Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Alqatawna, Ja'far
add a person with the name Alqatawna, Ja'far
 

Other publications of authors with the same name

Comparative Review of e-service Maturity Models: 6I Model., , , , and . CSREA EEE, page 3-9. CSREA Press, (2008)Spam profiles detection on social networks using computational intelligence methods: The effect of the lingual context., , , and . J. Inf. Sci., (2021)Improving Event Monitoring in IoT Network Using an Integrated Blockchain-Distributed Pattern Recognition Scheme., , , , and . BLOCKCHAIN, volume 1010 of Advances in Intelligent Systems and Computing, page 134-144. Springer, (2019)Users Profiling Using Clickstream Data Analysis and Classification., , , , and . CCC, page 96-99. IEEE, (2016)Security in e-Business - Understanding Customers Perceptions and Concerns., , and . WEBIST (2), page 319-324. INSTICC Press, (2010)978-989-674-025-2.Towards Holistic Approaches to Secure e-Business: A Critical Review., , , and . CSREA EEE, page 245-251. CSREA Press, (2008)The Impact of Social Engineer Attack Phases on Improved Security Countermeasures: Social Engineer Involvement as Mediating Variable., , , , and . Int. J. Digit. Crime Forensics, 14 (1): 1-26 (2022)Modeling Employee Flexible Work Scheduling As A Classification Problem., , , and . KES, volume 192 of Procedia Computer Science, page 3281-3290. Elsevier, (2021)A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes., , , and . CCC, page 65-69. IEEE, (2016)EMFET: E-mail Features Extraction Tool., , , , , and . CoRR, (2017)