Follow
Abdulrahman Alarifi
Abdulrahman Alarifi
KACST, King Abdulaziz City for Science and Technology
Verified email at kacst.edu.sa
Title
Cited by
Cited by
Year
Ultra wideband indoor positioning technologies: Analysis and recent advances
A Alarifi, AM Al-Salman, M Alsaleh, A Alnafessah, S Al-Hadhrami, ...
Sensors 16 (5), 707, 2016
11672016
Comparative survey of indoor positioning technologies, techniques, and algorithms
MA Al-Ammar, S Alhadhrami, A Al-Salman, A Alarifi, HS Al-Khalifa, ...
2014 International Conference on Cyberworlds, 245-252, 2014
2282014
Twitter turing test: Identifying social machines
A Alarifi, M Alsaleh, AM Al-Salman
Information Sciences 372, 332-346, 2016
1222016
Earthquakes magnitude predication using artificial neural network in northern Red Sea area
ASN Alarifi, NSN Alarifi, S Al-Humidan
Journal of King Saud University-Science 24 (4), 301-313, 2012
1112012
System and method of comparative evaluation for phishing mitigation
MA Alsaleh, AS Alarifi
US Patent 10,069,856, 2018
902018
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15, 475-491, 2016
872016
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15, 475-491, 2016
872016
AbdulMalik Al-Salman, Mansour Alsaleh, Ahmad Alnafessah, Suheer Al-Hadhrami, Mai A Al-Ammar, and Hend S Al-Khalifa. Ultra wideband indoor positioning technologies: Analysis and …
A Alarifi
Sensors 16 (5), 707, 2016
812016
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
732017
Tsd: Detecting sybil accounts in twitter
M Alsaleh, A Alarifi, AM Al-Salman, M Alfayez, A Almuhaysin
2014 13th International Conference on Machine Learning and Applications, 463-469, 2014
732014
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
492014
Diversify sensor nodes to improve resilience against node compromise
A Alarifi, W Du
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
482006
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
442017
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99, 519-535, 2017
422017
An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review
M Zarour, A Abran, JM Desharnais, A Alarifi
Journal of Systems and Software 101, 180-192, 2015
402015
Performance-based comparative assessment of open source web vulnerability scanners
M Alsaleh, N Alomar, M Alshreef, A Alarifi, AM Al-Salman
Security and Communication Networks 2017, 2017
382017
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
342016
Social information leakage: Effects of awareness and peer pressure on user behavior
M Nouh, A Almaatouq, A Alabdulkareem, VK Singh, E Shmueli, M Alsaleh, ...
Human Aspects of Information Security, Privacy, and Trust: Second …, 2014
322014
Behavioral consequences of Pokémon GO: the exaggerated picture
N Alomar, M Alsaleh, A Alarifi
Computers in Human Behavior 90, 223-245, 2019
222019
Visualizing PHPIDS log files for better understanding of web server attacks
M Alsaleh, A Alqahtani, A Alarifi, AM Al-Salman
Proceedings of the Tenth Workshop on Visualization for Cyber Security, 1-8, 2013
212013
The system can't perform the operation now. Try again later.
Articles 1–20