A new comprehensive framework for enterprise information security risk management MS Saleh, A Alfantookh Applied computing and informatics 9 (2), 107-118, 2011 | 138 | 2011 |
Using ISO 17799: 2005 information security management: a STOPE view with six sigma approach MS Saleh, A Alrabiah, SH Bakry International Journal of network management 17 (1), 85-97, 2007 | 65 | 2007 |
A STOPE model for the investigation of compliance with ISO 17799‐2005 MS Saleh, A Alrabiah, SH Bakry Information Management & Computer Security 15 (4), 283-294, 2007 | 26 | 2007 |
Towards cloud computing services for higher educational institutions: Concepts & literature review N Alsaeed, M Saleh 2015 international conference on cloud computing (ICCC), 1-7, 2015 | 23 | 2015 |
Developing a Framework for Cost-Benefit Analysis of Cloud Computing Adoption by Higher Education Institutions in Saudi Arabia N Aldahwan, M Saleh International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2018 | 16 | 2018 |
A Conceptual Framework for Measuring Personal Privacy Risks In Facebook Online Social Network H Alasmari, M Saleh International Conference on Computer and Information Sciences (2019 ICCIS), 2019 | 12 | 2019 |
An overview of key IT risk management methods MS Saleh, SH Bakry Saudi Computer Journal 6 (2), 61-70, 2008 | 6 | 2008 |
Developing a Performance-based Tool for Arabic Text Steganography AI Alaqeel, MS Saleh 2021 National Computing Colleges Conference (NCCC), 1-6, 2021 | 4 | 2021 |
E-Business diffusion requirements: A STOPE view for easing the use of ISO 17799 information security management standard MS Saleh, A Alrabiah, SH Bakry Organization 6, 16, 2005 | 4 | 2005 |
An open reference framework for enterprise information security risk management using the STOPE scope and the six-sigma process MS Saleh, A Alfantookh, J Mellor, SH Bakry | 3 | 2008 |
Analysis of Information Security Risks and Protection Management Requirements for Enterprise Networks. MSM Saleh University of Bradford, 2012 | 1 | 2012 |
An overview of key information technology risk management methods S MS, B SH. Journal of Applied Computing & Informatices, 2008 | | 2008 |
ISO Information Security Standards: A Common and Safe Environment for e-Services S MS, A A, B SH. Journal of Applied Computing & Informatices 6 (1), 73-80, 2007 | | 2007 |
Structured evaluation of site security using an agent based hierarchical approach to ISO 17799. AJ Cullen, MS Saleh, JE Mellor, SH Bakry | | |