Follow
Shouki A. Ebad
Shouki A. Ebad
Northern Border University
Verified email at nbu.edu.sa - Homepage
Title
Cited by
Cited by
Year
An exploratory study of ICT projects failure in emerging markets
SA Ebad
Journal of Global Information Technology Management 21 (2), 139-160, 2018
532018
Influencing factors for IT software project failures in developing countries-a critical literature survey.
SA Ebad
J. Softw. 11 (11), 1145-1153, 2016
272016
Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector
S T. Alanazi, M Anbar, S A. Ebad, S Karuppayah, HA Al-Ani
Symmetry 12 (9), 1544, 2020
232020
Measuring software obfuscation quality—a systematic literature review
SA Ebad, A Darem, JH Abawajy
IEEE Access 9, 99024 - 99038, 2021
212021
Healthcare software design and implementation—A project failure case
SA Ebad
Software: Practice and Experience 50 (7), 1258-1276, 2020
212020
Inspection reading techniques applied to software artifacts-a systematic review
SA Ebad
Comput. Syst. Sci. Eng 32 (3), 213-226, 2017
162017
Measuring stability of object‐oriented software architectures
SA Ebad, MA Ahmed
IET Software 9 (3), 76-82, 2015
162015
Deep-ensemble and multifaceted behavioral malware variant detection model
AA Al-Hashmi, FA Ghaleb, A Al-Marghilani, AE Yahya, SA Ebad, M Saqib, ...
IEEE Access 10, 42762-42777, 2022
152022
Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory
SA Ebad
International Journal of System Assurance Engineering and Management 13 (1 …, 2022
132022
Analyzing privacy requirements: A case study of healthcare in Saudi Arabia
SA Ebad, ES Jaha, MA Al-Qadhi
Informatics for Health and Social Care 41 (1), 47-63, 2016
102016
Software packaging approaches—a comparison framework
SA Ebad, M Ahmed
Software Architecture: 5th European Conference, ECSA 2011, Essen, Germany …, 2011
92011
An evaluation framework for package-level cohesion metrics
S Ebad, M Ahmed
International Proceedings of Computer Science and Information Technology 13 …, 2011
92011
Cyber threats classifications and countermeasures in banking and financial sector
AA Darem, AA Alhashmi, TM Alkhaldi, AM Alashjaee, SM Alanazi, ...
IEEE Access 11, 125138-125158, 2023
82023
The influencing causes of software unavailability: A case study from industry
SA Ebad
Software: Practice and Experience 48 (5), 1056-1076, 2018
82018
Towards measuring software requirements volatility: A retrospective analysis
SA Ebad
Malaysian Journal of Computer Science 30 (2), 99-116, 2017
82017
Exploring how to apply secure software design principles
SA Ebad
IEEE Access 10, 128983-128993, 2022
72022
Investigating the effect of software packaging on modular structure stability
SA Ebad, M Ahmed
Computer Systems Science and Engineering 34 (5), 283-296, 2019
72019
An empirical comparison of Java and C# programs in following naming conventions
SA Ebad, D Manzoor
International Journal of People-Oriented Programming (IJPOP) 5 (1), 39-60, 2016
62016
Functionality-based software packaging using sequence diagrams
SA Ebad, MA Ahmed
Software Quality Journal 23, 453-481, 2015
62015
XMI2UC: An automatic tool to extract use cases from object oriented source code
SA Ebad, MA Ahmed
International Journal of Future Computer and Communication 1 (2), 193, 2012
52012
The system can't perform the operation now. Try again later.
Articles 1–20