An approach to map COBIT processes to ISO/IEC 27001 information security management controls R Sheikhpour, N Modiri International Journal of Security and Its Applications 6 (2), 13-28, 2012 | 95 | 2012 |
A best practice approach for integration of ITIL and ISO/IEC 27001 services for information security management R Sheikhpour, N Modiri Indian journal of science and technology 5 (2), 2170-2176, 2012 | 61 | 2012 |
The ISO reference model entities N Modiri IEEE Network 5 (4), 24-33, 1991 | 40 | 1991 |
Focusing on the importance and the role of requirement engineering M Attarha, N Modiri The 4th International Conference on Interaction Sciences, 181-184, 2011 | 39 | 2011 |
Metric for early measurement of software complexity G Keshavarz, N Modiri, M Pedram Interfaces 5 (10), 15, 2011 | 24 | 2011 |
Criteria specifications for the comparison and evaluation of access control models SM Hasani, N Modiri International Journal of Computer Network and Information Security 5 (5), 19, 2013 | 21 | 2013 |
The risk assessment and treatment approach in order to provide LAN security based on ISMS standard MS Toosarvandani, N Modiri, M Afzali arXiv preprint arXiv:1301.1578, 2012 | 21 | 2012 |
An implementation of an OSI network management system F Halsall, N Modiri IEEE Network 4 (4), 44-53, 1990 | 15 | 1990 |
A neural network scheme for anomaly based intrusion detection systems in mobile ad hoc networks S Jabbehdari, SH Talari, N Modiri Journal of computing 4 (2), 61-66, 2012 | 14 | 2012 |
An implementation of the common network management information service element interfaces N Modiri IEEE Communications Magazine 29 (7), 29-38, 1991 | 14 | 1991 |
Comparative study between the integration of ITIL and ISO/IEC 27001 with the integration of COBIT and ISO/IEC 27001 NK Gunawan, RB Hadiprakoso, H Kabetta IOP Conference Series: Materials Science and Engineering 852 (1), 012128, 2020 | 13 | 2020 |
A novel multilayer AAA model for integrated applications A Rezakhani, H Shirazi, N Modiri Neural Computing and Applications 29, 887-901, 2018 | 12 | 2018 |
Development of a framework for applying asycuda system with n-tier application architecture AP Tafti, S Janosepah, N Modiri, AM Noudeh, H Alizadeh Software Engineering and Computer Systems: Second International Conference …, 2011 | 11 | 2011 |
A new comprehensive solution to handle information security governance in organizations Z Mounia, N Bouchaib Proceedings of the 2nd International Conference on Networking, Information …, 2019 | 10 | 2019 |
Security as a Serious Challenge for E-Banking: a Review of Emmental Malware S Geramiparvar, N Modiri International Journal of Advanced Computer Research 5 (18), 62, 2015 | 10 | 2015 |
Service oriented architecture adoption management roadmap A Moeini, N Modiri, T Azadi The 7th International Conference on Digital Content, Multimedia Technology …, 2011 | 10 | 2011 |
Software Engineering and Computer Systems, Part III: Second International Conference, ICSECS 2011, Kuantan, Pahang, Malaysia, June 27-29, 2011, Proceedings JM Zain, WMW Mohd, E El-Qawasmeh Springer Science & Business Media, 2011 | 9 | 2011 |
A novel access control model based on the structure of applications A Rezakhani, H Shirazi, N Modiri International Journal of Communication Networks and Information Security …, 2016 | 8 | 2016 |
A Proposal Framework For Information Security Establishment Focusing On Risk Evaluation And Its Optimum Reduction Based On Standard EAM Malayeri, N Modiri, S Jabbehdari, P Behbahani Advances in Information Sciences and Service Sciences 4 (7), 2012 | 8 | 2012 |
Mapping approach of ITIL service management processes to ISO/IEC 27001 controls R Sheikhpour, N Modiri Journal of Computing 37, 117-124, 2011 | 8 | 2011 |