Mohamed Sarrab

According to our database1, Mohamed Sarrab authored at least 28 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Examining the roles of students' beliefs and security concerns for using smartwatches in higher education.
J. Enterp. Inf. Manag., 2021

User Privacy and Data Flow Control for Android Apps: Systematic Literature Review.
J. Cyber Secur. Mobil., 2021

Assisted-Fog-Based Framework for IoT-Based Healthcare Data Preservation.
Int. J. Cloud Appl. Comput., 2021

Privacy Preservation Instruments Influencing the Trustworthiness of e-Government Services.
Comput., 2021

CUPA: A Configurable User Privacy Approach For Android Mobile Application.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Prioritising mobile learning application requirements.
Int. J. Bus. Inf. Syst., 2019

Preserving Privacy of Integrated E-Government Information: Architecture Approach.
Proceedings of the 2nd IEEE Middle East and North Africa COMMunications Conference, 2019

Real-Time Traffic Monitoring Systems Based on Magnetic Sensor Integration.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Critical Aspects Pertaining to Privacy Preservation of IoT Architecture.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Neural network approach to predict mobile learning acceptance.
Educ. Inf. Technol., 2018

Development and validation of Mobile Learning Acceptance Measure.
Interact. Learn. Environ., 2017

Proposing a new requirements engineering framework for m-learning applications.
Int. J. Mob. Learn. Organisation, 2017

Mobile learning key influencing factors adoption based on analytic hierarchy process.
Int. J. Inf. Decis. Sci., 2017

Human Factors Considerations in Mobile Learning Management Systems.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

Proposing New Mobile Learning (M-Learning) Adoption Model for Higher Education Providers.
Proceedings of the Interactive Mobile Communication Technologies and Learning - Proceedings of the 11th IMCL Conference, 30 November, 2017

A study on the usage of unsafe functions in gcc compared to mobile software systems.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017

A model for mobile learning non-functional requirement elicitation.
Int. J. Mob. Learn. Organisation, 2016

Towards a quality model of technical aspects for mobile learning services: An empirical investigation.
Comput. Hum. Behav., 2016

Mobile Learning (M-Learning) adoption in the Middle East: Lessons learned from the educationally advanced countries.
Telematics Informatics, 2015

Empirical study on mobile platforms selection, based on system, information and service quality characteristics.
Int. J. Wirel. Mob. Comput., 2015

Bytecode instrumentation mechanism for monitoring mobile application information flow.
Int. J. Secur. Networks, 2015

An empirical study on cloud computing requirements for better mobile learning services.
Int. J. Mob. Learn. Organisation, 2015

Cybercrime Investigation Challenges: Middle East and North Africa.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

From traditional learning into mobile learning in education at the university level: undergraduate students perspective.
Int. J. Mob. Learn. Organisation, 2014

Empirical study of open source software selection for adoption, based on software quality characteristics.
Adv. Eng. Softw., 2014

Mobile cloud computing: advantage, disadvantage and open challenge.
Proceedings of the 7th Euro American Conference on Telematics and Information Systems, 2014

Runtime verification using policy-based approach to control information flow.
Int. J. Secur. Networks, 2013

Controlling Data Dissemination.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011