var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https://dblp.org/pid/19/8362.bib&jsonp=1&groupby=type&sort=-year&hidemenu=true&theme=mila&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https://dblp.org/pid/19/8362.bib&jsonp=1&groupby=type&sort=-year&hidemenu=true&theme=mila\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https://dblp.org/pid/19/8362.bib&jsonp=1&groupby=type&sort=-year&hidemenu=true&theme=mila\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n article\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n A Retrospective Analysis of the COVID-19 Infodemic in Saudi Arabia.\n \n \n \n \n\n\n \n Alasmari, A.; Addawood, A.; Nouh, M.; Rayes, W.; and Al-Wabil, A.\n\n\n \n\n\n\n Future Internet, 13(10): 254. 2021.\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/fi/AlasmariANRA21,\n  author       = {Ashwag Alasmari and\n                  Aseel Addawood and\n                  Mariam Nouh and\n                  Wajanat Rayes and\n                  Areej Al{-}Wabil},\n  title        = {A Retrospective Analysis of the {COVID-19} Infodemic in Saudi Arabia},\n  journal      = {Future Internet},\n  volume       = {13},\n  number       = {10},\n  pages        = {254},\n  year         = {2021},\n  url          = {https://doi.org/10.3390/fi13100254},\n  doi          = {10.3390/FI13100254},\n  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/journals/fi/AlasmariANRA21.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.\n \n \n \n \n\n\n \n Nouh, M.; Nurse, J. R. C.; and Goldsmith, M.\n\n\n \n\n\n\n CoRR, abs/1905.08067. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1905-08067,\n  author       = {Mariam Nouh and\n                  Jason R. C. Nurse and\n                  Michael Goldsmith},\n  title        = {Understanding the Radical Mind: Identifying Signals to Detect Extremist\n                  Content on Twitter},\n  journal      = {CoRR},\n  volume       = {abs/1905.08067},\n  year         = {2019},\n  url          = {http://arxiv.org/abs/1905.08067},\n  eprinttype    = {arXiv},\n  eprint       = {1905.08067},\n  timestamp    = {Tue, 28 May 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-08067.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cybercrime Investigators are Users Too! Understanding the Socio-Technical Challenges Faced by Law Enforcement.\n \n \n \n \n\n\n \n Nouh, M.; Nurse, J. R. C.; Webb, H.; and Goldsmith, M.\n\n\n \n\n\n\n CoRR, abs/1902.06961. 2019.\n \n\n\n\n
\n\n\n\n \n \n \"CybercrimePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1902-06961,\n  author       = {Mariam Nouh and\n                  Jason R. C. Nurse and\n                  Helena Webb and\n                  Michael Goldsmith},\n  title        = {Cybercrime Investigators are Users Too! Understanding the Socio-Technical\n                  Challenges Faced by Law Enforcement},\n  journal      = {CoRR},\n  volume       = {abs/1902.06961},\n  year         = {2019},\n  url          = {http://arxiv.org/abs/1902.06961},\n  eprinttype    = {arXiv},\n  eprint       = {1902.06961},\n  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06961.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Aspect-oriented modeling framework for security hardening.\n \n \n \n \n\n\n \n Mouheb, D.; Alhadidi, D.; Nouh, M.; Debbabi, M.; Wang, L.; and Pourzandi, M.\n\n\n \n\n\n\n Innov. Syst. Softw. Eng., 12(1): 41–67. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"Aspect-orientedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/isse/MouhebANDWP16,\n  author       = {Djedjiga Mouheb and\n                  Dima Alhadidi and\n                  Mariam Nouh and\n                  Mourad Debbabi and\n                  Lingyu Wang and\n                  Makan Pourzandi},\n  title        = {Aspect-oriented modeling framework for security hardening},\n  journal      = {Innov. Syst. Softw. Eng.},\n  volume       = {12},\n  number       = {1},\n  pages        = {41--67},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s11334-015-0263-5},\n  doi          = {10.1007/S11334-015-0263-5},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.\n \n \n \n \n\n\n \n Almaatouq, A.; Shmueli, E.; Nouh, M.; Alabdulkareem, A.; Singh, V. K.; Alsaleh, M.; Alarifi, A.; Alfaris, A.; and Pentland, A. '.\n\n\n \n\n\n\n Int. J. Inf. Sec., 15(5): 475–491. 2016.\n \n\n\n\n
\n\n\n\n \n \n \"IfPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{DBLP:journals/ijisec/AlmaatouqSNASAA16,\n  author       = {Abdullah Almaatouq and\n                  Erez Shmueli and\n                  Mariam Nouh and\n                  Ahmad Alabdulkareem and\n                  Vivek K. Singh and\n                  Mansour Alsaleh and\n                  Abdulrahman Alarifi and\n                  Anas Alfaris and\n                  Alex 'Sandy' Pentland},\n  title        = {If it looks like a spammer and behaves like a spammer, it must be\n                  a spammer: analysis and detection of microblogging spam accounts},\n  journal      = {Int. J. Inf. Sec.},\n  volume       = {15},\n  number       = {5},\n  pages        = {475--491},\n  year         = {2016},\n  url          = {https://doi.org/10.1007/s10207-016-0321-5},\n  doi          = {10.1007/S10207-016-0321-5},\n  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/journals/ijisec/AlmaatouqSNASAA16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n book\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Aspect-Oriented Security Hardening of UML Design Models.\n \n \n \n \n\n\n \n Mouheb, D.; Debbabi, M.; Pourzandi, M.; Wang, L.; Nouh, M.; Ziarati, R.; Alhadidi, D.; Talhi, C.; and Lima, V.\n\n\n \n\n\n\n Springer, 2015.\n \n\n\n\n
\n\n\n\n \n \n \"Aspect-OrientedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@book{DBLP:books/sp/MouhebDPWNZATL15,\n  author       = {Djedjiga Mouheb and\n                  Mourad Debbabi and\n                  Makan Pourzandi and\n                  Lingyu Wang and\n                  Mariam Nouh and\n                  Raha Ziarati and\n                  Dima Alhadidi and\n                  Chamseddine Talhi and\n                  Vitor Lima},\n  title        = {Aspect-Oriented Security Hardening of {UML} Design Models},\n  publisher    = {Springer},\n  year         = {2015},\n  url          = {https://doi.org/10.1007/978-3-319-16106-8},\n  doi          = {10.1007/978-3-319-16106-8},\n  isbn         = {978-3-319-16105-1},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n inproceedings\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter.\n \n \n \n \n\n\n \n Nouh, M.; Nurse, J. R. C.; and Goldsmith, M.\n\n\n \n\n\n\n In 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, Shenzhen, China, July 1-3, 2019, pages 98–103, 2019. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/isi/NouhNG19,\n  author       = {Mariam Nouh and\n                  Jason R. C. Nurse and\n                  Michael Goldsmith},\n  title        = {Understanding the Radical Mind: Identifying Signals to Detect Extremist\n                  Content on Twitter},\n  booktitle    = {2019 {IEEE} International Conference on Intelligence and Security\n                  Informatics, {ISI} 2019, Shenzhen, China, July 1-3, 2019},\n  pages        = {98--103},\n  publisher    = {{IEEE}},\n  year         = {2019},\n  url          = {https://doi.org/10.1109/ISI.2019.8823548},\n  doi          = {10.1109/ISI.2019.8823548},\n  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},\n  biburl       = {https://dblp.org/rec/conf/isi/NouhNG19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Designing a Multipurpose Cybercrime Intelligence Framework.\n \n \n \n \n\n\n \n Nouh, M.; Nurse, J. R. C.; and Goldsmith, M.\n\n\n \n\n\n\n In Brynielsson, J.; and Johansson, F., editor(s), 2016 European Intelligence and Security Informatics Conference, EISIC 2016, Uppsala, Sweden, August 17-19, 2016, pages 60–67, 2016. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/eisic/NouhNG16,\n  author       = {Mariam Nouh and\n                  Jason R. C. Nurse and\n                  Michael Goldsmith},\n  editor       = {Joel Brynielsson and\n                  Fredrik Johansson},\n  title        = {Towards Designing a Multipurpose Cybercrime Intelligence Framework},\n  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}\n                  2016, Uppsala, Sweden, August 17-19, 2016},\n  pages        = {60--67},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2016},\n  url          = {https://doi.org/10.1109/EISIC.2016.018},\n  doi          = {10.1109/EISIC.2016.018},\n  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/eisic/NouhNG16.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Identifying Key-Players in Online Activist Groups on the Facebook Social Network.\n \n \n \n \n\n\n \n Nouh, M.; and Nurse, J. R. C.\n\n\n \n\n\n\n In IEEE International Conference on Data Mining Workshop, ICDMW 2015, Atlantic City, NJ, USA, November 14-17, 2015, pages 969–978, 2015. IEEE Computer Society\n \n\n\n\n
\n\n\n\n \n \n \"IdentifyingPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icdm/NouhN15,\n  author       = {Mariam Nouh and\n                  Jason R. C. Nurse},\n  title        = {Identifying Key-Players in Online Activist Groups on the Facebook\n                  Social Network},\n  booktitle    = {{IEEE} International Conference on Data Mining Workshop, {ICDMW} 2015,\n                  Atlantic City, NJ, USA, November 14-17, 2015},\n  pages        = {969--978},\n  publisher    = {{IEEE} Computer Society},\n  year         = {2015},\n  url          = {https://doi.org/10.1109/ICDMW.2015.88},\n  doi          = {10.1109/ICDMW.2015.88},\n  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},\n  biburl       = {https://dblp.org/rec/conf/icdm/NouhN15.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Twitter: who gets caught? observed trends in social micro-blogging spam.\n \n \n \n \n\n\n \n Almaatouq, A.; Alabdulkareem, A.; Nouh, M.; Shmueli, E.; Alsaleh, M.; Singh, V. K.; Alarifi, A.; Alfaris, A.; and Pentland, A.\n\n\n \n\n\n\n In Menczer, F.; Hendler, J.; Dutton, W. H.; Strohmaier, M.; Cattuto, C.; and Meyer, E. T., editor(s), ACM Web Science Conference, WebSci '14, Bloomington, IN, USA, June 23-26, 2014, pages 33–41, 2014. ACM\n \n\n\n\n
\n\n\n\n \n \n \"Twitter:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/websci/AlmaatouqANSASAAP14,\n  author       = {Abdullah Almaatouq and\n                  Ahmad Alabdulkareem and\n                  Mariam Nouh and\n                  Erez Shmueli and\n                  Mansour Alsaleh and\n                  Vivek K. Singh and\n                  Abdulrahman Alarifi and\n                  Anas Alfaris and\n                  Alex Pentland},\n  editor       = {Filippo Menczer and\n                  Jim Hendler and\n                  William H. Dutton and\n                  Markus Strohmaier and\n                  Ciro Cattuto and\n                  Eric T. Meyer},\n  title        = {Twitter: who gets caught? observed trends in social micro-blogging\n                  spam},\n  booktitle    = {{ACM} Web Science Conference, WebSci '14, Bloomington, IN, USA, June\n                  23-26, 2014},\n  pages        = {33--41},\n  publisher    = {{ACM}},\n  year         = {2014},\n  url          = {https://doi.org/10.1145/2615569.2615688},\n  doi          = {10.1145/2615569.2615688},\n  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/websci/AlmaatouqANSASAAP14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.\n \n \n \n \n\n\n \n Nouh, M.; Almaatouq, A.; Alabdulkareem, A.; Singh, V. K.; Shmueli, E.; Alsaleh, M.; Alarifi, A.; Alfaris, A.; and Pentland, A.\n\n\n \n\n\n\n In Tryfonas, T.; and Askoxylakis, I. G., editor(s), Human Aspects of Information Security, Privacy, and Trust - Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings, volume 8533, of Lecture Notes in Computer Science, pages 352–360, 2014. Springer\n \n\n\n\n
\n\n\n\n \n \n \"SocialPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hci/NouhAASSAAAP14,\n  author       = {Mariam Nouh and\n                  Abdullah Almaatouq and\n                  Ahmad Alabdulkareem and\n                  Vivek K. Singh and\n                  Erez Shmueli and\n                  Mansour Alsaleh and\n                  Abdulrahman Alarifi and\n                  Anas Alfaris and\n                  Alex Pentland},\n  editor       = {Theo Tryfonas and\n                  Ioannis G. Askoxylakis},\n  title        = {Social Information Leakage: Effects of Awareness and Peer Pressure\n                  on User Behavior},\n  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Second\n                  International Conference, {HAS} 2014, Held as Part of {HCI} International\n                  2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8533},\n  pages        = {352--360},\n  publisher    = {Springer},\n  year         = {2014},\n  url          = {https://doi.org/10.1007/978-3-319-07620-1\\_31},\n  doi          = {10.1007/978-3-319-07620-1\\_31},\n  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/hci/NouhAASSAAAP14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A malicious activity detection system utilizing predictive modeling in complex environments.\n \n \n \n \n\n\n \n Almaatouq, A.; Alabdulkareem, A.; Nouh, M.; Alsaleh, M.; Alarifi, A.; Sanchez, A.; Alfaris, A.; and Williams, J. R.\n\n\n \n\n\n\n In 11th IEEE Consumer Communications and Networking Conference, CCNC 2014, Las Vegas, NV, USA, January 10-13, 2014, pages 371–379, 2014. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ccnc/AlmaatouqANAASAW14,\n  author       = {Abdullah Almaatouq and\n                  Ahmad Alabdulkareem and\n                  Mariam Nouh and\n                  Mansour Alsaleh and\n                  Abdulrahman Alarifi and\n                  Abel Sanchez and\n                  Anas Alfaris and\n                  John R. Williams},\n  title        = {A malicious activity detection system utilizing predictive modeling\n                  in complex environments},\n  booktitle    = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC}\n                  2014, Las Vegas, NV, USA, January 10-13, 2014},\n  pages        = {371--379},\n  publisher    = {{IEEE}},\n  year         = {2014},\n  url          = {https://doi.org/10.1109/CCNC.2014.6866597},\n  doi          = {10.1109/CCNC.2014.6866597},\n  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/ccnc/AlmaatouqANAASAW14.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Cloud-Based Decision Support Platform for Group Decision Making.\n \n \n \n \n\n\n \n Nouh, M.; Hadhrawi, M. K.; Sanchez, A.; and Alfaris, A.\n\n\n \n\n\n\n In IEEE International Conference on Systems, Man, and Cybernetics, Manchester, SMC 2013, United Kingdom, October 13-16, 2013, pages 50–55, 2013. IEEE\n \n\n\n\n
\n\n\n\n \n \n \"TowardsPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/smc/NouhHSA13,\n  author       = {Mariam Nouh and\n                  Mohammad K. Hadhrawi and\n                  Abel Sanchez and\n                  Anas Alfaris},\n  title        = {Towards Cloud-Based Decision Support Platform for Group Decision Making},\n  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,\n                  Manchester, {SMC} 2013, United Kingdom, October 13-16, 2013},\n  pages        = {50--55},\n  publisher    = {{IEEE}},\n  year         = {2013},\n  url          = {https://doi.org/10.1109/SMC.2013.16},\n  doi          = {10.1109/SMC.2013.16},\n  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},\n  biburl       = {https://dblp.org/rec/conf/smc/NouhHSA13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CoPI: A Web-Based Collaborative Planning Interface Platform.\n \n \n \n \n\n\n \n Hadhrawi, M. K.; Nouh, M.; Alfaris, A.; and Sanchez, A.\n\n\n \n\n\n\n In Yamamoto, S., editor(s), Human Interface and the Management of Information. Information and Interaction for Learning, Culture, Collaboration and Business, - 15th International Conference, HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013, Proceedings, Part III, volume 8018, of Lecture Notes in Computer Science, pages 287–296, 2013. Springer\n \n\n\n\n
\n\n\n\n \n \n \"CoPI:Paper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/hci/HadhrawiNAS13,\n  author       = {Mohammad K. Hadhrawi and\n                  Mariam Nouh and\n                  Anas Alfaris and\n                  Abel Sanchez},\n  editor       = {Sakae Yamamoto},\n  title        = {CoPI: {A} Web-Based Collaborative Planning Interface Platform},\n  booktitle    = {Human Interface and the Management of Information. Information and\n                  Interaction for Learning, Culture, Collaboration and Business, - 15th\n                  International Conference, {HCI} International 2013, Las Vegas, NV,\n                  USA, July 21-26, 2013, Proceedings, Part {III}},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {8018},\n  pages        = {287--296},\n  publisher    = {Springer},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/978-3-642-39226-9\\_32},\n  doi          = {10.1007/978-3-642-39226-9\\_32},\n  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},\n  biburl       = {https://dblp.org/rec/conf/hci/HadhrawiNAS13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Web-Based Decision Support Platform for Multidimensional Modeling of Complex Engineering Systems.\n \n \n \n \n\n\n \n Nouh, M.; Alabdulkareem, A.; Gowharji, W.; Alfaris, A.; and Sanchez, A.\n\n\n \n\n\n\n In Dargam, F. C. C.; Hernández, J. E.; Zaraté, P.; Liu, S.; Ribeiro, R. A.; Delibasic, B.; and Papathanasiou, J., editor(s), Decision Support Systems III - Impact of Decision Support Systems for Global Environments - Euro Working Group Workshops, EWG-DSS 2013 Thessaloniki, Greece, May 29-31, 2013 and Rome, Italy, July 1-4, 2013 Revised Selected and Extended Papers, volume 184, of Lecture Notes in Business Information Processing, pages 45–56, 2013. Springer\n \n\n\n\n
\n\n\n\n \n \n \"APaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/ewgdss/NouhAGAS13,\n  author       = {Mariam Nouh and\n                  Ahmad Alabdulkareem and\n                  Waleed Gowharji and\n                  Anas Alfaris and\n                  Abel Sanchez},\n  editor       = {F{\\'{a}}tima C. C. Dargam and\n                  Jorge E. Hern{\\'{a}}ndez and\n                  Pascale Zarat{\\'{e}} and\n                  Shaofeng Liu and\n                  Rita Almeida Ribeiro and\n                  Boris Delibasic and\n                  Jason Papathanasiou},\n  title        = {A Web-Based Decision Support Platform for Multidimensional Modeling\n                  of Complex Engineering Systems},\n  booktitle    = {Decision Support Systems {III} - Impact of Decision Support Systems\n                  for Global Environments - Euro Working Group Workshops, {EWG-DSS}\n                  2013 Thessaloniki, Greece, May 29-31, 2013 and Rome, Italy, July 1-4,\n                  2013 Revised Selected and Extended Papers},\n  series       = {Lecture Notes in Business Information Processing},\n  volume       = {184},\n  pages        = {45--56},\n  publisher    = {Springer},\n  year         = {2013},\n  url          = {https://doi.org/10.1007/978-3-319-11364-7\\_5},\n  doi          = {10.1007/978-3-319-11364-7\\_5},\n  timestamp    = {Wed, 20 Sep 2023 13:32:42 +0200},\n  biburl       = {https://dblp.org/rec/conf/ewgdss/NouhAGAS13.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.\n \n \n \n \n\n\n \n Mouheb, D.; Talhi, C.; Nouh, M.; Lima, V.; Debbabi, M.; Wang, L.; and Pourzandi, M.\n\n\n \n\n\n\n In Lee, R. Y.; Ormandjieva, O.; Abran, A.; and Constantinides, C., editor(s), Software Engineering Research, Management and Applications 2010 [selected papers from the 8th ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2010, Montreal, Canada, May 24-26, 2010], volume 296, of Studies in Computational Intelligence, pages 197–213, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"Aspect-OrientedPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10,\n  author       = {Djedjiga Mouheb and\n                  Chamseddine Talhi and\n                  Mariam Nouh and\n                  Vitor Lima and\n                  Mourad Debbabi and\n                  Lingyu Wang and\n                  Makan Pourzandi},\n  editor       = {Roger Y. Lee and\n                  Olga Ormandjieva and\n                  Alain Abran and\n                  Constantinos Constantinides},\n  title        = {Aspect-Oriented Modeling for Representing and Integrating Security\n                  Concerns in {UML}},\n  booktitle    = {Software Engineering Research, Management and Applications 2010 [selected\n                  papers from the 8th {ACIS} International Conference on Software Engineering\n                  Research, Management and Applications, {SERA} 2010, Montreal, Canada,\n                  May 24-26, 2010]},\n  series       = {Studies in Computational Intelligence},\n  volume       = {296},\n  pages        = {197--213},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-13273-5\\_13},\n  doi          = {10.1007/978-3-642-13273-5\\_13},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.\n \n \n \n \n\n\n \n Mouheb, D.; Alhadidi, D.; Nouh, M.; Debbabi, M.; Wang, L.; and Pourzandi, M.\n\n\n \n\n\n\n In Barbosa, L. S.; and Lumpe, M., editor(s), Formal Aspects of Component Software - 7th International Workshop, FACS 2010, Guimarães, Portugal, October 14-16, 2010, Revised Selected Papers, volume 6921, of Lecture Notes in Computer Science, pages 182–199, 2010. Springer\n \n\n\n\n
\n\n\n\n \n \n \"AspectPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/facs2/MouhebANDWP10,\n  author       = {Djedjiga Mouheb and\n                  Dima Alhadidi and\n                  Mariam Nouh and\n                  Mourad Debbabi and\n                  Lingyu Wang and\n                  Makan Pourzandi},\n  editor       = {Lu{\\'{\\i}}s Soares Barbosa and\n                  Markus Lumpe},\n  title        = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic\n                  Framework},\n  booktitle    = {Formal Aspects of Component Software - 7th International Workshop,\n                  {FACS} 2010, Guimar{\\~{a}}es, Portugal, October 14-16, 2010, Revised\n                  Selected Papers},\n  series       = {Lecture Notes in Computer Science},\n  volume       = {6921},\n  pages        = {182--199},\n  publisher    = {Springer},\n  year         = {2010},\n  url          = {https://doi.org/10.1007/978-3-642-27269-1\\_11},\n  doi          = {10.1007/978-3-642-27269-1\\_11},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Aspect weaver: a model transformation approach for UML models.\n \n \n \n \n\n\n \n Nouh, M.; Ziarati, R.; Mouheb, D.; Alhadidi, D.; Debbabi, M.; Wang, L.; and Pourzandi, M.\n\n\n \n\n\n\n In Ng, J. W.; Couturier, C.; Müller, H. A.; Ryman, A. G.; and Kark, A. W., editor(s), Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada, pages 139–153, 2010. ACM\n \n\n\n\n
\n\n\n\n \n \n \"AspectPaper\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/cascon/NouhZMADWP10,\n  author       = {Mariam Nouh and\n                  Raha Ziarati and\n                  Djedjiga Mouheb and\n                  Dima Alhadidi and\n                  Mourad Debbabi and\n                  Lingyu Wang and\n                  Makan Pourzandi},\n  editor       = {Joanna W. Ng and\n                  Christian Couturier and\n                  Hausi A. M{\\"{u}}ller and\n                  Arthur G. Ryman and\n                  Anatol W. Kark},\n  title        = {Aspect weaver: a model transformation approach for {UML} models},\n  booktitle    = {Proceedings of the 2010 conference of the Centre for Advanced Studies\n                  on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada},\n  pages        = {139--153},\n  publisher    = {{ACM}},\n  year         = {2010},\n  url          = {https://doi.org/10.1145/1923947.1923962},\n  doi          = {10.1145/1923947.1923962},\n  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n phdthesis\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n On combating online radicalisation: a framework for cybercrime investigations.\n \n \n \n \n\n\n \n Nouh, M.\n\n\n \n\n\n\n Ph.D. Thesis, University of Oxford, UK, 2019.\n \n\n\n\n
\n\n\n\n \n \n \"OnPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@phdthesis{DBLP:phd/ethos/Nouh19,\n  author       = {Mariam Nouh},\n  title        = {On combating online radicalisation: a framework for cybercrime investigations},\n  school       = {University of Oxford, {UK}},\n  year         = {2019},\n  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.816556},\n  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},\n  biburl       = {https://dblp.org/rec/phd/ethos/Nouh19.bib},\n  bibsource    = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);