Access control models for cloud-enabled internet of things: A proposed architecture and research agenda A Alshehri, R Sandhu 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 85 | 2016 |
A novel and effective brain tumor classification model using deep feature fusion and famous machine learning classifiers H Kibriya, R Amin, AH Alshehri, M Masood, SS Alshamrani, A Alshehri Computational Intelligence and Neuroscience 2022 (1), 7897669, 2022 | 83 | 2022 |
Access control models for virtual object communication in cloud-enabled IoT A Alshehri, R Sandhu 2017 IEEE international conference on information reuse and integration (IRI …, 2017 | 73 | 2017 |
Deep fake detection and classification using error-level analysis and deep learning R Rafique, R Gantassi, R Amin, J Frnda, A Mustapha, AH Alshehri Scientific reports 13 (1), 7422, 2023 | 66 | 2023 |
A hybrid approach for alluring ads phishing attack detection using machine learning MW Shaukat, R Amin, MMA Muslam, AH Alshehri, J Xie Sensors 23 (19), 8070, 2023 | 29 | 2023 |
Distributed maritime transport communication system with reliability and safety based on blockchain and edge computing T Yang, Z Cui, AH Alshehri, M Wang, K Gao, K Yu IEEE Transactions on Intelligent Transportation Systems 24 (2), 2296-2306, 2022 | 16 | 2022 |
Access control models and architectures for IoT and cyber physical systems M Gupta, S Bhatt, AH Alshehri, R Sandhu Springer, 2022 | 11 | 2022 |
Faculty e-Learning adoption during the COVID-19 pandemic: A case study of Shaqra University AH Alshehri, SA Alahmari International Journal of Advanced Computer Science and Applications 12 (10 …, 2021 | 11 | 2021 |
Machine learning based psychotic behaviors prediction from facebook status updates M Ali, A Baquir, HHR Sherazi, MA Imran Computers, Materials and Continua 72 (2), 2411-2427, 2022 | 9 | 2022 |
Access control model for virtual objects (shadows) communication for aws internet of things A Alshehri, J Benson, F Patwa, R Sandhu Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 9 | 2018 |
Validation and psychometric properties of the Arabic version of the duke anticoagulation satisfaction scale (DASS) M AlAmmari, K Sultana, SN AlHarbi, AS Marenga, A AlTuraiki, ... Frontiers in Pharmacology 11, 587489, 2020 | 6 | 2020 |
On the Relationship Between Finite Domain ABAM and PreUCON A Alshehri, R Sandhu International Conference on Network and System Security, 333-346, 2016 | 4 | 2016 |
A hybrid approach for adversarial attack detection based on sentiment analysis model using Machine learning R Amin, R Gantassi, N Ahmed, AH Alshehri, FS Alsubaei, J Frnda Engineering Science and Technology, an International Journal 58, 101829, 2024 | 3 | 2024 |
An efficient algorithm for data transmission certainty in IIoT sensing network: A priority-based approach KG Nalbant, S Almutairi, AH Alshehri, H Kemal, SA Alsuhibany, BJ Choi PloS one 19 (7), e0305092, 2024 | 3 | 2024 |
Access Control Models for Cloud-Enabled Internet of Things AH Alshehri The University of Texas at San Antonio, 2018 | 3 | 2018 |
Smart Healthcare: A dynamic blockchain-based trust management model using Subarray algorithm M Al Qathrady, M Saeed, R Amin, MS Alshehri, A Alshehri, SM Alqhtani IEEE Access, 2024 | 2 | 2024 |
An Online Fake Review Detection Approach Using Famous Machine Learning Algorithms. AH Alshehri Computers, Materials & Continua 78 (2), 2024 | 2 | 2024 |
Introduction: Requirements for Access Control in IoT and CPS M Gupta, S Bhatt, AH Alshehri, R Sandhu Access Control Models and Architectures For IoT and Cyber Physical Systems, 1-17, 2022 | 2 | 2022 |
Access control models in cloud iot services M Gupta, S Bhatt, AH Alshehri, R Sandhu Access Control Models and Architectures For IoT and Cyber Physical Systems …, 2022 | 2 | 2022 |
A review on scientific visualization. case study: breast cancer S Bayoumi, M Alghamlas, A Alshehri, M Alruthae 2018 21st Saudi Computer Society National Computer Conference (NCC), 1-5, 2018 | 2 | 2018 |