An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques T Al-Shehari, RA Alsowail Entropy 23 (10), 1258, 2021 | 114 | 2021 |
A multi-tiered framework for insider threat prevention RA Alsowail, T Al-Shehari Electronics 10 (9), 1005, 2021 | 34 | 2021 |
Empirical detection techniques of insider threat incidents RA Alsowail, T Al-Shehari IEEE Access 8, 78385-78402, 2020 | 34 | 2020 |
Improving operating system fingerprinting using machine learning techniques T Al-Shehari, F Shahzad International Journal of Computer Theory and Engineering 6 (1), 57, 2014 | 28 | 2014 |
Techniques and countermeasures for preventing insider threats RA Alsowail, T Al-Shehari PeerJ Computer Science 8, e938, 2022 | 16 | 2022 |
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks T Al-Shehari, S Zhioua Cluster Computing Journal 21 (2), 16, 2018 | 14 | 2018 |
SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures. S Selvarajan, H Manoharan, C Iwendi, T Al-Shehari, M Al-Razgan, ... Mathematical Biosciences and Engineering 20 (12), 20828-20851, 2023 | 12 | 2023 |
Wireless video streaming over Data Distribution Service middleware B Al-madani, A Al-Roubaiey, T Al-shehari 2012 IEEE International Conference on Computer Science and Automation …, 2012 | 9 | 2012 |
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection T Al-Shehari, RA Alsowail International Journal of Information Security 22 (3), 611-629, 2023 | 6 | 2023 |
Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm T Al-Shehari, M Al-Razgan, T Alfakih, RA Alsowail, S Pandiaraj IEEE Access, 2023 | 3 | 2023 |
Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm T Al-Shehari, D Rosaci, M Al-Razgan, T Alfakih, M Kadrie, H Afzal, ... IEEE Access, 2024 | 1 | 2024 |
Insider threat detection in cyber-physical systems: a systematic literature review MN Al-Mhiqani, T Alsboui, T Al-Shehari, K hameed Abdulkareem, ... Computers and Electrical Engineering 119, 109489, 2024 | | 2024 |
TumorGANet: A Transfer Learning and Generative Adversarial Network-based Data Augmentation Model for Brain Tumor Classification A Nag, H Mondal, MM Hassan, T Al-Shehari, M Kadrie, M Al-Razgan, ... IEEE Access, 2024 | | 2024 |
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs I Pali, M Abdussami, R Amin, T Al-Shehari, M Al-Razgan, T Alfakih Vehicular Communications 47, 100767, 2024 | | 2024 |
Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning Z Anwar, H Afzal, T Al-Shehari, M Al-Razgan, T Alfakih, R Nawaz IEEE Access, 2024 | | 2024 |
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security S Selvarajan, A Shankar, M Uddin, AS Alqahtani, T Al‐Shehari, ... Expert Systems, e13544, 2024 | | 2024 |
Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning N Zainab, H Afzal, T Al-Shehari, M Al-Razgan, N Iltaf, M Zakria, MJ Hyder, ... IEEE Access 11, 127637-127650, 2023 | | 2023 |
Web browsers resistance to traffic analysis attacks TAY Al-Shehari http://eprints.kfupm.edu.sa/139421/, 2015 | | 2015 |