Sulaiman Al amro
Sulaiman Al amro
Vice Dean, Computer college, Qassim University
Verified email at qu.edu.sa
Title
Cited by
Cited by
Year
A Comparative Study of Virus Detection Techniques
S Al Amro, A Alkhalifah
International Journal of Computer and Information Engineering 9 (6), 1566-1573, 2015
102015
Application of fuzzy logic in computer security and forensics
S Al Amro, F Chiclana, DA Elizondo
Computational Intelligence for Privacy and Security, 35-49, 2012
102012
Evolutionary computation in computer security and forensics: An overview
S Al Amro, DA Elizondo, A Solanas, A Martínez-Ballesté
Computational Intelligence for Privacy and Security, 25-34, 2012
82012
Cybercrime in Saudi Arabia: fact or fiction?
S Al Amro
International Journal of Computer Science Issues (IJCSI) 14 (2), 36, 2017
62017
Computational Intelligence for Privacy and Security
DA Elizondo, A Solanas, A Martinez-Balleste
Springer, 2012
52012
Behaviour-based virus detection system using Interval Temporal Logic
S Al Amro, A Cau
2011 6th International Conference on Risks and Security of Internet and …, 2011
42011
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems.
A Alkhalifah, S Al Amro
JCP 12 (2), 174-182, 2017
32017
Behavioural API based virus analysis and detection
A Cau
International Journal of Computer Science and Information Security 10 (5), 14, 2012
32012
Behaviour-based Virus Analysis and Detection
S Al Amro
De Montfort University, 2013
22013
Cybercrime and its impact on e-government services and the private sector in the middle east
S Al Amro
International Journal of Computer Science and Information Security 14 (3), 69, 2016
12016
How safe is governmental infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective
S Al Amro
International Journal of Computer Science and Information Security (IJCSIS …, 2020
2020
A study of Android Operating System Security.
S Al Amro
2nd International Conference of Computation and Communication Technologies …, 2017
2017
Vulnerabilities in Mobile Devices
S Al Amro
International Journal of Computer Science and Security (IJCSS) 11 (1), 34-41, 2017
2017
Computer Worms Based on Monitoring Replication and Damage: Experiment and Evaluation
S Al-Saawy, Y.B. and Al Amro
IOSR Journals (IOSR Journal of Computer Engineering) 19 (1), 31-49, 2017
2017
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
YB Al-Saawy, S Al Amro
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
2016
A Security-Trust based Model for Identity Management Systems Adoption
A Alkhalifah, S Al-Amro
. International Journal of Information Technology & Computer Science 19 (2 …, 2015
2015
A Comparative study of Computational Intelligence in ComputerSecurity and Forensics
S Al amro.
The 2011 IJCAI Workshop on Intelligent Security (SecArt), 2-9, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–17