Mohammed I. Al-Saleh, Ph.D. - Publications

Affiliations: 
2011 Computer Science University of New Mexico, Albuquerque, NM, United States 
Area:
Computer Science

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Al-Sharif ZA, Al-Saleh MI, Alawneh LM, Jararweh YI, Gupta B. Live forensics of software attacks on cyber–physical systems Future Generation Computer Systems. 108: 1217-1229. DOI: 10.1016/J.Future.2018.07.028  0.426
2017 Al-Saleh MI, Al-Shamaileh MJ. Forensic artefacts associated with intentionally deleted user accounts International Journal of Electronic Security and Digital Forensics. 9: 167-179. DOI: 10.1504/Ijesdf.2017.10003678  0.39
2017 Doush IA, Al-Saleh MI. Can genetic algorithms help virus writers reshape their creations and avoid detection Journal of Experimental and Theoretical Artificial Intelligence. 29: 1297-1310. DOI: 10.1080/0952813X.2017.1354078  0.327
2017 Alsmirat MA, Obaidat I, Jararweh Y, Al-Saleh MI. A security framework for cloud-based video surveillance system Multimedia Tools and Applications. 76: 22787-22802. DOI: 10.1007/S11042-017-4488-1  0.428
2016 Al-Saleh MI, Shebaro B. Enhancing malware detection: Clients deserve more protection International Journal of Electronic Security and Digital Forensics. 8: 1-16. DOI: 10.1504/Ijesdf.2016.073728  0.423
2014 Al-Saleh MI, AbuHjeela FM, Al-Sharif ZA. Investigating the detection capabilities of antiviruses under concurrent attacks International Journal of Information Security. DOI: 10.1007/S10207-014-0261-X  0.505
2013 Al-saleh MI, Forihat YA. Skype Forensics in Android Devices International Journal of Computer Applications. 78: 38-44. DOI: 10.5120/13504-1253  0.336
2013 Al-Saleh MI. The impact of the antivirus on the digital evidence International Journal of Electronic Security and Digital Forensics. 5: 229-240. DOI: 10.1504/Ijesdf.2013.058656  0.351
2013 Al-Saleh MI, Espinoza AM, Crandall JR. Antivirus performance characterisation: System-wide view Iet Information Security. 7: 126-133. DOI: 10.1049/Iet-Ifs.2012.0192  0.456
2012 Al-Saleh MI, Al-Sharif ZA. Utilizing data lifetime of TCP buffers in digital forensics: Empirical study Digital Investigation. 9: 119-124. DOI: 10.1016/J.Diin.2012.09.001  0.385
2010 Al-Saleh MI, Crandall JR. On information flow for intrusion detection: What if accurate full-system dynamic information flow tracking was possible? Proceedings New Security Paradigms Workshop. 17-32. DOI: 10.1145/1900546.1900551  0.462
Show low-probability matches.