Mathew Nicho

Orcid: 0000-0001-7129-3988

According to our database1, Mathew Nicho authored at least 21 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Evaluation of Internship in the Digital Information Age: A Case Study.
Int. J. Online Pedagog. Course Des., 2024

2023
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study.
Int. J. Digit. Crime Forensics, 2023

Bypassing Multiple Security Layers Using Malicious USB Human Interface Device.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Evaluating Machine Learning Methods for Intrusion Detection in IoT.
Proceedings of the ICICM 2022: The 12th International Conference on Information Communication and Management, London, United Kingdom, July 13, 2022

Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats.
Proceedings of the 15th International Conference on Human System Interaction, 2022

Replacing Human Input in Spam Email Detection Using Deep Learning.
Proceedings of the Artificial Intelligence in HCI, 2022

2021
Modeling Evasive Malware Authoring Techniques.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

Application of Consumptive Metrics to Measure Internship Alignment.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2019
IT Governance Practices in the Gulf Cooperation Council Region.
Int. J. Inf. Technol. Proj. Manag., 2019

Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats.
Proceedings of the 2019 International Conference on Software, 2019

2018
A process model for implementing information systems security governance.
Inf. Comput. Secur., 2018

Identifying Vulnerabilities in APT Attacks: A Simulated Approach.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

A decision matrix model to identify and evaluate APT vulnerabilities at the user plane.
Proceedings of the 41st International Convention on Information and Communication Technology, 2018

2017
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks.
Proceedings of the Computer Network Security, 2017

Managing Information Security Risk Using Integrated Governance Risk and Compliance.
Proceedings of the International Conference on Computer and Applications, 2017

2014
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective.
Int. J. Inf. Secur. Priv., 2014

Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention.
Int. J. Heal. Inf. Syst. Informatics, 2014

Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems.
Commun. Assoc. Inf. Syst., 2014

2012
An Optimized Dynamic Process Model of IS Security Governance Implementation.
Proceedings of the CONF-IRM 2012, 2012

2011
An Integrated Security Governance Framework for Effective PCI DSS Implementation.
Int. J. Inf. Secur. Priv., 2011

2007
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007


  Loading...