A comparative study of virus detection techniques S Al Amro, A Alkhalifah International Journal of Computer, Electrical, Automation, Control and …, 2015 | 26 | 2015 |
Cybercrime in Saudi Arabia: fact or fiction? S Al Amro International Journal of Computer Science Issues (IJCSI) 14 (2), 36, 2017 | 18 | 2017 |
Application of fuzzy logic in computer security and forensics SA Amro, F Chiclana, DA Elizondo Computational Intelligence for Privacy and Security, 35-49, 2012 | 14 | 2012 |
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems. A Alkhalifah, S Al Amro J. Comput. 12 (2), 174-182, 2017 | 12 | 2017 |
Evolutionary computation in computer security and forensics: An overview SA Amro, DA Elizondo, A Solanas, A Martínez-Ballesté Computational Intelligence for Privacy and Security, 25-34, 2012 | 10 | 2012 |
How safe is governmental infrastructure: A cyber extortion and increasing ransomware attacks perspective S Al Amro International Journal of Computer Science and Information Security 18 (6), 2020 | 8 | 2020 |
Lumpy skin disease diagnosis in cattle: A deep learning approach optimized with RMSProp and MobileNetV2 S Muhammad Saqib, M Iqbal, M Tahar Ben Othman, T Shahazad, ... Plos one 19 (8), e0302862, 2024 | 5 | 2024 |
Behavioural API based virus analysis and detection A Cau International Journal of Computer Science and Information Security 10 (5), 14, 2012 | 5 | 2012 |
Computational Intelligence for Privacy and Security DA Elizondo, A Solanas, A Martinez-Balleste Springer, 2012 | 5 | 2012 |
Behaviour-based virus detection system using Interval Temporal Logic S Al Amro, A Cau 2011 6th International Conference on Risks and Security of Internet and …, 2011 | 5 | 2011 |
A Security-Trust based Model for Identity Management Systems Adoption A Alkhalifah, S Al-Amro . International Journal of Information Technology & Computer Science 19 (2 …, 2015 | 3* | 2015 |
Cybercrime and its impact on e-government services and the private sector in the Middle East S Al Amro International Journal of Computer Science and Information Security 14 (3), 69, 2016 | 2 | 2016 |
Behaviour-based virus analysis and detection S Al Amro De Montfort University, 2013 | 2 | 2013 |
A study of Android Operating System Security. S Al Amro 2nd International Conference of Computation and Communication Technologies …, 2017 | | 2017 |
Vulnerabilities in Mobile Devices S Al Amro International Journal of Computer Science and Security (IJCSS) 11 (1), 34-41, 2017 | | 2017 |
Computer Worms Based on Monitoring Replication and Damage: Experiment and Evaluation S Al-Saawy, Y.B. and Al Amro IOSR Journals (IOSR Journal of Computer Engineering) 19 (1), 31-49, 2017 | | 2017 |
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage YB Al-Saawy, S Al Amro International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | | 2016 |
A Comparative study of Computational Intelligence in ComputerSecurity and Forensics S Al amro. The 2011 IJCAI Workshop on Intelligent Security (SecArt), 2-9, 2011 | | 2011 |