Sign in
Mathew Nicho
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 14
Top Topics
Information Security
Forensic Analysis
Image Spam
Buffer Overflow
Top Venues
Int. J. Heal. Inf. Syst. Informatics
CSNet
Int. J. Digit. Crime Forensics
SoftCOM
</>
Publications
</>
Hussein Fakhry
,
Mathew Nicho
,
Emad Bataineh
,
Shini Girja
The Evaluation of Internship in the Digital Information Age: A Case Study.
Int. J. Online Pedagog. Course Des.
14 (1) (2024)
Mathew Nicho
,
Maha Alblooki
,
Saeed AlMutiwei
,
Christopher D. McDermott
,
Olufemi Ilesanmi
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Mathew Nicho
,
Ibrahim Sabry
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device.
ICISSP
(2023)
Mathew Nicho
,
Shini Girija
Evaluating Machine Learning Methods for Intrusion Detection in IoT.
ICICM
(2022)
Mathew Nicho
,
Farzan Majdani
,
Christopher D. McDermott
Replacing Human Input in Spam Email Detection Using Deep Learning.
HCI (35)
(2022)
Mathew Nicho
,
Shini Girija
Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats.
HSI
(2022)
Mathew Nicho
,
Maitha Alkhateri
Modeling Evasive Malware Authoring Techniques.
CSNet
(2021)
Suadad Muammar
,
Mathew Nicho
IT Governance Practices in the Gulf Cooperation Council Region.
Int. J. Inf. Technol. Proj. Manag.
10 (4) (2019)
Mathew Nicho
,
Christopher D. McDermott
Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats.
SoftCOM
(2019)
Mathew Nicho
,
Adelaiye Oluwasegun
,
Faouzi Kamoun
Identifying Vulnerabilities in APT Attacks: A Simulated Approach.
NTMS
(2018)
Mathew Nicho
,
Shafaq Naheed Khan
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane.
MIPRO
(2018)
Mathew Nicho
A process model for implementing information systems security governance.
Inf. Comput. Secur.
26 (1) (2018)
Vasileios Mavroeidis
,
Mathew Nicho
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks.
MMM-ACNS
(2017)
Mathew Nicho
,
Shafaq Khan
,
M. S. M. K. Rahman
Managing Information Security Risk Using Integrated Governance Risk and Compliance.
ICCA
(2017)
Mathew Nicho
,
Shafaq Khan
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective.
Int. J. Inf. Secur. Priv.
8 (1) (2014)
Faouzi Kamoun
,
Mathew Nicho
Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention.
Int. J. Heal. Inf. Syst. Informatics
9 (1) (2014)
Mathew Nicho
,
Faouzi Kamoun
Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems.
Commun. Assoc. Inf. Syst.
35 (2014)
Mathew Nicho
An Optimized Dynamic Process Model of IS Security Governance Implementation.
CONF-IRM
(2012)
Mathew Nicho
,
Hussein Fakhry
,
Charles Haiber
An Integrated Security Governance Framework for Effective PCI DSS Implementation.
Int. J. Inf. Secur. Priv.
5 (3) (2011)
Mathew Nicho
,
Brian Cusack
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit.
HICSS
(2007)