1) Arwa Najjar, Belal Amro, Mario, Macedo “The Adoption Level of Electronic Medical Records in Hebron Hospitals based on the Electronic Medical Record Adoption Model (EMRAM)”, Health policy and technology , 2021
2) Arwa Najjar, Belal Amro, Mario, Macedo, “An Intelligent Decision Support System For Recruitment: Resumes Screening And Applicants Ranking” , Informatica , 2021
3) Belal Amro, Zaid Abu Znaid , User Centric Android Application Permission Manager , AL-Rafidain Journal of Computer Sciences and Mathematics, University of Mosul, Iraq, accepted and will be published in December 2021.
4) بلال عمرو ، " واقع و دوافع الالتزام بسياسات أمن المعلومات في مؤسسات التعليم العالي الفلسطينية – دراسة حالة : جامعة الخليل " – مجلة دراسات – الجامعة الأردنية ، تم قبول البحث
5) مهند الجعبري ، بلال عمرو : " فاعلية برامج التوعية التقنية والقانونية في مواجهة الجريمة الالكترونية من وجهة نظر طلبة جامعة الخليل – فلسطين " ، مجلة جامعة الخليل للبحوث – تم قبول البحث
6) Amro, Belal; Abu Sabha, Ahmed; Qunaibi, Ammar; Najjar, Ibraheem “ PAPG- Personalized Antiphisihng Guard “ , International Journal of computing and network technology. Vol 7, Issue 1 . 2019
7) B. M. Amro, M. O. Al-Jabari, H. M. Jabareen, Y. S. Khader and A. Taweel, "Design and Development of Case Studies in Security and Privacy for Health Informatics Education," 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, 2018, pp. 1-6. doi: 10.1109/AICCSA.2018.8612876
8) M. O. Al-Jabari, B. M. Amro, H. M. Jabareen, Y. S. Khader and A. Taweel, "Development of a Case Study-Based Approach for Effective Understanding and use of EHRs in Undergraduate Multidisciplinary Education," 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, 2018, pp. 1-6. doi: 10.1109/AICCSA.2018.8612823
9) Belal Amro, Malware Detection Techniques for Mobile Devices, International Journal of Mobile Network Communications & Telematics ( IJMNCT), December 2017.
10) Belal Amro, Cybercrime as a Matter of the Art in Palestine and its Effect on Individuals” , International Journal of Wireless and Microwave Technologies(IJWMT), to appear in Vol 8, No 5, Sep 2019.
11) Belal Amro Protecting Privacy in VANETs Using Mix Zones with Virtual Pseudonym Change, The International Journal of Network Security & Its Applications (IJNSA), January 2018.
12) Belal Amro, Albert Levi, and Yucel Saygin , Flexible Fair and Collusion Resistant Pseudonym Providing System, International Arab Journal of Information Technology IAJIT, 2019
13) Belal Amro, Phishing techniques in mobile devices, Journal of Computer and Communications (JCC), February 2018.
14) Belal Amro, Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user’s preferences to appear in IJCSNS International Journal of Computer Science and Network Security February 2018.
15) Belal Amro, "Mobile Agent Systems, Recent Security Threats and Counter Measures". International Journal of Computer Science Issues (IJCSI); Mar2014, Vol. 11 Issue 2, p146
16) Belal Amro,Yücel Saygin, Albert Levi Enhancing Privacy in Collaborative Traffic Monitoring systems Using Autonomous Location Update. IET Intelligent Transport Systems, accepted, 2013
17) Amro, Belal Mohammed and Saygın, Yücel and Levi, Albert, ” PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism “, 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL ‘11), New York, USA: ACM (Association for Computing Machinery), November 2011, 1-8
18) Amro, Belal Mohammed and Levi, Albert and Saygın, Yücel, ” CoRPPS: collusion resistant pseudonym providing system “, 2011 IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT 2011), USA: IEEE Computer Society, October 2011, 1056-1063.
19) Amro, Belal Mohammed and Levi, Albert and Saygın, Yücel, “Flexible Fair and Collusion Resistant Pseudonym Providing System”, International Arab Journal of Information Technology (IAJIT) , Vol 16 No 1, Jan 2019.
20) Amro, Belal Mohammed and Saygın, Yücel and Levi, Albert, ” P2-CTM: privacy preserving collaborative traffic monitoring “, 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL ‘10), New York, NY, USA : ACM (Association for Computing Machinery), November 2010, 55-59
|