متابعة
Abdulrahman Alarifi
Abdulrahman Alarifi
KACST, King Abdulaziz City for Science and Technology
بريد إلكتروني تم التحقق منه على kacst.edu.sa
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Ultra wideband indoor positioning technologies: Analysis and recent advances
A Alarifi, AM Al-Salman, M Alsaleh, A Alnafessah, S Al-Hadhrami, ...
Sensors 16 (5), 707, 2016
11852016
Comparative survey of indoor positioning technologies, techniques, and algorithms
MA Al-Ammar, S Alhadhrami, A Al-Salman, A Alarifi, HS Al-Khalifa, ...
2014 International Conference on Cyberworlds, 245-252, 2014
2312014
Twitter turing test: Identifying social machines
A Alarifi, M Alsaleh, AM Al-Salman
Information Sciences 372, 332-346, 2016
1222016
Earthquakes magnitude predication using artificial neural network in northern Red Sea area
ASN Alarifi, NSN Alarifi, S Al-Humidan
Journal of King Saud University-Science 24 (4), 301-313, 2012
1132012
System and method of comparative evaluation for phishing mitigation
MA Alsaleh, AS Alarifi
US Patent 10,069,856, 2018
912018
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15, 475-491, 2016
872016
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15, 475-491, 2016
872016
AbdulMalik Al-Salman, Mansour Alsaleh, Ahmad Alnafessah, Suheer Al-Hadhrami, Mai A Al-Ammar, and Hend S Al-Khalifa. Ultra wideband indoor positioning technologies: Analysis and …
A Alarifi
Sensors 16 (5), 707, 2016
832016
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
742017
Tsd: Detecting sybil accounts in twitter
M Alsaleh, A Alarifi, AM Al-Salman, M Alfayez, A Almuhaysin
2014 13th International Conference on Machine Learning and Applications, 463-469, 2014
742014
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
522014
Diversify sensor nodes to improve resilience against node compromise
A Alarifi, W Du
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
492006
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
462017
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99, 519-535, 2017
442017
An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review
M Zarour, A Abran, JM Desharnais, A Alarifi
Journal of Systems and Software 101, 180-192, 2015
402015
Performance-based comparative assessment of open source web vulnerability scanners
M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman
Security and Communication Networks 2017, 2017
392017
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
342016
Social information leakage: Effects of awareness and peer pressure on user behavior
M Nouh, A Almaatouq, A Alabdulkareem, VK Singh, E Shmueli, M Alsaleh, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
322014
Behavioral consequences of Pokémon GO: the exaggerated picture
N Alomar, M Alsaleh, A Alarifi
Computers in Human Behavior 90, 223-245, 2019
222019
Visualizing PHPIDS log files for better understanding of web server attacks
M Alsaleh, A Alqahtani, A Alarifi, AM Al-Salman
Proceedings of the Tenth Workshop on Visualization for Cyber Security, 1-8, 2013
212013
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20