Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia
S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …
acceptable in organizations, which demands extensive dependence on digital technologies …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
Education, Online Presence and Cybersecurity Implications: A Study of Information Security Practices of Computing Students in Saudi Arabia
S Saeed - Sustainability, 2023 - mdpi.com
Information technology is considered as a key enabler to achieve “education for all” as a
sustainable development goal; however, involvement in the education sector has introduced …
sustainable development goal; however, involvement in the education sector has introduced …
Machine-Learning based analysis and classification of Android malware signatures
Multi-scanner Antivirus (AV) systems are often used for detecting Android malware since the
same piece of software can be checked against multiple different AV engines. However, in …
same piece of software can be checked against multiple different AV engines. However, in …
Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security
MKS Tan, S Goode, A Richardson - Behaviour & Information …, 2021 - Taylor & Francis
Anti-malware software must be frequently updated in order to protect the system and the
user from attack. Makers of this software must choose between interrupting the user to …
user from attack. Makers of this software must choose between interrupting the user to …
Investigating the detection capabilities of antiviruses under concurrent attacks
Cyber security is a major concern of computing systems. Different security controls are
developed to mitigate or prevent cyber attacks. Such controls include cryptography, firewalls …
developed to mitigate or prevent cyber attacks. Such controls include cryptography, firewalls …
The impact of the antivirus on the digital evidence
MI Al-Saleh - … Journal of Electronic Security and Digital …, 2013 - inderscienceonline.com
Digital forensics (DF) has a significant role in accusing cyber criminals and proving them
guilty. A criminal, if possible, may manage to delete the crime evidences in order to deny her …
guilty. A criminal, if possible, may manage to delete the crime evidences in order to deny her …
[PDF][PDF] Precise Performance Characterization of Antivirus on the File System Operations.
MI Al-Saleh, HM Hamdan - J. Univers. Comput. Sci., 2019 - researchgate.net
The Antivirus (AV) is of an important concern to the end-users community. Mainly, the AV
achieves security by scanning data against its database of virus signatures. In addition, the …
achieves security by scanning data against its database of virus signatures. In addition, the …
Enhancing malware detection: clients deserve more protection
MI Al-Saleh, B Shebaro - International Journal of Electronic …, 2016 - inderscienceonline.com
Sophisticated malware is designed to spread over the network and infect as many
connected client machines as possible before being detected. Network security engineers …
connected client machines as possible before being detected. Network security engineers …
On studying the antivirus behavior on kernel activities
MI Al-Saleh, HM Hamdan - Proceedings of the 2018 1st International …, 2018 - dl.acm.org
Security is of concern of any computing system. Intruders break into machines to steal
private data, important credentials, or credit cards. Causing damage, denying services …
private data, important credentials, or credit cards. Causing damage, denying services …