default search action
Abdulrahman Alruban
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Abdulrahman Alruban
, Hanan Abdullah Mengash
, Majdy M. Eltahir
, Nabil Sharaf Almalki, Ahmed Mahmud, Mohammed Assiri
:
Corrections to "Artificial Hummingbird Optimization Algorithm With Hierarchical Deep Learning for Traffic Management in Intelligent Transportation Systems". IEEE Access 13: 24642 (2025) - 2024
- [j7]Abdulrahman Alruban
, Hanan Abdullah Mengash
, Majdy M. Eltahir
, Nabil Sharaf Almalki, Ahmed Mahmud, Mohammed Assiri
:
Artificial Hummingbird Optimization Algorithm With Hierarchical Deep Learning for Traffic Management in Intelligent Transportation Systems. IEEE Access 12: 17596-17603 (2024) - 2023
- [j6]Abdulrahman Alruban
, Eatedal Alabdulkreem
, Majdy M. Eltahir
, Abdullah Alharbi
, Imène Issaoui, Ahmed Sayed:
Endoscopic Image Analysis for Gastrointestinal Tract Disease Diagnosis Using Nature Inspired Algorithm With Deep Learning Approach. IEEE Access 11: 130022-130030 (2023) - 2022
- [j5]Abdulrahman Alruban
:
Prediction of Application Usage on Smartphones via Deep Learning. IEEE Access 10: 49198-49206 (2022) - [j4]Hind Alobaidi, Nathan L. Clarke
, Fudong Li
, Abdulrahman Alruban:
Real-world smartphone-based gait recognition. Comput. Secur. 113: 102557 (2022) - [j3]Aisha Muhammad
, Mohammed A. H. Ali
, Sherzod Turaev
, Rawad Abdulghafor
, Ibrahim Haruna Shanono
, Zaid Alzaid, Abdulrahman Alruban, Rana Alabdan
, Ashit Kumar Dutta, Sultan Almotairi
:
A Generalized Laser Simulator Algorithm for Mobile Robot Path Planning with Obstacle Avoidance. Sensors 22(21): 8177 (2022) - [i2]Abdulrahman Alruban, Hind Alobaidi, Nathan L. Clarke, Fudong Li:
Physical Activity Recognition by Utilising Smartphone Sensor Signals. CoRR abs/2201.08688 (2022) - 2020
- [c11]Gueltoum Bendiab, Stavros Shiaeles
, Abdulrahman Alruban, Nicholas Kolokotronis
:
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. NetSoft 2020: 444-449 - [i1]Gueltoum Bendiab, Stavros Shiaeles, Abdulrahman Alruban, Nicholas Kolokotronis:
IoT Malware Network Traffic Classification using Visual Representation and Deep Learning. CoRR abs/2010.01712 (2020)
2010 – 2019
- 2019
- [j2]Hussein Oudah
, Bogdan V. Ghita
, Taimur Bakhshi
, Abdulrahman Alruban, David J. Walker
:
Using Burstiness for Network Applications Classification. J. Comput. Networks Commun. 2019: 5758437:1-5758437:10 (2019) - [c10]Saud Alotaibi, Abdulrahman Alruban, Steven Furnell, Nathan L. Clarke
:
A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications. ICISSP 2019: 246-251 - [c9]Abdulrahman Alruban, Hind Alobaidi, Nathan L. Clarke
, Fudong Li
:
Physical Activity Recognition by Utilising Smartphone Sensor Signals. ICPRAM 2019: 342-351 - [c8]Faisal Shaman, Bogdan V. Ghita
, Nathan L. Clarke
, Abdulrahman Alruban:
User Profiling Based on Application-Level Using Network Metadata. ISDFS 2019: 1-8 - [c7]Abdulrahman Alruban, Muhammed Abduallah, Gueltoum Bendiab, Stavros Shiaeles
, Marco A. Palomino
:
Improving Sentiment Analysis of Arabic Tweets. SSCC 2019: 146-158 - 2018
- [c6]Leith Abed
, Nathan L. Clarke
, Bogdan V. Ghita
, Abdulrahman Alruban:
Securing Cloud Storage by Transparent Biometric Cryptography. SecITC 2018: 97-108 - [c5]Abdulrahman Alruban, Nathan L. Clarke
, Fudong Li
, Steven Furnell:
Biometrically Linking Document Leakage to the Individuals Responsible. TrustBus 2018: 135-149 - 2017
- [c4]Abdulrahman Alruban, Nathan L. Clarke
, Fudong Li, Steven Furnell:
Insider Misuse Attribution using Biometrics. ARES 2017: 42:1-42:7 - [c3]Nathan L. Clarke, Fudong Li, Abdulrahman Alruban, Steven Furnell:
Insider Misuse Identification using Transparent Biometrics. HICSS 2017: 1-10 - 2016
- [j1]Abdulrahman Alruban, Nathan L. Clarke
, Fudong Li, Steven Furnell:
Leveraging Biometrics for Insider Misuse Identification. Int. J. Cyber Situational Aware. 1(1): 130-151 (2016) - [c2]Abdulrahman Alruban, Nathan L. Clarke
, Fudong Li, Steven Furnell
:
Proactive biometric-enabled forensic imprinting. Cyber Security And Protection Of Digital Services 2016: 1-15 - 2011
- [c1]Abdulrahman Alruban, Emlyn Everitt:
Two Novel 802.1x Denial of Service Attacks. EISIC 2011: 183-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint