Browsing by Author Amro, Belal

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 21  next >
Issue DateTitleAuthor(s)
2021-12-01The adoption level of electronic medical records in Hebron hospitals based on the electronic medical record adoption model (EMRAM)Amro, Belal; Najjar, Arwa; Macido, Mario
2023Big picture: analysis of DDoS attacks map - systems and network, cloud computing, SCADA systems, and IoTSalah, Saeed; Amro, Belal
2011-10CoRPPS: collusion resistant pseudonym providing systemAmro, Belal; Levi, Albert; Saygin, Yucel
2018-09Cybercrime as a Matter of the Art in Palestine and its Effect on IndividualsAmro, Belal
2018-10Design and Development of Case Studies in Security and Privacy for Health Informatics EducationAmro, Belal; Al-Jabari, Mohanad; Jabareen, Hussein; Khader, Yousef; Taweel, Adel
2018-10Development of Case Study-Based Approach for Learning Undergraduate Students to Effectively Understanding and Use of EHRAl-Jabari, Mohanad; Amro, Belal; Jabareen, Hussein; Khadir, Yousef; Taweel, Adel
2016-10Flexible Fair and Collusion Resistant Pseudonym Providing SystemAmro, Belal; Levi, Albert; Saygin, Yucel
2022-01-01An Intelligent Decision Support System For Recruitment: Resumes Screening and Applicants RankingAmro, Belal; Najjar, Arwa; Macido, Mario
2022-03-17islEHR, a model for electronic health records interoperabilityAmro, Belal; Najjar, Arwa; Macido, Mario
2017-12MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICESAmro, Belal
2014-03Mobile Agent Systems, Recent Security Threats and Counter MeasuresAmro, Belal
2010-11P2-CTM: privacy preserving collaborative traffic monitoringAmro, Belal; Saygin, Yucel; Levi, Albert
2011-11PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanismAmro, Belal; Saygin, Yucel; Levi, Albert
2019-01-01PAPG- Personalized Anti Phishing GuardAmro, Belal; Abu sabha, Ahmed; Qunaibi, Ammar; Najjar, Inrahim
2018-01Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user’s preferencesAmro, Belal
2018-02Phishing Techniques in Mobile DevicesAmro, Belal
2018-01PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGEAmro, Belal
2021-09-02The reality and motives for adherence to information security policies in Palestinian higher education institutions–A case study of Hebron UniversityAmro, Belal
2022-12-01Towards Secure Interoperability of EHR among Healthcare Organizations in PalestineAsafrah, mohammad; Amro, Belal
2021-12-16User Centric Android Application Permission ManagerAmro, Belal; zaid, abu znaid