关注
Nima Zahadat, Ph.D.
Nima Zahadat, Ph.D.
在 ubalt.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
BYOD security engineering: A framework and its analysis
N Zahadat, P Blessner, T Blackburn, BA Olson
Computers & Security 55, 81-99, 2015
1682015
Teaching web development in the web 2.0 era
YD Wang, N Zahadat
Proceedings of the 10th ACM conference on SIG-information technology …, 2009
462009
Digital forensics, a need for credentials and standards
N Zahadat
Journal of Digital Forensics, Security and Law 14 (1), 3, 2019
132019
Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and technology
N Zahadat
The George Washington University, 2016
92016
a. 2015.“BYOD security engineering: a framework & its analysis,”
N Zahadat, P Blessner, T Blackburn, B Olson
Computers & Security, 0
6
Blockchain: A Critical Component to Ensuring Data Security
N Zahadat, W Partridge
Journal of Forensic Sciences & Criminal Investigation 10 (1), 2018
42018
Securing Democracy: A comparative look at modern and future US Voting systems through the lens of the CIA Triad
L Hoffman, N Zahadat
Journal of Information Assurance and Security 13, 118-124, 2018
32018
Net Neutrality: What Is It and Is It Necessary?
N Zahadat
ISSA Journal 16 (7), 2018
22018
Ransomware as an Imminent and Destructive Cyber-Threat of the Digital World
E Emeksiz, N Zahadat
Available at SSRN 4644634, 2023
12023
DIGITAL FORENSICS AND CREDENTIALING.
N Zahadat
Journal of Digital Forensics, Security & Law 14 (1), 2019
12019
Mitigating the Damage of Ransomware Incidents
D Ahmad, N Zahadat
ISSA 20 (4), 21-24, 2022
2022
An Overview of Voice Authentication
N Zahadat
ISSA Journal 18 (3), 23-25, 2020
2020
A Look at the Espionage Act of 1917 for the Internet Age
W Partridge, N Zahadat
ISSA 16 (11), 27-32, 2018
2018
The Impact of Ransomware, Patterns, Types of Attacks and Organizational Measures Applied to Mitigate Ransomware Attacks
MLB Bermúdez, N Zahadat
Global Journal of Research and Review, 2014
2014
R Shiny as an Effective Tool for Reproducible Dissemmination of Public Health Data
D Funk, N Zahadat
系统目前无法执行此操作,请稍后再试。
文章 1–15