An access control model for cloud computing YA Younis, K Kifayat, M Merabti Journal of Information Security and Applications 19 (1), 45-60, 2014 | 226 | 2014 |
Secure cloud computing for critical infrastructure: A survey YA Younis, K Kifayat Liverpool John Moores University, United Kingdom, Tech. Rep, 599-610, 2013 | 89 | 2013 |
Cyber security teaching and learning laboratories: A survey L Topham, K Kifayat, YA Younis, Q Shi, B Askwith Information & Security 35 (1), 51, 2016 | 57 | 2016 |
A new prime and probe cache side-channel attack for cloud computing YA Younis, K Kifayat, Q Shi, B Askwith 2015 IEEE International Conference on Computer and Information Technology …, 2015 | 42 | 2015 |
Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University YA Younis, K Kifayat Liverpool John Moores University, 2013 | 25 | 2013 |
A framework to protect against phishing attacks YA Younis, M Musbah Proceedings of the 6th International Conference on Engineering & MIS 2020, 1-6, 2020 | 17 | 2020 |
The use of computer games for teaching and learning cybersecurity in higher education institutions A Mohammed, AY Younis Journal of Engineering Research 9 (3A), 143-152, 2021 | 14 | 2021 |
Preventing and detecting cache side-channel attacks in cloud computing YA Younis, K Kifayat, A Hussain Proceedings of the Second International Conference on Internet of Things …, 2017 | 12 | 2017 |
A novel evaluation criteria to cloud based access control models YA Younis, K Kifayat, M Merabti 2015 11th International Conference on Innovations in Information Technology …, 2015 | 11 | 2015 |
Teaching cryptography using cypher (interactive cryptographic protocol teaching and learning) YA Younis, K Kifayat, Q Shi, E Matthews, G Griffiths, R Lambertse Proceedings of the 6th International Conference on Engineering & MIS 2020, 1-7, 2020 | 8 | 2020 |
Cache side-channel attacks in cloud computing KK Younis Younis, M Merabti Proceedings of The International Conference on Cloud Security Management …, 2014 | 7 | 2014 |
Cloud Computing Security & Privacy Challenges YA Younis, K Kifayat, M Merabti 15th Annual Post Graduate Symposium on The Convergence of Telecommunications …, 2014 | 6 | 2014 |
Assessment of Healthcare Workers’ Level of Knowledge and Practices of Using Robotics During Covid-19 A Elghriani, YA Younis, AM Maatuk 2022 IEEE 2nd International Maghreb Meeting of the Conference on Sciences …, 2022 | 3 | 2022 |
Deploying risk access models in a cloud environment: Possibilities and challenges R Houssein, YA Younis 2021 IEEE 1st International Maghreb Meeting of the Conference on Sciences …, 2021 | 3 | 2021 |
Teaching Ethical Hacking: Evaluating Students' Levels of Achievements and Motivations YA Younis, K Kifayat, L Topham, Q Shi, B Askwith International Conference on Technical Sciences (ICST2019) 6, 04, 2019 | 3 | 2019 |
Securing Access to Cloud Computing for Critical Infrastructure YA Younis PQDT-UK & Ireland, 2015 | 3 | 2015 |
An Infrastructure Detection to Cache Side-Channel Attacks in Cloud Computing YA Younis, K Kifayat International Conference on Technical Sciences (ICST2019) 6, 04, 2019 | 2 | 2019 |
Fog Computing or Cloud Computing: a Study AN Elmoghrapi, A Bleblo, YA Younis 2022 International Conference on Engineering & MIS (ICEMIS), 1-6, 2022 | 1 | 2022 |
Secure Cloud Computing for Critical Infrastructure: A Survey K Kifayat, M Merabti, YA Younis | 1 | 2012 |
Measurement of Benefts, Reasons, and Barriers to Students’ Adoption of Electronic Applications YAY Mohammed Yahya Alghamdi, Mohammed Zakariah, Ali Aloway, Abdullah ... Journal of Engineering and Applied Sciences 10 (1), 18, 2023 | | 2023 |