Følg
Sulaiman Al amro
Sulaiman Al amro
Associate Professor , Computer college, Qassim University
Verificeret mail på qu.edu.sa
Titel
Citeret af
Citeret af
År
A comparative study of virus detection techniques
S Al Amro, A Alkhalifah
International Journal of Computer, Electrical, Automation, Control and …, 2015
262015
Cybercrime in Saudi Arabia: fact or fiction?
S Al Amro
International Journal of Computer Science Issues (IJCSI) 14 (2), 36, 2017
182017
Application of fuzzy logic in computer security and forensics
SA Amro, F Chiclana, DA Elizondo
Computational Intelligence for Privacy and Security, 35-49, 2012
142012
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems.
A Alkhalifah, S Al Amro
J. Comput. 12 (2), 174-182, 2017
122017
Evolutionary computation in computer security and forensics: An overview
SA Amro, DA Elizondo, A Solanas, A Martínez-Ballesté
Computational Intelligence for Privacy and Security, 25-34, 2012
102012
How safe is governmental infrastructure: A cyber extortion and increasing ransomware attacks perspective
S Al Amro
International Journal of Computer Science and Information Security 18 (6), 2020
82020
Lumpy skin disease diagnosis in cattle: A deep learning approach optimized with RMSProp and MobileNetV2
S Muhammad Saqib, M Iqbal, M Tahar Ben Othman, T Shahazad, ...
Plos one 19 (8), e0302862, 2024
52024
Behavioural API based virus analysis and detection
A Cau
International Journal of Computer Science and Information Security 10 (5), 14, 2012
52012
Computational Intelligence for Privacy and Security
DA Elizondo, A Solanas, A Martinez-Balleste
Springer, 2012
52012
Behaviour-based virus detection system using Interval Temporal Logic
S Al Amro, A Cau
2011 6th International Conference on Risks and Security of Internet and …, 2011
52011
A Security-Trust based Model for Identity Management Systems Adoption
A Alkhalifah, S Al-Amro
. International Journal of Information Technology & Computer Science 19 (2 …, 2015
3*2015
Cybercrime and its impact on e-government services and the private sector in the Middle East
S Al Amro
International Journal of Computer Science and Information Security 14 (3), 69, 2016
22016
Behaviour-based virus analysis and detection
S Al Amro
De Montfort University, 2013
22013
A study of Android Operating System Security.
S Al Amro
2nd International Conference of Computation and Communication Technologies …, 2017
2017
Vulnerabilities in Mobile Devices
S Al Amro
International Journal of Computer Science and Security (IJCSS) 11 (1), 34-41, 2017
2017
Computer Worms Based on Monitoring Replication and Damage: Experiment and Evaluation
S Al-Saawy, Y.B. and Al Amro
IOSR Journals (IOSR Journal of Computer Engineering) 19 (1), 31-49, 2017
2017
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
YB Al-Saawy, S Al Amro
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
2016
A Comparative study of Computational Intelligence in ComputerSecurity and Forensics
S Al amro.
The 2011 IJCAI Workshop on Intelligent Security (SecArt), 2-9, 2011
2011
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–18