Sulaiman Al amro
Sulaiman Al amro
Vice Dean, Computer college, Qassim University
Verified email at qu.edu.sa
Title
Cited by
Cited by
Year
Application of fuzzy logic in computer security and forensics
S Al Amro, F Chiclana, DA Elizondo
Computational Intelligence for Privacy and Security, 35-49, 2012
102012
A Comparative Study of Virus Detection Techniques
S Al Amro, A Alkhalifah
International Journal of Computer and Information Engineering 9 (6), 1566-1573, 2015
92015
Evolutionary computation in computer security and forensics: An overview
S Al Amro, DA Elizondo, A Solanas, A Martínez-Ballesté
Computational Intelligence for Privacy and Security, 25-34, 2012
72012
Cybercrime in Saudi Arabia: fact or fiction?
S Al Amro
International Journal of Computer Science Issues (IJCSI) 14 (2), 36, 2017
52017
Computational Intelligence for Privacy and Security
DA Elizondo, A Solanas, A Martinez-Balleste
Springer, 2012
52012
Behaviour-based virus detection system using Interval Temporal Logic
S Al Amro, A Cau
2011 6th International Conference on Risks and Security of Internet and …, 2011
42011
Behavioural API based virus analysis and detection
A Cau
International Journal of Computer Science and Information Security 10 (5), 14, 2012
32012
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems.
A Alkhalifah, S Al Amro
JCP 12 (2), 174-182, 2017
22017
Behaviour-based Virus Analysis and Detection
S Al Amro
De Montfort University, 2013
22013
Cybercrime and its impact on e-government services and the private sector in the middle east
S Al Amro
International Journal of Computer Science and Information Security 14 (3), 69, 2016
12016
How safe is governmental infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective
S Al Amro
International Journal of Computer Science and Information Security (IJCSIS …, 2020
2020
A study of Android Operating System Security.
S Al Amro
2nd International Conference of Computation and Communication Technologies …, 2017
2017
Vulnerabilities in Mobile Devices
S Al Amro
International Journal of Computer Science and Security (IJCSS) 11 (1), 34-41, 2017
2017
Computer Worms Based on Monitoring Replication and Damage: Experiment and Evaluation
S Al-Saawy, Y.B. and Al Amro
IOSR Journals (IOSR Journal of Computer Engineering) 19 (1), 31-49, 2017
2017
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
YB Al-Saawy, S Al Amro
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
2016
A Security-Trust based Model for Identity Management Systems Adoption
A Alkhalifah, S Al-Amro
. International Journal of Information Technology & Computer Science 19 (2 …, 2015
2015
A Comparative study of Computational Intelligence in ComputerSecurity and Forensics
S Al amro.
The 2011 IJCAI Workshop on Intelligent Security (SecArt), 2-9, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–17