Ultra wideband indoor positioning technologies: Analysis and recent advances A Alarifi, AM Al-Salman, M Alsaleh, A Alnafessah, S Al-Hadhrami, ... Sensors 16 (5), 707, 2016 | 1302 | 2016 |
Comparative survey of indoor positioning technologies, techniques, and algorithms MA Al-Ammar, S Alhadhrami, A Al-Salman, A Alarifi, HS Al-Khalifa, ... 2014 International Conference on Cyberworlds, 245-252, 2014 | 251 | 2014 |
Twitter turing test: Identifying social machines A Alarifi, M Alsaleh, AM Al-Salman Information Sciences 372, 332-346, 2016 | 138 | 2016 |
Earthquakes magnitude predication using artificial neural network in northern Red Sea area ASN Alarifi, NSN Alarifi, S Al-Humidan Journal of King Saud University-Science 24 (4), 301-313, 2012 | 123 | 2012 |
System and method of comparative evaluation for phishing mitigation MA Alsaleh, AS Alarifi US Patent 10,069,856, 2018 | 96 | 2018 |
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ... International Journal of Information Security 15, 475-491, 2016 | 91 | 2016 |
AbdulMalik Al-Salman, Mansour Alsaleh, Ahmad Alnafessah, Suheer Al-Hadhrami, Mai A Al-Ammar, and Hend S Al-Khalifa. Ultra wideband indoor positioning technologies: Analysis and … A Alarifi Sensors 16 (5), 707, 2016 | 90 | 2016 |
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods M Alsaleh, N Alomar, A Alarifi PloS one 12 (3), e0173284, 2017 | 81 | 2017 |
Tsd: Detecting sybil accounts in twitter M Alsaleh, A Alarifi, AM Al-Salman, M Alfayez, A Almuhaysin 2014 13th International Conference on Machine Learning and Applications, 463-469, 2014 | 76 | 2014 |
Twitter: who gets caught? observed trends in social micro-blogging spam A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ... Proceedings of the 2014 ACM conference on Web science, 33-41, 2014 | 52 | 2014 |
A model for evaluating the security and usability of e-banking platforms A Alarifi, M Alsaleh, N Alomar Computing 99, 519-535, 2017 | 49 | 2017 |
Diversify sensor nodes to improve resilience against node compromise A Alarifi, W Du Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006 | 49 | 2006 |
Social authentication applications, attacks, defense strategies and future research directions: a systematic review N Alomar, M Alsaleh, A Alarifi IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017 | 47 | 2017 |
Performance‐Based Comparative Assessment of Open Source Web Vulnerability Scanners M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman Security and Communication Networks 2017 (1), 6158107, 2017 | 46 | 2017 |
An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review M Zarour, A Abran, JM Desharnais, A Alarifi Journal of Systems and Software 101, 180-192, 2015 | 43 | 2015 |
SECDEP: Software engineering curricula development and evaluation process using SWEBOK A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh Information and Software Technology 74, 114-126, 2016 | 35 | 2016 |
Social information leakage: Effects of awareness and peer pressure on user behavior M Nouh, A Almaatouq, A Alabdulkareem, VK Singh, E Shmueli, M Alsaleh, ... Human Aspects of Information Security, Privacy, and Trust: Second …, 2014 | 33 | 2014 |
Behavioral consequences of Pokémon GO: the exaggerated picture N Alomar, M Alsaleh, A Alarifi Computers in Human Behavior 90, 223-245, 2019 | 29 | 2019 |
Combating comment spam with machine learning approaches M Alsaleh, A Alarifi, F Al-Quayed, AM Al-Salman 2015 IEEE 14th International Conference on Machine Learning and Applications …, 2015 | 22 | 2015 |
Visualizing PHPIDS log files for better understanding of web server attacks M Alsaleh, A Alqahtani, A Alarifi, AM Al-Salman Proceedings of the Tenth Workshop on Visualization for Cyber Security, 1-8, 2013 | 21 | 2013 |