Abdulrahman Alarifi

According to our database1, Abdulrahman Alarifi authored at least 40 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts.
Comput. Secur., 2019

Behavioral consequences of Pokémon GO: The exaggerated picture.
Comput. Hum. Behav., 2019

2018
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation.
CoRR, 2018


2017
Someone in Your Contact List: Cued Recall-Based Textual Passwords.
IEEE Trans. Inf. Forensics Secur., 2017

Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners.
Secur. Commun. Networks, 2017

Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review.
IEEE Commun. Surv. Tutorials, 2017

A model for evaluating the security and usability of e-banking platforms.
Computing, 2017

2016
Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances.
Sensors, 2016

Twitter turing test: Identifying social machines.
Inf. Sci., 2016

SECDEP: Software engineering curricula development and evaluation process using SWEBOK.
Inf. Softw. Technol., 2016

If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.
Int. J. Inf. Sec., 2016

2015
Visualizing web server attacks: patterns in PHPIDS logs<sup><i>‡</i></sup>.
Secur. Commun. Networks, 2015

An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review.
J. Syst. Softw., 2015

Moving from Evaluation to Trial: How do SMEs Start Adopting Cloud ERP?
Australas. J. Inf. Syst., 2015

Online Banking Security and Usability - Towards an Effective Evaluation Framework.
Proceedings of the WEBIST 2015, 2015

UWB Indoor Tracking System for Visually Impaired People.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

Process improvement in governmental agencies: Toward CMMI certification.
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015

Combating Comment Spam with Machine Learning Approaches.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Posters versus Lurkers: Improving Participation in Enterprise Social Networks through Promotional Messages.
Proceedings of the International Conference on Information Systems, 2015

Evaluating Arabic Text-to-Speech synthesizers for mobile phones.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

2014
Twitter: who gets caught? observed trends in social micro-blogging spam.
Proceedings of the ACM Web Science Conference, 2014

TSD: Detecting Sybil Accounts in Twitter.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014

Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Comparative Survey of Indoor Positioning Technologies, Techniques, and Algorithms.
Proceedings of the 2014 International Conference on Cyberworlds, 2014

A malicious activity detection system utilizing predictive modeling in complex environments.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Visualizing PHPIDS log files for better understanding of web server attacks.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

Toward a national strategy for Open Source Software.
Proceedings of the 8th International Conference on Standardization and Innovation in Information Technology, 2013

Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Google Penguin: Evasion in Non-English Languages and a New Classifier.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Enhancing Enterprise Social Network Use: A Control Theory Study.
Proceedings of the Australasian Conference on Information Systems, 2013

2012
Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations.
Proceedings of the Software Process Improvement and Capability Determination, 2012

Web Spam: A Study of the Page Language Effect on the Spam Detection Features.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2011
Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

2010
Feedforward Neural Network Model for Earthquakes Magnitude Prediction in Northern Red Sea Area.
Proceedings of the 2010 International Conference on Artificial Intelligence, 2010

2008
Online Arabic Character Recognition for Handheld Devices.
Proceedings of the 2008 International Conference on Image Processing, 2008

Managing Diversity in Networks.
Proceedings of the 2008 International Conference on Security & Management, 2008

2006
Diversify sensor nodes to improve resilience against node compromise.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
Risk-Based Routing Protocol for Wireless Ad-hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Random Pairwise Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge.
Proceedings of the 2005 International Conference on Wireless Networks, 2005


  Loading...