Mansour Alsaleh

Orcid: 0000-0003-0920-7561

According to our database1, Mansour Alsaleh authored at least 39 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Electricity Non-Technical Loss Detection: Enhanced Cost-Driven Approach Utilizing Synthetic Control.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2021

Next-day Electricity Demand Forecast: A New Ensemble Recommendation System Using Peak and Valley.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2021

2020
Cardea: An Open Automated Machine Learning Framework for Electronic Health Records.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

2019
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts.
Comput. Secur., 2019

Behavioral consequences of Pokémon GO: The exaggerated picture.
Comput. Hum. Behav., 2019

2018
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation.
CoRR, 2018


2017
Someone in Your Contact List: Cued Recall-Based Textual Passwords.
IEEE Trans. Inf. Forensics Secur., 2017

Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners.
Secur. Commun. Networks, 2017

Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review.
IEEE Commun. Surv. Tutorials, 2017

A model for evaluating the security and usability of e-banking platforms.
Computing, 2017

2016
Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances.
Sensors, 2016

Twitter turing test: Identifying social machines.
Inf. Sci., 2016

SECDEP: Software engineering curricula development and evaluation process using SWEBOK.
Inf. Softw. Technol., 2016

If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts.
Int. J. Inf. Sec., 2016

Social Communities in Urban Mobility Systems.
Proceedings of the Social Computing and Social Media, 2016

Towards Urban Tribes in Saudi Arabia: Social Subcultures Emerging from Urban Analytics of Social Media.
Proceedings of the Social Computing and Social Media, 2016

2015
Visualizing web server attacks: patterns in PHPIDS logs<sup><i>‡</i></sup>.
Secur. Commun. Networks, 2015

Online Banking Security and Usability - Towards an Effective Evaluation Framework.
Proceedings of the WEBIST 2015, 2015

UWB Indoor Tracking System for Visually Impaired People.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

Process improvement in governmental agencies: Toward CMMI certification.
Proceedings of the 2015 IEEE International Symposium on Software Reliability Engineering Workshops, 2015

Combating Comment Spam with Machine Learning Approaches.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

2014
Twitter: who gets caught? observed trends in social micro-blogging spam.
Proceedings of the ACM Web Science Conference, 2014

TSD: Detecting Sybil Accounts in Twitter.
Proceedings of the 13th International Conference on Machine Learning and Applications, 2014

Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Comparative Survey of Indoor Positioning Technologies, Techniques, and Algorithms.
Proceedings of the 2014 International Conference on Cyberworlds, 2014

A malicious activity detection system utilizing predictive modeling in complex environments.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors.
Int. J. Inf. Sec., 2013

Visualizing PHPIDS log files for better understanding of web server attacks.
Proceedings of the 10th Workshop on Visualization for Cyber Security, 2013

Toward a national strategy for Open Source Software.
Proceedings of the 8th International Conference on Standardization and Innovation in Information Technology, 2013

Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Google Penguin: Evasion in Non-English Languages and a New Classifier.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

2012
Revisiting Defenses against Large-Scale Online Password Guessing Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Revisiting network scanning detection using sequential hypothesis testing.
Secur. Commun. Networks, 2012

Web Spam: A Study of the Page Language Effect on the Spam Detection Features.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

2011
Network scan detection with LQS: a lightweight, quick and stateful algorithm.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2008
Improving Security Visualization with Exposure Map Filtering.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
A collaborative approval process for accessing sensitive data.
Int. J. Comput. Appl. Technol., 2007

2006
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006


  Loading...