Mohammed I. Al-Saleh, Ph.D. - Publications
Affiliations: | 2011 | Computer Science | University of New Mexico, Albuquerque, NM, United States |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2020 | Al-Sharif ZA, Al-Saleh MI, Alawneh LM, Jararweh YI, Gupta B. Live forensics of software attacks on cyber–physical systems Future Generation Computer Systems. 108: 1217-1229. DOI: 10.1016/J.Future.2018.07.028 | 0.426 | |||
2017 | Al-Saleh MI, Al-Shamaileh MJ. Forensic artefacts associated with intentionally deleted user accounts International Journal of Electronic Security and Digital Forensics. 9: 167-179. DOI: 10.1504/Ijesdf.2017.10003678 | 0.39 | |||
2017 | Doush IA, Al-Saleh MI. Can genetic algorithms help virus writers reshape their creations and avoid detection Journal of Experimental and Theoretical Artificial Intelligence. 29: 1297-1310. DOI: 10.1080/0952813X.2017.1354078 | 0.327 | |||
2017 | Alsmirat MA, Obaidat I, Jararweh Y, Al-Saleh MI. A security framework for cloud-based video surveillance system Multimedia Tools and Applications. 76: 22787-22802. DOI: 10.1007/S11042-017-4488-1 | 0.428 | |||
2016 | Al-Saleh MI, Shebaro B. Enhancing malware detection: Clients deserve more protection International Journal of Electronic Security and Digital Forensics. 8: 1-16. DOI: 10.1504/Ijesdf.2016.073728 | 0.423 | |||
2014 | Al-Saleh MI, AbuHjeela FM, Al-Sharif ZA. Investigating the detection capabilities of antiviruses under concurrent attacks International Journal of Information Security. DOI: 10.1007/S10207-014-0261-X | 0.505 | |||
2013 | Al-saleh MI, Forihat YA. Skype Forensics in Android Devices International Journal of Computer Applications. 78: 38-44. DOI: 10.5120/13504-1253 | 0.336 | |||
2013 | Al-Saleh MI. The impact of the antivirus on the digital evidence International Journal of Electronic Security and Digital Forensics. 5: 229-240. DOI: 10.1504/Ijesdf.2013.058656 | 0.351 | |||
2013 | Al-Saleh MI, Espinoza AM, Crandall JR. Antivirus performance characterisation: System-wide view Iet Information Security. 7: 126-133. DOI: 10.1049/Iet-Ifs.2012.0192 | 0.456 | |||
2012 | Al-Saleh MI, Al-Sharif ZA. Utilizing data lifetime of TCP buffers in digital forensics: Empirical study Digital Investigation. 9: 119-124. DOI: 10.1016/J.Diin.2012.09.001 | 0.385 | |||
2010 | Al-Saleh MI, Crandall JR. On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible? Proceedings New Security Paradigms Workshop. 17-32. DOI: 10.1145/1900546.1900551 | 0.462 | |||
Show low-probability matches. |