[PDF][PDF] Literature review of security issues in saas for public cloud computing: a meta-analysis

M Shakir, M Hammood, AK Muttar - International Journal of …, 2018 - academia.edu
Cloud computing is a rapidly growing technology due to its highly flexible uses and
applications. It also has other features such as simplicity, quick data access and reduced …

[PDF][PDF] Literature review of authentication layer for public cloud computing: a meta-analysis

A Eldow, M Shakir, MA Talab, AK Muttar… - Journal of Theoretical …, 2006 - academia.edu
Cloud computing is a8rapidly growing technology due to its8highly flexible uses and
applications. It also has other features such as8simplicity, quick data access and …

[PDF][PDF] Enhancing Security with Multi-Factor User Behavior Identification Via Longest Common Subsequence Analysis

B Shannaq, M Shakir - Informatica, 2024 - researchgate.net
Enter short title in File/Properties/Summary Page 1 https://doi.org/10.31449/inf.v48i19.6270
Informatica 48 (2024) 57–72 57 Enhancing Security with Multi-Factor User Behavior Identification …

Enhancing Security through Multi-Factor User Behavior Identification: Moving Beyond the Use of the Longest Common Subsequence (LCS)

B Shannaq, MT Shakir - Informatica, 2024 - informatica.si
The proposed approach comprises a set of strategies and tools to protect user-sensitive
data, such as passwords, from unauthorized access, misuse, or loss. It aims to identify …

Users Acceptance of Electronic Personal Synthesis Behavior (EPSB): An Exploratory Study

M Shakir, R Abood, M Sheker, M Alnaseri… - Recent Advances in …, 2021 - Springer
Abstract Electronic Personal Synthesis Behavior (EPSB) algorithm is suggested for
authenticating authorized users' behavior. It stands for the electronic diagnostic process to …

Enhancing Smartphone Authentication by Integrating Decision-Making Model with Touch Pressure, Finger Location Data, and Advanced Cybersecurity Techniques

MM Hamood, ML Shuwandy… - Iraqi Journal for …, 2024 - ijcsm.researchcommons.org
Smartphone authentication methods face significant challenges in achieving high accuracy,
robustness, and usability within cybersecurity applications. Traditional methods, such as …

[PDF][PDF] Enhancing secure access through time-stamped password analysis: Implications for infrastructure and policy development

M Shakir, B Shannaq, O Ali… - Journal of Infrastructure …, 2024 - researchgate.net
The proposed research work encompasses implications for infrastructure particularly the
cybersecurity as an essential in soft infrastructure, and policy making particularly on secure …

Applying Human Behaviour Recognition in Cloud Authentication Method—A Review

M Shakir - Proceedings of International Conference on Emerging …, 2022 - Springer
Authentication methods in public cloud computing play considerably in preventing
unauthorized access to data saved in the public cloud. Based on the National Institute of …

[引用][C] Address the challenges of implementing electronic document system in Iraq e-government-Tikrit City as a case study.

M Al-Hashimi, M SHAKIR, M HAMMOOD, A ELDOW - Journal of Theoretical & Applied …, 2017