Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

The role of machine learning in network anomaly detection for cybersecurity

A Yaseen - Sage Science Review of Applied Machine …, 2023 - journals.sagescience.org
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …

Internet of things (IoT) security challenges and solutions: A systematic literature review

RF Ali, A Muneer, PDD Dominic, SM Taib… - Advances in Cyber …, 2021 - Springer
Abstract The Internet of Things (IoT), often known as the Internet of Everything, is a new
technological paradigm visualized as a worldwide network of interconnected machines. IoT …

iGluK-Deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions

S Naseer, RF Ali, YD Khan… - Journal of Biomolecular …, 2022 - Taylor & Francis
Lysine glutarylation is a post-translation modification which plays an important regulatory
role in a variety of physiological and enzymatic processes including mitochondrial functions …

The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare nurses

K Dong, RF Ali, PDD Dominic, SEA Ali - Sustainability, 2021 - mdpi.com
The advancement of information communication technology in healthcare institutions has
increased information security breaches. Scholars and industry practitioners have reported …

IAmideV-deep: Valine amidation site prediction in proteins using deep learning and pseudo amino acid compositions

S Naseer, RF Ali, A Muneer, SM Fati - Symmetry, 2021 - mdpi.com
Amidation is an important post translational modification where a peptide ends with an
amide group (–NH2) rather than carboxyl group (–COOH). These amidated peptides are …

iNitroY-Deep: Computational identification of Nitrotyrosine sites to supplement Carcinogenesis studies using Deep Learning

S Naseer, RF Ali, SM Fati, A Muneer - IEEE Access, 2021 - ieeexplore.ieee.org
In biological systems, Nitration is a crucial post-translational modification which occurs on
various amino acids. Nitration of Tyrosine is regarded as nitorsative stress biomarker …

Computational identification of 4-carboxyglutamate sites to supplement physiological studies using deep learning

S Naseer, RF Ali, SM Fati, A Muneer - Scientific Reports, 2022 - nature.com
In biological systems, Glutamic acid is a crucial amino acid which is used in protein
biosynthesis. Carboxylation of glutamic acid is a significant post-translational modification …

iAceS-Deep: Sequence-based identification of acetyl serine sites in proteins using PseAAC and deep neural representations

S Naseer, SM Fati, A Muneer, RF Ali - IEEE Access, 2022 - ieeexplore.ieee.org
In the biological systems, Acetylation is a crucial post-translational modification, prevalent in
various physiological functions and pathological conditions like carcinoma and …

A survey on phishing emails detection techniques

A Muneer, RF Ali, AA Al-Sharai… - … Conference on Innovative …, 2021 - ieeexplore.ieee.org
In the last few eras, phishing attacks have become more sensitive case for local users,
organizations, and service providers. Phishing emails can also cause financial loss to …