Follow
Saja Alqurashi
Saja Alqurashi
Verified email at colostate.edu - Homepage
Title
Cited by
Cited by
Year
A comparison of malware detection techniques based on hidden Markov model
S Alqurashi, O Batarfi
Journal of Information Security 7 (3), 215-223, 2016
342016
Scrum of scrums solution for large size teams using scrum methodology
SA Qurashi, M Qureshi
arXiv preprint arXiv:1408.6142, 2014
202014
A comparison between API call sequences and opcode sequences as reflectors of malware behavior
S Alqurashi, O Batarfi
2017 12th International Conference for Internet Technology and Secured …, 2017
132017
Study of the security enhancements in various e-mail systems
AS Babrahem, ET Alharbi, AM Alshiky, SS Alqurashi, J Kar
Journal of Information Security 6 (01), 1, 2014
102014
On the performance of isolation forest and multi layer perceptron for anomaly detection in industrial control systems networks
S Alqurashi, H Shirazi, I Ray
2021 8th International Conference on Internet of Things: Systems, Management …, 2021
42021
Automated behavioral malware analysis system
S Alqurashi, O Batarfi
Information Technology: New Generations: 13th International Conference on …, 2016
32016
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements
M Abdelgawad, I Ray, S Alqurashi, V Venkatesha, H Shirazi
Proceedings of the 28th ACM Symposium on Access Control Models and …, 2023
22023
Automated Malware Detection Based on HMM and Genetic K-means
SOB Alqurashi
International Journal of Intelligent Computing Research 9 (1), 13, 2018
2018
AUTOMATED EXTRACTION OF ACCESS CONTROL POLICY FROM NATURAL LANGUAGE DOCUMENTS
S Alqurashi, I Ray, I Ray, Y Malaiya, S Simske
Colorado State University. Libraries, 0
The system can't perform the operation now. Try again later.
Articles 1–9