Gender difference and employees' cybersecurity behaviors M Anwar, W He, I Ash, X Yuan, L Li, L Xu Computers in Human Behavior 69, 437–443, 2016 | 377 | 2016 |
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior L Li, W He, L Xu, I Ash, M Anwar, X Yuan International Journal of Information Management 45, 13-24, 2019 | 368 | 2019 |
A privacy preservation model for facebook-style social network systems PWL Fong, M Anwar, Z Zhao Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 285 | 2009 |
Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study B Davis, J Mason, M Anwar IEEE Internet of Things Journal, 2020 | 122 | 2020 |
Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0 H Elhoone, T Zhang, M Anwar, S Desai International Journal of Production Research 58 (9), 2841-2861, 2020 | 105 | 2020 |
Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges M Anwar, J Joshi, J Tan Health Policy and Technology 4 (4), 299-311, 2015 | 80 | 2015 |
Facilitating trust in privacy-preserving e-learning environments M Anwar, J Greer IEEE Transactions on Learning Technologies 5 (1), 62-73, 2011 | 76 | 2011 |
Nonvisual tool for navigating hierarchical structures AC Smith, JS Cook, JM Francioni, A Hossain, M Anwar, MF Rahman ACM SIGACCESS Accessibility and Computing, 133-139, 2003 | 73 | 2003 |
Classification for authorship of tweets by comparing logistic regression and naive bayes classifiers O Aborisade, M Anwar 2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018 | 64 | 2018 |
Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training W He, I Ash, M Anwar, L Li, X Yuan, L Xu, X Tian Journal of intellectual capital 21 (2), 203-213, 2020 | 60 | 2020 |
A trust-based approach against IP-spoofing attacks JM Gonzalez, M Anwar, JBD Joshi 2011 Ninth Annual International Conference on Privacy, Security and Trust, 63-70, 2011 | 51 | 2011 |
Security & privacy challenges in IoT-based health cloud S Alasmari, M Anwar 2016 International Conference on Computational Science and Computational …, 2016 | 50 | 2016 |
Mutual-friend based attacks in social network systems L Jin, JBD Joshi, M Anwar Computers & security 37, 15-30, 2013 | 50 | 2013 |
A visualization tool for evaluating access control policies in facebook-style social network systems M Anwar, PWL Fong Proceedings of the 27th annual ACM Symposium on Applied Computing, 1443-1450, 2012 | 42 | 2012 |
Privacy enhanced personalization in e-learning MM Anwar, J Greer, CA Brooks Proceedings of the 2006 International Conference on Privacy, Security and …, 2006 | 42 | 2006 |
Visualizing privacy implications of access control policies in social network systems M Anwar, PWL Fong, XD Yang, H Hamilton International Workshop on Data Privacy Management, 106-120, 2009 | 40 | 2009 |
Does explicit information security policy affect employees' cyber security behavior? A pilot study L Li, W He, L Xu, A Ivan, M Anwar, X Yuan 2014 Enterprise systems conference, 169-173, 2014 | 39 | 2014 |
Monitoring COVID-19 Pandemic through the Lens of Social Media using Natural Language Processing and Machine Learning Y Liu, C Whitfield, T Zhang, A Hauser, T Reynolds, M Anwar Springer Health Information Science and Systems 9 (25), 16, 2021 | 38 | 2021 |
Digitalization in container terminal logistics: A literature review M Anwar, L Henesey, E Casalicchio 27th annual conference of international association of maritime economists …, 2019 | 38 | 2019 |
Survey of supervised learning for medical image processing A Aljuaid, M Anwar SN Computer Science 3 (4), 292, 2022 | 31 | 2022 |