Abdulrahman Alarifi
According to our database1,
Abdulrahman Alarifi
authored at least 40 papers
between 2005 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts.
Comput. Secur., 2019
Comput. Hum. Behav., 2019
2018
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation.
CoRR, 2018
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation.
Proceedings of the IECON 2018, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Secur. Commun. Networks, 2017
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review.
IEEE Commun. Surv. Tutorials, 2017
Computing, 2017
2016
Sensors, 2016
SECDEP: Software engineering curricula development and evaluation process using SWEBOK.
Inf. Softw. Technol., 2016
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.
Int. J. Inf. Sec., 2016
2015
Secur. Commun. Networks, 2015
An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review.
J. Syst. Softw., 2015
Australas. J. Inf. Syst., 2015
Proceedings of the WEBIST 2015, 2015
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
Posters versus Lurkers: Improving Participation in Enterprise Social Networks through Promotional Messages.
Proceedings of the International Conference on Information Systems, 2015
Proceedings of the Tenth International Conference on Digital Information Management, 2015
2014
Proceedings of the ACM Web Science Conference, 2014
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the 2014 International Conference on Cyberworlds, 2014
A malicious activity detection system utilizing predictive modeling in complex environments.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013
Proceedings of the 8th International Conference on Standardization and Innovation in Information Technology, 2013
Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
Proceedings of the Australasian Conference on Information Systems, 2013
2012
Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations.
Proceedings of the Software Process Improvement and Capability Determination, 2012
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
2011
Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011
2010
Feedforward Neural Network Model for Earthquakes Magnitude Prediction in Northern Red Sea Area.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010
2008
Online Arabic Character Recognition for Handheld Devices.
Proceedings of the 2008 International Conference on Image Processing, 2008
Managing Diversity in Networks.
Proceedings of the 2008 International Conference on Security & Management, 2008
2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
2005
Risk-Based Routing Protocol for Wireless Ad-hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005
Random Pairwise Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the 2005 International Conference on Wireless Networks, 2005