Continuous authentication using biometric keystroke dynamics P Bours, H Barghouthi The Norwegian Information Security Conference (NISK) 2009, 2009 | 71 | 2009 |
Keystroke Dynamics. How typing characteristics differ from one application to another H Barghouthi | 17 | 2009 |
The use of blockchain technology and OCR in e-government for document management: Inbound invoice management as an example F Azzam, M Jaber, A Saies, T Kirresh, R Awadallah, A Karakra, ... Applied Sciences 13 (14), 8463, 2023 | 9 | 2023 |
Digital twin in healthcare: Security threat meta-model A Karakra, F Fontanili, A Taweel, E Lamine, J Lamothe, H Barghouthi 2022 IEEE/ACS 19th International Conference on Computer Systems and …, 2022 | 4 | 2022 |
Keystroke Dynamics H Barghouthi How typing characteristics differ from one application to another, 2009 | 2 | 2009 |
Policy Peek: Privacy Policy Automatic Analysis Tool M Alghoul, M Moutan, N Kastro, A Karakra, H Barghouthi, M Njoum, ... 2024 International Conference on Electrical, Computer and Energy …, 2024 | | 2024 |
Adapting the Software Development Life Cycle for Digital Twin Development in Healthcare M Jaber, A Karakra, R Awadallah, H Barghouthi, A Taweel 2023 20th ACS/IEEE International Conference on Computer Systems and …, 2023 | | 2023 |