|Resource allocation for service composition in cloud-based video surveillance platform|
MS Hossain, MM Hassan, M Al Qurishi, A Alghamdi
2012 IEEE international conference on multimedia and expo workshops, 408-412, 2012
|Evaluating the impact of a cloud-based serious game on obese people|
A Alamri, MM Hassan, MA Hossain, M Al-Qurishi, Y Aldukhayyil, ...
Computers in Human Behavior 30, 468-475, 2014
|Sybil defense techniques in online social networks: a survey|
M Al-Qurishi, M Al-Rakhami, A Alamri, M Alrubaian, SMM Rahman, ...
IEEE Access 5, 1200-1219, 2017
|A credibility analysis system for assessing information on twitter|
M Alrubaian, M Al-Qurishi, MM Hassan, A Alamri
IEEE Transactions on Dependable and Secure Computing 15 (4), 661-674, 2016
|Reputation‐based credibility analysis of Twitter social network users|
M Alrubaian, M Al‐Qurishi, M Al‐Rakhami, MM Hassan, A Alamri
Concurrency and Computation: Practice and Experience 29 (7), e3873, 2017
|A cloud-based serious games framework for obesity|
MM Hassan, MS Hossain, A Alamri, MA Hossain, M Al-Qurishi, ...
Proceedings of the 1st ACM multimedia international workshop on Cloud-based …, 2012
|A multistage credibility analysis model for microblogs|
M AlRubaian, M Al-Qurishi, M Al-Rakhami, SMM Rahman, A Alamri
2015 IEEE/ACM International Conference on Advances in Social Networks …, 2015
|Leveraging analysis of user behavior to identify malicious activities in large-scale social networks|
M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri
IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017
|Android vs. iOS: The security battle|
F Al-Qershi, M Al-Qurishi, SMM Rahman, A Al-Amri
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
|A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient|
M Al-Qurishi, M Al-Rakhami, F Al-Qershi, MM Hassan, A Alamri, HU Khan, ...
International Journal of Distributed Sensor Networks 2015 (985629), 11, 2015
|Selecting the best open source tools for collecting and visualzing social media content|
M Al-Qurishi, M Al-Rakhami, M Alrubaian, A Alarifi, SMM Rahman, ...
2015 2nd world symposium on web applications and networking (WSWAN), 1-6, 2015
|A prediction system of Sybil attack in social network using deep-regression model|
M Al-Qurishi, M Alrubaian, SMM Rahman, A Alamri, MM Hassan
Future Generation Computer Systems 87, 743-753, 2018
|Credibility in online social networks: A survey|
M Alrubaian, M Al-Qurishi, A Alamri, M Al-Rakhami, MM Hassan, ...
IEEE Access 7, 2828-2855, 2018
|An efficient key agreement protocol for Sybil-precaution in online social networks|
M Al-Qurishi, SMM Rahman, MS Hossain, A Almogren, M Alrubaian, ...
Future Generation Computer Systems 84, 139-148, 2018
|Classification of ankle joint movements based on surface electromyography signals for rehabilitation robot applications|
MS Al-Quraishi, AJ Ishak, SA Ahmad, MK Hasan, M Al-Qurishi, ...
Medical & biological engineering & computing 55 (5), 747-758, 2017
|Verifying the images authenticity in cognitive internet of things (CIoT)-oriented cyber physical system|
MS Hossain, G Muhammad, MAL Qurishi
Mobile Networks and Applications 23 (2), 239-250, 2018
|A new model for classifying social media users according to their behaviors|
M Al-Qurishi, R Aldrees, M AlRubaian, M Al-Rakhami, SMM Rahman, ...
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-5, 2015
|Cloud-based mobile IPTV terminal for video surveillance|
MM Hassan, MA Hossain, M Al-Qurishi
16th International Conference on Advanced Communication Technology, 876-880, 2014
|Secure distributed adaptive bin packing algorithm for cloud storage|
I Mohiuddin, A Almogren, M Al Qurishi, MM Hassan, I Al Rassan, ...
Future Generation Computer Systems 90, 307-316, 2019
|A novel prevention mechanism for Sybil attack in online social network|
M AlRubaian, M Al-Qurishi, SMM Rahman, A Alamri
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015