default search action
Shawon Rahman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c6]Akashdeep Bhardwaj, Shawon Rahman:
Review of Security Threats and Attacks on IoT-based New Age Ecosystems. ICICT 2024: 413-420 - 2021
- [c5]Marvin Schneider, Shawon Rahman:
Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures. IEEE BigData 2021: 3353-3359
2010 – 2019
- 2019
- [c4]Salman Faizi, Shawon Rahman:
Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues. CATA 2019: 107-116 - [c3]Salman Faizi, Shawon Rahman:
Secured Cloud for Enterprise Computing. CATA 2019: 356-367 - [c2]Henry Okonofua, Shawon Rahman, Reni Ivanova:
An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations. CATA 2019: 464-474 - [i10]George W. Jackson Jr., Shawon Rahman:
Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related To The Medical Internet Of Things (MIoT). CoRR abs/1908.00666 (2019) - 2018
- [c1]Henry Okonofua, Shawon Rahman:
Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies. TrustCom/BigDataSE 2018: 1589-1592 - 2015
- [j1]M. Shamim Hossain, Al-Sakib Khan Pathan, Stefan Göbel, Shawon Rahman, M. Manzur Murshed:
Advances in Multimedia Sensor Networks for Health-Care and Related Applications. Int. J. Distributed Sens. Networks 11: 596096:1-596096:2 (2015) - [i9]Charles DeVoe, Shawon Rahman:
Incident Response Plan for a Small to Medium Sized Hospital. CoRR abs/1512.00054 (2015) - [i8]Kathleen Jungck, Shawon Rahman:
Cloud Computing Avoids Downfall of Application Service Providers. CoRR abs/1512.00061 (2015) - [i7]Kyle Dees, Shawon Rahman:
Enhancing Infrastructure Security in Real Estate. CoRR abs/1512.00064 (2015) - [i6]Lee Rice, Shawon Rahman:
Non-profit Organizations' Need to Address Security for Effective Government Contacting. CoRR abs/1512.00067 (2015) - [i5]D. J. Neal, Shawon Rahman:
Video Surveillance in the Cloud? CoRR abs/1512.00070 (2015) - [i4]Marc Rader, Shawon Rahman:
Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security Risks. CoRR abs/1512.00082 (2015) - [i3]Margie Todd, Shawon Rahman:
Complete Network Security Protection for SME's within Limited Resources. CoRR abs/1512.00085 (2015) - [i2]Karen Benson, Shawon Rahman:
Security Risks in Mechanical Engineering Industries. CoRR abs/1512.01730 (2015) - [i1]Kimmarie Donahue, Shawon Rahman:
Healthcare IT: Is your Information at Risk? CoRR abs/1512.01731 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 20:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint