Mansour Alsaleh
Mansour Alsaleh
Joint Centers of Excellence Program & CCES at King Abdulaziz City for Science and Technology (KACST)
Verified email at - Homepage
Cited by
Cited by
Ultra wideband indoor positioning technologies: Analysis and recent advances
A Alarifi, AM Al-Salman, M Alsaleh, A Alnafessah, S Al-Hadhrami, ...
Sensors 16 (5), 707, 2016
Comparative survey of indoor positioning technologies, techniques, and algorithms
MA Al-Ammar, S Alhadhrami, A Al-Salman, A Alarifi, HS Al-Khalifa, ...
2014 International Conference on Cyberworlds, 245-252, 2014
Revisiting defenses against large-scale online password guessing attacks
M Alsaleh, M Mannan, PC Van Oorschot
IEEE Transactions on dependable and secure computing 9 (1), 128-141, 2011
If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts
A Almaatouq, E Shmueli, M Nouh, A Alabdulkareem, VK Singh, M Alsaleh, ...
International Journal of Information Security 15 (5), 475-491, 2016
Improving the economic complexity index
S Albeaik, M Kaltenberg, M Alsaleh, CA Hidalgo
arXiv preprint arXiv:1707.05826, 2017
Twitter turing test: Identifying social machines
A Alarifi, M Alsaleh, AM Al-Salman
Information Sciences 372, 332-346, 2016
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
M Alsaleh, N Alomar, A Alarifi
PloS one 12 (3), e0173284, 2017
Twitter: who gets caught? observed trends in social micro-blogging spam
A Almaatouq, A Alabdulkareem, M Nouh, E Shmueli, M Alsaleh, VK Singh, ...
Proceedings of the 2014 ACM conference on Web science, 33-41, 2014
Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks
M Alsaleh, C Adams
International Workshop on Privacy Enhancing Technologies, 59-77, 2006
Tsd: Detecting sybil accounts in twitter
M Alsaleh, A Alarifi, AM Al-Salman, M Alfayez, A Almuhaysin
2014 13th International Conference on Machine Learning and Applications, 463-469, 2014
Social information leakage: Effects of awareness and peer pressure on user behavior
M Nouh, A Almaatouq, A Alabdulkareem, VK Singh, E Shmueli, M Alsaleh, ...
International Conference on Human Aspects of Information Security, Privacy …, 2014
System and method of comparative evaluation for phishing mitigation
MA Alsaleh, AS Alarifi
US Patent 10,069,856, 2018
Visualizing PHPIDS log files for better understanding of web server attacks
M Alsaleh, A Alqahtani, A Alarifi, AM Al-Salman
Proceedings of the Tenth Workshop on Visualization for Cyber Security, 1-8, 2013
A model for evaluating the security and usability of e-banking platforms
A Alarifi, M Alsaleh, N Alomar
Computing 99 (5), 519-535, 2017
Social authentication applications, attacks, defense strategies and future research directions: a systematic review
N Alomar, M Alsaleh, A Alarifi
IEEE Communications Surveys & Tutorials 19 (2), 1080-1111, 2017
SECDEP: Software engineering curricula development and evaluation process using SWEBOK
A Alarifi, M Zarour, N Alomar, Z Alshaikh, M Alsaleh
Information and Software Technology 74, 114-126, 2016
Increasing traffic flows with dsrc technology: Field trials and performance evaluation
R Zhang, F Schmutz, K Gerard, A Pomini, L Basseto, SB Hassen, ...
IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society …, 2018
Web spam: A study of the page language effect on the spam detection features
A Alarifi, M Alsaleh
2012 11th International Conference on Machine Learning and Applications 2 …, 2012
Ultra wideband positioning: An analytical study of emerging technologies
S Alhadhrami, A Al-Salman, H Al-Khalifa, A Alarifi, A Alnafessah, ...
Proceedings of the Eighth International Conference on Sensor Technologies …, 2014
Improving security visualization with exposure map filtering
M Alsaleh, D Barrera, PC Van Oorschot
2008 Annual Computer Security Applications Conference (ACSAC), 205-214, 2008
The system can't perform the operation now. Try again later.
Articles 1–20