الرجاء الأنتظار ..
جامعة القصيم
عمادة البحث العلمي
 
نظام الحصاد البحثي
الأبحاث المنشورة في المؤتمرات والندوات وورش العمل الدولية المحكمة في جامعة القصيم
فضلا مراعات التالي: يتم تحديث البيانات كل 10 ساعات ولذلك قد لا يظهر أي تعديل حدث في خلال تلك الفترة
شروط البحث: الأبحاث المنشورة في المؤتمرات والندوات وورش العمل الدولية المحكمة
  • المشاركة في المؤتمرات والندوات وورش العمل

    • الأبحاث المنشورة في المؤتمرات والندوات وورش العمل الدولية المحكمة

      • S. Mohamed, G. Rubino, M. Soliman, and F. Chammas.

        Levenberg-Marquardt Training Algorithm for Random Neural Networks

        Proc. of the 2nd International Computer Engineering Conference Engineering the Information Society (ICENCO), Cario, Egypt.
        Dec. 2006
      • S. Mohamed, G. Rubino, M. Soliman, and F. Chammas.

        A New Approach for Traffic Prediction Exploiting Short-term and Long-term Dependencies

        Proc. of the 2nd International Computer Engineering Conference Engineering the Information Society (ICENCO), Cario, Egypt.
        Dec. 2006
      • M. Soliman, S. Mohamed, S. Hassan, and S. Sedukhin..

        A Highly Efficient Implementation of Back Propagation Algorithm by Matrix ISA

        Proc. of the International Conference on Humains and Computers, Aizu, Japan,.
        Sept. 2005
      • S. Mohamed, W. Ata, N. Darwish.

        A New Technique for Automatic Text Categorization for Arabic Documents

        Proc. of 5th International Conference on Internet and Information Technology in Modern Organizations (IBIMA), Cario, Egypt..
        Dec. 2005
      • S. Mohamed and G. Rubino.

        Evaluation of Packet Video Quality in Real-time using RNN

        Random Neural Networks workshop, Madrid, Spain.
        2002
      • S. Mohamed, G. Rubino and F. Cervantes, H. Afifi.

        Real-Time Video Quality Assessment in Packet Networks: A Neural Network Model

        Proceedings of International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'2001), Las Vegas, Nevada, USA..
        June 2001
      • S. Mohamed, F. Cervantes and H. Afifi..

        Integrating Networks Measurements and Speech Quality Subjective Scores for Control Purposes

        Proceedings of the IEEE INFOCOM'01, Alaska, USA..
        April 22-26 2001
      • S. Mohamed, F. Cervantes and H. Afifi.

        Audio Quality Assessment in Packet Networks: an Inter-Subjective Neural Network Model

        Proceedings of the 15th International Conference on Information Networking (ICOIN-15), Japan.
        2001
      • د حسام أحمد الحمد Dr. Husam Ahmed Al Hamad.

        Over-Segmentation of Handwriting Arabic Scripts using an Efficient Heuristic Technique

        ICMLPR 2010 : "International Conference on Machine Learning and Pattern Recognition".
        November 24-26 2010
      • د حسام أحمد الحمد Dr. Husam Ahmed Al Hamad.

        Neural-Based Segmentation Technique for Arabic Handwriting Recognition

        ICMLPR 2010 : "International Conference on Machine Learning and Pattern Recognition".
        November 24-26 2010 Venice, Italy
      • Gamil abdel azim . M. K. Sousow.

        Multi Layer Feed Forward Neural Networks For Olive trees Identification

        :"IASTED. Conference on "Artificial Intelligence and Application ", 11-13 February..
        11-13 February 2008
      • Al-Shabi, M.A., Othman, M., Johari, R., Subramanian, S.

        New algorithm to avoid crosstalk in optical multistage inter connection networks

        Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication., 2005 13th IEEE International Conference on.
        11 2005
      • M. A. Al-Shabi, M. Othman, R. Johari and S. Subramanian.

        Zero Algorithms: to Avoid Crosstalk in Optical Multistage Interconnection Networks

        proceedings of Brunei International Conference on Engineering and Technology(BICET2005).
        10 2005
      • Abdullah Alnajim and Malcolm Munro.

        An Evaluation of Users' Tips Effectiveness for Phishing Websites Detection

        Proceedings of the third IEEE International Conference on Digital Information Management ICDIM, London, IEEE Press.
        November 2008 pp. 63-68
      • Abdullah Alnajim and Malcolm Munro.

        Effects of Technical Abilities and Phishing Knowledge on Phishing Websites Detection

        The IASTED International Conference on Software Engineering (SE 2009), Innsbruck, Austria, ACTA Press.
        February 2009 pp. 120-125
      • Abdullah Alnajim and Malcolm Munro.

        An Evaluation of Users’ Anti-Phishing Knowledge Retention

        The International Conference on 2009 International Conference on Information Management and Engineering (ICIME 2009), Kuala Lumpur, Malaysia, IEEE Press.
        April 2009 pp. 210-214
      • Abdullah Alnajim and Malcolm Munro.

        An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection

        The 6th International Conference on Information Technology - New Generations (ITNG), Las Vegas, USA, IEEE Press.
        April 2009 pp. 405-410
      • Abdullah Alnajim and Malcolm Munro.

        An Approach to the Implementation of the Anti-Phishing Tool for Phishing Websites Detection

        The International Conference on Intelligent Networking and Collaborative Systems (INCoS 2009), Barcelona, Spain, IEEE Press.
        November 2009 pp. 105 - 112
      • Abdullah Alnajim.

        High Level Anti-Phishing Countermeasure: A Case Study

        The World Congress on Internet Security (WorldCIS-2011), London, UK, IEEE Press.
        February 2011 To Appear
      • محمد عبد الله الهاجري، عبد الرقيب اسعد.

        Using Computer as tools in teaching and evaluating’

        The second international conference in information techniques.
        1998 University of Philadelphia, Jordon
      • Mohammed Abdullah Al-Hagery, Abdul Azim Abdul Ghani, Md Nasir Sulaiman, Mohd Hasan Selamat.

        Multiple components for general system characteristics to adjust the Function Point calculations accuracy

        Advanced Technology Congress, Putrajaya, Malaysia.
        May 2003
      • Mohammed Abdullah Al-Hagery, Abdul Azim Abdul Ghani, Md Nasir Sulaiman.

        Reducing the error gap of cost estimation in software systems using Function Point measure

        Integrating Technology in the Mathematical Sciences, USM- Malaysia.
        April 2003
      • Mohammed Abdullah Al-Hajri, Abdul Azim Abdul Ghani, Md Nasir Sulaiman.

        New method for reducing the error value of Function Point in software effort estimation

        Advanced Technology Congress, Putra Jaya, Malaysia.
        May . 2003
      • Abdullah I. Al-Shoshan.

        Systems Identification Using the Complex Cepstrum and the Evolutionary Spectral Theory

        ICSP96, Bejing, China.
        1996
      • Abdullah I. Al-Shoshan.

        Time-Varying Modeling Using the World-Cramer Representation

        ICSP96, Bejing, China.
        1996
      • Abdullah I. Al-Shoshan.

        Mathematical Modeling and Order Estimation of a Non-Stationary Signal

        11th International Conf. On Mathematical Modeling and Scientific Computing, Washington DC, USA.
        1997
      • Abdullah I. Al-Shoshan.

        Time-Varying Modeling of a Non-Stationary Signal

        CAINE-97 (The 10th International Conf. On Computer Applications in Industry and Engineering), pp. 79-82, Texas-USA.
        1997
      • Abdullah I. Al-Shoshan.

        Arabic OCR Based on Image Invariants

        IEEE Computer Society, Geometric Modeling and Imaging--New Trends (GMAI'06), UK, pp. 150-154.
        2006
      • Abdullah I. Al-Shoshan.

        A Joint Distribution Approach for Audio Signal Discrimination

        IEEE Computer Society, Geometric Modeling and Imaging--New Trends (GMAI'06), UK, pp. 233-238.
        2006
      • Abdullah I. Al-Shoshan.

        Handwritten Signature Verification Using Image Invariants and Dynamic Features

        ACM, 3rd International Conference on Computer Graphics, Imaging and Visualisation (CGIV06), 25-28 July 2006, University Technology of Sydney, Sydney, Australia, pp. 173-176.
        2006
      • Abdullah I. Al-Shoshan and Lius F. Chaparro.

        System Identification and Modeling of Non-Stationary Signals

        IEEE-SP Int. Sympos on TF and TS Analysis, Philadelphia, PA, pp. 25-28.
        1994
      • Ashraf S. Nasr, Mahmoud Ali Ashour (ا.د. محمود على عاشور).

        Experimental Studies for the Evaluation of Non-Ionizing Radiation Levels

        The Second All African IRPA Regional Radiation Protection Congress.
        April 2007 pp. 223-230
      • Ashraf S. Nasr.

        Effect of ionizing radiation on the characteristics of photodetectors

        The Second All African IRPA Regional Radiation Protection Congress.
        April 2007 pp. 231-241
      • Ashraf S. Nasr, Mohamed B. El_Mashade, M. Ashry.

        Characteristics determination of Quantum Well Infrared Photodetectors

        IEEE Mediterranean Microwave Symposium (MMS’2003).
        Mar. 2003 pp. 29-40
      • Ashraf S. Nasr, Mohamed B. El_Mashade, M. Ashry.

        Characteristic of Quantum Dot Infrared Photodetectors

        IEEE Mediterranean Microwave Symposium (MMS’2003).
        Mar. 2003 pp. 41-51, Cairo, Egypt
      • Ashraf S. Nasr, Mostfa Ashry (ا.م.د. مصطفى عشرى).

        Computer aided analysis of TM- Multimode planar graded -index optical waveguides and the field distribution

        Seventh Conference of Nuclear & Applications.
        February 2000 Cairo, Egypt 6-10
      • Ashraf S. Nasr, Ahmed A. Abou El-fadl, Taha E. Taha and Anwar A. Abou-Enein.

        Computer Aided analysis of Multimode planar graded -index optical waveguides

        The 2nd IMACS , International Multiconference CESA’98.
        April 1998 pp.1-4 Nabeul-Hammamet, Tunisia,
      • M. Ben Othman.

        A Fixed wireless network emulator For wireless ATM and Time Division Multiple Access (TDMA)

        SCS04 (Signals Circuits and Systems) international conference sponsored by IEEE.
        March 18-21 2004
      • M. Ben Othman, G. A. Azim, A. Hamdi-Cherif.

        Pairwise Sequence Alignment Revisited – Genetic Algorithms and Cosine Functions

        NAUN conference, Attica, Greece.
        June 1-3 2008
      • Ansari, G.A., K. Vinod and Ansari, M.S.H.

        “ Securing Data & Information into Database Through UML”

        International Conference on Recent Trends in Management, Technology, Environment.
        2009
      • V. Saxena and Ansari, G.A.,.

        “ UML Modeling for Patient Registration System”

        International Conference on Quantitative Methods, Operations and Information Technology for Managerial Decision Making ICQMOIT.
        2008
      • Aboubeker Hamdi-Cherif, Chafia Kara-Mohamed alias Hamdi-Cherif.

        Interactions between elearning and agents

        Int. Conf. On Inf. and Comp. Systems ICICS’04, EEE Computer Society, pp. 115-129.
        November 2004 Dhahran, Saudi Arabia, http://faculty.kfupm.edu.sa/coe/sadiq/proceedings/ICICS2004
      • Farid Nouioua, Aboubekeur Hamdi-Cherif.

        Using age, competition and dynamic parameters to control the population’s diversity of an evolutionary algorithm

        International Symposium on Innovations in Intelligent SysTems and Applications, IEEE Turkey Section.
        June 2009 Trabzon, Turkey
      • Farid Nouioua, Aboubekeur Hamdi-Cherif.

        An evolutionary algorithm with age, competition and dynamic parameters

        The 11th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems IPMU'2006.
        July 2006 Paris, France
      • Gamil Abdel-Azim, Mohamed Ben Othman, Z. A. Abo-Eleneen.

        Multiple Proteins Sequence Alignment based on Progressive Methods with New Guide Tree

        International Conference on Bioscience and Bioinformatics (ICBB '10), Vouliagmeni, Athens, Greece.
        December 29-31 2010
      • Issam Jabri, Krommenacker N, Adel Soudani, Thierry Divoux & Salem Nasri.

        Gestion de la qualité de service et équilibrage de charges dans les réseaux sans fils IEEE 802.11

        4th International Conference on Sciences of Electronic, Technologies of Information and Telecommunications, Hammamet, Tunisia, 2007. (SETIT’2007).
        2007 2007
      • Yassine Bensalem, Salem Nasri..

        Development of algorithms based on the neural network technique for quality control and classification of tissues.”

        The Fourth Libyan Arab International Conference on Electrical and Electronic Engineering, March 20–23, Tripoli, Libya, 2006.
        2006 2006
      • Shahid Lone, Shahab Khushnood.

        Analysis of Mechanical Autofrettage in Thick Cyclinders.

        13th International Conference on Nuclear Engineering, Beijing China..
        May 16 to 20 2005
      • Saloum S.S..

        Arabic Hand-Written Text Recognition

        ACS/IEEE International Conference on Computer systems and Applications (AICCSA 2001).
        25-29 June 2001
      • Saloum S.S..

        Handwritten text thinning algorithms

        III International Conference on Information Technology, Izhevsk-Russia.
        23-24 may 2001
      • Saloum S.S..

        Arabic Hand-written Text Recognition Using Critical points

        Sixth Multi-Conference on Systemic, Cybernetics and Information (SCI2002), Orlando, Florida, USA.
        24-26, July 2002
      • Saloum S.S., Kuchuganov V.N..

        Recognition Arabic Language

        IV International Conference on Information Technology, Izhevsk-Russia.
        29-30 May 2003 Recognition, Arabic Language
      • Aboubekeur Hamdi-Cherif and Chafia Kara-Mohamed alias Hamdi-Cherif.

        Interactions between elearning and agents

        Int. Conf. On Inf. and Comp. Systems ICICS’04, EEE Computer Society, Dhahran, Saudi Arabia..
        November 2004 pp. 115-129, http://faculty.kfupm.edu.sa/coe/sadiq/proceedings/ICICS2004
      • A.H. Sadiyal and M.Saleem.

        Oscillation in exactly solvable predator-prey Volterra Models

        Inproc.Int. conf. Math. Modeling(Ed. Bani Sing et. Al).
        2001
      • A. Karim El-Din , A. A. Sallam, A. A. Girgis.

        EMTP Simulation of Advanced Compensated (ASC) Transmission Lines

        Proc. of 4th International Middle East Power Systems Conference IEEE-MEPCON 96, Luxur, Egypt.
        1996
      • Karim El-Din.

        Adaptive protection of series compensated transmission lines

        Proceedings of the 36th Universities Power Engineering Conference, UPEC 36, University of Wales, Swansea, U.K.
        September 2001
      • A Karim El-Din.

        Fault location technique in series compensated transmission lines

        Proc. of 7th Middle East Power Systems Conf. IEEE-MEPCON’ 2001, Helwan University, Cairo, Egypt, 2001.
        2001
      • A Karim El-Din.

        Double-circuit transmission lines protection and accurate fault location

        Proc. of 9th Middle East Power Systems Conf. IEEE-MEPCON’ 2003, December 2003, Shebin El-Kom, Egypt.
        2003
      • Abdullah Alaraj and Malcolm Munro.

        An e-commerce Fair Exchange Protocol for exchanging Digital Products and Payments

        In Proceedings of IEEE/ACM ICDIM'2007.
        October 2007
      • Abdullah Alaraj and Malcolm Munro.

        An Efficient Fair Exchange Protocol that Enforces the Merchant to be Honest

        In Proceedings of IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing 2007, CollaborateCom 2007, New York,.
        2007
      • Abdullah Alaraj and Malcolm Munro.

        An efficient e-Commerce Fair Exchange Protocol that encourages Customer and Merchant to be Honest

        In the proceedings of the 27th International Conference on Computer Safety, Reliability and Security, 2008 (SafeComp 2008).
        2008 Lecture Notes In Computer Science, LNCS, Vol. 5219, pp. 193-206
      • Abdullah Alaraj.

        Ownership Transfer Protocol

        In Proceedings of the 5th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2010), November 8-11, 2010, London, UK.
        2010
      • Aboubekeur Hamdi-Cherif, Chafia Kara-Mohammed alias Hamdi-Cherif.

        Evolutionary Multiobjective Optimization for Medical Classification

        2011 IEEE GCC Conference & Exhibition, "For Sustainable Ubiquitous Technology", Dubai, United Arab Emirates.
        February 2011 pp. 441-444, 19-22 February 2011. http://www.ieeexplore.org
      • Aboubekeur Hamdi-Cherif.

        The CASCIDA Project - A Computer-Aided System Control for Interactive Design and Analysis

        Proceedings of IEEE / IFAC Joint Symposium on CACSD, CASCD’94, Tucson, AZ, USA.
        March 1994 pp.247-251, IEEE #94TH0619-7. ISBN 0-7803-1800-5, http://ieeexplore.org
      • Aboubekeur Hamdi-Cherif, Noureddine Golea and Mohammed-Laid Hadjili.

        Modal control by microcomputer : a sample program from the CASCIDA Project

        Proceedings of the European Simulation Multiconference, ESM’94, Barcelona, Spain.
        June 1994 , pp. 748-752. 1-3 June 1994. ISBN 1-56555-028-5
      • Aboubekeur Hamdi-Cherif.

        Two CACSD packages for classical control and self-tuning regulator design as further sample programs from the CASCIDA Project

        Proceedings of the European Simulation Multiconference (ESM’94), Barcelona, Spain.
        June 1994 pp. 726-730, ISBN 1-56555-028-5
      • Aboubekeur Hamdi-Cherif.

        A unifying framework for computer-aided engineering (CAE) with reference to computer-aided control system design (CACSD)

        Proceedings of the First Asian Control Conference (ASCC’94), Tokyo, Japan.
        July 1994 ,Vol. 1, pp. 45-48, ISBN 4-9900275-0-7
      • Aboubekeur Hamdi-Cherif.

        The intellectual environment for a CACSD project

        Proceedings of the IEEE Conference on Control Applications (CCA’94).Glasgow, Scotland,.
        August 1994 pp. 1365-1366. http://www.ieeexplore.org
      • Aboubekeur Hamdi-Cherif, Chafia Kara-Mohammed alias Hamdi-Cherif.

        Evolutionary Multiobjective Optimization for Medical Classification

        2011 IEEE GCC Conference & Exhibition, "For Sustainable Ubiquitous Technology", Dubai, United Arab Emirates,.
        February 2011 pp. 441-444, 19-22, http://www.ieeexplore.org
      • Gamil Abdel-Azim, Mohamed Ben Othman and Abo-Eleneen, Z. A.

        Multiple Proteins Sequence Alignment Based on Progressive Methods with New Guide Tree.

        International Conference on Bioscience and Bioinformatics (ICBB '10) Vouliagmeni, Athens, Greece, December 29-31, 2010..
        December 29-31, 2010
      • Abdullah Mohammed Alaraj.

        Purchase of Physical Products Online

        The 3rd International Conference on Multimedia Computing and Systems -ICMCS'12.
        May 2012
      • Ahmad A. Al-Hajji.

        Quality Parameters Analysis of Computer Control Systems

        The 1st Taibah University International Conference on Computing and Information Technology /ICCIT 2012.
        12-14/3 2012 Qassim University, Computer College, PO Box 6688 – 51452, Buraydah
      • Ahmad A. Al-Hajji.

        Rule-Based Expert System for Diagnosis and Symptom of Neurological Disorders “Neurologist Expert System /NES

        The 1st Taibah University International Conference on Computing and Information Technology /ICCIT 2012.
        12-14/3 2012 Qassim University, Computer College, P.O. Box 6688, Qassim – 51452, Buraydah
      • Ali Alkhalifah and John D'Ambra.

        Applying Task-Technology Fit to the Adoption of Identity Management Systems

        The 22nd Australasian Conference on Information Systems (ACIS2011), Sydney, Australia.
        December 2011
      • Ali Alkhalifah and John D'Ambra.

        A Research Methodology to Explore User Acceptance of Identity Management Systems

        the First International Conference on Emerging Research Paradigms in Business and Social Sciences (ERPBSS2011). Middlesex University Dubai, Dubai, United Arab of Emirates.
        November 2011
      • Ali Alkhalifah and John D'Ambra.

        Factors Effecting the Adoption of Identity Management Systems: An Empirical Study

        The 16th Pacific Asia Conference on Information Systems (PACIS2012), Ho Chi Minh city, Vietnam.
        July 2012
      • Ali Alkhalifah and John D'Ambra.

        The Role of Identity Management Systems in Enhancing Protection of User Privacy

        The International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012), IEEE, Kuala Lumpur, Malaysia.
        July 2012
      • Ali Alkhalifah and John D'Ambra.

        The Role of Trust in the Initial Adoption of Identity Management Systems

        The 21st International Conference on Information Systems Development (ISD2012), Prato, Italy.
        August 2012
      • Sulaiman Al amro, Antonio Cau.

        Behaviour-based Virus Detection System using Interval Temporal Logic

        The 6th IEEE International Conference on Risks and Security of Internet and Systems (CRISIS 2011).
        24-26/09 2011
      • Sulaiman Al amro, Antonio Cau.

        Behaviour-based Virus Detection System using Interval Temporal Logic

        The 6th IEEE International Conference on Risks and Security of Internet and Systems (CRISIS 2011).
        24-26/09 2011
      • Al Amro., Aldrawiesh, K. and Al-Ajlan A.

        A Comparative study of Computational Intelligence in Computer Security and Forensics

        The 2011 IJCAI Workshop on Intelligent Security (SecArt).
        July 2011
      • Abdullah I. Al-Shoshan.

        Identification of a linear, time-varying System Using the Time-Varying Higher-Order Statistics

        ,” 6th International Conference on SP (ICSP02), Vol. 1, Bejing, China.
        2002
      • Abdullah I. Al-Shoshan.

        LTV System Identification Using the Time-Varying Autocorrelation Function and Application to Audio Signal Discrimination

        6th International Conference on SP (ICSP02), Vol. 1, pp. 239-242, Bejing, China.
        2002
      • Abdullah I. Al-Shoshan.

        Modeling of a Non-Stationary Process Corrupted by a Symmetrically Distributed Noise Using The Evolutionary Bispectrum

        CAINE-2011 (The 24th International Conf. On Computer Applications in Industry and Engineering), Honolulu, Hawaii, USA, pp. 272-277, 14-16 Nov 2011.
        2011
      • Abdullah I. Al-Shoshan.

        On-Line Individual Verification Using Typing Velocity

        CAINE-2011 (The 24th International Conf. On Computer Applications in Industry and Engineering), Honolulu, Hawaii, USA, pp. 70-74, 14-16 Nov. 2011.
        2011
      • Abdullah I. Al-Shoshan.

        NMP-LTI System Identification Using Evolutionary Spectral Representation

        The 25th International Conf. On Computer Applications in Industry and Engineering (CAINE-2012), New Orleans, Louisiana, USA, pp. 69-73, 16-18 Nov 2012.
        2012
      • Abdullah I. Al-Shoshan.

        A Classification of Music, Speech and Mixture Signals Via Fuzzy Logic

        The 28th International Conference on Computers and Their Applications, (CATA-2013), Honolulu, Hawaii, USA, pp., 117-122 March 2013.
        2013
      • Abdullah I. Al-Shoshan.

        Identification and Modeling of an LTV System Using Time-Varying Sum-of-Pseudo-Cumulants

        The 26th International Conf. On Computer Applications in Industry and Engineering (CAINE-2013), Los Angeles, California, USA, pp. 97-100, 25-27 September 2013.
        2013
      • Mohamed Tahar Ben Othman.

        New Image Watermarking Scheme based on Image Content Addressing Method

        The 13th WSEAS International Conference on Applied Computer and Applied Computational Science, Kuala-Lumpur, Malaysia.
        23-25 April 2014
      • Abdullah I. Al-Shoshan.

        Parametric Identification of an LTI System Using the Evolutionary Spectrum

        The 29th International Conference on Computers and Their Applications, (CATA-2014).
        March 2014
      • Abdulgader Almutairi.

        A Web-based Policy Editor for SANTA

        the 5th Saudi International Conference, in proceedings of ICT Workshop in The University of Warwick, Coventry, 23-26 June SIC2011, Coventry UK, ISBN:978-0-9569045..
        23-26 June 2011
      • Abdulgader. Almutairi, and Francois. Siewe.

        CA-UCON: a context-aware usage control model

        Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems, CASEMANS’11 - Beijing, China, pages 38–43, 2011..
        13-Sep 2011
      • Abdugader. Almutairi, and Francois. Siewe.

        Formal Specification of CA-UCON model using CCA

        Science and Information Conference 2013. 7-9 October 2013, London, UK..
        7-9 Oct 2013
      • Abdulgader. Almutairi, and Francois. Siewe.

        Modelling Usage Control of a U-learning System using CA-UCON

        The 4th Workshop on Service Discovery and Composition in Ubiquitous and Pervasive Environments (SUPE’2013). August 26-28, 2013, Cyprus..
        26-28 August 2013
      • W. Alkhaldi. S. Almutairi. A. Almutairi and K. Aldrawiesh.

        (Toward Development Context Aware Advertisement system (Case Study

        ). in proceedings of the IEEE 2011 International Conference on Computer Applications and Net- work Security (ICCANS 2011), May 27th-29th 2011 in Maldives, IEEE Press, CFP1182M-PRT/ISBN: 978-1-4244-9764-5..
        27-29 May 2011
      • Alsuhibany, Suliman A..

        Optimising Captcha Generation

        In Availability, Reliability and Security (ARES), 2011 Sixth International Conference on, pp. 740-745. IEEE.
        22-26 Aug 2011
      • Alsuhibany, Suliman A., and Aad van Moorsel..

        Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets

        Eighth International Conference on Availability, Reliability and Security, IEEE.
        2-6 Sept. 2013
      • Alsuhibany, Suliman A., Ahmad Alonaizi, Charles Morisset, Chris Smith, and Aad van Moorsel..

        Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms

        In Security Engineering and Intelligence Informatics, Springer Berlin Heidelberg.
        2-6 Sept 2013
      • Alsuhibany, Suliman A., A. Alonizi, Charles Morisset, and A. van Moorsel.

        Optimizing the Release Order of Defensive Mechanisms.

        In 29th Annual UK Performance Engineering Workshop.
        2-4 Jul 2012
      • Alsuhibany, S. A., Morisset C., and van Moorsel, A..

        Detection of Attack Strategies

        In 8th International Conference on Risks and Security of Internet and Systems (CRiSIS’13), IEEE.
        October 23-25 2013
      • Alsuhibany, S. A., Alonaizi, A., Smith, C., and van Moorsel, A..

        Optimizing the Release Order of Defensive Mechanisms

        School of Computing Science Technical Report Series 1333.
        2012
      • Mohamed Tahar Ben Othman.

        Digital Image Watermarking based on Clustering

        The 3rd International Conference on Circuits, Systems, Communications, Computers and Applications (CSCCA '14).
        22-24 November 2014 http://www.wseas.us/e-library/conferences/2014/Florence/CSCCA/CSCCA-34.pdf
      • MK Siddiqui, S Nahid, Mohammad Nazrul Islam Khan.

        A review of Quaranic web portals through data mining

        2nd International Conference on Computational & Social Sciences,.
        2014
      • Abdullah I. Al-Shoshan.

        Analysis of a Linear, Time-Dependent Process Using Evolutionary Parameters

        The 4th International Conference on Electronics, Communications and Networks (CECNet 2014),.
        12 2014
      • A.Alkhalifah & S.Al-Amro.

        A Security-Trust based Model for Identity Management Systems Adoption

        The 4th International Conference on Computer Science, Information System and Communication Technologies ( ICCSISCT 2015 ),Sydney,Australia.
        March 2015
      • A.Alkhalifah & J.D'Ambra.

        Identity Management Systems Research: Framework, Emergence, and Future Opportunities

        (The 23rd European Conference on Information Systems (ECIS 2015),Munster, Germany(Accepted to be published.
        25-29 May 2015
      • ,Ali Alkhalifah, Sulaiman Al amro.

        A Security-Trust based Model for Identity Management Systems Adoption

        The 4th International Conference on Computer Science, Information System and Communication Technologies ( ICCSISCT 2015 ).
        23-3 2015
      • Waleed Albattah and Saleh Almugrin.

        Frequent Pattern Mining in Software Engineering

        22nd International Conference on Software Engineering and Data Engineering (SEDE).
        Sep 20 2013
      • Waleed Albattah and Austin Melton.

        Package cohesion classification

        5th IEEE International Conference on Software Engineering and Service Science (ICSESS).
        Jun 30 2014
      • Waleed Albattah, Saleh Almugrin, Omar Alaql, Musaad Alzahrani, and Austin Melton.

        Instability and Abstractness Metrics Based on Responsibility

        IEEE 38th Annual Computer Software and Applications Conference (COMPSAC).
        20 July 2014
      • Sulaiman Al amro; Ali Alkhalifah..

        A Comparative Study of Virus Detection Techniques

        The ICCSIE 2015 : 17th International Conference on Computer Science and Information Engineering.
        4-5/06 2015 New York, USA
      • Mohamed Tahar Ben Othman.

        لغة الضاد للبرمجة

        3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015).
        1-3 October 2015 Konya, Turkey
      • Habib Hamam, Mohamed Tahar Ben Othman, Amal Kilani, Mehdi Ben Ammar and Fehmi Ncibi.

        Data mining in Sciences of the prophet’s tradition in general and in impeachment and amendment in particular

        3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015).
        1-3 October 2015 Konya, Turkey
      • Habib Hamam, Mohamed Tahar Ben Othman, Amal Kilani, Mehdi Ben Ammar and Fehmi Ncibi.

        Data Mining in the Quran Using Aspects and Dependencies

        3rd International Conference on Islamic Applications in Computer Science and Technologies (IMAN 2015).
        1-3 October 2015 Konya, Turkey
 
 
  عدد زيارات هذا الموقع 4976276
جميع الحقوق محفوظة لعمادة البحث العلمي بجامعة القصيم ©