwaji, M Kamala Secure-Biometrics-Authentication-A-briefreview-of-the-Literature# scribd, 0 | 2 | |
Internet of Things and Distributed Denial of Service Mitigation MAS Ali, D Motawa, F Al-Harby International Conference on Applied Human Factors and Ergonomics-Springer, 26-36, 2017 | 1 | 2017 |