Dr. Taher Al-Shehari | Computer Science | Best Researcher Award
Senior Lecturer and Researcher of King Saud University, Saudi Arabia
Taher Ali Al-Shehari is a dedicated cybersecurity professional and educator with a robust background in computer science. Holding a Bachelor’s degree from King Khalid University and a Master’s degree from King Fahd University of Petroleum and Minerals, Taher has demonstrated exceptional academic performance and a commitment to the field. His career spans various roles, from technical support and research assistant to full-time lecturer and researcher at King Saud University. His objective is to advance cybersecurity research and education through innovative practices, contributing significantly to his institution and the broader academic community.
Professional profile
Education📚
Taher’s educational background is exemplary. He graduated with honors from King Khalid University with a Bachelor in Computer Science, boasting an impressive GPA of 4.7/5. He continued to excel academically, earning a Master’s in Computer Science from King Fahd University of Petroleum and Minerals with a GPA of 3.348/4. His strong educational foundation in computer science positions him as a knowledgeable and capable researcher in his field.
Professional Experience🏛️
Taher’s extensive professional experience underscores his capability and versatility. He has held various roles, from technical support and customer services to research assistant and data analyst, and now serves as a full-time lecturer and researcher at King Saud University. His responsibilities have included teaching numerous technical courses, conducting specialized training programs, and participating in curriculum development. His involvement in a research group at the Deanship of Scientific Research further solidifies his research credentials.
Research Interest🌐
Awards and Honors🏆
Achievements🏅
Taher Ali Al-Shehari’s achievements reflect his expertise and dedication in cybersecurity. He has received numerous accolades, including appreciation certificates for his contributions to data analysis, academic progression, and curriculum development. Notably, he won an award for designing the best Information Security technical syllabus at King Saud University. His research contributions are significant, with publications in reputable journals and conferences on topics such as operating system fingerprinting, insider threat detection, and web browser security. His work has been widely recognized, underscoring his impact and leadership in the field. 📚🔐🏆
Publications top noted📜
- “An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques”
Year: 2021
Journal: Entropy
Citations: 117 📊 - “A Multi-Tiered Framework for Insider Threat Prevention”
Year: 2021
Journal: Electronics
Citations: 36 🛡️ - “Empirical Detection Techniques of Insider Threat Incidents”
Year: 2020
Journal: IEEE Access
Citations: 35 🔍 - “Improving Operating System Fingerprinting Using Machine Learning Techniques”
Year: 2014
Journal: International Journal of Computer Theory and Engineering
Citations: 29 💻 - “Techniques and Countermeasures for Preventing Insider Threats”
Year: 2022
Journal: PeerJ Computer Science
Citations: 16 🚫 - “An Empirical Study of Web Browsers’ Resistance to Traffic Analysis and Website Fingerprinting Attacks”
Year: 2018
Journal: Cluster Computing Journal
Citations: 14 🌐 - “SCBC: Smart City Monitoring with Blockchain Using Internet of Things for and Neuro Fuzzy Procedures”
Year: 2023
Journal: Mathematical Biosciences and Engineering
Citations: 12 🏙️ - “Wireless Video Streaming Over Data Distribution Service Middleware”
Year: 2012
Conference: IEEE International Conference on Computer Science and Automation Engineering
Citations: 9 📺 - “Random Resampling Algorithms for Addressing the Imbalanced Dataset Classes in Insider Threat Detection”
Year: 2023
Journal: International Journal of Information Security
Citations: 6 📉 - “Insider Threat Detection Model Using Anomaly-Based Isolation Forest Algorithm”
Year: 2023
Journal: IEEE Access
Citations: 4 🌲 - “Enhancing Insider Threat Detection in Imbalanced Cybersecurity Settings Using the Density-Based Local Outlier Factor Algorithm”
Year: 2024
Journal: IEEE Access
Citations: 1 🧩 - “Insider Threat Detection in Cyber-Physical Systems: A Systematic Literature Review”
Year: 2024
Journal: Computers and Electrical Engineering
Citations: — 📚 - “TumorGANet: A Transfer Learning and Generative Adversarial Network-Based Data Augmentation Model for Brain Tumor Classification”
Year: 2024
Journal: IEEE Access
Citations: — 🧠 - “S2DN: Design of Robust Authentication Protocol with Session Key Establishment in Multi-Controller Based Software-Defined VANETs”
Year: 2024
Journal: Vehicular Communications
Citations: — 🚗 - “Mining the Opinions of Software Developers for Improved Project Insights: Harnessing the Power of Transfer Learning”
Year: 2024
Journal: IEEE Access
Citations: — 🔄
