BYOD security engineering: A framework and its analysis N Zahadat, P Blessner, T Blackburn, BA Olson Computers & Security 55, 81-99, 2015 | 168 | 2015 |
Teaching web development in the web 2.0 era YD Wang, N Zahadat Proceedings of the 10th ACM conference on SIG-information technology …, 2009 | 46 | 2009 |
Digital forensics, a need for credentials and standards N Zahadat Journal of Digital Forensics, Security and Law 14 (1), 3, 2019 | 13 | 2019 |
Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and technology N Zahadat The George Washington University, 2016 | 9 | 2016 |
a. 2015.“BYOD security engineering: a framework & its analysis,” N Zahadat, P Blessner, T Blackburn, B Olson Computers & Security, 0 | 6 | |
Blockchain: A Critical Component to Ensuring Data Security N Zahadat, W Partridge Journal of Forensic Sciences & Criminal Investigation 10 (1), 2018 | 4 | 2018 |
Securing Democracy: A comparative look at modern and future US Voting systems through the lens of the CIA Triad L Hoffman, N Zahadat Journal of Information Assurance and Security 13, 118-124, 2018 | 3 | 2018 |
Net Neutrality: What Is It and Is It Necessary? N Zahadat ISSA Journal 16 (7), 2018 | 2 | 2018 |
Ransomware as an Imminent and Destructive Cyber-Threat of the Digital World E Emeksiz, N Zahadat Available at SSRN 4644634, 2023 | 1 | 2023 |
DIGITAL FORENSICS AND CREDENTIALING. N Zahadat Journal of Digital Forensics, Security & Law 14 (1), 2019 | 1 | 2019 |
Mitigating the Damage of Ransomware Incidents D Ahmad, N Zahadat ISSA 20 (4), 21-24, 2022 | | 2022 |
An Overview of Voice Authentication N Zahadat ISSA Journal 18 (3), 23-25, 2020 | | 2020 |
A Look at the Espionage Act of 1917 for the Internet Age W Partridge, N Zahadat ISSA 16 (11), 27-32, 2018 | | 2018 |
The Impact of Ransomware, Patterns, Types of Attacks and Organizational Measures Applied to Mitigate Ransomware Attacks MLB Bermúdez, N Zahadat Global Journal of Research and Review, 2014 | | 2014 |
R Shiny as an Effective Tool for Reproducible Dissemmination of Public Health Data D Funk, N Zahadat | | |