Walid Al-Ahmad

According to our database1, Walid Al-Ahmad authored at least 11 papers between 1998 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
A code of practice for effective information security risk management using COBIT 5.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

2013
Towards a unified model for successful implementation of outsourcing and reversibility of information systems.
J. King Saud Univ. Comput. Inf. Sci., 2013

2012
Knowledge of IT Project Success and Failure Factors: Towards an Integration into the SDLC.
Int. J. Inf. Technol. Proj. Manag., 2012

2011
Building Secure Software Using XP.
Int. J. Secur. Softw. Eng., 2011

2008
An extended security framework for e-government.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2006
A framework for conceptual modeling in OOP.
J. Frankl. Inst., 2006

2004
A New Approach to Component-Oriented Programming.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

2001
On the Interaction of Programming by Contract and Liskov Substitution Principle.
Proceedings of the 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 2001

1999
Improving Support for Specialization Inheritance.
J. Object Oriented Program., 1999

Modeling and Reuse Perspectives of Inheritance Can be Reconciled.
Proceedings of the TOOLS 1999: 31st International Conference on Technology of Object-Oriented Languages and Systems, 1999

1998
Sepcialization of Behavior: Comparison, Critique, and a New Approach.
J. Object Oriented Program., 1998


  Loading...