Dr. Majed AlRubaian
Cited by
Cited by
A hybrid deep learning model for efficient intrusion detection in big data environment
MM Hassan, A Gumaei, A Alsanad, M Alrubaian, G Fortino
Information Sciences 513, 386-396, 2020
A performance evaluation of machine learning-based streaming spam tweets detection
C Chen, J Zhang, Y Xie, Y Xiang, W Zhou, MM Hassan, A AlElaiwi, ...
IEEE Transactions on Computational social systems 2 (3), 65-76, 2015
Facial expression recognition utilizing local direction-based robust features and deep belief network
MZ Uddin, MM Hassan, A Almogren, A Alamri, M Alrubaian, G Fortino
IEEE Access 5, 4525-4536, 2017
A credibility analysis system for assessing information on twitter
M Alrubaian, M Al-Qurishi, MM Hassan, A Alamri
IEEE Transactions on Dependable and Secure Computing 15 (4), 661-674, 2016
Credibility in online social networks: A survey
M Alrubaian, M Al-Qurishi, A Alamri, M Al-Rakhami, MM Hassan, ...
IEEE Access 7, 2828-2855, 2018
Sybil defense techniques in online social networks: a survey
M Al-Qurishi, M Al-Rakhami, A Alamri, M Alrubaian, SMM Rahman, ...
IEEE Access 5, 1200-1219, 2017
Human activity recognition from body sensor data using deep learning
MM Hassan, S Huda, MZ Uddin, A Almogren, M Alrubaian
Journal of medical systems 42, 1-8, 2018
Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data
S Huda, S Miah, MM Hassan, R Islam, J Yearwood, M Alrubaian, ...
Information Sciences 379, 211-228, 2017
Leveraging analysis of user behavior to identify malicious activities in large-scale social networks
M Al-Qurishi, MS Hossain, M Alrubaian, SMM Rahman, A Alamri
IEEE Transactions on Industrial Informatics 14 (2), 799-813, 2017
Reputation‐based credibility analysis of Twitter social network users
M Alrubaian, M Al‐Qurishi, M Al‐Rakhami, MM Hassan, A Alamri
Concurrency and Computation: Practice and Experience 29 (7), e3873, 2017
BiSAL–A bilingual sentiment analysis lexicon to analyze Dark Web forums for cyber security
K Al-Rowaily, M Abulaish, NAH Haldar, M Al-Rubaian
Digital Investigation 14, 53-62, 2015
Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment
S Khatoon, SMM Rahman, M Alrubaian, A Alamri
IEEE access 7, 47962-47971, 2019
A prediction system of Sybil attack in social network using deep-regression model
M Al-Qurishi, M Alrubaian, SMM Rahman, A Alamri, MM Hassan
Future Generation Computer Systems 87, 743-753, 2018
Maximizing quality of experience through context‐aware mobile application scheduling in Cloudlet infrastructure
MR Mahmud, M Afrin, MA Razzaque, MM Hassan, A Alelaiwi, M Alrubaian
Software: Practice and Experience 46 (11), 1525-1545, 2016
Quality of service aware reliable task scheduling in vehicular cloud computing
T Adhikary, AK Das, MA Razzaque, A Almogren, M Alrubaian, ...
Mobile Networks and Applications 21, 482-493, 2016
Online extremism detection in textual content: a systematic literature review
S Aldera, A Emam, M Al-Qurishi, M Alrubaian, A Alothaim
IEEE Access 9, 42384-42396, 2021
A multistage credibility analysis model for microblogs
M AlRubaian, M Al-Qurishi, M Al-Rakhami, SMM Rahman, A Alamri
Proceedings of the 2015 IEEE/ACM international conference on advances in …, 2015
User trustworthiness in online social networks: A systematic review
M Alkhamees, S Alsaleem, M Al-Qurishi, M Al-Rubaian, A Hussain
Applied Soft Computing 103, 107159, 2021
Big media healthcare data processing in cloud: a collaborative resource management perspective
AK Das, T Adhikary, MA Razzaque, M Alrubaian, MM Hassan, MZ Uddin, ...
Cluster Computing 20, 1599-1614, 2017
Detecting spamming activities in twitter based on deep‐learning technique
T Wu, S Wen, S Liu, J Zhang, Y Xiang, M Alrubaian, MM Hassan
Concurrency and Computation: Practice and Experience 29 (19), e4209, 2017
The system can't perform the operation now. Try again later.
Articles 1–20