Taher Al-Shehari

Orcid: 0000-0002-9783-919X

According to our database1, Taher Al-Shehari authored at least 14 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimized polycystic ovarian disease prognosis and classification using AI based computational approaches on multi-modality data.
BMC Medical Informatics Decis. Mak., December, 2024

S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs.
Veh. Commun., 2024

Insider threat detection in cyber-physical systems: a systematic literature review.
Comput. Electr. Eng., 2024

DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation.
Comput. Electr. Eng., 2024

TumorGANet: A Transfer Learning and Generative Adversarial Network- Based Data Augmentation Model for Brain Tumor Classification.
IEEE Access, 2024

Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning.
IEEE Access, 2024

Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm.
IEEE Access, 2024

2023
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.
Int. J. Inf. Sec., June, 2023

Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning.
IEEE Access, 2023

Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm.
IEEE Access, 2023

2022
Techniques and countermeasures for preventing insider threats.
PeerJ Comput. Sci., 2022

2021
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques.
Entropy, 2021

2020
Empirical Detection Techniques of Insider Threat Incidents.
IEEE Access, 2020

2018
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks.
Clust. Comput., 2018


  Loading...