Secure, usable biometric authentication systems LM Mayron, Y Hausawi, GS Bahr Universal Access in Human-Computer Interaction. Design Methods, Tools, and …, 2013 | 29 | 2013 |
Adopting and Implementing a Government Cloud in Saudi Arabia, an Integral Part of Vision 2030. MO Alannsary, YM Hausawi CATA, 387-396, 2019 | 14 | 2019 |
An assessment framework for usable-security based on decision science YM Hausawi, WH Allen Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 11 | 2014 |
Current trend of end-users’ behaviors towards security mechanisms YM Hausawi Human Aspects of Information Security, Privacy, and Trust: 4th International …, 2016 | 10 | 2016 |
Choice-based authentication: a usable-security approach YM Hausawi, WH Allen, GS Bahr Universal Access in Human-Computer Interaction. Design and Development …, 2014 | 9 | 2014 |
Usable-security evaluation YM Hausawi, WH Allen Human Aspects of Information Security, Privacy, and Trust: Third …, 2015 | 8 | 2015 |
Towards a Usable-Security Engineering Framework for Enhancing Software Development YM Hausawi Florida Institute of Technology, 2015 | 6 | 2015 |
Usablity and security trade-off: A design guideline YM Hausawi, WH Allen Proceedings of the 2014 ACM Southeast Regional Conference, 1-6, 2014 | 6 | 2014 |
Towards usable and secure natural language processing systems YM Hausawi, LM Mayron HCI International 2013-Posters’ Extended Abstracts: International Conference …, 2013 | 5 | 2013 |
TNC YM Hausawi Communications 7 (4), 19-26, 2019 | | 2019 |
IMPACT OF CYBER SECURITY MECHANISMS ON EMPLOYEES'BEHAVIOR YM Hausawi Proceedings of the International Conference on Security and Management (SAM …, 2019 | | 2019 |