An approach to the impact of transformation from the traditional use of ICT to the Internet of Things: How smart solutions can transform SMEs B Abazi IFAC-PapersOnLine 49 (29), 148-151, 2016 | 34 | 2016 |
Application of biometric models of authentication in mobile equipment B Abazi, B Qehaja, E Hajrizi IFAC-PapersOnLine 52 (25), 543-546, 2019 | 11 | 2019 |
Digital Transformation in the Western Balkans as an Opportunity for Managing Innovation in Small and Medium Businesses-Challenges and Opportunities A Zuzaku, B Abazi IFAC-PapersOnLine 55 (39), 60-65, 2022 | 10 | 2022 |
Research on the importance of training and professional certification in the field of ICT Case Study in Kosovo B Abazi, E Hajrizi IFAC-PapersOnLine 51 (30), 336-339, 2018 | 9 | 2018 |
Semi-automated information security risk assessment framework for analyzing enterprises security maturity level B Abazi, A Kő International Conference on Research and Practical Issues of Enterprise …, 2019 | 6 | 2019 |
Enterprise Technology Architecture solution for eHealth System and implementation Strategy B Qehaja, B Abazi, E Hajrizi IFAC-PapersOnLine 52 (25), 370-375, 2019 | 6 | 2019 |
Comparision of maturity model frameworks in information security and their implementation A Luma, B Abazi, B Selimi, M Hamiti Proceedings International Conf on Engineering Technologies (ICENTE'18), 102-104, 2018 | 5 | 2018 |
An approach to Information Security for SMEs based on the Resource-Based View theory B Abazi International Journal of Business and Technology 6 (3), 1-5, 2018 | 4 | 2018 |
An approach to Privacy on Recommended Systems A Luma, B Abazi, A Aliu 2019 3rd International Symposium on Multidisciplinary Studies and Innovative …, 2019 | 3 | 2019 |
The implications of Information security to the Internet of Things B Abazi JOURNAL OF NATURAL SCIENCES AND MATHEMATICS OF UT (JNSM) 3 (2), 86-90, 2016 | 3 | 2016 |
Practical analysis on the algorithm of the Cross-Site Scripting Attacks B Abazi, E Hajrizi 2022 29th International Conference on Systems, Signals and Image Processing …, 2022 | 2 | 2022 |
Risk Assessment process according to National Institute of Standards and Technology (NIST) B Abazi | 2 | 2018 |
Establishing the National Cybersecurity (Resilience) Ecosystem B Abazi IFAC-PapersOnLine 55 (39), 42-47, 2022 | 1 | 2022 |
Cybersecurity challenges for organizations A Luma, B Abazi, A Aliu, H Snopce, Y Januzaj International Conference on Engineering Technologies, 17 - 18, 2021 | 1* | 2021 |
The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS) A Luma, B Abazi 2019 42nd International Convention on Information and Communication …, 2019 | 1 | 2019 |
The adoption of Free/Open Source CRM software to SME-s An approach to low cost oriented solutions B Abazi 5th International Conference on Information Systems and Security, 2016 | 1 | 2016 |
Analysis of the security issues on 5g network in relation to other networks B Abazi | | 2022 |
A Comparative Study on the User Experience on Using Secure Messaging Tools B Abazi, R Gegaj Big Data Privacy and Security in Smart Cities, 119-131, 2022 | | 2022 |
Analyzing the Information Security Risk Management in Banking and Microfinance Institutions in Kosovo G Ademi, B Abazi | | 2021 |
The implementation of the new encryption mathematical model for cryptosystems A Luma, B Abazi, A Aliu, H Snopce, Y Januzaj International Conference on Engineering Technologies, 12-13, 2021 | | 2021 |