Follow
Taher Al-shehari
Title
Cited by
Cited by
Year
An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques
T Al-Shehari, RA Alsowail
Entropy 23 (10), 1258, 2021
912021
Empirical detection techniques of insider threat incidents
RA Alsowail, T Al-Shehari
IEEE Access 8, 78385-78402, 2020
332020
A multi-tiered framework for insider threat prevention
RA Alsowail, T Al-Shehari
Electronics 10 (9), 1005, 2021
282021
Improving operating system fingerprinting using machine learning techniques
T Al-Shehari, F Shahzad
International Journal of Computer Theory and Engineering 6 (1), 57, 2014
282014
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
T Al-Shehari, S Zhioua
Cluster Computing Journal 21 (2), 16, 2018
122018
Techniques and countermeasures for preventing insider threats
RA Alsowail, T Al-Shehari
PeerJ Computer Science 8, e938, 2022
92022
Wireless video streaming over Data Distribution Service middleware
B Al-madani, A Al-Roubaiey, T Al-shehari
2012 IEEE International Conference on Computer Science and Automation …, 2012
92012
SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures.
S Selvarajan, H Manoharan, C Iwendi, T Al-Shehari, M Al-Razgan, ...
Mathematical Biosciences and Engineering 20 (12), 20828-20851, 2023
62023
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
T Al-Shehari, RA Alsowail
International Journal of Information Security 22 (3), 611-629, 2023
52023
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs
I Pali, M Abdussami, R Amin, T Al-Shehari, M Al-Razgan, T Alfakih
Vehicular Communications 47, 100767, 2024
2024
Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm
T Al-Shehari, D Rosaci, M Al-Razgan, T Alfakih, M Kadrie, H Afzal, ...
IEEE Access, 2024
2024
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
S Selvarajan, A Shankar, M Uddin, AS Alqahtani, T Al‐Shehari, ...
Expert Systems, e13544, 2024
2024
Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning
N Zainab, H Afzal, T Al-Shehari, M Al-Razgan, N Iltaf, M Zakria, MJ Hyder, ...
IEEE Access 11, 127637-127650, 2023
2023
Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
T Al-Shehari, M Al-Razgan, T Alfakih, RA Alsowail, S Pandiaraj
IEEE Access, 2023
2023
Web browsers resistance to traffic analysis attacks
TAY Al-Shehari
http://eprints.kfupm.edu.sa/139421/, 2015
2015
Applications of GIS in Tourism Planning
TA Al-shehari
2012
The Minimum Covariance Determinant Technique for Insider Threat Detection in Communications and Network Security
T Al-Shehari, M Kadri, MN Al-Mhiqani, M Al-Razgan, T Alfakih
Available at SSRN 4766629, 0
The system can't perform the operation now. Try again later.
Articles 1–17