default search action
Hamid Jahankhani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Rao Faizan Ali, Hamid Jahankhani, Kashif Ali, Bilal Hassan:
Blockchain-Based Security Factors on Sustainable Supply Chain Management in UK Manufacturing Firms: A Hybrid SEM-ANN Approach. Syst. 12(6): 208 (2024) - 2021
- [j14]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Carsten Maple, Gregory Epiphaniou, Mohammad Hammoudeh, Hamid Jahankhani, Prashant Pillai:
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Comput. Electr. Eng. 91: 107047 (2021) - 2020
- [j13]Reza Montasari, Richard Hill, Farshad Montaseri, Hamid Jahankhani, Amin Hosseinian Far:
Internet of things devices: digital forensic process and data reduction. Int. J. Electron. Secur. Digit. Forensics 12(4): 424-436 (2020)
2010 – 2019
- 2019
- [c33]Grace Adedotun-Ogundeji, Hamid Jahankhani:
Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future. ICGS3 2019 - [c32]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Gregory Epiphaniou, Jon Cosson, Hamid Jahankhani, Prashant Pillai:
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. ICGS3 2019 - [c31]Usman Javed Butt, Maysam Abbod, Anzor Lors, Hamid Jahankhani, Arshad Jamal, Arvind Kumar:
Ransomware Threat and its Impact on SCADA. ICGS3 2019 - [c30]Nishan Chelvachandran, Hamid Jahankhani:
Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media. ICGS3 2019 - [c29]Nishan Chelvachandran, Hamid Jahankhani:
A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media. ICGS3 2019 - [c28]Anita Collins, Hamid Jahankhani:
Blockchain as a Tool for Financial Transparency in Development Aid. ICGS3 2019 - [c27]Homan Forouzan, Hamid Jahankhani:
An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service. ICGS3 2019 - [c26]John Goldie, Hamid Jahankhani:
Ethical Considerations of People with Autistic Spectrum Disorder. ICGS3 2019 - [c25]Jaime Ibarra Jimenez, Usman Javed Butt, Anh Do, Hamid Jahankhani, Arshad Jamal:
Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure. ICGS3 2019 - [c24]Jaime Ibarra Jimenez, Hamid Jahankhani:
"Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services. ICGS3 2019 - [c23]Stefan Kendzierskyj, Hamid Jahankhani:
The Role of Blockchain in Supporting Critical National Infrastructure. ICGS3 2019 - [c22]Stefan Kendzierskyj, Hamid Jahankhani:
Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research Data. ICGS3 2019 - [c21]Liam Odell, Hamid Jahankhani:
AI: The Cyber-Physical Project Manager and their Digital Twin. ICGS3 2019 - [c20]Joseph Waldu Woensdregt, Haider M. Al-Khateeb, Gregory Epiphaniou, Hamid Jahankhani:
AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms. ICGS3 2019 - 2015
- [c19]Hamid Jahankhani, Amin Hosseinian Far:
Challenges of Cloud Forensics. ES 2015: 1-18 - [c18]Wakas Mahmood, Hamid Jahankhani, Aykut Ozkaya:
Cloud Forensics Challenges Faced by Forensic Investigators. ICGS3 2015: 74-82 - [c17]Ali Hosseinpour, Amin Hosseinian Far, Hamid Jahankhani, Alireza Ghadrdanizadi:
Security and Feasibility of Power Line Communication System. ICGS3 2015: 244-251 - [c16]Ali G. Hessami, Hamid Jahankhani, Mathews Z. Nkhoma:
Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems Framework. ICGS3 2015: 263-274 - [c15]Hamid Jahankhani, Najib Altawell, Ali G. Hessami:
Risk and Privacy Issues of Digital Oil Fields in the Cloud. ICGS3 2015: 275-284 - [e3]Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian Far:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. Communications in Computer and Information Science 534, Springer 2015, ISBN 978-3-319-23275-1 [contents] - 2014
- [j12]Ali Hosseinpour Najarkolaei, Hamid Jahankhani, Amin Hosseinian Far:
Vulnerability considerations for power line communication's supervisory control and data acquisition. Int. J. Electron. Secur. Digit. Forensics 6(2): 104-114 (2014) - 2013
- [j11]Reza Alavi, Shareeful Islam, Hamid Jahankhani, Ameer Al-Nemrat:
Analyzing Human Factors for an Effective Information Security Management System. Int. J. Secur. Softw. Eng. 4(1): 50-74 (2013) - 2012
- [j10]Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab, Sitalakshmi Venkatraman, Hamid Jahankhani:
Analysis of firewall log-based detection scenarios for evidence in digital forensics. Int. J. Electron. Secur. Digit. Forensics 4(4): 261-279 (2012) - [c14]Hamid Jahankhani, Elias Pimenidis, Amin Hosseinian Far:
A Probabilistic Knowledge-Based Information System for Environmental Policy Modeling and Decision Making. AIAI (1) 2012: 136-145 - [e2]Christos K. Georgiadis, Hamid Jahankhani, Elias Pimenidis, Rabih Bashroush, Ameer Al-Nemrat:
Global Security, Safety and Sustainability & e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 99, Springer 2012, ISBN 978-3-642-33447-4 [contents] - 2011
- [j9]Devon Bennett, Hamid Jahankhani, Mohammad Dastbaz, Hossein Jahankhani:
A Secure Hybrid Network Solution to Enhance the Resilience of the UK Government National Critical Infrastructure TETRA Deployment. Int. J. Inf. Secur. Priv. 5(1): 1-13 (2011) - [j8]Mia Nazmul Haque Siddique, Richard J. Mitchell, Michael J. O'Grady, Hamid Jahankhani:
Cybernetic approaches to robotics. Paladyn J. Behav. Robotics 2(3): 109-110 (2011) - [c13]Rabih Bashroush, Ameer Al-Nemrat, M. Bachrouch, Hamid Jahankhani:
Visualizing Variability Models Using Hyperbolic Trees. CAiSE Forum 2011: 113-120 - [c12]Fawzi Fawzi, Rabih Bashroush, Hamid Jahankhani:
GSi Compliant RAS for Public Private Sector Partnership. ICGS3/e-Democracy 2011: 67-71 - [c11]Nurdeen M. Ibrahim, Ameer Al-Nemrat, Hamid Jahankhani, Rabih Bashroush:
Sufficiency of Windows Event Log as Evidence in Digital Forensics. ICGS3/e-Democracy 2011: 253-262 - [c10]Amin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera:
Financial Assessment of London Plan Policy 4A.2 by Probabilistic Inference and Influence Diagrams. EANN/AIAI (2) 2011: 51-60 - 2010
- [j7]Sérgio Tenreiro de Magalhães, Henrique M. Dinis Santos, Leonel Duarte Dos Santos, Hamid Jahankhani:
Cyberwar and the Russian Federation: the usual suspect. Int. J. Electron. Secur. Digit. Forensics 3(2): 151-163 (2010) - [c9]Ameer Al-Nemrat, Hamid Jahankhani, David S. Preston:
Cybercrime Victimisations/Criminalisation and Punishment. ICGS3 2010: 55-62 - [c8]Amin Hosseinian Far, Elias Pimenidis, Hamid Jahankhani, D. C. Wijeyesekera:
A Review on Sustainability Models. ICGS3 2010: 216-222 - [e1]Sérgio Tenreiro de Magalhães, Hamid Jahankhani, Ali G. Hessami:
Global Security, Safety, and Sustainability - 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings. Communications in Computer and Information Science 92, Springer 2010, ISBN 978-3-642-15716-5 [contents]
2000 – 2009
- 2009
- [j6]Hamid Jahankhani:
Criminal investigation and forensic tools for smartphones. Int. J. Electron. Secur. Digit. Forensics 2(4): 387-406 (2009) - 2008
- [j5]Amin Mousavi, Elias Pimenidis, Hamid Jahankhani:
Cultivating trust - an electronic-government development model for addressing the needs of developing countries. Int. J. Electron. Secur. Digit. Forensics 1(3): 233-248 (2008) - [j4]Hamid Jahankhani, Elidon Beqiri:
Memory-Based Antiforensic Tools and Techniques. Int. J. Inf. Secur. Priv. 2(2): 1-13 (2008) - [j3]Haralambos Mouratidis, Hamid Jahankhani, Mathews Z. Nkhoma:
Management versus security specialists: an empirical study on security related perceptions. Inf. Manag. Comput. Secur. 16(2): 187-205 (2008) - 2007
- [j2]Hamid Jahankhani:
Evaluation of cyber legislations: trading in the global cyber village. Int. J. Electron. Secur. Digit. Forensics 1(1): 1-11 (2007) - [j1]Hamid Jahankhani, Shantha Fernando, Mathews Z. Nkhoma, Haralambos Mouratidis:
Information Systems Security: Cases of Network Administrator Threats. Int. J. Inf. Secur. Priv. 1(3): 13-25 (2007) - 2005
- [c7]Hamid Jahankhani, Justus I. Ekeigwe:
Adaptation of the Balanced Scorecard Model to the IT Functions. ICITA (2) 2005: 784-787 - 2004
- [c6]Hamid Jahankhani, Mohammed Youssef:
Underlying Platform of the E-Commerce System: J2EE vs. NET. ICEIS (4) 2004: 250-257 - 2002
- [c5]Hamid Jahankhani, John A. Lynch, Jonathan Stephenson:
The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU. EurAsia-ICT 2002: 552-559 - [c4]Hamid Jahankhani, Jonathan Stephenson:
Web Accessibility: Impact of the Recent Law on E-Learning Provisions for the Visually Impaired. ICWI 2002: 144-151 - [c3]Hamid Jahankhani, Fadi Safieddine:
A Review of Web Tools Categories. ICWI 2002: 839-840 - [c2]Hamid Jahankhani, Solomon A. Alexis:
E-Commerce Business Practices in the EU. ICEIS 2002: 929-936 - [c1]Hamid Jahankhani, Pari Jahankhani:
Distributed Online Doctor Surgery. ICEIS 2002: 1042-1047
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint