IDS false alarm reduction using continuous and discontinuous patterns A Alharby, H Imai Applied Cryptography and Network Security: Third International Conference …, 2005 | 72 | 2005 |
Corona based deployment strategies in wireless sensor network: a survey AU Rahman, A Alharby, H Hasbullah, K Almuzaini Journal of Network and Computer applications 64, 176-193, 2016 | 57 | 2016 |
ICT students, stress and coping strategies: English perspective a case study of Midsize Middle Eastern University YM Alginahi, M Ahmed, O Tayan, AA Siddiqi, L Sharif, A Alharby, R Nour Trends in Information Management (TRIM) 5 (2), 2012 | 21 | 2012 |
Purpose, scope, and technical considerations of wearable technologies M Mehdi, A Alharby Wearable technologies: Concepts, methodologies, tools, and applications, 1-19, 2018 | 14 | 2018 |
An instrument to measure human behavior toward cyber security policies KA Alissa, HA Alshehri, SA Dahdouh, BM Alsubaie, AM Alghamdi, ... 2018 21st Saudi Computer Society National Computer Conference (NCC), 1-6, 2018 | 12 | 2018 |
Use of information and mobile computing technologies in healthcare facilities of Saudi Arabia AA Siddiqi, M Ahmed, YM Alginahi, A Alharby 2009 International Conference on Information and Communication Technologies …, 2009 | 12 | 2009 |
Prediction models aided postoperative decision making based on neural network and support vector machines I Abuaqel, A Alsaif, M Almulhim, M Aljallal, M Alghuraibi, M Alzahrani, ... 2017 International Conference on Informatics, Health & Technology (ICIHT), 1-7, 2017 | 9 | 2017 |
Information security: securing a network device with passwords to protect information M Ahmed, L Sharif, A Issa-Salwe, A Alharby Trends in Information Management 6 (1), 2010 | 4 | 2010 |
Hybrid intrusion detection model based on ordered sequences A Alharby, H Imai Computer Network Security: Third International Workshop on Mathematical …, 2005 | 4 | 2005 |
Comprehensive patient health care system for the Saudi hospitals using information and mobile computing technologies AA Siddiqi, M Ahmed, YM Alginahi, A Alharby Trends In Information Management 5 (2), 167-183, 2009 | 2 | 2009 |
Security protocols protection based on anomaly detection A Alharby, H Imai IEICE transactions on information and systems 89 (1), 189-200, 2006 | 2 | 2006 |
Application of ICT III: Use of information and mobile computing technologies in healthcare facilities of Saudi Arabia AA Siddiqi, M Ahmed, YM Alginahi, A Alharby | | 2009 |
Special Section on New Technologies and their Applications of the Internet III-Intrusion Detection-Security Protocols Protection Based on Anomaly Detection A Alharby, H Imai IEICE Transactions on Information and Systems 89 (1), 189-200, 2006 | | 2006 |
Secure Architecture For Distributed Intrusion Detection Systems A ALHARBY, I Hideki 情報理論とその応用シンポジウム予稿集= The proceedings of the Symposium on …, 2005 | | 2005 |
Energy-efficient and Secure Cluster-head Selection for Intrusion Detection Systems in Mobile Ad Hoc Networks A Abdulrahman, H Fathi, H Imai Proceedings of the International Symposium on Wireless Personal Multimedia …, 2005 | | 2005 |
Cooperative agents for Intrusion Detection systems A Abdulrahman, I Hideki 情報理論とその応用シンポジウム予稿集= The proceedings of the Symposium on …, 2004 | | 2004 |
Revocable Anonymous Schemes for User's Privacy in Intrusion Detection Systems A Abdulrahman, I Hideki 情報理論とその応用シンポジウム予稿集= The proceedings of the Symposium on …, 2003 | | 2003 |
Real Time Specific Weed Classifier Based on Variation in Environmental Conditions I Ahmad, A ALHARBY, A ur Rahman | | |