Taher Al-Shehari

Orcid: 0000-0002-9783-919X

According to our database1, Taher Al-Shehari authored at least 26 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LEFAM: Lightweight scalable efficient failover authentication mechanism for fog-based IoT environment.
Peer Peer Netw. Appl., August, 2025

Multi-stage Alzheimer's Disease Classification Using Squeeze Excitation Light Channel Network with a Random Lyrebird: Achieving High Sensitivity and Precision in Early Detection.
Cogn. Comput., August, 2025

Advancing object detection performance: random replacement one-one optimized convolutional LeNet algorithm with novel strategies for improved efficiency.
Evol. Syst., June, 2025

Seamless healthcare access: An efficient solution to access medical data using Internet of Things based multimedia communication.
Int. J. Commun. Syst., February, 2025

A novel hybrid architecture for video frame prediction: combining convolutional LSTM and 3D CNN.
J. Real Time Image Process., January, 2025

A smart decentralized identifiable distributed ledger technology-based blockchain (DIDLT-BC) model for cloud-IoT security.
Expert Syst. J. Knowl. Eng., January, 2025

CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies.
Int. J. Crit. Infrastructure Prot., 2025

Correction: Predictive modeling of ALS progression: an XGBoost approach using clinical features.
BioData Min., 2025

PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping.
IEEE Access, 2025

2024
Optimized polycystic ovarian disease prognosis and classification using AI based computational approaches on multi-modality data.
BMC Medical Informatics Decis. Mak., December, 2024

REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security.
Peer Peer Netw. Appl., November, 2024

S2DN: Design of robust authentication protocol with session key establishment in multi-controller based software-defined VANETs.
Veh. Commun., 2024

Insider threat detection in cyber-physical systems: a systematic literature review.
Comput. Electr. Eng., 2024

DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation.
Comput. Electr. Eng., 2024

Predictive modeling of ALS progression: an XGBoost approach using clinical features.
BioData Min., 2024

A Novel Multiagent Collaborative Learning Architecture for Automatic Recognition of Mudstone Rock Facies.
IEEE Access, 2024

TumorGANet: A Transfer Learning and Generative Adversarial Network- Based Data Augmentation Model for Brain Tumor Classification.
IEEE Access, 2024

Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning.
IEEE Access, 2024

Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm.
IEEE Access, 2024

2023
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.
Int. J. Inf. Sec., June, 2023

Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning.
IEEE Access, 2023

Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm.
IEEE Access, 2023

2022
Techniques and countermeasures for preventing insider threats.
PeerJ Comput. Sci., 2022

2021
An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques.
Entropy, 2021

2020
Empirical Detection Techniques of Insider Threat Incidents.
IEEE Access, 2020

2018
An empirical study of web browsers' resistance to traffic analysis and website fingerprinting attacks.
Clust. Comput., 2018


  Loading...