Qutaibah Althebyan

Orcid: 0000-0002-7474-4198

According to our database1, Qutaibah Althebyan authored at least 31 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Multilingual deep learning framework for fake news detection using capsule neural network.
J. Intell. Inf. Syst., June, 2023

MIRNA: adaptive 3D game to assist children's distance learning difficulties; design and teachers' intention to use.
Int. Arab J. Inf. Technol., 2023

Arabic Sentiment Analysis of Mobile Banking Services Reviews.
Proceedings of the Tenth International Conference on Social Networks Analysis, 2023

The Impact of Middle and High School Students Participation in the Innovation Nation Competition on Their Education.
Proceedings of the 24th International Arab Conference on Information Technology, 2023

2022
Analyzing the effect of driving speed on the performance of roundabouts.
Int. Arab J. Inf. Technol., 2022

Automated Question Answering based on Improved TF-IDF and Cosine Similarity.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

Smart Assistive 3D Tool to Remedy Children's Learning Difficulties for Distance Education.
Proceedings of the International Arab Conference on Information Technology, 2022

2021
A Student Advising System Using Association Rule Mining.
Int. J. Web Based Learn. Teach. Technol., 2021

On Prediction of Research Excellence using Data Mining and Deep Learning Techniques.
Proceedings of the Eighth International Conference on Social Network Analysis, 2021

Simulation study of speed control at congested arms of roundabouts.
Proceedings of the 22nd International Arab Conference on Information Technology, 2021

2020
A knowledgebase insider threat mitigation model in the cloud: a proactive approach.
Int. J. Adv. Intell. Paradigms, 2020

Mitigating insider threats on the edge: a knowledgebase approach.
Int. Arab J. Inf. Technol., 2020

2019
An agent-Based self-organizing model for large-scale biosurveillance systems using mobile edge computing.
Simul. Model. Pract. Theory, 2019

Higher Education Units Assessment Based on Data Envelopment Analysis and Clustering Techniques.
Proceedings of the International Arab Conference on Information Technology, 2019

A Mobile Edge Mitigation Model for Insider Threats: A Knowledgebase Approach.
Proceedings of the International Arab Conference on Information Technology, 2019

Zero-Day Attack Detection and Prevention in Software-Defined Networks.
Proceedings of the International Arab Conference on Information Technology, 2019

2018
An Agent Based Model for Health Surveillance Systems and Early Biological Threat Detection.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

2017
A scalable Map Reduce tasks scheduling: a threading-based approach.
Int. J. Comput. Sci. Eng., 2017

An insider threat aware access control for cloud relational databases.
Clust. Comput., 2017

2016
Mitigating insider threat in cloud relational databases.
Secur. Commun. Networks, 2016

Towards improving resource management in cloud systems using a multi-agent framework.
Int. J. Cloud Comput., 2016

Cloud support for large scale e-healthcare systems.
Ann. des Télécommunications, 2016

2015
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure.
Concurr. Comput. Pract. Exp., 2015

Multi-agent based dynamic resource provisioning and monitoring for cloud computing systems infrastructure.
Clust. Comput., 2015

Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

2014
Building A Smart Academic Advising System Using Association Rule Mining.
CoRR, 2014

2013
PEP-side caching: An insider threat port.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

2008
Knowledge Extraction and Management for Insider Threat Mitigation.
Proceedings of the Security in Information Systems, 2008

A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Performance analysis of an insider threat mitigation model.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

2005
A New Parameter for Maintaining Consistency in an Agent's Knowledge Base Using Truth Maintenance Systems.
Proceedings of the Innovative Concepts for Autonomic and Agent-Based Systems, 2005


  Loading...