default search action
Suliman A. Alsuhibany
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Mohammad Tanvir Parvez, Suliman A. Alsuhibany:
Challenges and opportunities for Arabic CAPTCHAs. Multim. Tools Appl. 83(5): 14047-14062 (2024) - 2023
- [j25]Faneela, Muazzam Ali Khan, Suliman A. Alsuhibany, Walid El Shafai, Mujeeb Ur Rehman, Jawad Ahmad:
An Immutable Framework for Smart Healthcare Using Blockchain Technology. Comput. Syst. Sci. Eng. 46(1): 165-179 (2023) - [j24]Ejaz Khan, Muhammad Zia Ur Rehman, Fawad Ahmed, Suliman A. Alsuhibany, Muhammad Zulfiqar Ali, Jawad Ahmad:
An Automated Classification Technique for COVID-19 Using Optimized Deep Learning Features. Comput. Syst. Sci. Eng. 46(3): 3799-3814 (2023) - 2022
- [j23]Yazeed Ghadi, Madiha Javeed, Mohammed Alarfaj, Tamara Al Shloul, Suliman A. Alsuhibany, Ahmad Jalal, Shaharyar Kamal, Dong-Seong Kim:
MS-DLD: Multi-Sensors Based Daily Locomotion Detection via Kinematic-Static Energy and Body-Specific HMMs. IEEE Access 10: 23964-23979 (2022) - [j22]Master Prince, Suliman A. Alsuhibany, Nahid A. Siddiqi:
Correction to "A Step Towards the Optimal Estimation of Image Orientation". IEEE Access 10: 32171 (2022) - [j21]Romany Fouad Mansour, Suliman A. Alsuhibany, Sayed Abdel-Khalek, Randa Alharbi, Thavavel Vaiyapuri, Ahmed J. Obaid, Deepak Gupta:
Energy aware fault tolerant clustering with routing protocol for improved survivability in wireless sensor networks. Comput. Networks 212: 109049 (2022) - [j20]Suliman A. Alsuhibany:
Vibration-Based Pattern Password Approach for Visually Impaired People. Comput. Syst. Sci. Eng. 40(1): 341-356 (2022) - [j19]Suliman A. Alsuhibany, Meznah Alquraishi:
Usability and Security of Arabic Text-based CAPTCHA Using Visual Cryptography. Comput. Syst. Sci. Eng. 40(2): 421-440 (2022) - [j18]Azza Abdullah Alnssayan, Mohammad Mahdi Hassan, Suliman A. Alsuhibany:
VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records. Comput. Syst. Sci. Eng. 40(3): 927-945 (2022) - [j17]Emtethal K. Alamri, Abdullah M. Alnajim, Suliman A. Alsuhibany:
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks. Future Internet 14(3): 82 (2022) - [j16]Suliman A. Alsuhibany, Mohammad Tanvir Parvez:
Attack-filtered interactive arabic CAPTCHAs. J. Inf. Secur. Appl. 70: 103318 (2022) - [j15]Yazeed Ghadi, Manahil Waheed, Tamara Al Shloul, Suliman A. Alsuhibany, Ahmad Jalal, Jeongmin Park:
Automated Parts-Based Model for Recognizing Human-Object Interactions from Aerial Imagery with Fully Convolutional Network. Remote. Sens. 14(6): 1492 (2022) - [j14]Yazeed Ghadi, Adnan Ahmed Rafique, Tamara Al Shloul, Suliman A. Alsuhibany, Ahmad Jalal, Jeongmin Park:
Robust Object Categorization and Scene Classification over Remote Sensing Images via Features Fusion and Fully Convolutional Network. Remote. Sens. 14(7): 1550 (2022) - [j13]Muhammad Zia Ur Rehman, Fawad Ahmed, Suliman A. Alsuhibany, Sajjad Shaukat Jamal, Muhammad Zulfiqar Ali, Jawad Ahmad:
Classification of Skin Cancer Lesions Using Explainable Deep Learning. Sensors 22(18): 6915 (2022) - 2021
- [j12]Suliman A. Alsuhibany, Ayshah A. Alnoshan:
Interactive Handwritten and Text-Based Handwritten Arabic CAPTCHA Schemes for Mobile Devices: A Comparative Study. IEEE Access 9: 140991-141001 (2021) - [j11]Suliman A. Alsuhibany, Sayed Abdel-Khalek, Ali Algarni, Aisha Fayomi, Deepak Gupta, Vinay Kumar, Romany Fouad Mansour:
Ensemble of Deep Learning Based Clinical Decision Support System for Chronic Kidney Disease Diagnosis in Medical Internet of Things Environment. Comput. Intell. Neurosci. 2021: 4931450:1-4931450:13 (2021) - [j10]Suliman A. Alsuhibany, Latifah A. Alreshoodi:
Detecting human attacks on text-based CAPTCHAs using the keystroke dynamic approach. IET Inf. Secur. 15(2): 191-204 (2021) - [j9]Suliman A. Alsuhibany, Fatimah N. Almohaimeed, Naseem A. Alrobah:
Synthetic Arabic handwritten CAPTCHA. Int. J. Inf. Comput. Secur. 16(3/4): 385-398 (2021) - [j8]Suliman A. Alsuhibany:
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack. Secur. Commun. Networks 2021: 6653076:1-6653076:11 (2021) - [j7]Suliman A. Alsuhibany, Afnan S. Almuqbil:
Analyzing the Effectiveness of Touch Keystroke Dynamic Authentication for the Arabic Language. Wirel. Commun. Mob. Comput. 2021: 9963129:1-9963129:15 (2021) - 2020
- [j6]Mohammad Tanvir Parvez, Suliman A. Alsuhibany:
Segmentation-validation based handwritten Arabic CAPTCHA generation. Comput. Secur. 95: 101829 (2020) - [j5]Suliman A. Alsuhibany, Muna Almushyti, Fatimah Alkhudhayr:
Investigating the accuracy of free-text keystroke dynamics authentication in touchscreen devices. Int. J. Biom. 12(4): 430-445 (2020) - [j4]Suliman A. Alsuhibany:
Usability and shoulder surfing vulnerability of pattern passwords on mobile devices using camouflage patterns. J. Ambient Intell. Humaniz. Comput. 11(4): 1645-1655 (2020)
2010 – 2019
- 2019
- [j3]Suliman A. Alsuhibany:
Developing a Visual Cryptography Tool for Arabic Text. IEEE Access 7: 76573-76579 (2019) - [j2]Master Prince, Suliman A. Alsuhibany, Nahid A. Siddiqi:
A Step Towards the Optimal Estimation of Image Orientation. IEEE Access 7: 185750-185759 (2019) - [j1]Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham, Fatimah Alkhudhayr:
The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language. Inf. Comput. Secur. 27(2): 221-232 (2019) - 2016
- [c7]Suliman A. Alsuhibany, Mohammad Tanvir Parvez:
Secure Arabic Handwritten CAPTCHA Generation Using OCR Operations. ICFHR 2016: 126-131 - [c6]Suliman A. Alsuhibany, Muna Almushyti, Noorah Alghasham, Fatimah Alkhudier:
Analysis of free-text keystroke dynamics for Arabic language using Euclidean distance. IIT 2016: 1-6 - 2015
- [c5]Suliman A. Alsuhibany, Waleed Albattah:
Secure Defensive Mechanisms: An Appropriate Categorisation. DSDIS 2015: 33-37 - 2014
- [b1]Suliman Abdullah Alsuhibany:
Quantitative analysis of the release order of defensive mechanisms. Newcastle University, Newcastle upon Tyne, UK, 2014 - 2013
- [c4]Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel:
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms. CD-ARES Workshops 2013: 321-336 - [c3]Suliman A. Alsuhibany, Aad P. A. van Moorsel:
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. ARES 2013: 437-445 - [c2]Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel:
Detection of attack strategies. CRiSIS 2013: 1-8 - 2011
- [c1]Suliman A. Alsuhibany:
Optimising CAPTCHA Generation. ARES 2011: 740-745
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint