default search action
Taher Al-Shehari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Arvind Prasad
, Shalini Chandra, Mueen Uddin
, Taher Al-Shehari
, Nasser A. Alsadhan, Syed Sajid Ullah
:
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping. IEEE Access 13: 507-528 (2025) - [j22]Richa Gupta, Mansi Bhandari, Anhad Grover, Taher Al-Shehari
, Mohammed Kadrie, Taha Alfakih, Hussain Alsalman:
Correction: Predictive modeling of ALS progression: an XGBoost approach using clinical features. BioData Min. 18(1) (2025) - [j21]Shitharth Selvarajan
, Achyut Shankar, Mueen Uddin, Abdullah Saleh Alqahtani, Taher Al-Shehari
, Wattana Viriyasitavat:
A smart decentralized identifiable distributed ledger technology-based blockchain (DIDLT-BC) model for cloud-IoT security. Expert Syst. J. Knowl. Eng. 42(1) (2025) - [j20]Rakan A. Alsowail, Taher Al-Shehari:
Advancing object detection performance: random replacement one-one optimized convolutional LeNet algorithm with novel strategies for improved efficiency. Evol. Syst. 16(2): 37 (2025) - [j19]C. Madan Kumar, Mohammad S. Obaidat, Taher Al-Shehari
, Mohammed Kadrie, Taha Alfakih
, Hussain Alsalman, Ruhul Amin
:
Seamless healthcare access: An efficient solution to access medical data using Internet of Things based multimedia communication. Int. J. Commun. Syst. 38(3): nla (2025) - [j18]C. V. Aravinda, Taher Al-Shehari
, Nasser A. Alsadhan, Shashank Shetty
, G. Padmajadevi, K. R. Udaya Kumar Reddy:
A novel hybrid architecture for video frame prediction: combining convolutional LSTM and 3D CNN. J. Real Time Image Process. 22(1): 50 (2025) - 2024
- [j17]Taher Al-Shehari
, Domenico Rosaci
, Muna S. Al-Razgan
, Taha Alfakih
, Mohammed Kadrie, Hammad Afzal
, Raheel Nawaz
:
Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm. IEEE Access 12: 34820-34834 (2024) - [j16]Zeeshan Anwar
, Hammad Afzal
, Taher Al-Shehari
, Muna S. Al-Razgan
, Taha Alfakih
, Raheel Nawaz
:
Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning. IEEE Access 12: 65942-65955 (2024) - [j15]Anindya Nag
, Hirak Mondal
, Md. Mehedi Hassan
, Taher Al-Shehari
, Mohammed Kadrie
, Muna Al-Razgan
, Taha Alfakih
, Sujit Biswas, Anupam Kumar Bairagi
:
TumorGANet: A Transfer Learning and Generative Adversarial Network- Based Data Augmentation Model for Brain Tumor Classification. IEEE Access 12: 103060-103081 (2024) - [j14]Saurabh Tewari
, Arvind Prasad
, Harsh Patel, Mueen Uddin
, Taher Al-Shehari
, Nasser A. Alsadhan:
A Novel Multiagent Collaborative Learning Architecture for Automatic Recognition of Mudstone Rock Facies. IEEE Access 12: 179144-179163 (2024) - [j13]Richa Gupta, Mansi Bhandari, Anhad Grover, Taher Al-Shehari, Mohammed Kadrie, Taha Alfakih
, Hussain Alsalman:
Predictive modeling of ALS progression: an XGBoost approach using clinical features. BioData Min. 17(1) (2024) - [j12]Mohammed Nasser Al-Mhiqani, Tariq Alsboui
, Taher Al-Shehari
, Karrar Hameed Abdulkareem, Rabiah Ahmad, Mazin Abed Mohammed:
Insider threat detection in cyber-physical systems: a systematic literature review. Comput. Electr. Eng. 119: 109489 (2024) - [j11]Mohammad Abdussami
, Sanjeev Kumar Dwivedi
, Taher Al-Shehari
, P. Saravanan, Mohammed Kadrie, Taha Alfakih
, Hussain Alsalman, Ruhul Amin
:
DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation. Comput. Electr. Eng. 120: 109696 (2024) - [j10]Kogilavani Shanmugavadivel, Murali Dhar M. S, Mahesh T. R, Taher Al-Shehari
, Nasser A. Alsadhan, Temesgen Engida Yimer:
Optimized polycystic ovarian disease prognosis and classification using AI based computational approaches on multi-modality data. BMC Medical Informatics Decis. Mak. 24(1): 281 (2024) - [j9]C. Madan Kumar, Sanjeev Kumar Dwivedi
, M. Brindha
, Taher Al-Shehari
, Taha Alfakih
, Hussain Alsalman, Ruhul Amin
:
REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security. Peer Peer Netw. Appl. 17(6): 4264-4285 (2024) - [j8]Isha Pali, Mohammad Abdussami
, Ruhul Amin
, Taher Al-Shehari
, Muna Al-Razgan
, Taha Alfakih
:
S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs. Veh. Commun. 47: 100767 (2024) - 2023
- [j7]Taher Al-Shehari
, Muna S. Al-Razgan
, Taha Alfakih
, Rakan A. Alsowail, Saravanan Pandiaraj
:
Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm. IEEE Access 11: 118170-118185 (2023) - [j6]Naureen Zainab, Hammad Afzal
, Taher Al-Shehari
, Muna S. Al-Razgan
, Naima Iltaf
, Muhammad Zakria, Muhammad Javed Hyder
, Raheel Nawaz
:
Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning. IEEE Access 11: 127637-127650 (2023) - [j5]Taher Al-Shehari
, Rakan Alsowail:
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection. Int. J. Inf. Sec. 22(3): 611-629 (2023) - 2022
- [j4]Rakan Alsowail, Taher Al-Shehari
:
Techniques and countermeasures for preventing insider threats. PeerJ Comput. Sci. 8: e938 (2022) - 2021
- [j3]Taher Al-Shehari
, Rakan Alsowail:
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques. Entropy 23(10): 1258 (2021) - 2020
- [j2]Rakan Alsowail, Taher Al-Shehari
:
Empirical Detection Techniques of Insider Threat Incidents. IEEE Access 8: 78385-78402 (2020)
2010 – 2019
- 2018
- [j1]Taher Al-Shehari
, Sami Zhioua
:
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks. Clust. Comput. 21(4): 1917-1931 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-03 00:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint