Muhammad AL-Qurishi
Muhammad AL-Qurishi
Elm Company- Research & Innovation
Verified email at - Homepage
Cited by
Cited by
Resource allocation for service composition in cloud-based video surveillance platform
MS Hossain, MM Hassan, M Al Qurishi, A Alghamdi
2012 IEEE international conference on multimedia and expo workshops, 408-412, 2012
Evaluating the impact of a cloud-based serious game on obese people
A Alamri, MM Hassan, MA Hossain, M Al-Qurishi, Y Aldukhayyil, ...
Computers in Human Behavior 30, 468-475, 2014
Sybil defense techniques in online social networks: a survey
M Al-Qurishi, M Al-Rakhami, A Alamri, M Alrubaian, SMM Rahman, ...
IEEE Access 5, 1200-1219, 2017
A credibility analysis system for assessing information on twitter
M Alrubaian, M Al-Qurishi, MM Hassan, A Alamri
IEEE Transactions on Dependable and Secure Computing 15 (4), 661-674, 2016
Reputation‐based credibility analysis of Twitter social network users
M Alrubaian, M Al‐Qurishi, M Al‐Rakhami, MM Hassan, A Alamri
Concurrency and Computation: Practice and Experience 29 (7), e3873, 2017
A cloud-based serious games framework for obesity
MM Hassan, MS Hossain, A Alamri, MA Hossain, M Al-Qurishi, ...
Proceedings of the 1st ACM multimedia international workshop on Cloud-based …, 2012
A multistage credibility analysis model for microblogs
M AlRubaian, M Al-Qurishi, M Al-Rakhami, SMM Rahman, A Alamri
2015 IEEE/ACM International Conference on Advances in Social Networks …, 2015
Leveraging analysis of user behavior to identify malicious activities in large-scale social networks
M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri
IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017
Android vs. iOS: The security battle
F Al-Qershi, M Al-Qurishi, SMM Rahman, A Al-Amri
2014 World Congress on Computer Applications and Information Systems (WCCAIS …, 2014
A Framework for Cloud-Based Healthcare Services to Monitor Noncommunicable Diseases Patient
M Al-Qurishi, M Al-Rakhami, F Al-Qershi, MM Hassan, A Alamri, HU Khan, ...
International Journal of Distributed Sensor Networks 2015 (985629), 11, 2015
Selecting the best open source tools for collecting and visualzing social media content
M Al-Qurishi, M Al-Rakhami, M Alrubaian, A Alarifi, SMM Rahman, ...
2015 2nd world symposium on web applications and networking (WSWAN), 1-6, 2015
A prediction system of Sybil attack in social network using deep-regression model
M Al-Qurishi, M Alrubaian, SMM Rahman, A Alamri, MM Hassan
Future Generation Computer Systems 87, 743-753, 2018
Credibility in online social networks: A survey
M Alrubaian, M Al-Qurishi, A Alamri, M Al-Rakhami, MM Hassan, ...
IEEE Access 7, 2828-2855, 2018
An efficient key agreement protocol for Sybil-precaution in online social networks
M Al-Qurishi, SMM Rahman, MS Hossain, A Almogren, M Alrubaian, ...
Future Generation Computer Systems 84, 139-148, 2018
Classification of ankle joint movements based on surface electromyography signals for rehabilitation robot applications
MS Al-Quraishi, AJ Ishak, SA Ahmad, MK Hasan, M Al-Qurishi, ...
Medical & biological engineering & computing 55 (5), 747-758, 2017
Verifying the images authenticity in cognitive internet of things (CIoT)-oriented cyber physical system
MS Hossain, G Muhammad, MAL Qurishi
Mobile Networks and Applications 23 (2), 239-250, 2018
A new model for classifying social media users according to their behaviors
M Al-Qurishi, R Aldrees, M AlRubaian, M Al-Rakhami, SMM Rahman, ...
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-5, 2015
Cloud-based mobile IPTV terminal for video surveillance
MM Hassan, MA Hossain, M Al-Qurishi
16th International Conference on Advanced Communication Technology, 876-880, 2014
Secure distributed adaptive bin packing algorithm for cloud storage
I Mohiuddin, A Almogren, M Al Qurishi, MM Hassan, I Al Rassan, ...
Future Generation Computer Systems 90, 307-316, 2019
A novel prevention mechanism for Sybil attack in online social network
M AlRubaian, M Al-Qurishi, SMM Rahman, A Alamri
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015
The system can't perform the operation now. Try again later.
Articles 1–20