Ahmad Jbara
Ahmad Jbara
School of Computer and Cyber Sciences, Augusta University, GA, USA
Verified email at augusta.edu - Homepage
Title
Cited by
Cited by
Year
Security and identification indicators for browsers against spoofing and phishing attacks
A Herzberg, A Jbara
ACM Transactions on Internet Technology (TOIT) 8 (4), 16, 2008
316*2008
How programmers read regular code: a controlled experiment using eye tracking
A Jbara, DG Feitelson
Empirical software engineering 22 (3), 1440-1477, 2017
482017
How programmers read regular code: a controlled experiment using eye tracking
A Jbara, DG Feitelson
Proceedings of the 2015 IEEE 23rd International Conference on, 244-254, 2015
482015
On the effect of code regularity on comprehension
A Jbara, DG Feitelson
Proceedings of the 22nd international conference on program comprehension …, 2014
292014
High-MCC functions in the Linux kernel
A Jbara, A Matan, DG Feitelson
Empirical Software Engineering 19 (5), 1261-1298, 2014
242014
High-MCC functions in the Linux kernel
A Jbara, A Matan, DG Feitelson
2012 IEEE 20th International Conference on Program Comprehension (ICPC), 2012
242012
OPCloud: An OPM Integrated Conceptual‐Executable Modeling Environment for Industry 4.0
D Dori, H Kohen, A Jbara, N Wengrowicz, R Lavi, NL Soskin, K Bernstein, ...
Systems Engineering in the Fourth Industrial Revolution, 243-271, 2019
152019
Protecting naive web users
A Herzberg, A Gbara
Draft of July 18, 2004, 2004
152004
Model-Based Systems Engineering for Aircraft Design with Dynamic Landing Constraints Using Object-Process Methodology
L Li, NL Soskin, A Jbara, M Karpel, D Dori
IEEE Access 7, 61494-61511, 2019
132019
Object-Process Methodology, OPM ISO 19450 – OPCloud and the Evolution of OPM Modeling Tools
D Dori, A Jbara, N Levi, N Wengrowicz
Systems Engineering Letters, Project Performance International (PPI) SyEN 61, 2018
102018
Model-Based Diagnosis with FTTell: Assessing the Potential for Pediatric Failure to Thrive (FTT) During the Perinatal Stage
N Levi-Soskin, R Shaoul, H Kohen, A Jbara, D Dori
EuroSymposium on Systems Analysis and Design, 37-47, 2019
92019
Trustbar: Protecting (even naive) web users from spoofing and phishing attacks. 2004
A Herzberg, A Gbara
Cryptology ePrint Archive: Report 2004/155 Google Scholar, 0
8
Quantification of code regularity using preprocessing and compression
A Jbara, DG Feitelson
manuscript, Jan 132, 2014
72014
Trustbar: Re-establishing trust in the web
A Herzberg, A Gbara
62006
EMIP: The eye movements in programming dataset
R Bednarik, T Busjahn, A Gibaldi, A Ahadi, M Bielikova, M Crosby, ...
Science of Computer Programming 198, 102520, 2020
52020
JCSD: Visual support for understanding code control structure
A Jbara, DG Feitelson
Proceedings of the 22Nd international conference on program comprehension …, 2014
52014
Characterization and assessment of the Linux configuration complexity
A Jbara, DG Feitelson
2013 IEEE 13th International Working Conference on Source Code Analysis and …, 2013
52013
Business process improvement using Object‐Process Methodology
JM Casebolt, A Jbara, D Dori
Systems Engineering, 2019
22019
The Model Fidelity Hierarchy: From Text to Conceptual, Computational, and Executable Model
N Levi-Soskin, A Jbara, D Dori
IEEE Systems Journal, 2020
12020
Toward integrating systems engineering with software engineering through Object-Process Programming
A Jbara, A Bibliowicz, N Wengrowicz, N Levi, D Dori
International Journal of Information Technology, 1-35, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20