The Evolution of Blockchain: A Bibliometric Study M Dabbagh, M Sookhak, NS Safa IEEE Access 7, 19212 - 19221, 2019 | 197 | 2019 |
Deterrence and prevention-based model to mitigate information security insider threats in organisations NS Safa, C Maple, S Furnell, MA Azad, C Perera, M Dabbagh, M Sookhak Future Generation Computer Systems 97, 587-597, 2019 | 122 | 2019 |
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities M Dabbagh, KKR Choo, A Beheshti, M Tahir, NS Safa Computers & Security 100, 102078, 2021 | 110 | 2021 |
A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-Trials, Challenges and Opportunities M Tahir, MH Habaebi, M Dabbagh IEEE Access 8, 115876 - 115904, 2020 | 90 | 2020 |
Functional and non-functional requirements prioritization: empirical evaluation of IPA, AHP-based, and HAM-based approaches M Dabbagh, SP Lee, RM Parizi Soft Computing 20 (11), 4497-4520, 2016 | 74 | 2016 |
Achievements and challenges in state-of-the-art software traceability between test and code artifacts RM Parizi, SP Lee, M Dabbagh IEEE Transactions on Reliability 63 (4), 913-926, 2014 | 70 | 2014 |
Performance analysis of blockchain platforms: Empirical evaluation of hyperledger fabric and ethereum M Dabbagh, M Kakavand, M Tahir, A Amphawan 2020 IEEE 2nd International conference on artificial intelligence in …, 2020 | 69 | 2020 |
An approach for integrating the prioritization of functional and nonfunctional requirements M Dabbagh, SP Lee The Scientific World Journal 2014 (1), 737626, 2014 | 61 | 2014 |
Application of Machine Learning Algorithms for Android Malware Detection M Kakavand, M Dabbagh, A Dehghantanha ACM International Conference on Computational Intelligence and Intelligent …, 2018 | 37 | 2018 |
A consistent approach for prioritizing system quality attributes M Dabbagh, SP Lee IEEE Conference on Software Engineering, Artificial Intelligence, Networking …, 2013 | 33 | 2013 |
Radio-over-free space optical space division multiplexing system using 3-core photonic crystal fiber mode group multiplexers A Amphawan, S Chaudhary, TK Neo, M Kakavand, M Dabbagh Wireless Networks 27, 211-225, 2021 | 31 | 2021 |
Towards enabling autonomic computing in IoT ecosystem M Tahir, QM Ashraf, M Dabbagh 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019 | 29 | 2019 |
Application of hybrid assessment method for priority assessment of functional and non-functional requirements M Dabbagh, SP Lee, RM Parizi IEEE Conference on Information Science & Applications (ICISA), 1-4, 2014 | 24 | 2014 |
RePizer: a framework for prioritization of software requirements SUR Khan, SP Lee, M Dabbagh, M Tahir, M Khan, M Arif Frontiers of Information Technology & Electronic Engineering 17 (8), 750-765, 2016 | 23 | 2016 |
An approach for prioritizing NFRs according to their relationship with FRs M Dabbagh, SP Lee Lecture Notes on Software Engineering 3 (1), 1-5, 2015 | 22 | 2015 |
Supplier assessment and selection using fuzzy analytic hierarchy process in a steel manufacturing company F Tahriri, M Dabbagh, N Ale Ebrahim Journal of Scientific Research and Reports 3 (10), 1319-1338, 2014 | 21 | 2014 |
Towards Integration of Blockchain and IoT: A Bibliometric Analysis of State-of-the-Art M Dabbagh, M Kakavand, M Tahir International Congress on Blockchain and Applications, Spain, 27-35, 2019 | 18 | 2019 |
Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities NS Safa, F Mitchell, C Maple, MA Azad, M Dabbagh Transactions on Emerging Telecommunications Technologies, 2020 | 9 | 2020 |
Qsecr: Secure qr code scanner according to a novel malicious url detection framework AS Rafsanjani, NB Kamaruddin, HM Rusli, M Dabbagh IEEE Access, 2023 | 7 | 2023 |
Performance evaluation of machine learning algorithms for intrusion detection in IoT applications NY Jien, M Tahir, M Dabbagh, YK Meng, A Farooq 2022 IEEE International Conference on Artificial Intelligence in Engineering …, 2022 | 3 | 2022 |