Continuous authentication using biometric keystroke dynamics P Bours, H Barghouthi The Norwegian Information Security Conference (NISK) 2009, 2009 | 69 | 2009 |
Keystroke Dynamics. How typing characteristics differ from one application to another H Barghouthi | 16 | 2009 |
The Use of Blockchain Technology and OCR in E-Government for Document Management: Inbound Invoice Management as an Example F Azzam, M Jaber, A Saies, T Kirresh, R Awadallah, A Karakra, ... Applied Sciences 13 (14), 8463, 2023 | 4 | 2023 |
Keystroke Dynamics H Barghouthi How typing characteristics differ from one application to another, 2009 | 2 | 2009 |
Digital Twin in Healthcare: Security Threat Meta-Model A Karakra, F Fontanili, A Taweel, E Lamine, J Lamothe, H Barghouthi 2022 IEEE/ACS 19th International Conference on Computer Systems and …, 2022 | 1 | 2022 |
Adapting the Software Development Life Cycle for Digital Twin Development in Healthcare M Jaber, A Karakra, R Awadallah, H Barghouthi, A Taweel 2023 20th ACS/IEEE International Conference on Computer Systems and …, 2023 | | 2023 |