Mohammed I. Al-Saleh, Ph.D.
Affiliations: | 2011 | Computer Science | University of New Mexico, Albuquerque, NM, United States |
Area:
Computer ScienceGoogle:
"Mohammed Al-Saleh"Parents
Sign in to add mentorJedidiah R. Crandall | grad student | 2011 | Univ. of New Mexico | |
(Fine-grained Reasoning about the Security and Usability Trade-off in Modern Security Tools.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Al-Sharif ZA, Al-Saleh MI, Alawneh LM, et al. (2020) Live forensics of software attacks on cyber–physical systems Future Generation Computer Systems. 108: 1217-1229 |
Al-Saleh MI, Al-Shamaileh MJ. (2017) Forensic artefacts associated with intentionally deleted user accounts International Journal of Electronic Security and Digital Forensics. 9: 167-179 |
Doush IA, Al-Saleh MI. (2017) Can genetic algorithms help virus writers reshape their creations and avoid detection Journal of Experimental and Theoretical Artificial Intelligence. 29: 1297-1310 |
Alsmirat MA, Obaidat I, Jararweh Y, et al. (2017) A security framework for cloud-based video surveillance system Multimedia Tools and Applications. 76: 22787-22802 |
Al-Saleh MI, Shebaro B. (2016) Enhancing malware detection: Clients deserve more protection International Journal of Electronic Security and Digital Forensics. 8: 1-16 |
Al-Saleh MI, AbuHjeela FM, Al-Sharif ZA. (2014) Investigating the detection capabilities of antiviruses under concurrent attacks International Journal of Information Security |
Al-saleh MI, Forihat YA. (2013) Skype Forensics in Android Devices International Journal of Computer Applications. 78: 38-44 |
Al-Saleh MI. (2013) The impact of the antivirus on the digital evidence International Journal of Electronic Security and Digital Forensics. 5: 229-240 |
Al-Saleh MI, Espinoza AM, Crandall JR. (2013) Antivirus performance characterisation: System-wide view Iet Information Security. 7: 126-133 |
Al-Saleh MI, Al-Sharif ZA. (2012) Utilizing data lifetime of TCP buffers in digital forensics: Empirical study Digital Investigation. 9: 119-124 |