Suliman A. Alsuhibany

  • Citations Per Year
Learn More
CAPTCHA is a test that can, automatically, tell human and computer programmes apart. It is now almost a standard security technology, and has found widespread application on commercial websites. Robustness and usability are two fundamental aspects with CAPTCHA. The robustness of a text CAPTCHA is typically determined by the strength of its(More)
An intrusion and attack detection system usually focuses on classifying a record as either normal or abnormal. In some cases such as insider attacks, attackers rely on feedback from the attacked system, which enables them to gradually manipulate their attempts in order to avoid detection. This paper proposes the notion of accumulative manipulation that can(More)
Twitter has attracted the attention of many researchers owing to the fact that every tweet is, by default, public in nature which is not the case with Facebook. In this paper, we present sentiment analysis of tweets written in English, belonging to different telecommunication companies in Saudi Arabia. We apply different machine learning algorithms such as(More)
Online services play an increasingly important role in executing tasks in many aspects of our lives. These services depend greatly on authentication mechanisms in order to give sufficient protection to the provided data. Since the traditional username and password scheme suffers from various security and usability drawbacks, this paper investigates a(More)
A defensive mechanism, which encompasses a variety of services and protections, has been proposed by several researchers for many organizations to protect system resources from misuse. In the practical use of defensive mechanisms such as CAPTCHAs and spam filters, attackers and defenders exchange 'victories,' each celebrating (temporary) success in breaking(More)
While security algorithms are utilized to protect system resources from misuse, using a single algorithm such as CAPTCHAs and Spam-Filters as a defence mechanism can work to protect a system against current attacks. However, as attackers learn from their attempts, this algorithm will eventually become useless and the system is no longer protected. We(More)