关注
Taher Al-shehari
Taher Al-shehari
Faculty Member at King Saud University
在 ksu.edu.sa 的电子邮件经过验证
标题
引用次数
引用次数
年份
An insider data leakage detection using one-hot encoding, synthetic minority oversampling and machine learning techniques
T Al-Shehari, RA Alsowail
Entropy 23 (10), 1258, 2021
1142021
A multi-tiered framework for insider threat prevention
RA Alsowail, T Al-Shehari
Electronics 10 (9), 1005, 2021
342021
Empirical detection techniques of insider threat incidents
RA Alsowail, T Al-Shehari
IEEE Access 8, 78385-78402, 2020
342020
Improving operating system fingerprinting using machine learning techniques
T Al-Shehari, F Shahzad
International Journal of Computer Theory and Engineering 6 (1), 57, 2014
282014
Techniques and countermeasures for preventing insider threats
RA Alsowail, T Al-Shehari
PeerJ Computer Science 8, e938, 2022
162022
An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks
T Al-Shehari, S Zhioua
Cluster Computing Journal 21 (2), 16, 2018
142018
SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures.
S Selvarajan, H Manoharan, C Iwendi, T Al-Shehari, M Al-Razgan, ...
Mathematical Biosciences and Engineering 20 (12), 20828-20851, 2023
122023
Wireless video streaming over Data Distribution Service middleware
B Al-madani, A Al-Roubaiey, T Al-shehari
2012 IEEE International Conference on Computer Science and Automation …, 2012
92012
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
T Al-Shehari, RA Alsowail
International Journal of Information Security 22 (3), 611-629, 2023
62023
Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm
T Al-Shehari, M Al-Razgan, T Alfakih, RA Alsowail, S Pandiaraj
IEEE Access, 2023
32023
Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm
T Al-Shehari, D Rosaci, M Al-Razgan, T Alfakih, M Kadrie, H Afzal, ...
IEEE Access, 2024
12024
Insider threat detection in cyber-physical systems: a systematic literature review
MN Al-Mhiqani, T Alsboui, T Al-Shehari, K hameed Abdulkareem, ...
Computers and Electrical Engineering 119, 109489, 2024
2024
TumorGANet: A Transfer Learning and Generative Adversarial Network-based Data Augmentation Model for Brain Tumor Classification
A Nag, H Mondal, MM Hassan, T Al-Shehari, M Kadrie, M Al-Razgan, ...
IEEE Access, 2024
2024
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs
I Pali, M Abdussami, R Amin, T Al-Shehari, M Al-Razgan, T Alfakih
Vehicular Communications 47, 100767, 2024
2024
Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning
Z Anwar, H Afzal, T Al-Shehari, M Al-Razgan, T Alfakih, R Nawaz
IEEE Access, 2024
2024
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
S Selvarajan, A Shankar, M Uddin, AS Alqahtani, T Al‐Shehari, ...
Expert Systems, e13544, 2024
2024
Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning
N Zainab, H Afzal, T Al-Shehari, M Al-Razgan, N Iltaf, M Zakria, MJ Hyder, ...
IEEE Access 11, 127637-127650, 2023
2023
Web browsers resistance to traffic analysis attacks
TAY Al-Shehari
http://eprints.kfupm.edu.sa/139421/, 2015
2015
系统目前无法执行此操作,请稍后再试。
文章 1–18