Projects per year
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
Quality of e-services in Oman: A perspective of service providers and service users
Project: HM Grants ( Strategic)
-
Increasing the Role of Women in Innovation and Entrepreneurship: Encouraging Women in Developing Countries to Use the Intellectual Property System
1/1/20 → 12/31/20
Project: Internal Grants (IG)
-
-
Performance analysis of zigbee-based iot prototype for remote monitoring in power grid systems
Ali, S., Rehman, O., Cha, K., Al Balushi, T. & Nadir, Z., Sept 17 2020, Proceedings of the 9th International Conference on Smart Media and Applications, SMA 2020. Association for Computing Machinery, p. 384-389 6 p. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Theoretical approach for instrument development in measuring user-perceived e-government service quality: A case of Oman e-government services
Al Balushi, T. & Ali, S., Jan 1 2020, In: International Journal of Electronic Government Research. 16, 1, p. 40-58 19 p.Research output: Contribution to journal › Article › peer-review
6 Citations (Scopus) -
Cyber-physical systems security
Ali, S., Al Balushi, T., Nadir, Z. & Hussain, O. K., 2018, Studies in Computational Intelligence. Springer Verlag, p. 1-10 10 p. (Studies in Computational Intelligence; vol. 768).Research output: Chapter in Book/Report/Conference proceeding › Chapter
3 Citations (Scopus) -
Distributed control systems security for CPS
Ali, S., Al Balushi, T., Nadir, Z. & Hussain, O. K., 2018, Studies in Computational Intelligence. Springer Verlag, p. 141-160 20 p. (Studies in Computational Intelligence; vol. 768).Research output: Chapter in Book/Report/Conference proceeding › Chapter
9 Citations (Scopus) -
Economics of cyber security and the way forward
Al Balushi, T., Ali, S. & Rehman, O., May 4 2018, Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 132-150 19 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter