Phishing attacks: A recent comprehensive study and a new anatomy Z Alkhalil, C Hewage, L Nawaf, I Khan Frontiers in Computer Science 3, 563060, 2021 | 509 | 2021 |
IOT technologies during and beyond COVID-19: A comprehensive review M Yousif, C Hewage, L Nawaf Future internet 13 (5), 105, 2021 | 84 | 2021 |
Mobile edge computing enabled efficient communication based on federated learning in internet of medical things X Zheng, SBH Shah, X Ren, F Li, L Nawaf, C Chakraborty, M Fayaz Wireless Communications and Mobile Computing 2021 (1), 4410894, 2021 | 21 | 2021 |
Enhancing Cyber Security Governance and Policy for SMEs in Industry 5.0: A Comparative Study between Saudi Arabia and the United Kingdom N Rawindaran, L Nawaf, S Alarifi, D Alghazzawi, F Carroll, I Katib, ... Digital 3 (3), 32, 2023 | 16 | 2023 |
Internet transit access point placement and bandwidth allocation in wireless mesh networks L Nawaf, SM Allen, O Rana 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 11 | 2017 |
Phishing attacks: A recent comprehensive study and a new anatomy. Frontiers in Computer Science, 3: 563060 Z Alkhalil, C Hewage, L Nawaf, I Khan | 10 | 2021 |
Source Routing for Distributed Big Data‐Based Cognitive Internet of Things (CIoT) S Begum, Y Nianmin, SBH Shah, A Abdollahi, IU Khan, L Nawaf Wireless Communications and Mobile Computing 2021 (1), 5129396, 2021 | 10 | 2021 |
Phishing attacks: a recent comprehensive study and a new anatomy. 2021 Z Alkhalil, C Hewage, L Nawaf, I Khan | 6 | 2021 |
Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. 3 (2021) Z Alkhalil, C Hewage, L Nawaf, I Khan | 6 | 2021 |
Optimizing infrastructure placement in wireless mesh networks using NSGA-II LF Nawaf, SM Allen, O Rana 2018 IEEE 20th International Conference on High Performance Computing and …, 2018 | 6 | 2018 |
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy. Frontiers in Computer Science 3 (2021) Z Alkhalil, C Hewage, L Nawaf, I Khan | 5 | 2021 |
Optimizing the placement of itaps in wireless mesh networks by implementing hc and sa algorithms L Nawaf, C Mumford, S Allen Ad Hoc Networks: 7th International Conference, AdHocHets 2015, San Remo …, 2015 | 5 | 2015 |
Minimization of cyber security threats caused by COVID-19 pandemic LF Nawaf, C Hewage, F Carroll Proceedings of Sixth International Congress on Information and Communication …, 2021 | 4 | 2021 |
Optimizing IoT Security by Implementing Artificial Intelligence L Nawaf Inforsecurity Magazine, 2020 | 4* | 2020 |
Privacy and Security Challenges and Opportunities for IoT Technologies during and beyond COVID-19 V Bentotahewa, M Yousif, C Hewage, L Nawaf, J Williams Privacy, Security And Forensics in The Internet of Things (IoT), 51-76, 2022 | 3 | 2022 |
Correction to: Privacy and security challenges and opportunities for IoT technologies during and beyond COVID-19 V Bentotahewa, M Yousif, C Hewage, L Nawaf, J Williams Privacy, Security And Forensics in The Internet of Things (IoT) 99, 202, 2022 | 1 | 2022 |
Phishing, trust and human wellbeing JA Adejobi, F Carroll, L Nawaf, R Montasari International Conferences ICT, Society, and Human Beings 2021, 53-60, 2021 | 1 | 2021 |
Optimization of cyber security through the implementation of AI technologies L Nawaf, V Bentotahewa Journal of Intelligent Systems 34 (1), 20240226, 2025 | | 2025 |
Inclusivity, diversity, and gender equality in cybersecurity L Nawaf Cardiff Metropolitan University, 2024 | | 2024 |
Recognition of handwritten digits through the novel AI-IoT enabled approach TK Bhatia, K Ulhaq, A Shafi, L Nawaf, IU Khan Cardiff Metropolitan University, 2024 | | 2024 |