Follow
Suhair Alshehri
Title
Cited by
Cited by
Year
Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption
S Alshehri, SP Radziszowski, RK Raj
2012 IEEE 28th international conference on data engineering workshops, 143-146, 2012
1202012
Credit card fraud detection in the era of disruptive technologies: A systematic review
A Cherif, A Badhib, H Ammar, S Alshehri, M Kalkatawi, A Imine
Journal of King Saud University-Computer and Information Sciences 35 (1 …, 2023
1042023
Secure access control for health information sharing systems
S Alshehri, RK Raj
2013 IEEE international conference on healthcare informatics, 277-286, 2013
662013
A survey on authentication techniques for the internet of things
A Albalawi, A Almrshed, A Badhib, S Alshehri
2019 international conference on computer and information sciences (ICCIS), 1-5, 2019
332019
A robust device-to-device continuous authentication protocol for the internet of things
A Badhib, S Alshehri, A Cherif
IEEE Access 9, 124768-124792, 2021
292021
A survey on access control in IoT: Models, architectures and research opportunities
S Alnefaie, S Alshehri, A Cherif
International Journal of Security and Networks 16 (1), 60-76, 2021
242021
Designing a secure cloud-based ehr system using ciphertext-policy attribute-based encryption
S Alshehri, S Radziszowski, RK Raj
Proceedings of the Data Management in the Cloud Workshop, Washington, DC, USA, 2012
232012
Towards a distributed access control model for IoT in healthcare
S Alnefaie, A Cherif, S Alshehri
2019 2nd International Conference on Computer Applications & Information …, 2019
202019
Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment
S Alshehri, O Bamasaq, D Alghazzawi, A Jamjoom
IEEE Internet of Things Journal 10 (5), 4239-4256, 2022
192022
Toward effective access control using attributes and pseudoroles
S Alshehri
Rochester Institute of Technology, 2014
162014
Real-time DDoS flood attack monitoring and detection (RT-AMD) model for cloud computing
O Bamasag, A Alsaeedi, A Munshi, D Alghazzawi, S Alshehri, A Jamjoom
PeerJ Computer Science 7, e814, 2022
152022
DroidRista: a highly precise static data flow analysis framework for android applications
A Alzaidi, S Alshehri, SM Buhari
International Journal of Information Security 19 (5), 523-536, 2020
152020
Insider threat mitigation and access control in healthcare systems
S Alshehri, S Mishra, R Raj
Technical Report, Dochester Institute of Technology, 2013
132013
Using access control to mitigate insider threats to healthcare systems
S Alshehri, S Mishra, RK Raj
2016 IEEE international conference on healthcare informatics (ICHI), 55-60, 2016
102016
A privacy-preserving collaborative reputation system for mobile crowdsensing
BH Alamri, MM Monowar, S Alshehri
International Journal of Distributed Sensor Networks 14 (9), 1550147718802189, 2018
82018
Aac-iot: Attribute access control scheme for iot using lightweight cryptography and hyperledger fabric blockchain
S Alshehri, O Bamasag
Applied Sciences 12 (16), 8111, 2022
62022
Blockchain-based access control for the internet of things: A survey
E Abdulrahman, S Alshehri, A Cherif
2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering …, 2021
52021
A Distributed Fog-based Access Control Architecture for IoT.
S Alnefaie, A Cherif, S Alshehri
KSII Transactions on Internet & Information Systems 15 (12), 2021
52021
A secure fog-cloud architecture using attribute-based encryption for the medical internet of things (MIoT)
S Alshehri, T Almehmadi
International Journal of Advanced Computer Science and Applications 12 (12), 2021
42021
Encoder–decoder graph neural network for credit card fraud detection
A Cherif, H Ammar, M Kalkatawi, S Alshehri, A Imine
Journal of King Saud University-Computer and Information Sciences 36 (3), 102003, 2024
32024
The system can't perform the operation now. Try again later.
Articles 1–20