Abdulrahman Alarifi
  According to our database1,
  Abdulrahman Alarifi
  authored at least 40 papers
  between 2005 and 2019.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2019
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts.
    
  
    Comput. Secur., 2019
    
  
    Comput. Hum. Behav., 2019
    
  
  2018
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation.
    
  
    CoRR, 2018
    
  
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation.
    
  
    Proceedings of the IECON 2018, 2018
    
  
  2017
    IEEE Trans. Inf. Forensics Secur., 2017
    
  
    Secur. Commun. Networks, 2017
    
  
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review.
    
  
    IEEE Commun. Surv. Tutorials, 2017
    
  
    Computing, 2017
    
  
  2016
    Sensors, 2016
    
  
SECDEP: Software engineering curricula development and evaluation process using SWEBOK.
    
  
    Inf. Softw. Technol., 2016
    
  
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.
    
  
    Int. J. Inf. Sec., 2016
    
  
  2015
    Secur. Commun. Networks, 2015
    
  
An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review.
    
  
    J. Syst. Softw., 2015
    
  
    Australas. J. Inf. Syst., 2015
    
  
    Proceedings of the WEBIST 2015, 2015
    
  
    Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
    
  
    Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015
    
  
    Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015
    
  
Posters versus Lurkers: Improving Participation in Enterprise Social Networks through Promotional Messages.
    
  
    Proceedings of the International Conference on Information Systems, 2015
    
  
    Proceedings of the Tenth International Conference on Digital Information Management, 2015
    
  
  2014
    Proceedings of the ACM Web Science Conference, 2014
    
  
    Proceedings of the 13th International Conference on Machine Learning and Applications, 2014
    
  
    Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
    
  
    Proceedings of the 2014 International Conference on Cyberworlds, 2014
    
  
A malicious activity detection system utilizing predictive modeling in complex environments.
    
  
    Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
    
  
  2013
    Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013
    
  
    Proceedings of the 8th International Conference on Standardization and Innovation in Information Technology, 2013
    
  
Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations.
    
  
    Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
    
  
    Proceedings of the 12th International Conference on Machine Learning and Applications, 2013
    
  
    Proceedings of the Australasian Conference on Information Systems, 2013
    
  
  2012
Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations.
    
  
    Proceedings of the Software Process Improvement and Capability Determination, 2012
    
  
    Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
    
  
  2011
Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks.
    
  
    Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011
    
  
  2010
Feedforward Neural Network Model for Earthquakes Magnitude Prediction in Northern Red Sea Area.
  
    Proceedings of the 2010 International Conference on Artificial Intelligence, 2010
    
  
  2008
Online Arabic Character Recognition for Handheld Devices.
  
    Proceedings of the 2008 International Conference on Image Processing, 2008
    
  
Managing Diversity in Networks.
  
    Proceedings of the 2008 International Conference on Security & Management, 2008
    
  
  2006
    Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
    
  
  2005
Risk-Based Routing Protocol for Wireless Ad-hoc Networks.
  
    Proceedings of the 2005 International Conference on Wireless Networks, 2005
    
  
Random Pairwise Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
  
    Proceedings of the 2005 International Conference on Wireless Networks, 2005