Blockchain for electronic voting system—review and open research challenges U Jafar, MJA Aziz, Z Shukur Sensors 21 (17), 5874, 2021 | 277 | 2021 |
Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations MK Hasan, AKMA Habib, Z Shukur, F Ibrahim, S Islam, MA Razzaque Journal of network and computer applications 209, 103540, 2023 | 259 | 2023 |
Conceptual privacy framework for health information on wearable device S Safavi, Z Shukur PloS one 9 (12), e114306, 2014 | 106 | 2014 |
Social engineering attacks prevention: A systematic literature review W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim IEEE access 10, 39325-39343, 2022 | 104 | 2022 |
A review on text steganography techniques MA Majeed, R Sulaiman, Z Shukur, MK Hasan Mathematics 9 (21), 2829, 2021 | 97 | 2021 |
Security challenges and success factors of electronic healthcare system A Ghazvini, Z Shukur Procedia Technology 11, 212-219, 2013 | 81 | 2013 |
A review on electronic payments security MA Hassan, Z Shukur, MK Hasan, AS Al-Khaleefa Symmetry 12 (8), 1344, 2020 | 77 | 2020 |
Analysis of research in programming teaching tools: An initial review SM Salleh, Z Shukur, HM Judi Procedia-Social and Behavioral Sciences 103, 127-135, 2013 | 73 | 2013 |
An efficient secure electronic payment system for e-commerce MA Hassan, Z Shukur, MK Hasan computers 9 (3), 66, 2020 | 72 | 2020 |
A design of an assessment system for UML class diagram NH Ali, Z Shukur, S Idris 2007 International Conference on Computational Science and its Applications …, 2007 | 71 | 2007 |
Proposed features of an online examination interface design and its optimal values NA Karim, Z Shukur Computers in Human Behavior 64, 414-422, 2016 | 66 | 2016 |
Review of user authentication methods in online examination NA Karim, Z Shukur Asian Journal of Information Technology 14 (5), 166-175, 2015 | 60 | 2015 |
Review of digital wallet requirements MA Hassan, Z Shukur 2019 International Conference on Cybersecurity (ICoCSec), 43-48, 2019 | 52 | 2019 |
Detecting abnormal behavior in social network websites by using a process mining technique M Sahlabadi, RC Muniyandi, Z Shukur Journal of Computer Science 10 (3), 393, 2014 | 51 | 2014 |
Cyber vulnerabilities on smart healthcare, review and solutions S Safavi, AM Meer, EKJ Melanie, Z Shukur 2018 Cyber Resilience Conference (CRC), 1-5, 2018 | 48 | 2018 |
Awareness training transfer and information security content development for healthcare industry A Ghazvini, Z Shukur International Journal of Advanced Computer Science and Applications 7 (5), 2016 | 44 | 2016 |
Assessment system for UML class diagram using notations extraction NH Ali, Z Shukur, S Idris International Journal on Computer Science Network Security 7, 181-187, 2007 | 43 | 2007 |
Improving google glass security and privacy by changing the physical and software structure S Safavi, Z Shukur Life Science Journal 11 (5), 109-117, 2014 | 39 | 2014 |
Systematic literature review on data carving in digital forensic N Alherbawi, Z Shukur, R Sulaiman Procedia technology 11, 86-92, 2013 | 39 | 2013 |
Final year supervision management system as a tool for monitoring Computer Science projects MA Bakar, N Jailani, Z Shukur, NFM Yatim Procedia-Social and Behavioral Sciences 18, 273-281, 2011 | 37 | 2011 |