Follow
Dr. Nader Sohrabi safa
Dr. Nader Sohrabi safa
University of Wolverhampton
Verified email at warwick.ac.uk
Title
Cited by
Cited by
Year
Information security policy compliance model in organizations
NS Safa, R Von Solms, S Furnell
Computers & security 56, 70-82, 2016
7232016
Information security conscious care behaviour formation in organizations
NS Safa, M Sookhak, R Von Solms, S Furnell, NA Ghani, T Herawan
Computers & Security 53, 65-78, 2015
5792015
An information security knowledge sharing model in organizations
NS Safa, RV Solms
Computers in Human Behavior 57, 442e451, 2016
4012016
Fog vehicular computing: Augmentation of fog computing using vehicular cloud computing
M Sookhak, FR Yu, Y He, H Talebian, NS Safa, N Zhao, MK Khan, ...
IEEE Vehicular Technology Magazine 12 (3), 55-64, 2017
2182017
The evolution of blockchain: A bibliometric study
M Dabbagh, M Sookhak, NS Safa
IEEE Access 7, 19212-19221, 2019
2142019
Motivation and opportunity based model to reduce information security insider threats in organisations
NS Safa, C Maple, T Watson, R Von Solms
Journal of information security and applications 40, 247-257, 2018
1822018
A customer loyalty formation model in electronic commerce
NS Safa, MA Ismail
Economic Modelling 35, 559-564, 2013
1752013
Blockchain and smart contract for access control in healthcare: A survey, issues and challenges, and open issues
M Sookhak, MR Jabbarpour, N Sohrabi Safa, FR Yud
Journal of Network and Computer Applications, 2021
1682021
Human aspects of information security in organisations
NS Safa, R von Solms, L Futcher
Computer Fraud & Security 2016 (2), 15-18, 2016
1492016
Deterrence and prevention-based model to mitigate information security insider threats in organisations
NS Safa, C Maple, S Furnell, MA Azad, C Perera, M Dabbagh, M Sookhak
Future Generation Computer Systems 97, 587-597, 2019
1342019
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities
M Dabbagh, KK RaymondChoo, A Beheshti, M Tahir, NS Safa
Computers and Security, 2021
1312021
Customers repurchase intention formation in e-commerce
NS Safa, R Von Solms
South African Journal of Information Management 18 (1), 1-9, 2016
1242016
A LogitBoost-based Algorithm for Detecting Known and Unknown Web Attacks
MH Kamarudin, C Maple, T Watson, NS Safa
IEEE Access 1 (99), 1-20, 2017
1132017
A multivariant secure framework for smart mobile health application
NSS Shariq Aziz Butt, Tauseef Jamal, Muhammad Ajmal Azad, Arshad Ali
Transactions on Emerging Telecommunications Technologies, 1-18, 2019
68*2019
Human errors in the information security realm–and how to fix them
NS Safa, C Maple
Computer Fraud & Security 2016 (9), 17-20, 2016
472016
A review on artificial intelligence methodologies for the forecasting of crude oil price
AYGTH Haruna Chiroma, Sameem Abdul-kareem, Ahmad Shukri Mohd Noor, Adamu I ...
Intelligent Automation & Soft Computing, 1-14, 2016
47*2016
Trust, satisfaction, and loyalty formation in electronic commerce
MA Ismail, NS Safa
Journal of Industrial and Intelligent Information Vol 2 (3), 2014
412014
An artificial neural network classification approach for improving accuracy of customer identification in e-Commerce
NS Safa, NA Ghani, MA Ismail
Malaysian Journal of Computer Science (MJCS) 27 (3), 171-185, 2014
382014
Incremental Algorithm for Association Rule Mining Under Dynamic Threshold
I Aqra, NA Ghani, C Maple, J Machado, NS Safa
Applied Sciences 9 (24), 2019
362019
Information security collaboration formation in organisations
N Sohrabi Safa, C Maple, T Watson, S Furnell
IET Information Security 12 (3), 238-245, 2018
242018
The system can't perform the operation now. Try again later.
Articles 1–20