Ahmad Jbara
Ahmad Jbara
School of Computer Science, Netanya Academic College
Verified email at netanya.ac.il
Title
Cited by
Cited by
Year
Security and identification indicators for browsers against spoofing and phishing attacks
A Herzberg, A Jbara
ACM Transactions on Internet Technology (TOIT) 8 (4), 16, 2008
319*2008
How programmers read regular code: a controlled experiment using eye tracking
A Jbara, DG Feitelson
Empirical software engineering 22 (3), 1440-1477, 2017
492017
How programmers read regular code: a controlled experiment using eye tracking
A Jbara, DG Feitelson
Proceedings of the 2015 IEEE 23rd International Conference on, 244-254, 2015
492015
On the effect of code regularity on comprehension
A Jbara, DG Feitelson
Proceedings of the 22nd international conference on program comprehension …, 2014
292014
High-MCC functions in the Linux kernel
A Jbara, A Matan, DG Feitelson
Empirical Software Engineering 19 (5), 1261-1298, 2014
242014
High-MCC functions in the Linux kernel
A Jbara, A Matan, DG Feitelson
2012 IEEE 20th International Conference on Program Comprehension (ICPC), 2012
242012
OPCloud: An OPM Integrated Conceptual‐Executable Modeling Environment for Industry 4.0
D Dori, H Kohen, A Jbara, N Wengrowicz, R Lavi, NL Soskin, K Bernstein, ...
Systems Engineering in the Fourth Industrial Revolution, 243-271, 2019
172019
Model-Based Systems Engineering for Aircraft Design with Dynamic Landing Constraints Using Object-Process Methodology
L Li, NL Soskin, A Jbara, M Karpel, D Dori
IEEE Access 7, 61494-61511, 2019
152019
Protecting naive web users
A Herzberg, A Gbara
Draft of July 18, 2004, 2004
152004
Object-Process Methodology, OPM ISO 19450 – OPCloud and the Evolution of OPM Modeling Tools
D Dori, A Jbara, N Levi, N Wengrowicz
Systems Engineering Letters, Project Performance International (PPI) SyEN 61, 2018
102018
Model-based diagnosis with FTTell: Assessing the potential for pediatric failure to thrive (FTT) during the perinatal stage
N Levi-Soskin, R Shaoul, H Kohen, A Jbara, D Dori
EuroSymposium on Systems Analysis and Design, 37-47, 2019
92019
Trustbar: Protecting (even naive) web users from spoofing and phishing attacks. 2004
A Herzberg, A Gbara
Cryptology ePrint Archive: Report 2004/155 Google Scholar, 0
8
Quantification of code regularity using preprocessing and compression
A Jbara, DG Feitelson
manuscript, Jan 132, 2014
72014
Trustbar: Re-establishing trust in the web
A Herzberg, A Gbara
72006
EMIP: The eye movements in programming dataset
R Bednarik, T Busjahn, A Gibaldi, A Ahadi, M Bielikova, M Crosby, ...
Science of Computer Programming 198, 102520, 2020
52020
JCSD: Visual support for understanding code control structure
A Jbara, DG Feitelson
Proceedings of the 22Nd international conference on program comprehension …, 2014
52014
Characterization and assessment of the Linux configuration complexity
A Jbara, DG Feitelson
2013 IEEE 13th International Working Conference on Source Code Analysis and …, 2013
52013
Business process improvement using Object‐Process Methodology
JM Casebolt, A Jbara, D Dori
Systems Engineering, 2019
22019
The Model Fidelity Hierarchy: From Text to Conceptual, Computational, and Executable Model
N Levi-Soskin, A Jbara, D Dori
IEEE Systems Journal 15 (1), 1287-1298, 2020
12020
Toward integrating systems engineering with software engineering through Object-Process Programming
A Jbara, A Bibliowicz, N Wengrowicz, N Levi, D Dori
International Journal of Information Technology, 1-35, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20