​
Login / Signup
Mathew Nicho
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 19
Top Topics
Case Study
Rough Sets
Quick Response
Buffer Overflow
Top Venues
Int. J. Inf. Secur. Priv.
Int. J. Heal. Inf. Syst. Informatics
CSNet
Int. J. Digit. Crime Forensics
</>
Publications
</>
Hussein Fakhry
,
Mathew Nicho
,
Emad Bataineh
,
Shini Girja
The Evaluation of Internship in the Digital Information Age: A Case Study.
Int. J. Online Pedagog. Course Des.
14 (1) (2024)
Mathew Nicho
,
Hussein Fakhry
,
Emad Bataineh
,
Shini Girija
A Strategic Evaluation of Educational Continuity for Accessibility During Uncertainty in an Educational Practicum.
Int. J. Inf. Commun. Technol. Educ.
20 (1) (2024)
Tarek Gaber
,
Mathew Nicho
,
Esraa Ahmed
,
Ahmed Hamed
Robust thermal face recognition for law enforcement using optimized deep features with new rough sets-based optimizer.
J. Inf. Secur. Appl.
85 (2024)
Mathew Nicho
,
Tarannum Parkar
,
Shini Girija
Evaluating Onsite and Online Internship Mode Using Consumptive Metrics.
Int. J. Web Based Learn. Teach. Technol.
18 (1) (2023)
Mathew Nicho
,
Christopher D. McDermott
,
Hussein Fakhry
,
Shini Girija
A System Dynamics Approach to Evaluate Advanced Persistent Threat Vectors.
Int. J. Inf. Secur. Priv.
17 (1) (2023)
Mathew Nicho
,
Maha Alblooki
,
Saeed AlMutiwei
,
Christopher D. McDermott
,
Olufemi Ilesanmi
A Crime Scene Reconstruction for Digital Forensic Analysis: An SUV Case Study.
Int. J. Digit. Crime Forensics
15 (1) (2023)
Mathew Nicho
,
Ibrahim Sabry
Bypassing Multiple Security Layers Using Malicious USB Human Interface Device.
ICISSP
(2023)
Mathew Nicho
,
Shini Girija
Evaluating Machine Learning Methods for Intrusion Detection in IoT.
ICICM
(2022)
Mathew Nicho
,
Farzan Majdani
,
Christopher D. McDermott
Replacing Human Input in Spam Email Detection Using Deep Learning.
HCI (35)
(2022)
Mathew Nicho
,
Shini Girija
Systems Dynamics Modeling for Evaluating Socio-Technical Vulnerabilities in Advanced Persistent Threats.
HSI
(2022)
Mathew Nicho
,
Maitha Alkhateri
Modeling Evasive Malware Authoring Techniques.
CSNet
(2021)
Mathew Nicho
,
Emad Bataineh
,
Tarannum Parkar
Application of Consumptive Metrics to Measure Internship Alignment.
CSCI
(2021)
Suadad Muammar
,
Mathew Nicho
IT Governance Practices in the Gulf Cooperation Council Region.
Int. J. Inf. Technol. Proj. Manag.
10 (4) (2019)
Mathew Nicho
,
Christopher D. McDermott
Dimensions of 'Socio' Vulnerabilities of Advanced Persistent Threats.
SoftCOM
(2019)
Mathew Nicho
,
Adelaiye Oluwasegun
,
Faouzi Kamoun
Identifying Vulnerabilities in APT Attacks: A Simulated Approach.
NTMS
(2018)
Mathew Nicho
,
Shafaq Naheed Khan
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane.
MIPRO
(2018)
Mathew Nicho
A process model for implementing information systems security governance.
Inf. Comput. Secur.
26 (1) (2018)
Vasileios Mavroeidis
,
Mathew Nicho
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks.
MMM-ACNS
(2017)
Mathew Nicho
,
Shafaq Khan
,
M. S. M. K. Rahman
Managing Information Security Risk Using Integrated Governance Risk and Compliance.
ICCA
(2017)
Mathew Nicho
,
Shafaq Khan
Identifying Vulnerabilities of Advanced Persistent Threats: An Organizational Perspective.
Int. J. Inf. Secur. Priv.
8 (1) (2014)
Faouzi Kamoun
,
Mathew Nicho
Human and Organizational Factors of Healthcare Data Breaches: The Swiss Cheese Model of Data Breach Causation And Prevention.
Int. J. Heal. Inf. Syst. Informatics
9 (1) (2014)
Mathew Nicho
,
Faouzi Kamoun
Multiple Case Study Approach to Identify Aggravating Variables of Insider Threats in Information Systems.
Commun. Assoc. Inf. Syst.
35 (2014)
Mathew Nicho
An Optimized Dynamic Process Model of IS Security Governance Implementation.
CONF-IRM
(2012)
Mathew Nicho
,
Hussein Fakhry
,
Charles Haiber
An Integrated Security Governance Framework for Effective PCI DSS Implementation.
Int. J. Inf. Secur. Priv.
5 (3) (2011)
Mathew Nicho
,
Brian Cusack
A Metrics Generation Model for Measuring the Control Objectives of Information Systems Audit.
HICSS
(2007)