Shawon Rahman

Orcid: 0000-0001-6763-6714

According to our database1, Shawon Rahman authored at least 17 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Review of Security Threats and Attacks on IoT-based New Age Ecosystems.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

2021
Identifying Protection Motivation Theory Factors that Influence Smartphone Security Measures.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2019
Exploring Challenges and Opportunities in Cybersecurity Risk and Threat Communications Related To The Medical Internet Of Things (MIoT).
CoRR, 2019

An Empirical Examination of the Effects of IT Leadership on Information Security Risk Management in USA Organizations.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

Secured Cloud for Enterprise Computing.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

Choosing the Best-fit Lifecycle Framework while Addressing Functionality and Security Issues.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

2018
Evaluating the Risk Management Plan and Addressing Factors for Successes in Government Agencies.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2015
Advances in Multimedia Sensor Networks for Health-Care and Related Applications.
Int. J. Distributed Sens. Networks, 2015

Complete Network Security Protection for SME's within Limited Resources.
CoRR, 2015

Non-profit Organizations' Need to Address Security for Effective Government Contacting.
CoRR, 2015

Exploring Historical and Emerging Phishing Techniques and Mitigating the Associated Security Risks.
CoRR, 2015

Video Surveillance in the Cloud?
CoRR, 2015

Cloud Computing Avoids Downfall of Application Service Providers.
CoRR, 2015

Healthcare IT: Is your Information at Risk?
CoRR, 2015

Enhancing Infrastructure Security in Real Estate.
CoRR, 2015

Incident Response Plan for a Small to Medium Sized Hospital.
CoRR, 2015

Security Risks in Mechanical Engineering Industries.
CoRR, 2015


  Loading...