default search action
Mohammed Alshehri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Noura Fahad Almujahid, Mohd Anul Haq, Mohammed Alshehri:
Comparative evaluation of machine learning algorithms for phishing site detection. PeerJ Comput. Sci. 10: e2131 (2024) - 2023
- [j22]Azath Mubarakali, Anand Deva Durai, Mohammed Alshehri, Osama Alfarraj, Jayabrabu Ramakrishnan, Dinesh Mavaluru:
Fog-Based Delay-Sensitive Data Transmission Algorithm for Data Forwarding and Storage in Cloud Environment for Multimedia Applications. Big Data 11(2): 128-136 (2023) - [j21]Ramkumar Jayaraman, Mohammed Alshehri, Manoj Kumar, Ahed Abugabah, Surender Singh Samant, Ahmed A. Mohamed:
Secure Biomedical Document Protection Framework to Ensure Privacy Through Blockchain. Big Data 11(6): 437-451 (2023) - [j20]Mohammed Alshehri:
Blockchain-assisted internet of things framework in smart livestock farming. Internet Things 22: 100739 (2023) - [j19]Purushottam Sharma, Mohammed Alshehri, Richa Sharma:
Activities tracking by smartphone and smartwatch biometric sensors using fuzzy set theory. Multim. Tools Appl. 82(2): 2277-2302 (2023) - 2022
- [b1]Mohammed Alshehri:
Six approaches to enhancing the efficiency of dynamic time warping: a study using nearest neighbour classification. University of Liverpool, UK, 2022 - [j18]Shaik Shakeel Ahamad, Mohammed Alshehri, Ismail Keshta:
A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification. IEEE Access 10: 120227-120244 (2022) - [j17]Mohammed Alshehri, Ahed Abugabah, Abdullah Algarni, Sultan Almotairi:
Character-level word encoding deep learning model for combating cyber threats in phishing URL detection. Comput. Electr. Eng. 100: 107868 (2022) - [j16]Maher Alsharif, Shailendra Mishra, Mohammed Alshehri:
Impact of Human Vulnerabilities on Cybersecurity. Comput. Syst. Sci. Eng. 40(3): 1153-1166 (2022) - [j15]Abdulwahed Awad Almutairi, Shailendra Mishra, Mohammed Alshehri:
Web Security: Emerging Threats and Defense. Comput. Syst. Sci. Eng. 40(3): 1233-1248 (2022) - [j14]Shailendra Mishra, Waleed Bander Alotaibi, Mohammed Alshehri, Sharad Saxena:
Cyber-attacks visualisation and prediction in complex multi-stage network. Int. J. Comput. Appl. Technol. 68(4): 345-356 (2022) - [j13]Mohammed Alshehri:
APP-NTS: a network traffic similarity-based framework for repacked Android apps detection. J. Ambient Intell. Humaniz. Comput. 13(3): 1537-1546 (2022) - [j12]Supriya Raheja, Mohammed Alshehri, Ahmed A. Mohamed, Supriya Khaitan, Manoj Kumar, Thompson Stephan:
A smart intuitionistic fuzzy-based framework for round-robin short-term scheduler. J. Supercomput. 78(4): 4655-4679 (2022) - [j11]Supriya Raheja, Mohammed Alshehri, Ahmed A. Mohamed, Supriya Khaitan, Manoj Kumar, Thompson Stephan:
Correction to: A smart intuitionistic fuzzy‑based framework for round‑robin short‑term scheduler. J. Supercomput. 78(4): 4680 (2022) - [c8]Majed Alowaidi, Mohammed Alshehri:
Domain Adaptive Scene Text Localization in Night View Images. FLAIRS 2022 - 2021
- [j10]Akarsh Aggarwal, Mohammed Alshehri, Manoj Kumar, Purushottam Sharma, Osama Alfarraj, Vikas Deep:
Principal component analysis, hidden Markov model, and artificial neural network inspired techniques to recognize faces. Concurr. Comput. Pract. Exp. 33(9) (2021) - [j9]Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, Ahmed A. Mohamed, Osama Alfarraj:
Classification model for accuracy and intrusion detection using machine learning approach. PeerJ Comput. Sci. 7: e437 (2021) - [j8]Rayed AlGhamdi, Azra Aziz, Mohammed Alshehri, Kamal Raj Pardasani, Tarique Aziz:
Deep learning model with ensemble techniques to compute the secondary structure of proteins. J. Supercomput. 77(5): 5104-5119 (2021) - [c7]Mohammed Alshehri, Frans Coenen, Keith Dures:
Motif-based Classification using Enhanced Sub-Sequence-Based Dynamic Time Warping. DATA 2021: 184-191 - [c6]Mohammed Alshehri:
Fuzzy Logic Based Explainable AI Approach for the Easy Calibration of AI Models in IoT Environments. ICHI 2021: 621-633 - 2020
- [j7]Gaurav Sharma, Vaibhav Sharma, Kamal Raj Pardasani, Mohammed Alshehri:
Soft Set Based Intelligent Assistive Model for Multiobjective and Multimodal Transportation Problem. IEEE Access 8: 102646-102656 (2020) - [j6]Akarsh Aggarwal, Mohammed Alshehri, Manoj Kumar, Osama Alfarraj, Purushottam Sharma, Kamal Raj Pardasani:
Landslide data analysis using various time-series forecasting models. Comput. Electr. Eng. 88: 106858 (2020) - [j5]Jing Sha, Abdol Ghaffar Ebadi, Dinesh Mavaluru, Mohammed Alshehri, Osama Alfarraj, Lila Rajabion:
A method for virtual machine migration in cloud computing using a collective behavior-based metaheuristics algorithm. Concurr. Comput. Pract. Exp. 32(2) (2020) - [j4]Manoj Kumar, Mohammed Alshehri, Rayed AlGhamdi, Purushottam Sharma, Vikas Deep:
A DE-ANN Inspired Skin Cancer Detection Approach Using Fuzzy C-Means Clustering. Mob. Networks Appl. 25(4): 1319-1329 (2020) - [c5]Mohammed Alshehri, Frans Coenen, Keith Dures:
Candidates Reduction and Enhanced Sub-Sequence-Based Dynamic Time Warping: A Hybrid Approach. SGAI Conf. 2020: 273-285
2010 – 2019
- 2019
- [j3]Tian Erlin, Abdol Ghaffar Ebadi, Dinesh Mavaluru, Mohammed Alshehri, Ahmed Abo-Bakr Mohamed, Behnam Sobhani:
Parameter derivation of a proton exchange membrane fuel cell based on coevolutionary ribonucleic acid genetic algorithm. Comput. Intell. 35(4): 1021-1041 (2019) - [c4]Mohammed Alshehri, Frans Coenen, Keith Dures:
Sub-Sequence-Based Dynamic Time Warping. KDIR 2019: 274-281 - [c3]Mohammed Alshehri, Frans Coenen, Keith Dures:
Effective Sub-Sequence-Based Dynamic Time Warping. SGAI Conf. 2019: 293-305 - 2013
- [i2]Mohammed Alshehri, Steve Drew, Rayed AlGhamdi:
Analysis of Citizens Acceptance for E-government Services: Applying the UTAUT Model. CoRR abs/1304.3157 (2013) - 2012
- [j2]Mohammed Alshehri, Steve Drew, Thamer Alhussain, Rayed AlGhamdi:
The Impact of Trust on E-Government Services Acceptance: A Study of Users' Perceptions by Applying UTAUT Model. Int. J. Technol. Diffusion 3(2): 50-61 (2012) - [c2]Mohammed Alshehri, Steve Drew, Thamer Alhussain:
The Effects of Website Quality on Adoption of E-Government Service: An Empirical Study Applying UTAUT Model Using SEM. ACIS 2012 - [i1]Mohammed Alshehri, Steve Drew, Thamer Alhussain, Rayed AlGhamdi:
The Effects of Website Quality on Adoption of E-Government Service: AnEmpirical Study Applying UTAUT Model Using SEM. CoRR abs/1211.2410 (2012) - 2011
- [j1]Mohammed Alshehri, Steve Drew:
E-government principles: implementation, advantages and challenges. Int. J. Electron. Bus. 9(3): 255-270 (2011) - [c1]Rayed AlGhamdi, Steve Drew, Mohammed Alshehri:
Strategic government initiatives to promote diffusion of online retailing in Saudi Arabia. ICDIM 2011: 217-222
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint