Information security behavior and information security policy compliance: A systematic literature review for identifying the transformation process from noncompliance …

RF Ali, PDD Dominic, SEA Ali, M Rehman, A Sohail - Applied Sciences, 2021 - mdpi.com
A grave concern to an organization's information security is employees' behavior when they
do not value information security policy compliance (ISPC). Most ISPC studies evaluate …

[PDF][PDF] The role of machine learning in network anomaly detection for cybersecurity

A Yaseen - Sage Science Review of Applied Machine Learning, 2023 - researchgate.net
This research introduces a theoretical framework for network anomaly detection in
cybersecurity, emphasizing the integration of adaptive machine learning models, ensemble …

Internet of things (IoT) security challenges and solutions: A systematic literature review

RF Ali, A Muneer, PDD Dominic, SM Taib… - Advances in Cyber …, 2021 - Springer
Abstract The Internet of Things (IoT), often known as the Internet of Everything, is a new
technological paradigm visualized as a worldwide network of interconnected machines. IoT …

[HTML][HTML] The effect of organizational information security climate on information security policy compliance: The mediating effect of social bonding towards healthcare …

K Dong, RF Ali, PDD Dominic, SEA Ali - Sustainability, 2021 - mdpi.com
The advancement of information communication technology in healthcare institutions has
increased information security breaches. Scholars and industry practitioners have reported …

iGluK-Deep: computational identification of lysine glutarylation sites using deep neural networks with general pseudo amino acid compositions

S Naseer, RF Ali, YD Khan… - Journal of Biomolecular …, 2022 - Taylor & Francis
Lysine glutarylation is a post-translation modification which plays an important regulatory
role in a variety of physiological and enzymatic processes including mitochondrial functions …

[HTML][HTML] IAmideV-deep: Valine amidation site prediction in proteins using deep learning and pseudo amino acid compositions

S Naseer, RF Ali, A Muneer, SM Fati - Symmetry, 2021 - mdpi.com
Amidation is an important post translational modification where a peptide ends with an
amide group (–NH2) rather than carboxyl group (–COOH). These amidated peptides are …

Nurse information security policy compliance, information competence, and information security attitudes predict information security behavior

P Kang, J Kang, KA Monsen - CIN: Computers, Informatics …, 2023 - journals.lww.com
Nurses' attitudes toward information security can influence the hospital's information
resources management and development. This study investigated the relationships between …

iNitroY-Deep: Computational identification of Nitrotyrosine sites to supplement Carcinogenesis studies using Deep Learning

S Naseer, RF Ali, SM Fati, A Muneer - IEEE Access, 2021 - ieeexplore.ieee.org
In biological systems, Nitration is a crucial post-translational modification which occurs on
various amino acids. Nitration of Tyrosine is regarded as nitorsative stress biomarker …

A survey on phishing emails detection techniques

A Muneer, RF Ali, AA Al-Sharai… - … conference on innovative …, 2021 - ieeexplore.ieee.org
In the last few eras, phishing attacks have become more sensitive case for local users,
organizations, and service providers. Phishing emails can also cause financial loss to …

Investigation of information security policy violations among oil and gas employees: A security-related stress and avoidance co** perspective

RF Ali, PDD Dominic - Journal of Information Science, 2024 - journals.sagepub.com
Information security is one of the most crucial considerations in digitising Oil and Gas (O&G)
organisations. For ensuring information security policy compliance, O&G organisations …