Author of the publication

Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees.

, , , and . Int. J. Inf. Sec., 23 (2): 1197-1213 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Reinforcement Learning for Anomaly Detection: A Systematic Review., , , , , , and . IEEE Access, (2022)iPhosS(Deep)-PseAAC: Identification of Phosphoserine Sites in Proteins Using Deep Learning on General Pseudo Amino Acid Compositions., , , and . IEEE ACM Trans. Comput. Biol. Bioinform., 19 (3): 1703-1714 (2022)iNitroY-Deep: Computational Identification of Nitrotyrosine Sites to Supplement Carcinogenesis Studies Using Deep Learning., , , and . IEEE Access, (2021)Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks., and . KSII Trans. Internet Inf. Syst., 12 (10): 5159-5178 (2018)iAmideV-Deep: Valine Amidation Site Prediction in Proteins Using Deep Learning and Pseudo Amino Acid Compositions., , , and . Symmetry, 13 (4): 560 (2021)Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey., , and . SNPD, page 344-349. IEEE Computer Society, (2008)iAceS-Deep: Sequence-Based Identification of Acetyl Serine Sites in Proteins Using PseAAC and Deep Neural Representations., , , and . IEEE Access, (2022)ICT Enabled TVET Education: A Systematic Literature Review., , , , and . IEEE Access, (2021)Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees., , , and . Int. J. Inf. Sec., 23 (2): 1197-1213 (April 2024)Performance Analysis of Secured Privacy and Key Management Protocol in IEEE 802-16e-2005., , , and . JDCTA, 3 (1): 103-109 (2009)