• 429 Citations
  • 9 h-Index
20132019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 429 Citations
  • 9 h-Index
  • 20 Article
  • 3 Conference proceeding
  • 1 Chapter
2019

A multivariant secure framework for smart mobile health application

Butt, S. A., Jamal, T., Azad, M. A., Ali, A. & Sohrabi Safa, N., 6 Aug 2019, In : Transactions on Emerging Telecommunications Technologies. (In-Press), p. (In-Press) 18 p., e3684.

Research output: Contribution to journalArticle

1 Citation (Scopus)

An opportunistic resource management model to overcome resource-constraint in the Internet of Things

Safa, N. S., Maple, C., Haghparast, M., Watson, T. & Dianati, M., 25 Apr 2019, In : Concurrency Computation. 31, 8, e5014.

Research output: Contribution to journalArticle

Open Access
3 Citations (Scopus)

Deterrence and prevention-based model to mitigate information security insider threats in organisations

Sohrabi Safa, N., Maple, C., Furnell, S., Azad, M. A., Perera, C., Dabbagh, M. & Sookhak, M., Aug 2019, In : Future Generation Computer Systems. 97, p. 587-597 11 p.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
2 Downloads (Pure)

Incremental Algorithm for Association Rule Mining under Dynamic Threshold

Aqra, I., Ghani, N. A., Maple, C., Machado, J. & Sohrabi Safa, N., 10 Dec 2019, In : Applied Sciences. 9, 24, 22 p., 5398.

Research output: Contribution to journalArticle

Open Access
File
1 Citation (Scopus)
2 Downloads (Pure)

The evolution of blockchain: A bibliometric study

Dabbagh, M., Sookhak, M. & Safa, N. S., 29 Jan 2019, In : IEEE Access. 7, p. 19212-19221 10 p., 8628982.

Research output: Contribution to journalArticle

Open Access
File
7 Citations (Scopus)
118 Downloads (Pure)
2018

Information security collaboration formation in organisations

Safa, N. S., Maple, C., Watson, T. & Furnell, S., 1 May 2018, In : IET Information Security. 12, 3, p. 238-245 8 p.

Research output: Contribution to journalArticle

Open Access
2 Citations (Scopus)

Motivation and opportunity based model to reduce information security insider threats in organisations

Safa, N. S., Maple, C., Watson, T. & Von Solms, R., 1 Jun 2018, In : Journal of Information Security and Applications. 40, p. 247-257 11 p.

Research output: Contribution to journalArticle

Open Access
9 Citations (Scopus)
2017

A LogitBoost-based Algorithm for Detecting Known and Unknown Web Attacks

Kamarudin, M. H., Maple, C., Watson, T. & Sohrabi Safa, N., 3 Nov 2017, In : IEEE Access. 5, p. 26190 - 26200 11 p.

Research output: Contribution to journalArticle

Open Access
File
14 Citations (Scopus)
44 Downloads (Pure)

A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks

Kamarudin, M. H., Maple, C., Watson, T. & Safa, N. S., 7 Nov 2017, In : Security and Communication Networks. 2017, 18 p., 2539034.

Research output: Contribution to journalArticle

Open Access
File
2 Citations (Scopus)
15 Downloads (Pure)

An Information Security Risk Management Model for Smart Industry

Sohrabi Safa, N., Maple, C. & Watson, T., 1 Sep 2017, Advances in Manufacturing Technology XXXI - Proceedings of the 15th International Conference on Manufacturing Research, ICMR 2017, Incorporating the 32nd National Conference on Manufacturing Research. Goa, J., El Souri, M. & Keates, S. (eds.). IOS Press, Vol. 6. p. 257-262 6 p. (Advances in Transdisciplinary Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

1 Citation (Scopus)

An interactive visual library model to improve awareness in handling of business information

Sohrabi Safa, N., Delport, P. M. J. & Gerber, M., 2 Jan 2017, Information Security for South Africa (ISSA). IEEE, p. 18-26 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

A threat based approach to computational offloading for collaborative cruise control

Sheik, A. T., Maple, C., Watson, T., Alhagagi, H., Safa, N. S. & Woo-Lee, S., 22 Mar 2017, Proceedings of the 2nd International Conference on Internet of Things and Cloud Computing, ICC 2017. Hamdan, H., Boubiche, D. E. & Hidoussi, F. (eds.). Association for Computing Machinery, 9 p. 175. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding

Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing

Sookhak, M., Yu, F. R., He, Y., Talebian, H., Sohrabi Safa, N., Zhao, N., Khan, M. K. & Kumar, N., 1 Sep 2017, In : IEEE Vehicular Technology Magazine. 12, 3, p. 55-64 10 p., 7994678.

Research output: Contribution to journalArticle

Open Access
File
56 Citations (Scopus)
139 Downloads (Pure)

The information security landscape in the supply chain

Sohrabi Safa, N., Maple, C. & Watson, T., Jun 2017, In : Computer Fraud and Security. 2017, 6, p. 16-20 5 p.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)
2016

An information security knowledge sharing model in organizations

Safa, N. S. & Von Solms, R., 1 Apr 2016, In : Computers in Human Behavior. 57, p. 442-451 10 p.

Research output: Contribution to journalArticle

65 Citations (Scopus)

A Review on Artificial Intelligence Methodologies for the Forecasting of Crude Oil Price

Chiroma, H., Abdul-Kareem, S., Shukri Mohd Noor, A., Abubakar, A. I., Sohrabi Safa, N., Shuib, L., Fatihu Hamza, M., Ya’u Gital, A. & Herawan, T., 2016, In : Intelligent Automation and Soft Computing. 22, 3, p. 449-462 14 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Human aspects of information security in organisations

Safa, N. S., Solms, R. V. & Futcher, L., 1 Feb 2016, In : Computer Fraud and Security. 2016, 2, p. 15-18 4 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Human errors in the information security realm – and how to fix them

Safa, N. S. & Maple, C., 1 Sep 2016, In : Computer Fraud and Security. 2016, 9, p. 17-20 4 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Information security policy compliance model in organizations

Sohrabi Safa, N., Von Solms, R. & Furnell, S., 1 Feb 2016, In : Computers and Security. 56, p. 70-82 13 p.

Research output: Contribution to journalArticle

98 Citations (Scopus)
2015

Information security conscious care behaviour formation in organizations

Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A. & Herawan, T., 3 Sep 2015, In : Computers and Security. 53, p. 65-78 14 p.

Research output: Contribution to journalArticle

83 Citations (Scopus)
2014

An artificial neural network classification approach for improving accuracy of customer identification in e-commerce

Safa, N. S., Ghani, N. A. & Ismail, M. A., 1 Sep 2014, In : Malaysian Journal of Computer Science. 27, 3, p. 171-185 15 p.

Research output: Contribution to journalArticle

Open Access
File
12 Citations (Scopus)
5 Downloads (Pure)
2013

A customer loyalty formation model in electronic commerce

Sohrabi Safa, N. & Ismail, M. A., 4 Sep 2013, In : Economic Modelling. 35, p. 559-564 6 p.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Customer E-loyalty: From an estimate in electronic commerce with an artificial neural fuzzy interface system (ANFIS)

Sohrabi Safa, N. & Ismail, M. A., 15 Dec 2013, Proceedings of the First International Conference on Advanced Data and Information Engineering . Springer, p. 667-674 8 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Investigations on e-trust and e-satisfaction of customers for e-loyalty: The case of Iranian e-commerce

Sohrabi Safa, N. & Ismail, M. A., 2013, In : Actual Problems of Economics. 139, 1, p. 492-502 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)