default search action
Abdulrahman Alarifi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j13]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Behavioral consequences of Pokémon GO: The exaggerated picture. Comput. Hum. Behav. 90: 223-245 (2019) - [j12]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts. Comput. Secur. 85: 300-312 (2019) - 2018
- [c26]Rusheng Zhang, Frank Schmutz, Kyle Gerard, Aurélien Pomini, Louis Basseto, Sami Ben Hassen, Adhishree Jaiprakash, Inci Ozgunes, Abdulrahman Alarifi, Hussam Aldossary, Issa Alkurtass, Omar Talabay, Areej Almohanna, S. AlGhamisi, Mansour Alsaleh, A. Ahmed Biyabani, Khaled Al-Ghoneim, Ozan K. Tonguz:
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation. IECON 2018: 6191-6196 - [i1]Rusheng Zhang, Frank Schmutz, Kyle Gerard, Aurélien Pomini, Louis Basseto, Sami Ben Hassen, Adhishree Jaiprakash, Inci Ozgunes, Abdulrahman Alarifi, Hussam Aldossary, Issa Alkurtass, Omar Talabay, Areej Almohanna, Shaha Alotaibi, Mansour Alsaleh, A. Ahmed Biyabani, Khaled Almohanna, Ozan K. Tonguz:
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation. CoRR abs/1807.01388 (2018) - 2017
- [j11]Abdulrahman Alarifi, Mansour Alsaleh, Noura Alomar:
A model for evaluating the security and usability of e-banking platforms. Computing 99(5): 519-535 (2017) - [j10]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review. IEEE Commun. Surv. Tutorials 19(2): 1080-1111 (2017) - [j9]Mansour Alsaleh, Noura Alomar, Monirah Alshreef, Abdulrahman Alarifi, AbdulMalik S. Al-Salman:
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. Secur. Commun. Networks 2017: 6158107:1-6158107:14 (2017) - [j8]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Someone in Your Contact List: Cued Recall-Based Textual Passwords. IEEE Trans. Inf. Forensics Secur. 12(11): 2574-2589 (2017) - 2016
- [j7]Abdullah Almaatouq, Erez Shmueli, Mariam Nouh, Ahmad Alabdulkareem, Vivek K. Singh, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex 'Sandy' Pentland:
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Sec. 15(5): 475-491 (2016) - [j6]Abdulrahman Alarifi, Mohammad Zarour, Noura Alomar, Ziyad Alshaikh, Mansour Alsaleh:
SECDEP: Software engineering curricula development and evaluation process using SWEBOK. Inf. Softw. Technol. 74: 114-126 (2016) - [j5]Abdulrahman Alarifi, Mansour Alsaleh, AbdulMalik S. Al-Salman:
Twitter turing test: Identifying social machines. Inf. Sci. 372: 332-346 (2016) - [j4]Abdulrahman Alarifi, AbdulMalik S. Al-Salman, Mansour Alsaleh, Ahmad Alnafessah, Suheer Alhadhrami, Mai A. Al-Ammar, Hend S. Al-Khalifa:
Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances. Sensors 16(5): 707 (2016) - 2015
- [j3]Siti Aisyah Salim, Darshana Sedera, Sukanlaya Sawang, Abdulrahman Alarifi, Maura Atapattu:
Moving from Evaluation to Trial: How do SMEs Start Adopting Cloud ERP? Australas. J. Inf. Syst. 19 (2015) - [j2]Mohammad Zarour, Alain Abran, Jean-Marc Desharnais, Abdulrahman Alarifi:
An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review. J. Syst. Softw. 101: 180-192 (2015) - [j1]Mansour Alsaleh, Abdulrahman Alarifi, Abdullah Alqahtani, AbdulMalik S. Al-Salman:
Visualizing web server attacks: patterns in PHPIDS logs‡. Secur. Commun. Networks 8(11): 1991-2003 (2015) - [c25]Hend AlRouqi, Abdulrahman Alarifi, Ahmad Alnafessah, Suheer Alhadhrami, Hend S. Al-Khalifa, AbdulMalik S. Al-Salman, Mai A. Al-Ammar:
Evaluating Arabic Text-to-Speech synthesizers for mobile phones. ICDIM 2015: 89-94 - [c24]Abdulrahman Alarifi, Darshana Sedera, Jan Recker:
Posters versus Lurkers: Improving Participation in Enterprise Social Networks through Promotional Messages. ICIS 2015 - [c23]Mansour Alsaleh, Abdulrahman Alarifi, Fatima Al-Quayed, AbdulMalik S. Al-Salman:
Combating Comment Spam with Machine Learning Approaches. ICMLA 2015: 295-300 - [c22]Ziyad Alshaikh, Mansour Alsaleh, Abdulrahman Alarifi, Mohammad Zarour:
Process improvement in governmental agencies: Toward CMMI certification. ISSRE Workshops 2015: 168-173 - [c21]Suheer Alhadhrami, Ahmad Alnafessah, Mai A. Al-Ammar, Abdulrahman Alarifi, Hend Suliman Al-Khalifa, Mansour Alsaleh:
UWB Indoor Tracking System for Visually Impaired People. MoMM 2015: 54-62 - [c20]Mansour Alsaleh, Abdulrahman Alarifi, Ziyad Alshaikh, Mohammad Zarour:
Online Banking Security and Usability - Towards an Effective Evaluation Framework. WEBIST 2015: 141-149 - 2014
- [c19]Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Mansour Alsaleh, Abdulrahman Alarifi, Abel Sanchez, Anas Alfaris, John R. Williams:
A malicious activity detection system utilizing predictive modeling in complex environments. CCNC 2014: 371-379 - [c18]Mai A. Al-Ammar, Suheer Alhadhrami, AbdulMalik S. Al-Salman, Abdulrahman Alarifi, Hend Suliman Al-Khalifa, Ahmad Alnafessah, Mansour Alsaleh:
Comparative Survey of Indoor Positioning Technologies, Techniques, and Algorithms. CW 2014: 245-252 - [c17]Mariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior. HCI (24) 2014: 352-360 - [c16]Mansour Alsaleh, Abdulrahman Alarifi, AbdulMalik S. Al-Salman, Mohammed Alfayez, Abdulmajeed Almuhaysin:
TSD: Detecting Sybil Accounts in Twitter. ICMLA 2014: 463-469 - [c15]Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K. Singh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Twitter: who gets caught? observed trends in social micro-blogging spam. WebSci 2014: 33-41 - 2013
- [c14]Abdulrahman Alarifi, Darshana Sedera:
Enhancing Enterprise Social Network Use: A Control Theory Study. ACIS 2013: 145 - [c13]Abdulrahman Alarifi, Mansour Alsaleh, AbdulMalik S. Al-Salman, Abdulmajeed Alswayed, Ahmad Alkhaledi:
Google Penguin: Evasion in Non-English Languages and a New Classifier. ICMLA (2) 2013: 274-280 - [c12]Ziyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh:
Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations. ISI 2013: 295-300 - [c11]Ziyad Alshaikh, Mansour Alsaleh, Abdulrahman Alarifi, Mohammad Zarour:
Toward a national strategy for Open Source Software. SIIT 2013: 1-12 - [c10]Mansour Alsaleh, Abdullah Alqahtani, Abdulrahman Alarifi, AbdulMalik S. Al-Salman:
Visualizing PHPIDS log files for better understanding of web server attacks. VizSEC 2013: 1-8 - 2012
- [c9]Abdulrahman Alarifi, Mansour Alsaleh:
Web Spam: A Study of the Page Language Effect on the Spam Detection Features. ICMLA (2) 2012: 216-221 - [c8]Mohammad Zarour, Jean-Marc Desharnais, Abdulrahman Alarifi, Naji Habra, Grégory Cassiers, Antoine Robaeys:
Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations. SPICE 2012: 51-61 - 2011
- [c7]Abdulrahman Alarifi, Issa Alkurtass, AbdulMalik S. Al-Salman:
Arabic Text-Dependent Speaker Verification for Mobile Devices Using Artificial Neural Networks. ICMLA (2) 2011: 350-353 - 2010
- [c6]Abdulrahman Alarifi:
Feedforward Neural Network Model for Earthquakes Magnitude Prediction in Northern Red Sea Area. IC-AI 2010: 1008-1014
2000 – 2009
- 2008
- [c5]Abdulrahman Alarifi:
Managing Diversity in Networks. Security and Management 2008: 363-373 - [c4]Khaled Al-Ghoneim, Abdulrahman Alarifi:
Online Arabic Character Recognition for Handheld Devices. IPCV 2008: 15-22 - 2006
- [c3]Abdulrahman Alarifi, Wenliang Du:
Diversify sensor nodes to improve resilience against node compromise. SASN 2006: 101-112 - 2005
- [c2]Abdulrahman Alarifi, Wenliang Du:
Risk-Based Routing Protocol for Wireless Ad-hoc Networks. ICWN 2005: 161-165 - [c1]Abdulrahman Alarifi:
Random Pairwise Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. ICWN 2005: 583-589
Coauthor Index
aka: AbdulMalik S. Al-Salman
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint