Neural networks for shortest path computation and routing in computer networks MKM Ali, F Kamoun IEEE transactions on neural networks 4 (6), 941-954, 1993 | 400 | 1993 |
Accessibility as an integral factor in e-government web site evaluation: The case of Dubai e-government F Kamoun, M Basel Almourad Information Technology & People 27 (2), 208-228, 2014 | 121 | 2014 |
A roadmap towards the convergence of business process management and service oriented architecture F Kamoun Ubiquity 2007 (April), 1-1, 2007 | 94 | 2007 |
A secure fog‐based platform for SCADA‐based IoT critical infrastructure T Baker, M Asim, A MacDermott, F Iqbal, F Kamoun, B Shah, O Alfandi, ... Software: Practice and Experience 50 (5), 503-518, 2020 | 81 | 2020 |
Rethinking the business model with RFID F Kamoun Communications of the association for information systems 22 (1), 35, 2008 | 77 | 2008 |
Human and organizational factors of healthcare data breaches: The swiss cheese model of data breach causation and prevention F Kamoun, M Nicho International Journal of Healthcare Information Systems and Informatics …, 2014 | 66 | 2014 |
Drone forensics: challenges and new insights H Bouafif, F Kamoun, F Iqbal, A Marrington 2018 9th IFIP International Conference on New Technologies, Mobility and …, 2018 | 61 | 2018 |
A neural network approach to visibility range estimation under foggy weather conditions H Chaabani, F Kamoun, H Bargaoui, F Outay Procedia computer science 113, 466-471, 2017 | 57 | 2017 |
Accessibility evaluation of Dubai e-government websites: Findings and implications M Al Mourad, F Kamoun Journal of E-Government Studies and Best Practices, 2013 | 55 | 2013 |
A framework towards assessing the merits of inviting IT professionals to the classroom F Kamoun, S Selim Journal of Information Technology Education: Research 6 (1), 81-103, 2007 | 42 | 2007 |
Blockchain-based chain of custody: towards real-time tamper-proof evidence management L Ahmad, S Khanji, F Iqbal, F Kamoun Proceedings of the 15th international conference on availability …, 2020 | 41 | 2020 |
User interface design and e-commerce security perception: An empirical study F Kamoun, M Halaweh International Journal of E-Business Research (IJEBR) 8 (2), 15-32, 2012 | 41 | 2012 |
Toward best maintenance practices in communications network management F Kamoun International Journal of Network Management 15 (5), 321-334, 2005 | 41 | 2005 |
RFID system management: State-of-the art and open research issues F Kamoun IEEE Transactions on network and service Management 6 (3), 190-205, 2009 | 40 | 2009 |
A decision-tree-based system for student academic advising and planning in information systems programmes N Werghi, FK Kamoun International Journal of Business Information Systems 5 (1), 1-18, 2010 | 39 | 2010 |
Estimating meteorological visibility range under foggy weather conditions: A deep learning approach H Chaabani, N Werghi, F Kamoun, B Taha, F Outay Procedia Computer Science 141, 478-483, 2018 | 33 | 2018 |
AI and machine learning: A mixed blessing for cybersecurity F Kamoun, F Iqbal, M Esseghir, T Baker International Symposium on Networks, Computers and Communications (ISNCC …, 2020 | 32 | 2020 |
V2V and V2I Communications for Traffic Safety and CO2 Emission Reduction: A Performance Evaluation F Outay, F Kamoun, F Kaisser, D Alterri, A Yasar The 10th International Conference on Ambient Systems, Networks and …, 2019 | 32 | 2019 |
Virtualizing the datacenter without compromising server performance F Kamoun Ubiquity 2009 (August), 2009 | 32 | 2009 |
Multiple case study approach to identify aggravating variables of insider threats in information systems M Nicho, F Kamoun Communications of the Association for Information Systems 35 (1), 18, 2014 | 28 | 2014 |