Impact of system quality on users' satisfaction in continuation of the use of e-learning system AE Dreheeb, N Basir, N Fabil International Journal of e-Education, e-Business, e-Management and e …, 2016 | 96 | 2016 |
Web accessibility challenges HY Abuaddous, MZ Jali, N Basir International Journal of Advanced Computer Science and Applications (IJACSA), 2016 | 90 | 2016 |
Security awareness training: A review MM Al-Daeef, N Basir, MM Saudi Lecture notes in engineering and computer science, 2017 | 83 | 2017 |
Deriving safety cases for hierarchical structure in model-based development N Basir, E Denney, B Fischer Computer Safety, Reliability, and Security: 29th International Conference …, 2010 | 39 | 2010 |
Requirements elicitation techniques: comparative study OI Al Mrayat, N Norwawi, N Basir International Journal of Recent Development in Engineering and Technology 1 …, 2013 | 34 | 2013 |
A simulated annealing for Tahmidi course timetabling N Basir, W Ismail, NM Norwawi Procedia Technology 11, 437-445, 2013 | 34 | 2013 |
Constructing a safety case for automatically generated code from formal program verification information N Basir, E Denney, B Fischer Computer Safety, Reliability, and Security: 27th International Conference …, 2008 | 33 | 2008 |
Deriving safety cases from automatically constructed proofs N Basir, E Denney, B Fischer IET Digital Library, 2009 | 20 | 2009 |
Hybrid search approach for retrieving Medical and Health Science knowledge from Quran MAM Safee, MM Saudi, SA Pitchay, F Ridzuan, N Basir, K Saadan, ... International Journal of Engineering and Technology (UAE), 2018 | 19 | 2018 |
Tacit requirements elicitation framework B Basir, R Salam ARPN J. Eng. Appl. Sci 10 (2), 572-578, 2015 | 19 | 2015 |
Mortality rates due to coronary heart disease by specific sex and age groups among Malaysians W Abdullah, YS Yusoff, N Basir, MM Yusuf Lecture Notes in Engineering and Computer Science, 2017 | 16 | 2017 |
Study of the accessibility diagnosis on the public higher institutions website in Malaysia HY Abuaddous, MZ Jali, N Basir | 16 | 2013 |
Security metrics to improve misuse case model AA Abdulrazeg, NM Norwawi, N Basir Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 14 | 2012 |
A systematic review analysis of root exploitation for mobile botnet detection HAB Hashim, M Mohd Saudi, N Basir Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016 | 12 | 2016 |
Security measurement based on GQM to improve application security during requirements stage AA Abdulrazeg, NM Norwawi, N Basir International Journal of Cyber-security and digital forensics 1 (3), 211-221, 2012 | 11 | 2012 |
Deriving safety cases for the formal safety certification of automatically generated code N Basir, E Denney, B Fischer Electronic Notes in Theoretical Computer Science 238 (4), 19-26, 2009 | 11 | 2009 |
Quantitative metric for ranking web accessibility barriers based on their severity HY Abuaddous, MZ Jali, N Basir Journal of Information and Communication Technology 16 (1), 81-102, 2017 | 10 | 2017 |
A method to measure the efficiency of phishing emails detection features MM Al-Daeef, N Basir, MM Saudi 2014 International Conference on Information Science & Applications (ICISA), 1-5, 2014 | 10 | 2014 |
Comparative study of quality models AE Dreheeb, N Basir, N Fabil International Journal of Computer Science and Electronics Engineering (IJCSEE), 2016 | 8 | 2016 |
Building heterogeneous safety cases for automatically generated code N Basir, E Denney, B Fischer Infotech@ Aerospace Conference. AIAA, 2011 | 8 | 2011 |