Follow
Sulaiman Al amro
Sulaiman Al amro
Associate Professor , Computer college, Qassim University
Verified email at qu.edu.sa
Title
Cited by
Cited by
Year
A comparative study of virus detection techniques
S Al Amro, A Alkhalifah
International Journal of Computer and Information Engineering 9 (6), 1559-1566, 2015
262015
Cybercrime in Saudi Arabia: fact or fiction?
S Al Amro
International Journal of Computer Science Issues (IJCSI) 14 (2), 36, 2017
182017
Application of fuzzy logic in computer security and forensics
SA Amro, F Chiclana, DA Elizondo
Computational Intelligence for Privacy and Security, 35-49, 2012
142012
Evolutionary computation in computer security and forensics: An overview
SA Amro, DA Elizondo, A Solanas, A Martínez-Ballesté
Computational Intelligence for Privacy and Security, 25-34, 2012
112012
Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems.
A Alkhalifah, S Al Amro
J. Comput. 12 (2), 174-182, 2017
102017
How safe is governmental infrastructure: A cyber extortion and increasing ransomware attacks perspective
S Al Amro
International Journal of Computer Science and Information Security (IJCSIS …, 2020
62020
Behavioural API based virus analysis and detection
A Cau
International Journal of Computer Science and Information Security 10 (5), 14, 2012
52012
Behaviour-based virus detection system using Interval Temporal Logic
S Al Amro, A Cau
2011 6th International Conference on Risks and Security of Internet and …, 2011
52011
Computational Intelligence for Privacy and Security
DA Elizondo, A Solanas, A Martinez-Balleste
Springer, 2012
42012
A Security-Trust based Model for Identity Management Systems Adoption
A Alkhalifah, S Al-Amro
. International Journal of Information Technology & Computer Science 19 (2 …, 2015
3*2015
Cybercrime and its impact on e-government services and the private sector in the middle east
S Al Amro
International Journal of Computer Science and Information Security 14 (3), 69, 2016
22016
Behaviour-based Virus Analysis and Detection
S Al Amro
De Montfort University, 2013
12013
A study of Android Operating System Security.
S Al Amro
2nd International Conference of Computation and Communication Technologies …, 2017
2017
Vulnerabilities in Mobile Devices
S Al Amro
International Journal of Computer Science and Security (IJCSS) 11 (1), 34-41, 2017
2017
Computer Worms Based on Monitoring Replication and Damage: Experiment and Evaluation
S Al-Saawy, Y.B. and Al Amro
IOSR Journals (IOSR Journal of Computer Engineering) 19 (1), 31-49, 2017
2017
Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
YB Al-Saawy, S Al Amro
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
2016
A Comparative study of Computational Intelligence in ComputerSecurity and Forensics
S Al amro.
The 2011 IJCAI Workshop on Intelligent Security (SecArt), 2-9, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–17