Taher Al‐Shehari

689 total citations
36 papers, 331 citations indexed

About

Taher Al‐Shehari is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Taher Al‐Shehari has authored 36 papers receiving a total of 331 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Computer Networks and Communications, 20 papers in Information Systems and 12 papers in Artificial Intelligence. Recurrent topics in Taher Al‐Shehari's work include Network Security and Intrusion Detection (13 papers), Information and Cyber Security (7 papers) and IoT and Edge/Fog Computing (6 papers). Taher Al‐Shehari is often cited by papers focused on Network Security and Intrusion Detection (13 papers), Information and Cyber Security (7 papers) and IoT and Edge/Fog Computing (6 papers). Taher Al‐Shehari collaborates with scholars based in Saudi Arabia, India and United Kingdom. Taher Al‐Shehari's co-authors include Rakan A. Alsowail, Taha Alfakih, Farrukh Shahzad, Muna Al‐Razgan, Sami Zhioua, Shitharth Selvarajan, Mueen Uddin, Hariprasath Manoharan, Hussain AlSalman and Celestine Iwendi and has published in prestigious journals such as Scientific Reports, IEEE Access and Scientific Data.

In The Last Decade

Taher Al‐Shehari

31 papers receiving 321 citations

Peers

Taher Al‐Shehari
Omaimah Bamasag Saudi Arabia
Atif Ali Pakistan
Rakan A. Alsowail Saudi Arabia
Waqas Ahmed Pakistan
Abdullah Ali Saudi Arabia
Yaser Alhasawi Saudi Arabia
Omaimah Bamasag Saudi Arabia
Taher Al‐Shehari
Citations per year, relative to Taher Al‐Shehari Taher Al‐Shehari (= 1×) peers Omaimah Bamasag

Countries citing papers authored by Taher Al‐Shehari

Since Specialization
Citations

This map shows the geographic impact of Taher Al‐Shehari's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Taher Al‐Shehari with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Taher Al‐Shehari more than expected).

Fields of papers citing papers by Taher Al‐Shehari

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Taher Al‐Shehari. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Taher Al‐Shehari. The network helps show where Taher Al‐Shehari may publish in the future.

Co-authorship network of co-authors of Taher Al‐Shehari

This figure shows the co-authorship network connecting the top 25 collaborators of Taher Al‐Shehari. A scholar is included among the top collaborators of Taher Al‐Shehari based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Taher Al‐Shehari. Taher Al‐Shehari is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Khadidos, Alaa O., et al.. (2025). CyberSentry: Enhancing SCADA security through advanced deep learning and optimization strategies. International Journal of Critical Infrastructure Protection. 50. 100782–100782.
2.
Selvarajan, Shitharth, et al.. (2025). IoT driven healthcare monitoring with evolutionary optimization and game theory. Scientific Reports. 15(1). 15224–15224.
3.
Obaidat, Mohammad S., et al.. (2024). Seamless healthcare access: An efficient solution to access medical data using Internet of Things based multimedia communication. International Journal of Communication Systems. 38(3).
4.
Gupta, Richa, et al.. (2024). Predictive modeling of ALS progression: an XGBoost approach using clinical features. BioData Mining. 17(1). 54–54. 2 indexed citations
5.
Raha, Avi Deb, et al.. (2024). Modeling and Predictive Analytics of Breast Cancer Using Ensemble Learning Techniques: An Explainable Artificial Intelligence Approach. Computers, materials & continua/Computers, materials & continua (Print). 81(3). 4033–4048. 1 indexed citations
6.
Al‐Shehari, Taher, Mohammed Nasser Al‐Mhiqani, Taha Alfakih, et al.. (2024). Comparative evaluation of data imbalance addressing techniques for CNN-based insider threat detection. Scientific Reports. 14(1). 24715–24715. 3 indexed citations
7.
Anwar, Zeeshan, Hammad Afzal, Taher Al‐Shehari, et al.. (2024). Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning. IEEE Access. 12. 65942–65955. 2 indexed citations
8.
Tewari, Saurabh, et al.. (2024). A Novel Multiagent Collaborative Learning Architecture for Automatic Recognition of Mudstone Rock Facies. IEEE Access. 12. 179144–179163. 3 indexed citations
9.
Al‐Shehari, Taher, Domenico Rosaci, Muna Al‐Razgan, et al.. (2024). Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm. IEEE Access. 12. 34820–34834. 10 indexed citations
10.
Chandra, Shalini, et al.. (2024). PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping. IEEE Access. 13. 507–528. 5 indexed citations
11.
Hassan, Md. Mehedi, et al.. (2024). TumorGANet: A Transfer Learning and Generative Adversarial Network- Based Data Augmentation Model for Brain Tumor Classification. IEEE Access. 12. 103060–103081. 12 indexed citations
12.
Al‐Shehari, Taher, Taha Alfakih, Hussain AlSalman, et al.. (2024). Blockchain with secure data transactions and energy trading model over the internet of electric vehicles. Scientific Reports. 14(1). 19208–19208. 6 indexed citations
13.
Dwivedi, Sanjeev Kumar, et al.. (2024). DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation. Computers & Electrical Engineering. 120. 109696–109696. 4 indexed citations
14.
Afzal, Hammad, Taher Al‐Shehari, Muna Al‐Razgan, et al.. (2023). Detection and Classification of Temporal Changes for Citrus Canker Growth Rate Using Deep Learning. IEEE Access. 11. 127637–127650. 5 indexed citations
15.
Al‐Shehari, Taher, Muna Al‐Razgan, Taha Alfakih, Rakan A. Alsowail, & Saravanan Pandiaraj. (2023). Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm. IEEE Access. 11. 118170–118185. 7 indexed citations
16.
Al‐Shehari, Taher & Rakan A. Alsowail. (2022). Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection. International Journal of Information Security. 22(3). 611–629. 10 indexed citations
17.
Al‐Shehari, Taher & Rakan A. Alsowail. (2021). An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques. Entropy. 23(10). 1258–1258. 104 indexed citations
18.
Alsowail, Rakan A. & Taher Al‐Shehari. (2021). A Multi-Tiered Framework for Insider Threat Prevention. Electronics. 10(9). 1005–1005. 23 indexed citations
19.
Alsowail, Rakan A. & Taher Al‐Shehari. (2020). Empirical Detection Techniques of Insider Threat Incidents. IEEE Access. 8. 78385–78402. 23 indexed citations
20.
Al‐Shehari, Taher & Sami Zhioua. (2018). An empirical study of web browsers’ resistance to traffic analysis and website fingerprinting attacks. Cluster Computing. 21(4). 1917–1931. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026