A comparison of malware detection techniques based on hidden Markov model S Alqurashi, O Batarfi Journal of Information Security 7 (3), 215-223, 2016 | 34 | 2016 |
Scrum of scrums solution for large size teams using scrum methodology SA Qurashi, M Qureshi arXiv preprint arXiv:1408.6142, 2014 | 20 | 2014 |
A comparison between API call sequences and opcode sequences as reflectors of malware behavior S Alqurashi, O Batarfi 2017 12th International Conference for Internet Technology and Secured …, 2017 | 13 | 2017 |
Study of the security enhancements in various e-mail systems AS Babrahem, ET Alharbi, AM Alshiky, SS Alqurashi, J Kar Journal of Information Security 6 (01), 1, 2014 | 10 | 2014 |
On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks S Alqurashi, H Shirazi, I Ray 2021 8th International Conference on Internet of Things: Systems, Management …, 2021 | 4 | 2021 |
Automated behavioral malware analysis system S Alqurashi, O Batarfi Information Technology: New Generations: 13th International Conference on …, 2016 | 3 | 2016 |
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements M Abdelgawad, I Ray, S Alqurashi, V Venkatesha, H Shirazi Proceedings of the 28th ACM Symposium on Access Control Models and …, 2023 | 2 | 2023 |
Automated Malware Detection Based on HMM and Genetic K-means SOB Alqurashi International Journal of Intelligent Computing Research 9 (1), 13, 2018 | | 2018 |
AUTOMATED EXTRACTION OF ACCESS CONTROL POLICY FROM NATURAL LANGUAGE DOCUMENTS S Alqurashi, I Ray, I Ray, Y Malaiya, S Simske Colorado State University. Libraries, 0 | | |