default search action
Mansour Alsaleh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c23]Bader Alaskar, Abdullah Alhadlaq, Meshal Alharbi, Saud Alghumayjan, Ahmad Alabdulkareem, Mansour Alsaleh, Devavrat Shah:
Next-day Electricity Demand Forecast: A New Ensemble Recommendation System Using Peak and Valley. ISGT 2021: 1-5 - [c22]Meshal Alharbi, Saud Alghumayjan, Mansour Alsaleh, Devavrat Shah, Ahmad Alabdulkareem:
Electricity Non-Technical Loss Detection: Enhanced Cost-Driven Approach Utilizing Synthetic Control. ISGT 2021: 1-5 - 2020
- [c21]Sarah Alnegheimish, Najat Alrashed, Faisal Aleissa, Shahad Althobaiti, Dongyu Liu, Mansour Alsaleh, Kalyan Veeramachaneni:
Cardea: An Open Automated Machine Learning Framework for Electronic Health Records. DSAA 2020: 536-545 - [i2]Sarah Alnegheimish, Najat Alrashed, Faisal Aleissa, Shahad Althobaiti, Dongyu Liu, Mansour Alsaleh, Kalyan Veeramachaneni:
Cardea: An Open Automated Machine Learning Framework for Electronic Health Records. CoRR abs/2010.00509 (2020)
2010 – 2019
- 2019
- [j15]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Behavioral consequences of Pokémon GO: The exaggerated picture. Comput. Hum. Behav. 90: 223-245 (2019) - [j14]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts. Comput. Secur. 85: 300-312 (2019) - 2018
- [c20]Rusheng Zhang, Frank Schmutz, Kyle Gerard, Aurélien Pomini, Louis Basseto, Sami Ben Hassen, Adhishree Jaiprakash, Inci Ozgunes, Abdulrahman Alarifi, Hussam Aldossary, Issa Alkurtass, Omar Talabay, Areej Almohanna, S. AlGhamisi, Mansour Alsaleh, A. Ahmed Biyabani, Khaled Al-Ghoneim, Ozan K. Tonguz:
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation. IECON 2018: 6191-6196 - [i1]Rusheng Zhang, Frank Schmutz, Kyle Gerard, Aurélien Pomini, Louis Basseto, Sami Ben Hassen, Adhishree Jaiprakash, Inci Ozgunes, Abdulrahman Alarifi, Hussam Aldossary, Issa Alkurtass, Omar Talabay, Areej Almohanna, Shaha Alotaibi, Mansour Alsaleh, A. Ahmed Biyabani, Khaled Almohanna, Ozan K. Tonguz:
Increasing Traffic Flows with DSRC Technology: Field Trials and Performance Evaluation. CoRR abs/1807.01388 (2018) - 2017
- [j13]Abdulrahman Alarifi, Mansour Alsaleh, Noura Alomar:
A model for evaluating the security and usability of e-banking platforms. Computing 99(5): 519-535 (2017) - [j12]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review. IEEE Commun. Surv. Tutorials 19(2): 1080-1111 (2017) - [j11]Mansour Alsaleh, Noura Alomar, Monirah Alshreef, Abdulrahman Alarifi, AbdulMalik S. Al-Salman:
Performance-Based Comparative Assessment of Open Source Web Vulnerability Scanners. Secur. Commun. Networks 2017: 6158107:1-6158107:14 (2017) - [j10]Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Someone in Your Contact List: Cued Recall-Based Textual Passwords. IEEE Trans. Inf. Forensics Secur. 12(11): 2574-2589 (2017) - 2016
- [j9]Abdullah Almaatouq, Erez Shmueli, Mariam Nouh, Ahmad Alabdulkareem, Vivek K. Singh, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex 'Sandy' Pentland:
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. Int. J. Inf. Sec. 15(5): 475-491 (2016) - [j8]Abdulrahman Alarifi, Mohammad Zarour, Noura Alomar, Ziyad Alshaikh, Mansour Alsaleh:
SECDEP: Software engineering curricula development and evaluation process using SWEBOK. Inf. Softw. Technol. 74: 114-126 (2016) - [j7]Abdulrahman Alarifi, Mansour Alsaleh, AbdulMalik S. Al-Salman:
Twitter turing test: Identifying social machines. Inf. Sci. 372: 332-346 (2016) - [j6]Abdulrahman Alarifi, AbdulMalik S. Al-Salman, Mansour Alsaleh, Ahmad Alnafessah, Suheer Alhadhrami, Mai A. Al-Ammar, Hend S. Al-Khalifa:
Ultra Wideband Indoor Positioning Technologies: Analysis and Recent Advances. Sensors 16(5): 707 (2016) - [c19]Tarfah Alrashed, Jumana Almahmoud, Mohamad Alrished, Sattam Alsubaiee, Mansour Alsaleh, Carlos Sandoval Olascoaga:
Social Communities in Urban Mobility Systems. HCI (12) 2016: 177-187 - [c18]Tariq Alhindi, Salma Aldawood, Jumana Almahmoud, Carlos Sandoval, Areej Al-Wabil, Mansour Alsaleh, Sarah Williams:
Towards Urban Tribes in Saudi Arabia: Social Subcultures Emerging from Urban Analytics of Social Media. HCI (12) 2016: 258-266 - 2015
- [j5]Mansour Alsaleh, Abdulrahman Alarifi, Abdullah Alqahtani, AbdulMalik S. Al-Salman:
Visualizing web server attacks: patterns in PHPIDS logs‡. Secur. Commun. Networks 8(11): 1991-2003 (2015) - [c17]Mansour Alsaleh, Abdulrahman Alarifi, Fatima Al-Quayed, AbdulMalik S. Al-Salman:
Combating Comment Spam with Machine Learning Approaches. ICMLA 2015: 295-300 - [c16]Ziyad Alshaikh, Mansour Alsaleh, Abdulrahman Alarifi, Mohammad Zarour:
Process improvement in governmental agencies: Toward CMMI certification. ISSRE Workshops 2015: 168-173 - [c15]Suheer Alhadhrami, Ahmad Alnafessah, Mai A. Al-Ammar, Abdulrahman Alarifi, Hend Suliman Al-Khalifa, Mansour Alsaleh:
UWB Indoor Tracking System for Visually Impaired People. MoMM 2015: 54-62 - [c14]Mansour Alsaleh, Abdulrahman Alarifi, Ziyad Alshaikh, Mohammad Zarour:
Online Banking Security and Usability - Towards an Effective Evaluation Framework. WEBIST 2015: 141-149 - 2014
- [c13]Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Mansour Alsaleh, Abdulrahman Alarifi, Abel Sanchez, Anas Alfaris, John R. Williams:
A malicious activity detection system utilizing predictive modeling in complex environments. CCNC 2014: 371-379 - [c12]Mai A. Al-Ammar, Suheer Alhadhrami, AbdulMalik S. Al-Salman, Abdulrahman Alarifi, Hend Suliman Al-Khalifa, Ahmad Alnafessah, Mansour Alsaleh:
Comparative Survey of Indoor Positioning Technologies, Techniques, and Algorithms. CW 2014: 245-252 - [c11]Mariam Nouh, Abdullah Almaatouq, Ahmad Alabdulkareem, Vivek K. Singh, Erez Shmueli, Mansour Alsaleh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Social Information Leakage: Effects of Awareness and Peer Pressure on User Behavior. HCI (24) 2014: 352-360 - [c10]Mansour Alsaleh, Abdulrahman Alarifi, AbdulMalik S. Al-Salman, Mohammed Alfayez, Abdulmajeed Almuhaysin:
TSD: Detecting Sybil Accounts in Twitter. ICMLA 2014: 463-469 - [c9]Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K. Singh, Abdulrahman Alarifi, Anas Alfaris, Alex Pentland:
Twitter: who gets caught? observed trends in social micro-blogging spam. WebSci 2014: 33-41 - 2013
- [j4]Mansour Alsaleh, Paul C. van Oorschot:
Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors. Int. J. Inf. Sec. 12(2): 97-110 (2013) - [c8]Abdulrahman Alarifi, Mansour Alsaleh, AbdulMalik S. Al-Salman, Abdulmajeed Alswayed, Ahmad Alkhaledi:
Google Penguin: Evasion in Non-English Languages and a New Classifier. ICMLA (2) 2013: 274-280 - [c7]Ziyad Alshaikh, Abdulrahman Alarifi, Mansour Alsaleh:
Christopher Alexander's fifteen properties: Toward developing evaluation metrics for security visualizations. ISI 2013: 295-300 - [c6]Ziyad Alshaikh, Mansour Alsaleh, Abdulrahman Alarifi, Mohammad Zarour:
Toward a national strategy for Open Source Software. SIIT 2013: 1-12 - [c5]Mansour Alsaleh, Abdullah Alqahtani, Abdulrahman Alarifi, AbdulMalik S. Al-Salman:
Visualizing PHPIDS log files for better understanding of web server attacks. VizSEC 2013: 1-8 - 2012
- [j3]Mansour Alsaleh, Paul C. van Oorschot:
Revisiting network scanning detection using sequential hypothesis testing. Secur. Commun. Networks 5(12): 1337-1350 (2012) - [j2]Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot:
Revisiting Defenses against Large-Scale Online Password Guessing Attacks. IEEE Trans. Dependable Secur. Comput. 9(1): 128-141 (2012) - [c4]Abdulrahman Alarifi, Mansour Alsaleh:
Web Spam: A Study of the Page Language Effect on the Spam Detection Features. ICMLA (2) 2012: 216-221 - 2011
- [c3]Mansour Alsaleh, Paul C. van Oorschot:
Network scan detection with LQS: a lightweight, quick and stateful algorithm. AsiaCCS 2011: 102-113
2000 – 2009
- 2008
- [c2]Mansour Alsaleh, David Barrera, Paul C. van Oorschot:
Improving Security Visualization with Exposure Map Filtering. ACSAC 2008: 205-214 - 2007
- [j1]Liam Peyton, Jun Hu, Hao Liu, Mansour Alsaleh, Abdulmotaleb El-Saddik:
A collaborative approval process for accessing sensitive data. Int. J. Comput. Appl. Technol. 29(1): 45-53 (2007) - 2006
- [c1]Mansour Alsaleh, Carlisle Adams:
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. Privacy Enhancing Technologies 2006: 59-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint