Global e‐commerce: a framework for understanding and overcoming the trust barrier HA Aljifri, A Pons, D Collins Information Management & Computer Security 11 (3), 130-138, 2003 | 210 | 2003 |
Understanding user perspectives on biometric technology AP Pons, P Polak Communications of the ACM 51 (9), 115-118, 2008 | 100 | 2008 |
E-government for Arab countries A Pons Journal of Global Information Technology Management 7 (1), 30-46, 2004 | 92 | 2004 |
HMM-based intrusion detection system for software defined networking T Hurley, JE Perdomo, A Perez-Pons 2016 15th ieee international conference on machine learning and applications …, 2016 | 71 | 2016 |
IP traceback using header compression H Aljifri, M Smets, A Pons Computers & Security 22 (2), 136-151, 2003 | 55 | 2003 |
Object prefetching using semantic links AP Pons ACM SIGMIS Database: the DATABASE for Advances in Information Systems 37 (1 …, 2006 | 45 | 2006 |
A survey on modality characteristics, performance evaluation metrics, and security for traditional and wearable biometric systems A Sundararajan, AI Sarwat, A Pons ACM Computing Surveys (CSUR) 52 (2), 1-36, 2019 | 42 | 2019 |
E‐commerce and Arab intra‐trade A Pons, H Aljifri, K Fourati Information Technology & People 16 (1), 34-48, 2003 | 36 | 2003 |
Realization of a universal patient identifier for electronic medical records through biometric technology DC Leonard, AP Pons, SS Asfour IEEE Transactions on Information Technology in Biomedicine 13 (4), 494-500, 2008 | 32 | 2008 |
Biometric marketing: targeting the online consumer AP Pons Communications of the ACM 49 (8), 60-66, 2006 | 32 | 2006 |
Improving the performance of client web object retrieval AP Pons Journal of Systems and Software 74 (3), 303-311, 2005 | 27 | 2005 |
A generic framework for EEG-based biometric authentication A Sundararajan, A Pons, AI Sarwat 2015 12th International Conference on Information Technology-New Generations …, 2015 | 20 | 2015 |
Semantic prefetching objects of slower web site pages AP Pons Journal of Systems and Software 79 (12), 1715-1724, 2006 | 19 | 2006 |
Tighten the computation of worst-case execution-time by detecting feasible paths HA Aljifri, A Pons, MA Tapia Conference Proceedings of the 2000 IEEE International Performance, Computing …, 2000 | 18 | 2000 |
Enhancing the quality-of-service for application service providers AP Pons Journal of Computer Information Systems 44 (1), 3-8, 2003 | 15 | 2003 |
Personality, mood and music listening of computer information systems developers: Implications for quality-of-work T Lesiuk, A Pons, P Polak Information Resources Management Journal (IRMJ) 22 (2), 83-97, 2009 | 11 | 2009 |
Web-application centric object prefetching AP Pons Journal of Systems and Software 67 (3), 193-200, 2003 | 11 | 2003 |
AA-HMM: An anti-adversarial hidden Markov model for network-based intrusion detection C Song, A Pons, K Yen Applied Sciences 8 (12), 2421, 2018 | 10 | 2018 |
Evaluating the teaching effectiveness of various data modeling notations AP Pons, P Polak, J Stutz Journal of Computer Information Systems 46 (2), 78-84, 2005 | 8 | 2005 |
Data protection using watermarking in e-business AP Pons, H Aljifri Journal of Database Management (JDM) 14 (4), 1-13, 2003 | 8 | 2003 |