Machine learning based decision support systems (DSS) for heart disease diagnosis: a review S Safdar, S Zafar, N Zafar, NF Khan Artificial Intelligence Review 50 (4), 597-623, 2018 | 181 | 2018 |
Synthetic data generation: State of the art in health care domain H Murtaza, M Ahmed, NF Khan, G Murtaza, S Zafar, A Bano Computer Science Review 48, 100546, 2023 | 128 | 2023 |
Prevalence of cyberbullying victimization among Pakistani Youth S Saleem, NF Khan, S Zafar Technology in Society 65, 101577, 2021 | 72 | 2021 |
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model NF Khan, N Ikram, H Murtaza, M Javed Computers & Security 125, 103049, 2023 | 51 | 2023 |
Systematic literature reviews in cyberbullying/cyber harassment: A tertiary study S Saleem, NF Khan, S Zafar, N Raza Technology in Society 70, 102055, 2022 | 40 | 2022 |
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective SZ Naurin Farooq Kham, Naveed Ikram, Sumera Saleem Security Journal, 2022 | 40 | 2022 |
Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach NF Khan, N Ikram, H Murtaza, MA Asadi Kybernetes 52 (1), 401-421, 2023 | 32 | 2023 |
The cybersecurity behavioral research: A tertiary study NF Khan, A Yaqoob, MS Khan, N Ikram Computers & Security 120, 102826, 2022 | 27 | 2022 |
Security requirements engineering: A systematic mapping (2010-2015) NF Khan, N Ikram 2016 International Conference on Software Security and Assurance (ICSSA), 31-36, 2016 | 13 | 2016 |
Requirements simulation for early validation using Behavior Trees and Datalog S Zafar, N Farooq-Khan, M Ahmed Information and Software Technology 61, 52-70, 2015 | 12 | 2015 |
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country NF Khan, N Ikram, S Saleem Security Journal, 1, 2023 | 11 | 2023 |
Digital divide and socio-economic differences in smartphone information security behaviour among university students: empirical evidence from Pakistan NF Khan, N Ikram, S Saleem International Journal of Mobile Communications 22 (1), 1-24, 2023 | 11 | 2023 |
Nutritive values of Brassica campestris L. oil as affected by growth regulator treatments A Bano, N Khan Journal of the Chemical Society of Pakistan 31 (5), 819-822, 2009 | 9 | 2009 |
Security requirement elicitation techniques: The comparison of misuse cases and issue based information systems N Ikram, S Siddiqui, NF Khan 2014 IEEE 4th International Workshop on Empirical Requirements Engineering …, 2014 | 6 | 2014 |
Development of students’ security and privacy habits scale NF Khan, N Ikram Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020 | 2 | 2020 |
Evaluating collaborative learning using Community of Inquiry framework for a blended learning formal methods course S Zafar, NF Khan, S Hussain Teaching and Learning in a Digital World: Proceedings of the 20th …, 2018 | 2 | 2018 |
Explanatory and predictive analysis of smartphone security using protection motivation theory: a hybrid SEM-AI approach NF Khan, H Murtaza, K Malik, M Mahmood, MA Asadi Information Technology & People, 2024 | 1 | 2024 |
Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory U Kiran, NF Khan, H Murtaza, A Farooq, H Pirkkalainen Computers & Security 149, 104204, 2025 | | 2025 |
Design and evaluation of TPB based anti-bullying intervention for university students S Saleem, NF Khan, S Zafar, M Ahmed Multimedia Tools and Applications, 1-25, 2024 | | 2024 |