Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-View of Testing Techniques Toward Improving Web-Based Application Testing, , and . CoRR, (2012)Using a Multi-Criteria Approach in Early Warning Information Systems (MCEWIS)., , , and . WorldCIST (1), volume 275 of Advances in Intelligent Systems and Computing, page 399-410. Springer, (2014)Building a Comprehensive Information Systems Auditing and Control Software., and . Egypt. Comput. Sci. J., (2007)A Framework for Auditing Software Coding & Database Integrity., and . Egypt. Comput. Sci. J., (2008)A Conceptual Model for Effective Early Warning Information Systems (EEWIS)., , , and . ICEIS (2), page 134-142. SciTePress, (2013)Cybersecurity Tools for IS Auditing., , , and . ES, page 217-223. IEEE, (2018)Assessment of cloud computing adoption models in e-government environment., , and . Int. J. Comput. Intell. Stud., 7 (1): 67-92 (2018)Implementation of Customer Service Tracking Using the Active Document Model., , and . Egypt. Comput. Sci. J., 28 (2): 52-70 (2006)Modelling Blockchain-Based Systems Using Model-Driven Engineering., , , and . BCCA, page 329-334. IEEE, (2023)Work flow methodology: A proposed approach for analysis and conceptual design of large scale computer based information systems., and . Inf. Manag., 19 (5): 333-343 (1990)