An overview of the security concerns in enterprise cloud computing A Bisong, M Rahman arXiv preprint arXiv:1101.5613, 2011 | 344 | 2011 |
Remote data visualization through websockets A Wessels, M Purvis, J Jackson, S Rahman 2011 Eighth international conference on information technology: new …, 2011 | 71 | 2011 |
Evaluation of key success factors influencing ERP implementation success A Hailu, S Rahman 2012 IEEE Eighth World Congress on Services, 88-91, 2012 | 61 | 2012 |
Video surveillance in the cloud? DJ Neal, S Rahman arXiv preprint arXiv:1512.00070, 2015 | 53 | 2015 |
Exploring historical and emerging phishing techniques and mitigating the associated security risks M Rader, S Rahman arXiv preprint arXiv:1512.00082, 2015 | 51 | 2015 |
Convergence of corporate and information security M Rahman, SE Donahue arXiv preprint arXiv:1002.1950, 2010 | 46 | 2010 |
Factors influencing cloud-computing technology adoption in developing countries A Hailu Capella University, 2012 | 44 | 2012 |
Security analysis of AES and enhancing its security by modifying S-box with an additional byte A Al-Mamun, S Rahman, TA Shaon, MA Hossain International Journal of Computer Networks & Communications (IJCNC) 9 (2), 69-88, 2017 | 36 | 2017 |
E-commerce systems security for small businesses R Lackey International Journal of Network Security & Its Applications 5 (2), 193, 2013 | 35 | 2013 |
The top ten cloud-security practices in next-generation networking WM Halton, S Rahman International Journal of Communication Networks and Distributed Systems 8 (1 …, 2012 | 35 | 2012 |
Discovering new cyber protection approaches from a security professional prospective A Loukaka, S Rahman International Journal of Computer Networks & Communications (IJCNC) Vol 9, 2017 | 33 | 2017 |
Information Security Synthesis in Online Universities M Schuett, M Rahman arXiv preprint arXiv:1111.1771, 2011 | 33 | 2011 |
Cloud computing avoids downfall of application service providers K Jungck, S Rahman International Journal of Information Technology Convergence and services …, 2011 | 31 | 2011 |
The ethical dilemma of the USA government wiretapping A Mullikin, SSM Rahman International Journal of Managing Information Technology (IJMIT) 2 (4), 2010 | 31 | 2010 |
Analyzing livelihood sustainability of climate vulnerable fishers: Insight from Bangladesh AR Sunny, KM Masum, N Islam, M Rahman, A Rahman, J Islam, ... Journal of Aquaculture Research and Development 11 (6), 593, 2020 | 27 | 2020 |
Security risks in mechanical engineering industries K Benson, S Rahman arXiv preprint arXiv:1512.01730, 2015 | 27 | 2015 |
Healthcare IT: is your information at risk? K Donahue, S Rahman arXiv preprint arXiv:1512.01731, 2015 | 26 | 2015 |
Analytic of China cyberattack RLCII CAP, CEH CSSL The International Journal of Multimedia & Its Applications 4 (3), 37, 2012 | 26 | 2012 |
Obstacles to implementation of information security governance WW Lidster, SSM Rahman 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 25 | 2018 |
Information security plan for flight simulator applications J Slaughter, SSM Rahman arXiv preprint arXiv:1111.1772, 2011 | 25 | 2011 |