Mohammed I. Al-Saleh

Orcid: 0000-0001-6950-8337

According to our database1, Mohammed I. Al-Saleh authored at least 23 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
EPPR: blockchain for educational record sharing and recommendation using the Ethereum platform.
Int. J. Grid Util. Comput., 2021

2020
Utilizing Debugging Information of Applications in Memory Forensics.
J. Univers. Comput. Sci., 2020

Fingerprinting violating machines with in-memory protocol artefacts.
Int. J. Adv. Intell. Paradigms, 2020

Live forensics of software attacks on cyber-physical systems.
Future Gener. Comput. Syst., 2020

2019
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.
J. Univers. Comput. Sci., 2019

Precise Performance Characterization of Antivirus on the File System Operations.
J. Univers. Comput. Sci., 2019

Automated ARIMA Model Construction for Dynamic Vehicle GPS Location Prediction.
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

2018
A Unified Key Distribution and Session Management Protocol for Mobile Video Surveillance Systems.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

2017
A security framework for cloud-based video surveillance system.
Multim. Tools Appl., 2017

Can genetic algorithms help virus writers reshape their creations and avoid detection?
J. Exp. Theor. Artif. Intell., 2017

On Improving Antivirus Scanning Engines: Memory On-Access Scanner.
J. Comput. Sci., 2017

Forensic artefacts associated with intentionally deleted user accounts.
Int. J. Electron. Secur. Digit. Forensics, 2017

Towards the memory forensics of OOP execution behavior.
Proceedings of the 8th International Conference on Information, 2017

IMO forensics in Android and windows systems.
Proceedings of the 8th International Conference on Information, 2017

2016
Enhancing malware detection: clients deserve more protection.
Int. J. Electron. Secur. Digit. Forensics, 2016

A compression-based technique to classify metamorphic malware.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Investigating the detection capabilities of antiviruses under concurrent attacks.
Int. J. Inf. Sec., 2015

2013
The impact of the antivirus on the digital evidence.
Int. J. Electron. Secur. Digit. Forensics, 2013

Antivirus performance characterisation: system-wide view.
IET Inf. Secur., 2013

2012
Utilizing data lifetime of TCP buffers in digital forensics: Empirical study.
Digit. Investig., 2012

2011
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

2010
On information flow for intrusion detection: what if accurate full-system dynamic information flow tracking was possible?
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

2009
Architectural Support for Securing Sensor Networks Against Remote Attacks.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009


  Loading...