Mohd Anwar
Cited by
Cited by
A privacy preservation model for facebook-style social network systems
PWL Fong, M Anwar, Z Zhao
European symposium on research in computer security, 303-320, 2009
Gender difference and employees' cybersecurity behaviors
M Anwar, W He, I Ash, X Yuan, L Li, L Xu
Computers in Human Behavior 69, 437–443, 2016
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
L Li, W He, L Xu, I Ash, M Anwar, X Yuan
International Journal of Information Management 45, 13-24, 2019
Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges
M Anwar, J Joshi, J Tan
Health Policy and Technology 4 (4), 299-311, 2015
Facilitating trust in privacy-preserving e-learning environments
M Anwar, J Greer
IEEE Transactions on Learning Technologies 5 (1), 62-73, 2011
Nonvisual tool for navigating hierarchical structures
AC Smith, JS Cook, JM Francioni, A Hossain, M Anwar, MF Rahman
ACM SIGACCESS Accessibility and Computing, 133-139, 2003
Cyber-based design for additive manufacturing using artificial neural networks for Industry 4.0
H Elhoone, T Zhang, M Anwar, S Desai
International Journal of Production Research 58 (9), 2841-2861, 2020
Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study
B Davis, J Mason, M Anwar
IEEE Internet of Things Journal, 2020
Mutual-friend based attacks in social network systems
L Jin, JBD Joshi, M Anwar
Computers & security 37, 15-30, 2013
A trust-based approach against IP-spoofing attacks
JM Gonzalez, M Anwar, JBD Joshi
2011 Ninth Annual International Conference on Privacy, Security and Trust, 63-70, 2011
Privacy enhanced personalization in e-learning
MM Anwar, J Greer, CA Brooks
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
Visualizing privacy implications of access control policies in social network systems
M Anwar, PWL Fong, XD Yang, H Hamilton
Data privacy management and autonomous spontaneous security, 106-120, 2009
Classification for authorship of tweets by comparing logistic regression and naive bayes classifiers
O Aborisade, M Anwar
2018 IEEE International Conference on Information Reuse and Integration (IRI …, 2018
A visualization tool for evaluating access control policies in facebook-style social network systems
M Anwar, PWL Fong
Proceedings of the 27th annual ACM Symposium on Applied Computing, 1443-1450, 2012
Security & privacy challenges in IoT-based health cloud
S Alasmari, M Anwar
2016 International Conference on Computational Science and Computational …, 2016
Reputation Management in Privacy-enhanced E-learning
M Anwar, J Greer
Proceedings of the 3rd Annual Scientific Conference of the LORNET Research …, 2006
Improving employees’ intellectual capacity for cybersecurity through evidence-based malware training
W He, I Ash, M Anwar, L Li, X Yuan, L Xu, X Tian
Journal of intellectual capital, 2019
A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device Authentication.
M Anwar, A Imran
MAICS, 13-18, 2015
Automatic evaluation of information provider reliability and expertise
K Pelechrinis, V Zadorozhny, V Kounev, V Oleshchuk, M Anwar, Y Lin
World Wide Web 18 (1), 33-72, 2015
Does explicit information security policy affect employees' cyber security behavior? A pilot study
L Li, W He, L Xu, A Ivan, M Anwar, X Yuan
2014 enterprise systems conference, 169-173, 2014
The system can't perform the operation now. Try again later.
Articles 1–20