Follow
Shouki A. Ebad
Shouki A. Ebad
Northern Border University
Verified email at nbu.edu.sa - Homepage
Title
Cited by
Cited by
Year
An exploratory study of ICT projects failure in emerging markets
SA Ebad
Journal of Global Information Technology Management 21 (2), 139-160, 2018
522018
Influencing factors for IT software project failures in developing countries-a critical literature survey.
SA Ebad
J. Softw. 11 (11), 1145-1153, 2016
272016
Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector
S T. Alanazi, M Anbar, S A. Ebad, S Karuppayah, HA Al-Ani
Symmetry 12 (9), 1544, 2020
232020
Measuring software obfuscation quality—a systematic literature review
SA Ebad, A Darem, JH Abawajy
IEEE Access 9, 99024 - 99038, 2021
212021
Healthcare software design and implementation—A project failure case
SA Ebad
Software: Practice and Experience 50 (7), 1258-1276, 2020
212020
Inspection reading techniques applied to software artifacts-a systematic review
SA Ebad
Comput. Syst. Sci. Eng 32 (3), 213-226, 2017
162017
Measuring stability of object‐oriented software architectures
SA Ebad, MA Ahmed
IET Software 9 (3), 76-82, 2015
162015
Deep-ensemble and multifaceted behavioral malware variant detection model
AA Al-Hashmi, FA Ghaleb, A Al-Marghilani, AE Yahya, SA Ebad, M Saqib, ...
IEEE Access 10, 42762-42777, 2022
152022
Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory
SA Ebad
International Journal of System Assurance Engineering and Management 13 (1 …, 2022
132022
Analyzing privacy requirements: A case study of healthcare in Saudi Arabia
SA Ebad, ES Jaha, MA Al-Qadhi
Informatics for Health and Social Care 41 (1), 47-63, 2016
102016
Software packaging approaches—a comparison framework
SA Ebad, M Ahmed
Software Architecture: 5th European Conference, ECSA 2011, Essen, Germany …, 2011
92011
An evaluation framework for package-level cohesion metrics
S Ebad, M Ahmed
International Proceedings of Computer Science and Information Technology 13 …, 2011
92011
The influencing causes of software unavailability: A case study from industry
SA Ebad
Software: Practice and Experience 48 (5), 1056-1076, 2018
82018
Towards measuring software requirements volatility: A retrospective analysis
SA Ebad
Malaysian Journal of Computer Science 30 (2), 99-116, 2017
82017
Cyber threats classifications and countermeasures in banking and financial sector
AA Darem, AA Alhashmi, TM Alkhaldi, AM Alashjaee, SM Alanazi, ...
IEEE Access 11, 125138-125158, 2023
72023
Investigating the effect of software packaging on modular structure stability
SA Ebad, M Ahmed
Computer Systems Science and Engineering 34 (5), 283-296, 2019
72019
Exploring how to apply secure software design principles
SA Ebad
IEEE Access 10, 128983-128993, 2022
62022
An empirical comparison of Java and C# programs in following naming conventions
SA Ebad, D Manzoor
International Journal of People-Oriented Programming (IJPOP) 5 (1), 39-60, 2016
62016
Functionality-based software packaging using sequence diagrams
SA Ebad, MA Ahmed
Software Quality Journal 23, 453-481, 2015
62015
XMI2UC: An automatic tool to extract use cases from object oriented source code
SA Ebad, MA Ahmed
International Journal of Future Computer and Communication 1 (2), 193, 2012
52012
The system can't perform the operation now. Try again later.
Articles 1–20