BibTeX records: Jemal H. Abawajy

download as .bib file

@article{DBLP:journals/access/ChoudhryAHR23,
  author       = {Nomica Choudhry and
                  Jemal H. Abawajy and
                  Shamsul Huda and
                  Imran Rao},
  title        = {A Comprehensive Survey of Machine Learning Methods for Surveillance
                  Videos Anomaly Detection},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {114680--114713},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3321800},
  doi          = {10.1109/ACCESS.2023.3321800},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChoudhryAHR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/MurshedMASAA23,
  author       = {Belal Abdullah Hezam Murshed and
                  Suresha Mallappa and
                  Jemal H. Abawajy and
                  Mufeed Ahmed Naji Saif and
                  Hasib Daowd Esmail Al{-}Ariki and
                  Hudhaifa Mohammed Abdulwahab},
  title        = {Short text topic modelling approaches in the context of big data:
                  taxonomy, survey, and analysis},
  journal      = {Artif. Intell. Rev.},
  volume       = {56},
  number       = {6},
  pages        = {5133--5260},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10462-022-10254-w},
  doi          = {10.1007/S10462-022-10254-W},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/MurshedMASAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/diot/XuJNA23,
  author       = {Zheng Xu and
                  Deepak Kumar Jain and
                  S. Neelakandan and
                  Jemal H. Abawajy},
  title        = {Hunger games search optimization with deep learning model for sustainable
                  supply chain management},
  journal      = {Discov. Internet Things},
  volume       = {3},
  number       = {1},
  pages        = {10},
  year         = {2023},
  url          = {https://doi.org/10.1007/s43926-023-00040-7},
  doi          = {10.1007/S43926-023-00040-7},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/diot/XuJNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/MurshedMASAG23,
  author       = {Belal Abdullah Hezam Murshed and
                  Suresha Mallappa and
                  Jemal H. Abawajy and
                  Mufeed Ahmed Naji Saif and
                  Hudhaifa Mohammed Abdulwahab and
                  Fahd A. Ghanem},
  title        = {{FAEO-ECNN:} cyberbullying detection in social media platforms using
                  topic modelling and deep learning},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {30},
  pages        = {46611--46650},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-15372-3},
  doi          = {10.1007/S11042-023-15372-3},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/MurshedMASAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/YanA23,
  author       = {Yuwei Yan and
                  Jemal H. Abawajy},
  title        = {Special issue on neural computing and applications in cyber intelligence:
                  {ATCI} 2022},
  journal      = {Neural Comput. Appl.},
  volume       = {35},
  number       = {35},
  pages        = {24563--24564},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00521-023-09101-y},
  doi          = {10.1007/S00521-023-09101-Y},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/YanA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ShahidinejadA23,
  author       = {Ali Shahidinejad and
                  Jemal H. Abawajy},
  title        = {Decentralized Lattice-Based Device-to-Device Authentication for the
                  Edge-Enabled IoT},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {6623--6633},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3319280},
  doi          = {10.1109/JSYST.2023.3319280},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/ShahidinejadA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/AlMansooriAC23,
  author       = {Ahmed Al{-}Mansoori and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury},
  title        = {{SDN} enabled {BDSP} in public cloud for resource optimization},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {3},
  pages        = {1031--1041},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-018-1887-9},
  doi          = {10.1007/S11276-018-1887-9},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/AlMansooriAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MurshedAMSA22,
  author       = {Belal Abdullah Hezam Murshed and
                  Jemal H. Abawajy and
                  Suresha Mallappa and
                  Mufeed Ahmed Naji Saif and
                  Hasib Daowd Esmail Al{-}Ariki},
  title        = {{DEA-RNN:} {A} Hybrid Deep Learning Approach for Cyberbullying Detection
                  in Twitter Social Media Platform},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {25857--25871},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3153675},
  doi          = {10.1109/ACCESS.2022.3153675},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MurshedAMSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HartantiAC22,
  author       = {Fera Tri Hartanti and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury},
  title        = {Evaluating Public Service Delivery Smartness and Impact on Citizens'
                  Well-Being},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {69106--69124},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3186325},
  doi          = {10.1109/ACCESS.2022.3186325},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HartantiAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MurshedAMSAG22,
  author       = {Belal Abdullah Hezam Murshed and
                  Jemal H. Abawajy and
                  Suresha Mallappa and
                  Mufeed Ahmed Naji Saif and
                  Sumaia Mohammed Al{-}Ghuribi and
                  Fahd A. Ghanem},
  title        = {Enhancing Big Social Media Data Quality for Use in Short-Text Topic
                  Modeling},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {105328--105351},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3211396},
  doi          = {10.1109/ACCESS.2022.3211396},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MurshedAMSAG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/MakkarGRA22,
  author       = {Aaisha Makkar and
                  Uttam Ghosh and
                  Danda B. Rawat and
                  Jemal H. Abawajy},
  title        = {FedLearnSP: Preserving Privacy and Security Using Federated Learning
                  and Edge Computing},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {11},
  number       = {2},
  pages        = {21--27},
  year         = {2022},
  url          = {https://doi.org/10.1109/MCE.2020.3048926},
  doi          = {10.1109/MCE.2020.3048926},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/MakkarGRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SinghKSAK22,
  author       = {Simar Preet Singh and
                  Rajesh Kumar and
                  Anju Sharma and
                  Jemal H. Abawajy and
                  Ravneet Kaur},
  title        = {Energy efficient load balancing hybrid priority assigned laxity algorithm
                  in fog computing},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {5},
  pages        = {3325--3342},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-022-03554-x},
  doi          = {10.1007/S10586-022-03554-X},
  timestamp    = {Tue, 20 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SinghKSAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MostafaeiAA22,
  author       = {Habib Mostafaei and
                  Shafi Afridi and
                  Jemal H. Abawajy},
  title        = {Network-aware worker placement for wide-area streaming analytics},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {136},
  pages        = {270--281},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.future.2022.06.009},
  doi          = {10.1016/J.FUTURE.2022.06.009},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/MostafaeiAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/HassanHHAAF22,
  author       = {Md. Rafiul Hassan and
                  Shamsul Huda and
                  Mohammad Mehedi Hassan and
                  Jemal H. Abawajy and
                  Ahmed Alsanad and
                  Giancarlo Fortino},
  title        = {Early detection of cardiovascular autonomic neuropathy: {A} multi-class
                  classification model based on feature selection and deep learning
                  feature fusion},
  journal      = {Inf. Fusion},
  volume       = {77},
  pages        = {70--80},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.inffus.2021.07.010},
  doi          = {10.1016/J.INFFUS.2021.07.010},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/HassanHHAAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SharmeenHAAHF22,
  author       = {Shaila Sharmeen and
                  Shamsul Huda and
                  Jemal H. Abawajy and
                  Chuadhry Mujeeb Ahmed and
                  Mohammad Mehedi Hassan and
                  Giancarlo Fortino},
  title        = {An Advanced Boundary Protection Control for the Smart Water Network
                  Using Semisupervised and Deep Learning Approaches},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {10},
  pages        = {7298--7310},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3100461},
  doi          = {10.1109/JIOT.2021.3100461},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SharmeenHAAHF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/QinCMLA22,
  author       = {Hongwu Qin and
                  Yuntao Cheng and
                  Xiuqin Ma and
                  Fei Li and
                  Jemal H. Abawajy},
  title        = {Weighted Byzantine Fault Tolerance consensus algorithm for enhancing
                  consortium blockchain efficiency and security},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {10 Part {A}},
  pages        = {8370--8379},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2022.08.017},
  doi          = {10.1016/J.JKSUCI.2022.08.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/QinCMLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AziziSAB22,
  author       = {Sadoon Azizi and
                  Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Rajkumar Buyya},
  title        = {Deadline-aware and energy-efficient IoT task scheduling in fog computing
                  systems: {A} semi-greedy approach},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {201},
  pages        = {103333},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2022.103333},
  doi          = {10.1016/J.JNCA.2022.103333},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AziziSAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/GhanavatiAI22,
  author       = {Sara Ghanavati and
                  Jemal H. Abawajy and
                  Davood Izadi},
  title        = {Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in
                  Fog Computing},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {10},
  number       = {1},
  pages        = {488--499},
  year         = {2022},
  url          = {https://doi.org/10.1109/TETC.2020.3033672},
  doi          = {10.1109/TETC.2020.3033672},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/GhanavatiAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/MaQA22,
  author       = {Xiuqin Ma and
                  Hongwu Qin and
                  Jemal H. Abawajy},
  title        = {Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making
                  and Parameter Reduction},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {30},
  number       = {2},
  pages        = {357--369},
  year         = {2022},
  url          = {https://doi.org/10.1109/TFUZZ.2020.3039335},
  doi          = {10.1109/TFUZZ.2020.3039335},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tfs/MaQA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/ZhouSAYL22,
  author       = {Zhou Zhou and
                  Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Hui Yin and
                  Hongming Lu},
  title        = {{ECMS:} An Edge Intelligent Energy Efficient Model in Mobile Edge
                  Computing},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {6},
  number       = {1},
  pages        = {238--247},
  year         = {2022},
  url          = {https://doi.org/10.1109/TGCN.2021.3121961},
  doi          = {10.1109/TGCN.2021.3121961},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgcn/ZhouSAYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ShojafarMPA22,
  author       = {Mohammad Shojafar and
                  Mithun Mukherjee and
                  Vincenzo Piuri and
                  Jemal H. Abawajy},
  title        = {Guest Editorial: Security and Privacy of Federated Learning Solutions
                  for Industrial IoT Applications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {5},
  pages        = {3519--3521},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3128972},
  doi          = {10.1109/TII.2021.3128972},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ShojafarMPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhouASC22,
  author       = {Zhou Zhou and
                  Jemal H. Abawajy and
                  Mohammad Shojafar and
                  Morshed U. Chowdhury},
  title        = {{DEHM:} An Improved Differential Evolution Algorithm Using Hierarchical
                  Multistrategy in a Cybertwin 6G Network},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {7},
  pages        = {4944--4953},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2022.3140854},
  doi          = {10.1109/TII.2022.3140854},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ZhouASC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/GhanavatiAI22,
  author       = {Sara Ghanavati and
                  Jemal H. Abawajy and
                  Davood Izadi},
  title        = {An Energy Aware Task Scheduling Model Using Ant-Mating Optimization
                  in Fog Computing Environment},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {2007--2017},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3028575},
  doi          = {10.1109/TSC.2020.3028575},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/GhanavatiAI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/ZhouLASCLL22,
  author       = {Zhou Zhou and
                  Kenli Li and
                  Jemal H. Abawajy and
                  Mohammad Shojafar and
                  Morshed Uddin Chowdhury and
                  Fangmin Li and
                  Keqin Li},
  title        = {An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized
                  Networked Datacenters},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {371--385},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSUSC.2021.3115388},
  doi          = {10.1109/TSUSC.2021.3115388},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsusc/ZhouLASCLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/KumarKAASZ22,
  author       = {Mohit Kumar and
                  Avadh Kishor and
                  Jemal H. Abawajy and
                  Prabal Agarwal and
                  Amritpal Singh and
                  Albert Y. Zomaya},
  title        = {{ARPS:} An Autonomic Resource Provisioning and Scheduling Framework
                  for Cloud Platforms},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {386--399},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSUSC.2021.3110245},
  doi          = {10.1109/TSUSC.2021.3110245},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/KumarKAASZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scdm/2022,
  editor       = {Rozaida Ghazali and
                  Nazri Mohd Nawi and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  Nureize Arbaiy},
  title        = {Recent Advances in Soft Computing and Data Mining - Proceedings of
                  the Fifth International Conference on Soft Computing and Data Mining
                  {(SCDM} 2022), May 30-31, 2022, Virtual Event},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {457},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-00828-3},
  doi          = {10.1007/978-3-031-00828-3},
  isbn         = {978-3-031-00827-6},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scdm/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZamanMHAAM21,
  author       = {Gohar Zaman and
                  Hairulnizam Mahdin and
                  Khalid Hussain and
                  Atta{-}ur{-}Rahman and
                  Jemal H. Abawajy and
                  Salama A. Mostafa},
  title        = {An Ontological Framework for Information Extraction From Diverse Scientific
                  Sources},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {42111--42124},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3063181},
  doi          = {10.1109/ACCESS.2021.3063181},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZamanMHAAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DaremGAAAA21,
  author       = {Abdul Basit Darem and
                  Fuad A. Ghaleb and
                  Asma Alhashmi and
                  Jemal H. Abawajy and
                  Sultan M. Alanazi and
                  Afrah Y. AL{-}Rezami},
  title        = {An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants
                  Detection Model Using Concept Drift Detection and Sequential Deep
                  Learning},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {97180--97196},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3093366},
  doi          = {10.1109/ACCESS.2021.3093366},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DaremGAAAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/EbadDA21,
  author       = {Shouki A. Ebad and
                  Abdul Basit Darem and
                  Jemal H. Abawajy},
  title        = {Measuring Software Obfuscation Quality-A Systematic Literature Review},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {99024--99038},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3094517},
  doi          = {10.1109/ACCESS.2021.3094517},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/EbadDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SharmaABCCABMDM21,
  author       = {Akhilesh Kumar Sharma and
                  Gaurav Aggarwal and
                  Sachit Bhardwaj and
                  Prasun Chakrabarti and
                  Tulika Chakrabarti and
                  Jemal H. Abawajy and
                  Siddhartha Bhattacharyya and
                  Richa Mishra and
                  Anirban Das and
                  Hairulnizam Mahdin},
  title        = {Classification of Indian Classical Music With Time-Series Matching
                  Deep Learning Approach},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {102041--102052},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3093911},
  doi          = {10.1109/ACCESS.2021.3093911},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SharmaABCCABMDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NazahHAH21,
  author       = {Saiba Nazah and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {An Unsupervised Model for Identifying and Characterizing Dark Web
                  Forums},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {112871--112892},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3103319},
  doi          = {10.1109/ACCESS.2021.3103319},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NazahHAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KassemCA21,
  author       = {Haider Kassem and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {121686--121697},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3108561},
  doi          = {10.1109/ACCESS.2021.3108561},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KassemCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HartantiACS21,
  author       = {Fera Tri Hartanti and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Wervyan Shalannanda},
  title        = {Citizens' Trust Measurement in Smart Government Services},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {150663--150676},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3124206},
  doi          = {10.1109/ACCESS.2021.3124206},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HartantiACS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Al-OmairiACA21,
  author       = {Lamyaa Al{-}Omairi and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Tahsien Al{-}Quraishi},
  title        = {An empirical analysis of graph-based linear dimensionality reduction
                  techniques},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.5990},
  doi          = {10.1002/CPE.5990},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/Al-OmairiACA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DaremAMAA21,
  author       = {Abdul Basit Darem and
                  Jemal H. Abawajy and
                  Aaisha Makkar and
                  Asma Alhashmi and
                  Sultan M. Alanazi},
  title        = {Visualization and deep-learning-based malware variant detection using
                  OpCode-level features},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {125},
  pages        = {314--323},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.06.032},
  doi          = {10.1016/J.FUTURE.2021.06.032},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/DaremAMAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfs/XiaoAACAL21,
  author       = {Fuyuan Xiao and
                  Masayoshi Aritsugi and
                  Jemal H. Abawajy and
                  Zehong Cao and
                  Rami Al{-}Hmouz and
                  Peide Liu},
  title        = {Editorial on Special Issue: "Applications of Intelligent and
                  Fuzzy Theory in Data Science"},
  journal      = {Int. J. Fuzzy Syst.},
  volume       = {23},
  number       = {2},
  pages        = {492--493},
  year         = {2021},
  url          = {https://doi.org/10.1007/s40815-021-01091-0},
  doi          = {10.1007/S40815-021-01091-0},
  timestamp    = {Wed, 09 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijfs/XiaoAACAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/XuA21,
  author       = {Zheng Xu and
                  Jemal H. Abawajy},
  title        = {Editorial: Special issue on neural computing and applications in cyber
                  intelligence: {ATCI} 2020},
  journal      = {Neural Comput. Appl.},
  volume       = {33},
  number       = {3},
  pages        = {805--806},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00521-020-05653-5},
  doi          = {10.1007/S00521-020-05653-5},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/XuA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/PrinceHCAK21,
  author       = {Prince and
                  Ananda Shankar Hati and
                  Prasun Chakrabarti and
                  Jemal H. Abawajy and
                  Ng Wee Keong},
  title        = {Development of energy efficient drive for ventilation system using
                  recurrent neural network},
  journal      = {Neural Comput. Appl.},
  volume       = {33},
  number       = {14},
  pages        = {8659--8668},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00521-020-05615-x},
  doi          = {10.1007/S00521-020-05615-X},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/PrinceHCAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AbawajyDA21,
  author       = {Jemal H. Abawajy and
                  Abdul Basit Darem and
                  Asma Alhashmi},
  title        = {Feature Subset Selection for Malware Detection in Smart IoT Platforms},
  journal      = {Sensors},
  volume       = {21},
  number       = {4},
  pages        = {1374},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21041374},
  doi          = {10.3390/S21041374},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AbawajyDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/AziziSAB21,
  author       = {Sadoon Azizi and
                  Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Rajkumar Buyya},
  title        = {{GRVMP:} {A} Greedy Randomized Algorithm for Virtual Machine Placement
                  in Cloud Data Centers},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {2},
  pages        = {2571--2582},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.3002721},
  doi          = {10.1109/JSYST.2020.3002721},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/AziziSAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/ZhouSAAL21,
  author       = {Zhou Zhou and
                  Mohammad Shojafar and
                  Mamoun Alazab and
                  Jemal H. Abawajy and
                  Fangmin Li},
  title        = {{AFED-EF:} An Energy-Efficient {VM} Allocation Algorithm for IoT Applications
                  in a Cloud Data Center},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {5},
  number       = {2},
  pages        = {658--669},
  year         = {2021},
  url          = {https://doi.org/10.1109/TGCN.2021.3067309},
  doi          = {10.1109/TGCN.2021.3067309},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgcn/ZhouSAAL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/ZhouSAB21,
  author       = {Zhou Zhou and
                  Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Ali Kashif Bashir},
  title        = {{IADE:} An Improved Differential Evolution Algorithm to Preserve Sustainability
                  in a 6G Network},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {5},
  number       = {4},
  pages        = {1747--1760},
  year         = {2021},
  url          = {https://doi.org/10.1109/TGCN.2021.3111909},
  doi          = {10.1109/TGCN.2021.3111909},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgcn/ZhouSAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HassanHSAF21,
  author       = {Mohammad Mehedi Hassan and
                  Md. Shamsul Huda and
                  Shaila Sharmeen and
                  Jemal H. Abawajy and
                  Giancarlo Fortino},
  title        = {An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning
                  Feature-Extraction-Based Semisupervised Model},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {4},
  pages        = {2860--2870},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3015026},
  doi          = {10.1109/TII.2020.3015026},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/HassanHSAF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/MostafaeiAA21,
  author       = {Habib Mostafaei and
                  Shafi Afridi and
                  Jemal H. Abawajy},
  editor       = {Laurent Lef{\`{e}}vre and
                  Stacy Patterson and
                  Young Choon Lee and
                  Haiying Shen and
                  Shashikant Ilager and
                  Mohammad Goudarzi and
                  Adel Nadjaran Toosi and
                  Rajkumar Buyya},
  title        = {{SNR:} Network-aware Geo-Distributed Stream Analytics},
  booktitle    = {21st {IEEE/ACM} International Symposium on Cluster, Cloud and Internet
                  Computing, CCGrid 2021, Melbourne, Australia, May 10-13, 2021},
  pages        = {820--827},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CCGrid51090.2021.00100},
  doi          = {10.1109/CCGRID51090.2021.00100},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgrid/MostafaeiAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atci/2020,
  editor       = {Jemal H. Abawajy and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Xu and
                  Mohammed Atiquzzaman},
  title        = {2020 International Conference on Applications and Techniques in Cyber
                  Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI}
                  2020), Fuyang, China, 20-22 June, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1244},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-53980-1},
  doi          = {10.1007/978-3-030-53980-1},
  isbn         = {978-3-030-53979-5},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atci/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atci/2021-1,
  editor       = {Jemal H. Abawajy and
                  Zheng Xu and
                  Mohammed Atiquzzaman and
                  Xiaolu Zhang},
  title        = {2021 International Conference on Applications and Techniques in Cyber
                  Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI}
                  2021) Volume 1, Fuyang, China, 9-21 June, 2021},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1398},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-79200-8},
  doi          = {10.1007/978-3-030-79200-8},
  isbn         = {978-3-030-79199-5},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/atci/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icmc2/2020,
  editor       = {Debasis Giri and
                  Rajkumar Buyya and
                  S. Ponnusamy and
                  Debashis De and
                  Andrew Adamatzky and
                  Jemal H. Abawajy},
  title        = {Proceedings of the Sixth International Conference on Mathematics and
                  Computing - {ICMC} 2020, Gangtok, Sikkim, India, September 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1262},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-15-8061-1},
  doi          = {10.1007/978-981-15-8061-1},
  isbn         = {978-981-15-8060-4},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmc2/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiXA20,
  author       = {Shanshan Li and
                  Fuyuan Xiao and
                  Jemal H. Abawajy},
  title        = {Conflict Management of Evidence Theory Based on Belief Entropy and
                  Negation},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {37766--37774},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2975802},
  doi          = {10.1109/ACCESS.2020.2975802},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiXA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouLAG20,
  author       = {Zhou Zhou and
                  Fangmin Li and
                  Jemal H. Abawajy and
                  Chaochao Gao},
  title        = {Improved {PSO} Algorithm Integrated With Opposition-Based Learning
                  and Tentative Perception in Networked Data Centres},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {55872--55880},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2981972},
  doi          = {10.1109/ACCESS.2020.2981972},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhouLAG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NazahHAH20,
  author       = {Saiba Nazah and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {Evolution of Dark Web Threat Analysis and Detection: {A} Systematic
                  Approach},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {171796--171819},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3024198},
  doi          = {10.1109/ACCESS.2020.3024198},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NazahHAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/SharmeenHAH20,
  author       = {Shaila Sharmeen and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {An adaptive framework against android privilege escalation threats
                  using deep learning and semi-supervised approaches},
  journal      = {Appl. Soft Comput.},
  volume       = {89},
  pages        = {106089},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2020.106089},
  doi          = {10.1016/J.ASOC.2020.106089},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/SharmeenHAH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/JauroCGAAA20,
  author       = {Fatsuma Jauro and
                  Haruna Chiroma and
                  Abdulsalam Ya'u Gital and
                  Mubarak Almutairi and
                  Shafii Muhammad Abdulhamid and
                  Jemal H. Abawajy},
  title        = {Deep learning architectures in emerging cloud computing architectures:
                  Recent development, challenges and next research trend},
  journal      = {Appl. Soft Comput.},
  volume       = {96},
  pages        = {106582},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2020.106582},
  doi          = {10.1016/J.ASOC.2020.106582},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/JauroCGAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/JacobFSYA20,
  author       = {Deden Witarsyah Jacob and
                  Mohd Farhan Md Fudzee and
                  Mohamad Aizi Salamat and
                  Iwan Tri Riyadi Yanto and
                  Jemal H. Abawajy},
  title        = {Soft Set Theory Based Decision Support System for Mining Electronic
                  Government Dataset},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {16},
  number       = {1},
  pages        = {39--62},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJDWM.2020010103},
  doi          = {10.4018/IJDWM.2020010103},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdwm/JacobFSYA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZhouLZXAC20,
  author       = {Zhou Zhou and
                  Fangmin Li and
                  Huaxi Zhu and
                  Houliang Xie and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury},
  title        = {An improved genetic algorithm using greedy strategy toward task scheduling
                  optimization in cloud environments},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {6},
  pages        = {1531--1541},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00521-019-04119-7},
  doi          = {10.1007/S00521-019-04119-7},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/ZhouLZXAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/XuA20,
  author       = {Zheng Xu and
                  Jemal H. Abawajy},
  title        = {Special issue on Neural Computing and Applications in cyber intelligence:
                  {ATCI} 2019},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {10},
  pages        = {5313--5314},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00521-020-04889-5},
  doi          = {10.1007/S00521-020-04889-5},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/XuA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/AbawajyCK20,
  author       = {Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Andrei Kelarev},
  title        = {Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware
                  Detection},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {2},
  pages        = {398--407},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2015.2481378},
  doi          = {10.1109/TCC.2015.2481378},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/AbawajyCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ChowdhuryAKJ20,
  author       = {Morshed U. Chowdhury and
                  Jemal H. Abawajy and
                  Andrei Kelarev and
                  Herbert F. Jelinek},
  title        = {A Clustering-Based Multi-Layer Distributed Ensemble for Neurological
                  Diagnostics in Cloud Services},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {2},
  pages        = {473--483},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2016.2567389},
  doi          = {10.1109/TCC.2016.2567389},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ChowdhuryAKJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ShojafarCLA20,
  author       = {Mohammad Shojafar and
                  Claudia Canali and
                  Riccardo Lancellotti and
                  Jemal H. Abawajy},
  title        = {Adaptive Computing-Plus-Communication Optimization Framework for Multimedia
                  Processing in Cloud Systems},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {4},
  pages        = {1162--1175},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2016.2617367},
  doi          = {10.1109/TCC.2016.2617367},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/ShojafarCLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/Al-OmairiAC20,
  author       = {Lamyaa Al{-}Omairi and
                  Jemal H. Abawajy and
                  Morshed Uddin Chowdhury},
  editor       = {Gordon Lee and
                  Ying Jin},
  title        = {Utility-Aware Graph Dimensionality Reduction Approach},
  booktitle    = {Proceedings of 35th International Conference on Computers and Their
                  Applications, {CATA} 2020, San Francisco, California, USA, March 23-25,
                  2020},
  series       = {EPiC Series in Computing},
  volume       = {69},
  pages        = {327--333},
  publisher    = {EasyChair},
  year         = {2020},
  url          = {https://doi.org/10.29007/2p7l},
  doi          = {10.29007/2P7L},
  timestamp    = {Sun, 15 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cata/Al-OmairiAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/KassemCAA20,
  author       = {Haider Kassem and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy and
                  Ahmed Raad Al{-}Sudani},
  editor       = {Gordon Lee and
                  Ying Jin},
  title        = {Yawn Based Driver Fatigue Level Prediction},
  booktitle    = {Proceedings of 35th International Conference on Computers and Their
                  Applications, {CATA} 2020, San Francisco, California, USA, March 23-25,
                  2020},
  series       = {EPiC Series in Computing},
  volume       = {69},
  pages        = {372--382},
  publisher    = {EasyChair},
  year         = {2020},
  url          = {https://doi.org/10.29007/67kk},
  doi          = {10.29007/67KK},
  timestamp    = {Sun, 15 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cata/KassemCAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/Al-MansooriAC20,
  author       = {Ahmed Al{-}Mansoori and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury},
  title        = {{BDSP} in the cloud: Scheduling and Load Balancing utlizing {SDN}
                  and {CEP}},
  booktitle    = {20th {IEEE/ACM} International Symposium on Cluster, Cloud and Internet
                  Computing, {CCGRID} 2020, Melbourne, Australia, May 11-14, 2020},
  pages        = {827--835},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CCGrid49817.2020.000-2},
  doi          = {10.1109/CCGRID49817.2020.000-2},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/Al-MansooriAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scdm/2020,
  editor       = {Rozaida Ghazali and
                  Nazri Mohd Nawi and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  title        = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  the Fourth International Conference on Soft Computing and Data Mining
                  {(SCDM} 2020), Melaka, Malaysia, January 22-23, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {978},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-36056-6},
  doi          = {10.1007/978-3-030-36056-6},
  isbn         = {978-3-030-36055-9},
  timestamp    = {Tue, 17 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scdm/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HarunaISGBDKHZA19,
  author       = {Khalid Haruna and
                  Maizatul Akmar Ismail and
                  Mohammad Suyanto and
                  Lubna Abdel Kareim Gabralla and
                  Abdullahi Baffa Bichi and
                  Sani Danjuma and
                  Habeebah Adamu Kakudi and
                  Muhammad Sani Haruna and
                  Saber Zerdoumi and
                  Jemal H. Abawajy and
                  Tutut Herawan},
  title        = {A Soft Set Approach for Handling Conflict Situation on Movie Selection},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {116179--116194},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2892778},
  doi          = {10.1109/ACCESS.2019.2892778},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HarunaISGBDKHZA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatama/AlkouzAA19,
  author       = {Balsam Alkouz and
                  Zaher Al Aghbari and
                  Jemal H. Abawajy},
  title        = {Tweetluenza: Predicting flu trends from twitter data},
  journal      = {Big Data Min. Anal.},
  volume       = {2},
  number       = {4},
  pages        = {273--287},
  year         = {2019},
  url          = {https://doi.org/10.26599/BDMA.2019.9020012},
  doi          = {10.26599/BDMA.2019.9020012},
  timestamp    = {Sat, 09 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdatama/AlkouzAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HudaAAPH19,
  author       = {Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Baker Al{-}Rubaie and
                  Lei Pan and
                  Mohammad Mehedi Hassan},
  title        = {Automatic extraction and integration of behavioural indicators of
                  malware for protection of cyber-physical networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {1247--1258},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.07.005},
  doi          = {10.1016/J.FUTURE.2019.07.005},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HudaAAPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-wss/KhalifaKAA19,
  author       = {Banafsj Khalifa and
                  Ahmed Khedr and
                  Zaher Al Aghbari and
                  Jemal H. Abawajy},
  title        = {Fuzzy logic approach to repair coverage holes in internet of things
                  monitoring applications},
  journal      = {{IET} Wirel. Sens. Syst.},
  volume       = {9},
  number       = {4},
  pages        = {227--235},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-wss.2018.5174},
  doi          = {10.1049/IET-WSS.2018.5174},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-wss/KhalifaKAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChooAI19,
  author       = {Kim{-}Kwang Raymond Choo and
                  Jemal H. Abawajy and
                  Md. Rafiqul Islam},
  title        = {Special issue on cybersecurity in the critical infrastructure: Advances
                  and future directions},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {102},
  pages        = {40--41},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jcss.2016.08.002},
  doi          = {10.1016/J.JCSS.2016.08.002},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/ChooAI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/VaradharajanSAY19,
  author       = {Vijayakumar Varadharajan and
                  V. Subramaniyaswamy and
                  Jemal H. Abawajy and
                  Longzhi Yang},
  title        = {Intelligent, smart and scalable cyber-physical systems},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {36},
  number       = {5},
  pages        = {3935--3943},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-179108},
  doi          = {10.3233/JIFS-179108},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/VaradharajanSAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/XiaoZA19,
  author       = {Fuyuan Xiao and
                  Zili Zhang and
                  Jemal H. Abawajy},
  title        = {Workflow scheduling in distributed systems under fuzzy environment},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {37},
  number       = {4},
  pages        = {5323--5333},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-190483},
  doi          = {10.3233/JIFS-190483},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/XiaoZA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/HassanACQC19,
  author       = {Mohammad Mehedi Hassan and
                  Jemal H. Abawajy and
                  Min Chen and
                  Meikang Qiu and
                  Sheng Chen},
  title        = {Special Section on Cloud-of-Things and Edge Computing: Recent Advances
                  and Future Trends},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {133},
  pages        = {170--173},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jpdc.2019.07.004},
  doi          = {10.1016/J.JPDC.2019.07.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/HassanACQC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GentaLA19,
  author       = {Addisalem Genta and
                  D. K. Lobiyal and
                  Jemal H. Abawajy},
  title        = {Energy Efficient Multipath Routing Algorithm for Wireless Multimedia
                  Sensor Network},
  journal      = {Sensors},
  volume       = {19},
  number       = {17},
  pages        = {3642},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19173642},
  doi          = {10.3390/S19173642},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GentaLA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/AbawajyK19,
  author       = {Jemal H. Abawajy and
                  Andrei Kelarev},
  title        = {Iterative Classifier Fusion System for the Detection of Android Malware},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {5},
  number       = {3},
  pages        = {282--292},
  year         = {2019},
  url          = {https://doi.org/10.1109/TBDATA.2017.2676100},
  doi          = {10.1109/TBDATA.2017.2676100},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/AbawajyK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codit/Al-QuraishiAAAA19,
  author       = {Tahsien Al{-}Quraishi and
                  Jemal H. Abawajy and
                  Naseer Al{-}Quraishi and
                  Ahmad Abdalrada and
                  Lamyaa Al{-}Omairi},
  title        = {Predicting Breast Cancer Risk Using Subset of Genes},
  booktitle    = {6th International Conference on Control, Decision and Information
                  Technologies, CoDIT 2019, Paris, France, April 23-26, 2019},
  pages        = {1379--1384},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CoDIT.2019.8820378},
  doi          = {10.1109/CODIT.2019.8820378},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codit/Al-QuraishiAAAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/daeng/2015,
  editor       = {Jemal H. Abawajy and
                  Mohamed Othman and
                  Rozaida Ghazali and
                  Mustafa Mat Deris and
                  Hairulnizam Mahdin and
                  Tutut Herawan},
  title        = {Proceedings of the Second International Conference on Advanced Data
                  and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26,
                  2015},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {520},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-1799-6},
  doi          = {10.1007/978-981-13-1799-6},
  isbn         = {978-981-13-1797-2},
  timestamp    = {Fri, 16 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/daeng/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HudaAAAAAY18,
  author       = {Md. Shamsul Huda and
                  Sultan Alyahya and
                  Md. Mohsin Ali and
                  Shafiq Ahmad and
                  Jemal H. Abawajy and
                  Hmood Al{-}Dossari and
                  John Yearwood},
  title        = {A Framework for Software Defect Prediction and Metric Selection},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {2844--2858},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2785445},
  doi          = {10.1109/ACCESS.2017.2785445},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HudaAAAAAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SharmeenHAIH18,
  author       = {Shaila Sharmeen and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Walaa N. Ismail and
                  Mohammad Mehedi Hassan},
  title        = {Malware Threats and Detection for Industrial Mobile-IoT Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {15941--15957},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2815660},
  doi          = {10.1109/ACCESS.2018.2815660},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SharmeenHAIH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouALHCAL18,
  author       = {Zhou Zhou and
                  Jemal H. Abawajy and
                  Fangmin Li and
                  Zhigang Hu and
                  Morshed U. Chowdhury and
                  Abdulhameed Alelaiwi and
                  Keqin Li},
  title        = {Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics
                  in Cloud Data Center},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {27080--27090},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2732458},
  doi          = {10.1109/ACCESS.2017.2732458},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhouALHCAL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/AbawajyKYJ18,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Xun Yi and
                  Herbert F. Jelinek},
  title        = {Minimal ensemble based on subset selection using {ECG} to diagnose
                  categories of {CAN}},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {160},
  pages        = {85--94},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cmpb.2018.01.019},
  doi          = {10.1016/J.CMPB.2018.01.019},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cmpb/AbawajyKYJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/RayACA18,
  author       = {Biplob R. Ray and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Abdulhameed Alelaiwi},
  title        = {Universal and secure object ownership transfer protocol for the Internet
                  of Things},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {838--849},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.02.020},
  doi          = {10.1016/J.FUTURE.2017.02.020},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/RayACA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HudaIAYHF18,
  author       = {Md. Shamsul Huda and
                  Md. Rafiqul Islam and
                  Jemal H. Abawajy and
                  John Yearwood and
                  Mohammad Mehedi Hassan and
                  Giancarlo Fortino},
  title        = {A hybrid-multi filter-wrapper framework to identify run-time behaviour
                  for fast malware detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {83},
  pages        = {193--207},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.12.037},
  doi          = {10.1016/J.FUTURE.2017.12.037},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HudaIAYHF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhouACHLCEL18,
  author       = {Zhou Zhou and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Zhigang Hu and
                  Keqin Li and
                  Hongbing Cheng and
                  Abdulhameed A. Al Elaiwi and
                  Fangmin Li},
  title        = {Minimizing {SLA} violation and power consumption in Cloud data centers
                  using adaptive energy-aware algorithms},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {836--850},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.07.048},
  doi          = {10.1016/J.FUTURE.2017.07.048},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhouACHLCEL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AbawajyHSHA18,
  author       = {Jemal H. Abawajy and
                  Md. Shamsul Huda and
                  Shaila Sharmeen and
                  Mohammad Mehedi Hassan and
                  Ahmad Almogren},
  title        = {Identifying cyber threats to mobile-IoT applications in edge computing
                  paradigm},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {89},
  pages        = {525--538},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.06.053},
  doi          = {10.1016/J.FUTURE.2018.06.053},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AbawajyHSHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JavadiMCA18,
  author       = {Mahmood Javadi and
                  Habib Mostafaei and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Learning automaton based topology control protocol for extending wireless
                  sensor networks lifetime},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {122},
  pages        = {128--136},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.08.012},
  doi          = {10.1016/J.JNCA.2018.08.012},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JavadiMCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangWLA18,
  author       = {Shaobo Zhang and
                  Guojun Wang and
                  Qin Liu and
                  Jemal H. Abawajy},
  title        = {A trajectory privacy-preserving scheme based on query exchange in
                  mobile social networks},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {18},
  pages        = {6121--6133},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-017-2676-6},
  doi          = {10.1007/S00500-017-2676-6},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangWLA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/Al-JaljouliAHA18,
  author       = {Raja Al{-}Jaljouli and
                  Jemal H. Abawajy and
                  Mohammad Mehedi Hassan and
                  Abdulhameed Alelaiwi},
  title        = {Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework
                  for E-Commerce},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {415--429},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSC.2016.2560160},
  doi          = {10.1109/TSC.2016.2560160},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/Al-JaljouliAHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/LiWAQ18,
  author       = {Xin Li and
                  Liangyuan Wang and
                  Jemal H. Abawajy and
                  Xiaolin Qin},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data
                  Centers},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11335},
  pages        = {630--644},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05054-2\_47},
  doi          = {10.1007/978-3-030-05054-2\_47},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/LiWAQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/LiLQA18,
  author       = {Xin Li and
                  Zhen Lian and
                  Xiaolin Qin and
                  Jemal H. Abawajy},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System},
  booktitle    = {{IEEE} International Conference on Parallel {\&} Distributed Processing
                  with Applications, Ubiquitous Computing {\&} Communications, Big
                  Data {\&} Cloud Computing, Social Computing {\&} Networking,
                  Sustainable Computing {\&} Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom
                  2018, Melbourne, Australia, December 11-13, 2018},
  pages        = {816--823},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BDCloud.2018.00122},
  doi          = {10.1109/BDCLOUD.2018.00122},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/LiLQA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/AbdalradaACRAJ18,
  author       = {Ahmad Shaker Abdalrada and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Sutharshan Rajasegarar and
                  Tahsien Al{-}Quraishi and
                  Herbert F. Jelinek},
  editor       = {Rozaida Ghazali and
                  Mustafa Mat Deris and
                  Nazri Mohd Nawi and
                  Jemal H. Abawajy},
  title        = {Relationship Between Angiotensin Converting Enzyme Gene and Cardiac
                  Autonomic Neuropathy Among Australian Population},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  the Third International Conference on Soft Computing and Data Mining
                  {(SCDM} 2018), Johor, Malaysia, February 06-07, 2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {700},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-72550-5\_14},
  doi          = {10.1007/978-3-319-72550-5\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scdm/AbdalradaACRAJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/Al-QuraishiACRA18,
  author       = {Tahsien Al{-}Quraishi and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury and
                  Sutharshan Rajasegarar and
                  Ahmad Shaker Abdalrada},
  editor       = {Rozaida Ghazali and
                  Mustafa Mat Deris and
                  Nazri Mohd Nawi and
                  Jemal H. Abawajy},
  title        = {Breast Cancer Recurrence Prediction Using Random Forest Model},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  the Third International Conference on Soft Computing and Data Mining
                  {(SCDM} 2018), Johor, Malaysia, February 06-07, 2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {700},
  pages        = {318--329},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-72550-5\_31},
  doi          = {10.1007/978-3-319-72550-5\_31},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scdm/Al-QuraishiACRA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scdm/2018,
  editor       = {Rozaida Ghazali and
                  Mustafa Mat Deris and
                  Nazri Mohd Nawi and
                  Jemal H. Abawajy},
  title        = {Recent Advances on Soft Computing and Data Mining - Proceedings of
                  the Third International Conference on Soft Computing and Data Mining
                  {(SCDM} 2018), Johor, Malaysia, February 06-07, 2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {700},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-72550-5},
  doi          = {10.1007/978-3-319-72550-5},
  isbn         = {978-3-319-72549-9},
  timestamp    = {Wed, 17 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scdm/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChiromaSAZGHA17,
  author       = {Haruna Chiroma and
                  Nor Liyana Mohd Shuib and
                  Adamu I. Abubakar and
                  Akram M. Zeki and
                  Abdulsalam Ya'u Gital and
                  Tutut Herawan and
                  Jemal H. Abawajy},
  title        = {Advances in Teaching and Learning on Facebook in Higher Institutions},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {480--500},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2016.2643682},
  doi          = {10.1109/ACCESS.2016.2643682},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChiromaSAZGHA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BaccarelliNSSA17,
  author       = {Enzo Baccarelli and
                  Paola Gabriela Vinueza Naranjo and
                  Michele Scarpiniti and
                  Mohammad Shojafar and
                  Jemal H. Abawajy},
  title        = {Fog of Everything: Energy-Efficient Networked Computing Architectures,
                  Research Challenges, and a Case Study},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {9882--9910},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2702013},
  doi          = {10.1109/ACCESS.2017.2702013},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BaccarelliNSSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/GhanavatiAIA17,
  author       = {Sara Ghanavati and
                  Jemal H. Abawajy and
                  Davood Izadi and
                  Abdulhameed Alelaiwi},
  title        = {Cloud-assisted IoT-based health status monitoring framework},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1843--1853},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0847-y},
  doi          = {10.1007/S10586-017-0847-Y},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/GhanavatiAIA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AliHAAAY17,
  author       = {Md. Mohsin Ali and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Sultan Alyahya and
                  Hmood Al{-}Dossari and
                  John Yearwood},
  title        = {A parallel framework for software defect detection and metric selection
                  on cloud computing},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2267--2281},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0892-6},
  doi          = {10.1007/S10586-017-0892-6},
  timestamp    = {Thu, 01 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/AliHAAAY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/AbawajyH17,
  author       = {Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  title        = {Federated Internet of Things and Cloud Computing Pervasive Patient
                  Health Monitoring System},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {1},
  pages        = {48--53},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600374CM},
  doi          = {10.1109/MCOM.2017.1600374CM},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/AbawajyH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Abawajy017,
  author       = {Jemal H. Abawajy and
                  Md. Rafiqul Islam},
  title        = {Applications and techniques in information and network security},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {23},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.4351},
  doi          = {10.1002/CPE.4351},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/Abawajy017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChowdhuryAKH17,
  author       = {Morshed U. Chowdhury and
                  Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Teruhisa Hochin},
  title        = {Multilayer hybrid strategy for phishing email zero-day filtering},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {23},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3929},
  doi          = {10.1002/CPE.3929},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChowdhuryAKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HudaAA0Y17,
  author       = {Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mali Abdollahian and
                  Md. Rafiqul Islam and
                  John Yearwood},
  title        = {A fast malware feature selection approach using a hybrid of multi-linear
                  and stepwise binary logistic regression},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {23},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3912},
  doi          = {10.1002/CPE.3912},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/HudaAA0Y17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LuoLAW17,
  author       = {Entao Luo and
                  Qin Liu and
                  Jemal H. Abawajy and
                  Guojun Wang},
  title        = {Privacy-preserving multi-hop profile-matching protocol for proximity
                  mobile social networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {68},
  pages        = {222--233},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.09.013},
  doi          = {10.1016/J.FUTURE.2016.09.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/LuoLAW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/AlrubaieyA17,
  author       = {Baker Alrubaiey and
                  Jemal H. Abawajy},
  title        = {Virtual networks dependability assessment framework},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {10},
  number       = {1/2},
  pages        = {3--12},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJHPCN.2017.10003758},
  doi          = {10.1504/IJHPCN.2017.10003758},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/AlrubaieyA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ChooAI17,
  author       = {Kim{-}Kwang Raymond Choo and
                  Jemal H. Abawajy and
                  Md. Rafiqul Islam},
  title        = {Special Issue on Cyber Security in the Critical Infrastructure: Advances
                  and Future Directions},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {83},
  number       = {1},
  pages        = {1--2},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.09.001},
  doi          = {10.1016/J.JCSS.2016.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/ChooAI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tec/SabarAY17,
  author       = {Nasser R. Sabar and
                  Jemal H. Abawajy and
                  John Yearwood},
  title        = {Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution
                  Algorithm for Big Data Optimization Problems},
  journal      = {{IEEE} Trans. Evol. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {315--327},
  year         = {2017},
  url          = {https://doi.org/10.1109/TEVC.2016.2602860},
  doi          = {10.1109/TEVC.2016.2602860},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tec/SabarAY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangYWA17,
  author       = {Jie Wang and
                  Lili Yang and
                  Jie Wu and
                  Jemal H. Abawajy},
  title        = {Clustering analysis for malicious network traffic},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7997375},
  doi          = {10.1109/ICC.2017.7997375},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangYWA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AbawajyRA17,
  author       = {Jemal H. Abawajy and
                  A. Richard and
                  Zaher Al Aghbari},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Securing Websites Against Homograph Attacks},
  booktitle    = {Security and Privacy in Communication Networks - SecureComm 2017 International
                  Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October
                  22-25, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {239},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78816-6\_4},
  doi          = {10.1007/978-3-319-78816-6\_4},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AbawajyRA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AbawajyNADA17,
  author       = {Jemal H. Abawajy and
                  Mohd Izuan Hafez Ninggal and
                  Zaher Al Aghbari and
                  Abdul Basit Darem and
                  Asma Alhashmi},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Privacy Threat Analysis of Mobile Social Network Data Publishing},
  booktitle    = {Security and Privacy in Communication Networks - SecureComm 2017 International
                  Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October
                  22-25, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {239},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78816-6\_5},
  doi          = {10.1007/978-3-319-78816-6\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AbawajyNADA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/IzadiGAH16,
  author       = {Davood Izadi and
                  Sara Ghanavati and
                  Jemal H. Abawajy and
                  Tutut Herawan},
  title        = {An alternative data collection scheduling scheme in wireless sensor
                  networks},
  journal      = {Computing},
  volume       = {98},
  number       = {12},
  pages        = {1287--1304},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00607-016-0484-y},
  doi          = {10.1007/S00607-016-0484-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/IzadiGAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/AbawajyNH16,
  author       = {Jemal H. Abawajy and
                  Mohd Izuan Hafez Ninggal and
                  Tutut Herawan},
  title        = {Privacy Preserving Social Network Data Publication},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {18},
  number       = {3},
  pages        = {1974--1997},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMST.2016.2533668},
  doi          = {10.1109/COMST.2016.2533668},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/AbawajyNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AbawajyNH16,
  author       = {Jemal H. Abawajy and
                  Mohd Izuan Hafez Ninggal and
                  Tutut Herawan},
  title        = {Vertex re-identification attack using neighbourhood-pair properties},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {10},
  pages        = {2906--2919},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3687},
  doi          = {10.1002/CPE.3687},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/AbawajyNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AbawajyWYJ16,
  author       = {Jemal H. Abawajy and
                  Guojun Wang and
                  Laurence T. Yang and
                  Bahman Javadi},
  title        = {Trust, Security and Privacy in Emerging Distributed Systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {55},
  pages        = {224--226},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2015.11.008},
  doi          = {10.1016/J.FUTURE.2015.11.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AbawajyWYJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HudaAAA0Y16,
  author       = {Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Mamoun Alazab and
                  Mali Abdollahian and
                  Md. Rafiqul Islam and
                  John Yearwood},
  title        = {Hybrids of support vector machine wrapper and filter based framework
                  for malware detection},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {55},
  pages        = {376--390},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2014.06.001},
  doi          = {10.1016/J.FUTURE.2014.06.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/HudaAAA0Y16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdi/VictorLA16,
  author       = {Nancy Victor and
                  Daphne Lopez and
                  Jemal H. Abawajy},
  title        = {Privacy models for big data: a survey},
  journal      = {Int. J. Big Data Intell.},
  volume       = {3},
  number       = {1},
  pages        = {61--75},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJBDI.2016.073904},
  doi          = {10.1504/IJBDI.2016.073904},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbdi/VictorLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/HossainAGCA16,
  author       = {M. Anwar Hossain and
                  Jemal H. Abawajy and
                  Ra{\'{u}}l Garc{\'{\i}}a{-}Castro and
                  Wen{-}Huang Cheng and
                  Dewan Tanvir Ahmed},
  title        = {Sensor-Web Systems, Applications, and Services},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {12},
  number       = {4},
  pages        = {5349568:1--5349568:2},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/5349568},
  doi          = {10.1155/2016/5349568},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/HossainAGCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RayCA16,
  author       = {Biplob R. Ray and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Secure Object Tracking Protocol for the Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {3},
  number       = {4},
  pages        = {544--553},
  year         = {2016},
  url          = {https://doi.org/10.1109/JIOT.2016.2572729},
  doi          = {10.1109/JIOT.2016.2572729},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RayCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AbawajyZS16,
  author       = {Jemal H. Abawajy and
                  Albert Y. Zomaya and
                  Ivan Stojmenovic},
  title        = {Network computing and applications for Big Data analytics},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {59},
  pages        = {361},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.11.007},
  doi          = {10.1016/J.JNCA.2015.11.007},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AbawajyZS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Bhattacharya0A16,
  author       = {Maumita Bhattacharya and
                  Md. Rafiqul Islam and
                  Jemal H. Abawajy},
  title        = {Evolutionary optimization: {A} big data perspective},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {59},
  pages        = {416--426},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2014.07.032},
  doi          = {10.1016/J.JNCA.2014.07.032},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Bhattacharya0A16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/KamaludinMA16,
  author       = {Hazalila Kamaludin and
                  Hairulnizam Mahdin and
                  Jemal H. Abawajy},
  title        = {Filtering Redundant Data from {RFID} Data Streams},
  journal      = {J. Sensors},
  volume       = {2016},
  pages        = {7107914:1--7107914:7},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/7107914},
  doi          = {10.1155/2016/7107914},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/KamaludinMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/titb/AbawajyKCJ16,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury and
                  Herbert F. Jelinek},
  title        = {Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using
                  Blood Biochemistry Features and Iterative Multitier Ensembles},
  journal      = {{IEEE} J. Biomed. Health Informatics},
  volume       = {20},
  number       = {1},
  pages        = {408--415},
  year         = {2016},
  url          = {https://doi.org/10.1109/JBHI.2014.2363177},
  doi          = {10.1109/JBHI.2014.2363177},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/titb/AbawajyKCJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/AlrubaieyA16,
  author       = {Baker Alrubaiey and
                  Jemal H. Abawajy},
  editor       = {Guojun Wang and
                  Yanbo Han and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Prediction of Virtual Networks Substrata Failures},
  booktitle    = {Advances in Services Computing - 10th Asia-Pacific Services Computing
                  Conference, {APSCC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10065},
  pages        = {423--434},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49178-3\_32},
  doi          = {10.1007/978-3-319-49178-3\_32},
  timestamp    = {Mon, 23 Jan 2023 10:33:27 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/AlrubaieyA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/GhanavatiAI16,
  author       = {Sara Ghanavati and
                  Jemal H. Abawajy and
                  Davood Izadi},
  title        = {{ECG} rate control scheme in pervasive health care monitoring system},
  booktitle    = {2016 {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE}
                  2016, Vancouver, BC, Canada, July 24-29, 2016},
  pages        = {2265--2270},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/FUZZ-IEEE.2016.7737975},
  doi          = {10.1109/FUZZ-IEEE.2016.7737975},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/GhanavatiAI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/GhanavatiAI16,
  author       = {Sara Ghanavati and
                  Jemal H. Abawajy and
                  Davood Izadi},
  title        = {An alternative sensor Cloud architecture for vital signs monitoring},
  booktitle    = {2016 International Joint Conference on Neural Networks, {IJCNN} 2016,
                  Vancouver, BC, Canada, July 24-29, 2016},
  pages        = {2827--2833},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IJCNN.2016.7727556},
  doi          = {10.1109/IJCNN.2016.7727556},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/GhanavatiAI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/Al-RubaieyA16,
  author       = {Baker Al{-}Rubaiey and
                  Jemal H. Abawajy},
  title        = {Failure detection in virtual network environment},
  booktitle    = {26th International Telecommunication Networks and Applications Conference,
                  {ITNAC} 2016, Dunedin, New Zealand, December 7-9, 2016},
  pages        = {149--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ATNAC.2016.7878800},
  doi          = {10.1109/ATNAC.2016.7878800},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itnac/Al-RubaieyA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/RisnumawanSAS16,
  author       = {Anhar Risnumawan and
                  Indra Adji Sulistijono and
                  Jemal H. Abawajy and
                  Younes Saadi},
  editor       = {Tutut Herawan and
                  Rozaida Ghazali and
                  Nazri Mohd Nawi and
                  Mustafa Mat Deris},
  title        = {Text Detection in Low Resolution Scene Images Using Convolutional
                  Neural Network},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - The Second International
                  Conference on Soft Computing and Data Mining (SCDM-2016), Bandung,
                  Indonesia, August 18-20, 2016, Proceedings},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {549},
  pages        = {366--375},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51281-5\_37},
  doi          = {10.1007/978-3-319-51281-5\_37},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scdm/RisnumawanSAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scdm/FudzeeHMKA16,
  author       = {Mohd Farhan Md Fudzee and
                  Mohamud Hassan and
                  Hairulnizam Mahdin and
                  Shahreen Kasim and
                  Jemal H. Abawajy},
  editor       = {Tutut Herawan and
                  Rozaida Ghazali and
                  Nazri Mohd Nawi and
                  Mustafa Mat Deris},
  title        = {A Framework to Analyze Quality of Service (QoS) for Text-To-Speech
                  {(TTS)} Services},
  booktitle    = {Recent Advances on Soft Computing and Data Mining - The Second International
                  Conference on Soft Computing and Data Mining (SCDM-2016), Bandung,
                  Indonesia, August 18-20, 2016, Proceedings},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {549},
  pages        = {589--597},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51281-5\_59},
  doi          = {10.1007/978-3-319-51281-5\_59},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scdm/FudzeeHMKA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RayCA16,
  author       = {Biplob R. Ray and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {A Multi-protocol Security Framework to Support Internet of Things},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_14},
  doi          = {10.1007/978-3-319-59608-2\_14},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/RayCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcom/PooranianNRMA16,
  author       = {Zahra Pooranian and
                  Nima Nikmehr and
                  Sajad Najafi Ravadanegh and
                  Hairulnizam Mahdin and
                  Jemal H. Abawajy},
  title        = {Economical and environmental operation of smart networked microgrids
                  under uncertainties using {NSGA-II}},
  booktitle    = {24th International Conference on Software, Telecommunications and
                  Computer Networks, SoftCOM 2016, Split, Croatia, September 22-24,
                  2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SOFTCOM.2016.7772136},
  doi          = {10.1109/SOFTCOM.2016.7772136},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/softcom/PooranianNRMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/AbawajyF15,
  author       = {Jemal H. Abawajy and
                  Harinda Fernando},
  title        = {Policy-based {SQLIA} detection and prevention approach for {RFID}
                  systems},
  journal      = {Comput. Stand. Interfaces},
  volume       = {38},
  pages        = {64--71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.csi.2014.08.005},
  doi          = {10.1016/J.CSI.2014.08.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/AbawajyF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejgta/AbawajyK015,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Joe Ryan},
  title        = {Ideal basis in constructions defined by directed graphs},
  journal      = {Electron. J. Graph Theory Appl.},
  volume       = {3},
  number       = {1},
  pages        = {35--49},
  year         = {2015},
  url          = {https://doi.org/10.5614/ejgta.2015.3.1.5},
  doi          = {10.5614/EJGTA.2015.3.1.5},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejgta/AbawajyK015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijtmcc/ChongA15,
  author       = {Soon{-}Keow Chong and
                  Jemal H. Abawajy},
  title        = {Mitigating malicious feedback attacks in trust management systems},
  journal      = {Int. J. Trust. Manag. Comput. Commun.},
  volume       = {3},
  number       = {1},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJTMCC.2015.072455},
  doi          = {10.1504/IJTMCC.2015.072455},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijtmcc/ChongA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/PooranianSAA15,
  author       = {Zahra Pooranian and
                  Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Ajith Abraham},
  title        = {An efficient meta-heuristic algorithm for grid computing},
  journal      = {J. Comb. Optim.},
  volume       = {30},
  number       = {3},
  pages        = {413--434},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10878-013-9644-6},
  doi          = {10.1007/S10878-013-9644-6},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jco/PooranianSAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/NinggalA15,
  author       = {Mohd Izuan Hafez Ninggal and
                  Jemal H. Abawajy},
  title        = {Utility-aware social network graph anonymization},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {56},
  pages        = {137--148},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jnca.2015.05.013},
  doi          = {10.1016/J.JNCA.2015.05.013},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/NinggalA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mics/AbawajyKM015,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Mirka Miller and
                  Joseph F. Ryan},
  title        = {Distances of Centroid Sets in a Graph-Based Construction for Information
                  Security Applications},
  journal      = {Math. Comput. Sci.},
  volume       = {9},
  number       = {2},
  pages        = {127--137},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11786-015-0217-1},
  doi          = {10.1007/S11786-015-0217-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mics/AbawajyKM015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AbawajyF15,
  author       = {Jemal H. Abawajy and
                  Mohd Farhan Md Fudzee},
  title        = {Dynamic path determination policy for distributed multimedia content
                  adaptation},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {19},
  pages        = {8325--8341},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1735-y},
  doi          = {10.1007/S11042-013-1735-Y},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AbawajyF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AbawajyFD15,
  author       = {Jemal H. Abawajy and
                  Mohd Farhan Md Fudzee and
                  Mustafa Mat Deris},
  title        = {Multimedia content adaptation service discovery mechanism},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {19},
  pages        = {8365--8378},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-013-1696-1},
  doi          = {10.1007/S11042-013-1696-1},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AbawajyFD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/Abawajy15,
  author       = {Jemal H. Abawajy},
  title        = {Comprehensive analysis of big data variety landscape},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {30},
  number       = {1},
  pages        = {5--14},
  year         = {2015},
  url          = {https://doi.org/10.1080/17445760.2014.925548},
  doi          = {10.1080/17445760.2014.925548},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/Abawajy15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ShojafarADAPA15,
  author       = {Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Zia Delkhah and
                  Ali Ahmadi and
                  Zahra Pooranian and
                  Ajith Abraham},
  title        = {An efficient and distributed file search in unstructured peer-to-peer
                  networks},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {1},
  pages        = {120--136},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-013-0236-0},
  doi          = {10.1007/S12083-013-0236-0},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ShojafarADAPA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/IzadiAGH15,
  author       = {Davood Izadi and
                  Jemal H. Abawajy and
                  Sara Ghanavati and
                  Tutut Herawan},
  title        = {A Data Fusion Method in Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {15},
  number       = {2},
  pages        = {2964--2979},
  year         = {2015},
  url          = {https://doi.org/10.3390/s150202964},
  doi          = {10.3390/S150202964},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/IzadiAGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/AbawajyFHA15,
  author       = {Jemal H. Abawajy and
                  Mohd Farhan Md Fudzee and
                  Mohammad Mehedi Hassan and
                  Majed A. AlRubaian},
  title        = {Service level agreement management framework for utility-oriented
                  computing platforms},
  journal      = {J. Supercomput.},
  volume       = {71},
  number       = {11},
  pages        = {4287--4303},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11227-015-1526-5},
  doi          = {10.1007/S11227-015-1526-5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/AbawajyFHA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/BansalA15,
  author       = {Shivali G. Bansal and
                  Jemal H. Abawajy},
  title        = {Performance analysis of two-hop decode-amplify-forward relayed system
                  in different fading conditions},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {649--665},
  year         = {2015},
  url          = {https://doi.org/10.1002/wcm.2370},
  doi          = {10.1002/WCM.2370},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/BansalA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccbd/NikZZA15,
  author       = {Wan Nor Shuhadah Wan Nik and
                  Bing Bing Zhou and
                  Albert Y. Zomaya and
                  Jemal H. Abawajy},
  title        = {A Framework for Implementing Asynchronous Replication Scheme in Utility-Based
                  Computing Environment},
  booktitle    = {International Conference on Cloud Computing and Big Data, {CCBD} 2015,
                  Shanghai, China, November 4-6, 2015},
  pages        = {183--190},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CCBD.2015.42},
  doi          = {10.1109/CCBD.2015.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccbd/NikZZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/daeng/AzizAHN15,
  author       = {Maslina Abdul Aziz and
                  Jemal H. Abawajy and
                  Ikram Ul Haq and
                  Ida Normaya Mohd Nasir},
  editor       = {Jemal H. Abawajy and
                  Mohamed Othman and
                  Rozaida Ghazali and
                  Mustafa Mat Deris and
                  Hairulnizam Mahdin and
                  Tutut Herawan},
  title        = {A Survey of Big Workflow},
  booktitle    = {Proceedings of the Second International Conference on Advanced Data
                  and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26,
                  2015},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {520},
  pages        = {529--539},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-981-13-1799-6\_55},
  doi          = {10.1007/978-981-13-1799-6\_55},
  timestamp    = {Fri, 16 Aug 2019 10:59:15 +0200},
  biburl       = {https://dblp.org/rec/conf/daeng/AzizAHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/AzizAH15,
  author       = {Maslina Abdul Aziz and
                  Jemal H. Abawajy and
                  Tutut Herawan},
  editor       = {Adnan Yazici and
                  Nikhil R. Pal and
                  Uzay Kaymak and
                  Trevor Martin and
                  Hisao Ishibuchi and
                  Chin{-}Teng Lin and
                  Jo{\~{a}}o M. C. Sousa and
                  B{\"{u}}lent T{\"{u}}tmez},
  title        = {Layered workflow scheduling algorithm},
  booktitle    = {2015 {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE}
                  2015, Istanbul, Turkey, August 2-5, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/FUZZ-IEEE.2015.7338091},
  doi          = {10.1109/FUZZ-IEEE.2015.7338091},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/AzizAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ShojafarCAB15,
  author       = {Mohammad Shojafar and
                  Nicola Cordeschi and
                  Jemal H. Abawajy and
                  Enzo Baccarelli},
  title        = {Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for {TCP/IP}
                  Mobile Cloud},
  booktitle    = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOMW.2015.7413988},
  doi          = {10.1109/GLOCOMW.2015.7413988},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ShojafarCAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/AbawajyH15,
  author       = {Jemal H. Abawajy and
                  Mohammad Mehedi Hassan},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Reliability-Aware Distributed Computing Scheduling Policy},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {627--632},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_57},
  doi          = {10.1007/978-3-319-27161-3\_57},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/AbawajyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TownsendA15,
  author       = {Ben Townsend and
                  Jemal H. Abawajy},
  editor       = {Bhavani Thuraisingham and
                  XiaoFeng Wang and
                  Vinod Yegneswaran},
  title        = {Security Considerations for Wireless Carrier Agonistic Bio-Monitoring
                  Systems},
  booktitle    = {Security and Privacy in Communication Networks - 11th International
                  Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {164},
  pages        = {725--737},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28865-9\_48},
  doi          = {10.1007/978-3-319-28865-9\_48},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TownsendA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/RayHAJ15,
  author       = {Biplob R. Ray and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy and
                  Monika Jesmin},
  title        = {Secure object tracking protocol for Networked {RFID} Systems},
  booktitle    = {16th {IEEE/ACIS} International Conference on Software Engineering,
                  Artificial Intelligence, Networking and Parallel/Distributed Computing,
                  {SNPD} 2015, Takamatsu, Japan, June 1-3, 2015},
  pages        = {135--141},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SNPD.2015.7176190},
  doi          = {10.1109/SNPD.2015.7176190},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/RayHAJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sscc/2015,
  editor       = {Jemal H. Abawajy and
                  Sougata Mukherjea and
                  Sabu M. Thampi and
                  Antonio Ruiz{-}Mart{\'{\i}}nez},
  title        = {Security in Computing and Communications - Third International Symposium,
                  {SSCC} 2015, Kochi, India, August 10-13, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {536},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22915-7},
  doi          = {10.1007/978-3-319-22915-7},
  isbn         = {978-3-319-22914-0},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sscc/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/behaviourIT/Abawajy14,
  author       = {Jemal H. Abawajy},
  title        = {User preference of cyber security awareness delivery methods},
  journal      = {Behav. Inf. Technol.},
  volume       = {33},
  number       = {3},
  pages        = {236--247},
  year         = {2014},
  url          = {https://doi.org/10.1080/0144929X.2012.708787},
  doi          = {10.1080/0144929X.2012.708787},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/behaviourIT/Abawajy14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RayAC14,
  author       = {Biplob R. Ray and
                  Jemal H. Abawajy and
                  Morshed U. Chowdhury},
  title        = {Scalable {RFID} security framework and protocol supporting Internet
                  of Things},
  journal      = {Comput. Networks},
  volume       = {67},
  pages        = {89--103},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.03.023},
  doi          = {10.1016/J.COMNET.2014.03.023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/RayAC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HamidA14,
  author       = {Isredza Rahmi A. Hamid and
                  Jemal H. Abawajy},
  title        = {An approach for profiling phishing activities},
  journal      = {Comput. Secur.},
  volume       = {45},
  pages        = {27--41},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.04.002},
  doi          = {10.1016/J.COSE.2014.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HamidA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ChandrasekaranCAN14,
  author       = {Srimathi Chandrasekaran and
                  Eunmi Choi and
                  Jemal H. Abawajy and
                  Rajesh Natarajan},
  title        = {Sensor Grid Middleware Metamodeling and Analysis},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/805708},
  doi          = {10.1155/2014/805708},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ChandrasekaranCAN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/HassanPHA14,
  author       = {Mohammad Mehedi Hassan and
                  Al{-}Sakib Khan Pathan and
                  Eui{-}Nam Huh and
                  Jemal H. Abawajy},
  title        = {Emerging Sensor-Cloud Technology for Pervasive Services and Applications},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/610106},
  doi          = {10.1155/2014/610106},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/HassanPHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/AlazabHAKA14,
  author       = {Ammar Alazab and
                  Michael Hobbs and
                  Jemal H. Abawajy and
                  Ansam Khraisat and
                  Mamoun Alazab},
  title        = {Using response action with intelligent intrusion detection and prevention
                  system against web application malware},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {22},
  number       = {5},
  pages        = {431--449},
  year         = {2014},
  url          = {https://doi.org/10.1108/IMCS-02-2013-0007},
  doi          = {10.1108/IMCS-02-2013-0007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/AlazabHAKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbawajyBKC14,
  author       = {Jemal H. Abawajy and
                  Gleb Beliakov and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury},
  title        = {Iterative Construction of Hierarchical Classifiers for Phishing Website
                  Detection},
  journal      = {J. Networks},
  volume       = {9},
  number       = {8},
  pages        = {2089--2098},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.8.2089-2098},
  doi          = {10.4304/JNW.9.8.2089-2098},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AbawajyBKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbawajyKC14,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury},
  title        = {Automatic Generation of Meta Classifiers with Large Levels for Distributed
                  Computing and Networking},
  journal      = {J. Networks},
  volume       = {9},
  number       = {9},
  pages        = {2259--2268},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.9.2259-2268},
  doi          = {10.4304/JNW.9.9.2259-2268},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AbawajyKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AbawajyI14,
  author       = {Jemal H. Abawajy and
                  Md. Rafiqul Islam},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {9},
  number       = {11},
  pages        = {2875--2877},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.11.2875-2877},
  doi          = {10.4304/JNW.9.11.2875-2877},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AbawajyI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/AlazabHAIYVB14,
  author       = {Mamoun Alazab and
                  Md. Shamsul Huda and
                  Jemal H. Abawajy and
                  Md. Rafiqul Islam and
                  John Yearwood and
                  Sitalakshmi Venkatraman and
                  Roderic Broadhurst},
  title        = {A Hybrid Wrapper-Filter Approach for Malware Detection},
  journal      = {J. Networks},
  volume       = {9},
  number       = {11},
  pages        = {2878--2891},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.11.2878-2891},
  doi          = {10.4304/JNW.9.11.2878-2891},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/AlazabHAIYVB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ChowdhuryCA14,
  author       = {Belal Chowdhury and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Securing a Smart Anti-counterfeit Web Application},
  journal      = {J. Networks},
  volume       = {9},
  number       = {11},
  pages        = {2925--2933},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.11.2925-2933},
  doi          = {10.4304/JNW.9.11.2925-2933},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ChowdhuryCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAKKS14,
  author       = {Salahuddin Muhammad Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Joarder Kamruzzaman and
                  Mohammad A. Karim and
                  Nurul I. Sarkar},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {9},
  number       = {12},
  pages        = {3189--3191},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.12.3189-3191},
  doi          = {10.4304/JNW.9.12.3189-3191},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAKKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/AbawajyD14,
  author       = {Jemal H. Abawajy and
                  Mustafa Mat Deris},
  title        = {Data Replication Approach with Consistency Guarantee for Data Grid},
  journal      = {{IEEE} Trans. Computers},
  volume       = {63},
  number       = {12},
  pages        = {2975--2987},
  year         = {2014},
  url          = {https://doi.org/10.1109/TC.2013.183},
  doi          = {10.1109/TC.2013.183},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/AbawajyD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/AbawajyKC14,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury},
  title        = {Large Iterative Multitier Ensemble Classifiers for Security of Big
                  Data},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {2},
  number       = {3},
  pages        = {352--363},
  year         = {2014},
  url          = {https://doi.org/10.1109/TETC.2014.2316510},
  doi          = {10.1109/TETC.2014.2316510},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/AbawajyKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/MaQSHA14,
  author       = {Xiuqin Ma and
                  Hongwu Qin and
                  Norrozila Sulaiman and
                  Tutut Herawan and
                  Jemal H. Abawajy},
  title        = {The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and
                  Its Related Algorithms},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {22},
  number       = {1},
  pages        = {57--71},
  year         = {2014},
  url          = {https://doi.org/10.1109/TFUZZ.2013.2246571},
  doi          = {10.1109/TFUZZ.2013.2246571},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/MaQSHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/JavanmardiSSAS14,
  author       = {Saeed Javanmardi and
                  Mohammad Shojafar and
                  Shahdad Shariatmadari and
                  Jemal H. Abawajy and
                  Mukesh Singhal},
  title        = {{PGSW-OS:} a novel approach for resource management in a semantic
                  web operating system based on a {P2P} grid architecture},
  journal      = {J. Supercomput.},
  volume       = {69},
  number       = {2},
  pages        = {955--975},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-014-1221-y},
  doi          = {10.1007/S11227-014-1221-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/JavanmardiSSAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/NawiKRAHA14,
  author       = {Nazri Mohd Nawi and
                  Abdullah Khan and
                  M. Z. Rehman and
                  Maslina Abdul Aziz and
                  Tutut Herawan and
                  Jemal H. Abawajy},
  editor       = {Chu Kiong Loo and
                  Keem Siah Yap and
                  Kok Wai Wong and
                  Andrew Teoh Beng Jin and
                  Kaizhu Huang},
  title        = {Neural Network Training by Hybrid Accelerated Cuckoo Particle Swarm
                  Optimization Algorithm},
  booktitle    = {Neural Information Processing - 21st International Conference, {ICONIP}
                  2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8835},
  pages        = {237--244},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12640-1\_29},
  doi          = {10.1007/978-3-319-12640-1\_29},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/NawiKRAHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/NawiKRAHA14a,
  author       = {Nazri Mohd Nawi and
                  Abdullah Khan and
                  M. Z. Rehman and
                  Maslina Abdul Aziz and
                  Tutut Herawan and
                  Jemal H. Abawajy},
  editor       = {Chu Kiong Loo and
                  Keem Siah Yap and
                  Kok Wai Wong and
                  Andrew Teoh Beng Jin and
                  Kaizhu Huang},
  title        = {An Accelerated Particle Swarm Optimization Based Levenberg Marquardt
                  Back Propagation Algorithm},
  booktitle    = {Neural Information Processing - 21st International Conference, {ICONIP}
                  2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8835},
  pages        = {245--253},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12640-1\_30},
  doi          = {10.1007/978-3-319-12640-1\_30},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/NawiKRAHA14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/ShahHGNAA14,
  author       = {Habib Shah and
                  Tutut Herawan and
                  Rozaida Ghazali and
                  Rashid Naseem and
                  Maslina Abdul Aziz and
                  Jemal H. Abawajy},
  editor       = {Chu Kiong Loo and
                  Keem Siah Yap and
                  Kok Wai Wong and
                  Andrew Teoh Beng Jin and
                  Kaizhu Huang},
  title        = {An Improved Gbest Guided Artificial Bee Colony {(IGGABC)} Algorithm
                  for Classification and Prediction Tasks},
  booktitle    = {Neural Information Processing - 21st International Conference, {ICONIP}
                  2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8834},
  pages        = {559--569},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12637-1\_70},
  doi          = {10.1007/978-3-319-12637-1\_70},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/ShahHGNAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/chb/SalehiAB14,
  author       = {Mohsen Amini Salehi and
                  Jemal H. Abawajy and
                  Rajkumar Buyya},
  editor       = {Teofilo F. Gonzalez and
                  Jorge Diaz{-}Herrera and
                  Allen Tucker},
  title        = {Taxonomy of Contention Management in Interconnected Distributed Systems},
  booktitle    = {Computing Handbook, Third Edition: Computer Science and Software Engineering},
  pages        = {57: 1--33},
  publisher    = {{CRC} Press},
  year         = {2014},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/chb/SalehiAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/daeng/2013,
  editor       = {Tutut Herawan and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  title        = {Proceedings of the First International Conference on Advanced Data
                  and Information Engineering, DaEng 2013, Kuala Lumpur, Malaysia, December
                  16-18, 2013},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-981-4585-18-7},
  doi          = {10.1007/978-981-4585-18-7},
  isbn         = {978-981-4585-17-0},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/daeng/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/StranieriAKHCJ13,
  author       = {Andrew Stranieri and
                  Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Md. Shamsul Huda and
                  Morshed U. Chowdhury and
                  Herbert F. Jelinek},
  title        = {An approach for Ewing test selection to support the clinical assessment
                  of cardiac autonomic neuropathy},
  journal      = {Artif. Intell. Medicine},
  volume       = {58},
  number       = {3},
  pages        = {185--193},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.artmed.2013.04.007},
  doi          = {10.1016/J.ARTMED.2013.04.007},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/artmed/StranieriAKHCJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/AbawajyKCSJ13,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury and
                  Andrew Stranieri and
                  Herbert F. Jelinek},
  title        = {Predicting cardiac autonomic neuropathy category for diabetic data
                  with missing values},
  journal      = {Comput. Biol. Medicine},
  volume       = {43},
  number       = {10},
  pages        = {1328--1333},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compbiomed.2013.07.002},
  doi          = {10.1016/J.COMPBIOMED.2013.07.002},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/AbawajyKCSJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/AbawajyKC13,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury},
  title        = {Multistage approach for clustering and classification of {ECG} data},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {112},
  number       = {3},
  pages        = {720--730},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cmpb.2013.08.002},
  doi          = {10.1016/J.CMPB.2013.08.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cmpb/AbawajyKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/AbawajyJSH13,
  author       = {Jemal H. Abawajy and
                  Syed Imran Jami and
                  Zubair Ahmed Shaikh and
                  Syed A. Hammad},
  title        = {A framework for scalable distributed provenance storage system},
  journal      = {Comput. Stand. Interfaces},
  volume       = {35},
  number       = {1},
  pages        = {179--186},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.csi.2012.07.001},
  doi          = {10.1016/J.CSI.2012.07.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/AbawajyJSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejgta/AbawajyKC13,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev and
                  Morshed U. Chowdhury},
  title        = {Power graphs: {A} survey},
  journal      = {Electron. J. Graph Theory Appl.},
  volume       = {1},
  number       = {2},
  pages        = {125--147},
  year         = {2013},
  url          = {https://doi.org/10.5614/ejgta.2013.1.2.6},
  doi          = {10.5614/EJGTA.2013.1.2.6},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejgta/AbawajyKC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijimai/PooranianSAS13,
  author       = {Zahra Pooranian and
                  Mohammad Shojafar and
                  Jemal H. Abawajy and
                  Mukesh Singhal},
  title        = {{GLOA:} {A} New Job Scheduling Algorithm for Grid Computing},
  journal      = {Int. J. Interact. Multim. Artif. Intell.},
  volume       = {2},
  number       = {1},
  pages        = {59--64},
  year         = {2013},
  url          = {https://doi.org/10.9781/ijimai.2013.218},
  doi          = {10.9781/IJIMAI.2013.218},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijimai/PooranianSAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/AlazabHAK13,
  author       = {Ammar Alazab and
                  Michael Hobbs and
                  Jemal H. Abawajy and
                  Ansam Khraisat},
  title        = {Malware Detection and Prevention System Based on Multi-Stage Rules},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {7},
  number       = {2},
  pages        = {29--43},
  year         = {2013},
  url          = {https://doi.org/10.4018/jisp.2013040102},
  doi          = {10.4018/JISP.2013040102},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/AlazabHAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijndc/RayCA13,
  author       = {Biplob Rakshit Ray and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery
                  for {RFID} Tag},
  journal      = {Int. J. Networked Distributed Comput.},
  volume       = {1},
  number       = {2},
  pages        = {79--88},
  year         = {2013},
  url          = {https://doi.org/10.2991/ijndc.2013.1.2.2},
  doi          = {10.2991/IJNDC.2013.1.2.2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijndc/RayCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcse/ShojafarPAM13,
  author       = {Mohammad Shojafar and
                  Zahra Pooranian and
                  Jemal H. Abawajy and
                  Mohammad Reza Meybodi},
  title        = {An Efficient Scheduling Method for Grid Systems Based on a Hierarchical
                  Stochastic Petri Net},
  journal      = {J. Comput. Sci. Eng.},
  volume       = {7},
  number       = {1},
  pages        = {44--52},
  year         = {2013},
  url          = {https://doi.org/10.5626/JCSE.2013.7.1.44},
  doi          = {10.5626/JCSE.2013.7.1.44},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcse/ShojafarPAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/KelarevASJ13,
  author       = {Andrei V. Kelarev and
                  Jemal H. Abawajy and
                  Andrew Stranieri and
                  Herbert F. Jelinek},
  title        = {Empirical Investigation of Decision Tree Ensembles for Monitoring
                  Cardiac Complications of Diabetes},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {9},
  number       = {4},
  pages        = {1--18},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijdwm.2013100101},
  doi          = {10.4018/IJDWM.2013100101},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdwm/KelarevASJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/IzadiAG13,
  author       = {Davood Izadi and
                  Jemal H. Abawajy and
                  Sara Ghanavati},
  title        = {Fuzzy logic optimized wireless sensor network routing protocol},
  journal      = {J. High Speed Networks},
  volume       = {19},
  number       = {2},
  pages        = {115--128},
  year         = {2013},
  url          = {https://doi.org/10.3233/JHS-130467},
  doi          = {10.3233/JHS-130467},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/IzadiAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/IslamA13,
  author       = {Md. Rafiqul Islam and
                  Jemal H. Abawajy},
  title        = {A multi-tier phishing detection and filtering approach},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {324--335},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.05.009},
  doi          = {10.1016/J.JNCA.2012.05.009},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/IslamA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/Abawajy13,
  author       = {Jemal H. Abawajy},
  title        = {{SQLIA} detection and prevention approach for {RFID} systems},
  journal      = {J. Syst. Softw.},
  volume       = {86},
  number       = {3},
  pages        = {751--758},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jss.2012.11.022},
  doi          = {10.1016/J.JSS.2012.11.022},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/Abawajy13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/GhanavatiAI13,
  author       = {Sara Ghanavati and
                  Jemal H. Abawajy and
                  Davood Izadi},
  title        = {A fuzzy technique to control congestion in {WSN}},
  booktitle    = {The 2013 International Joint Conference on Neural Networks, {IJCNN}
                  2013, Dallas, TX, USA, August 4-9, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IJCNN.2013.6706958},
  doi          = {10.1109/IJCNN.2013.6706958},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/GhanavatiAI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/IzadiAG13,
  author       = {Davood Izadi and
                  Jemal H. Abawajy and
                  Sara Ghanavati},
  title        = {A new energy efficient cluster-head and backup selection scheme in
                  {WSN}},
  booktitle    = {{IEEE} 14th International Conference on Information Reuse {\&}
                  Integration, {IRI} 2013, San Francisco, CA, USA, August 14-16, 2013},
  pages        = {408--415},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IRI.2013.6642500},
  doi          = {10.1109/IRI.2013.6642500},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/IzadiAG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/NinggalA13,
  author       = {Mohd Izuan Hafez Ninggal and
                  Jemal H. Abawajy},
  editor       = {Ivan Stojmenovic and
                  Zixue Cheng and
                  Song Guo},
  title        = {Neighbourhood-Pair Attack in Social Network Data Publishing},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 10th International Conference, {MOBIQUITOUS} 2013, Tokyo, Japan,
                  December 2-4, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {131},
  pages        = {726--731},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-11569-6\_61},
  doi          = {10.1007/978-3-319-11569-6\_61},
  timestamp    = {Fri, 13 Jul 2018 15:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/NinggalA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secnet/AlazabHAK13,
  author       = {Ammar Alazab and
                  Michael Hobbs and
                  Jemal H. Abawajy and
                  Ansam Khraisat},
  editor       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Kensuke Baba},
  title        = {Developing an Intelligent Intrusion Detection and Prevention System
                  against Web Application Malware},
  booktitle    = {Advances in Security of Information and Communication Networks - First
                  International Conference, SecNet 2013, Cairo, Egypt, September 3-5,
                  2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {381},
  pages        = {177--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40597-6\_15},
  doi          = {10.1007/978-3-642-40597-6\_15},
  timestamp    = {Wed, 19 May 2021 08:32:23 +0200},
  biburl       = {https://dblp.org/rec/conf/secnet/AlazabHAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChowdhuryCA13,
  author       = {Belal Chowdhury and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Securing a Web-Based Anti-counterfeit {RFID} System},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {342--355},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_21},
  doi          = {10.1007/978-3-319-04283-1\_21},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChowdhuryCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MasudIA13,
  author       = {Md. Anwar Hossain Masud and
                  Md. Rafiqul Islam and
                  Jemal H. Abawajy},
  editor       = {Tanveer A. Zia and
                  Albert Y. Zomaya and
                  Vijay Varadharajan and
                  Zhuoqing Morley Mao},
  title        = {Security Concerns and Remedy in a Cloud Based E-learning System},
  booktitle    = {Security and Privacy in Communication Networks - 9th International
                  {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
                  25-28, 2013, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {127},
  pages        = {356--366},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04283-1\_22},
  doi          = {10.1007/978-3-319-04283-1\_22},
  timestamp    = {Mon, 28 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MasudIA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/RayCA13,
  author       = {Biplob R. Ray and
                  Morshed U. Chowdhury and
                  Jemal H. Abawajy},
  title        = {Critical Analysis and Comparative Study of Security for Networked
                  {RFID} Systems},
  booktitle    = {14th {ACIS} International Conference on Software Engineering, Artificial
                  Intelligence, Networking and Parallel/Distributed Computing, {SNPD}
                  2013, Honolulu, Hawaii, USA, 1-3 July, 2013},
  pages        = {197--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SNPD.2013.41},
  doi          = {10.1109/SNPD.2013.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/RayCA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NinggalA13,
  author       = {Mohd Izuan Hafez Ninggal and
                  Jemal H. Abawajy},
  title        = {Preserving Utility in Social Network Graph Anonymization},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {226--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.31},
  doi          = {10.1109/TRUSTCOM.2013.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NinggalA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamidA13,
  author       = {Isredza Rahmi A. Hamid and
                  Jemal H. Abawajy},
  title        = {Profiling Phishing Email Based on Clustering Approach},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {628--635},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.76},
  doi          = {10.1109/TRUSTCOM.2013.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamidA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlazabAHLK13,
  author       = {Ammar Alazab and
                  Jemal H. Abawajy and
                  Michael Hobbs and
                  Robert Layton and
                  Ansam Khraisat},
  title        = {Crime Toolkits: The Productisation of Cybercrime},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {1626--1632},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.273},
  doi          = {10.1109/TRUSTCOM.2013.273},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlazabAHLK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/FernandoA13,
  author       = {Harinda Fernando and
                  Jemal H. Abawajy},
  editor       = {Nik Bessis and
                  Fatos Xhafa and
                  Dora Varvarigou and
                  Richard Hill and
                  Maozhen Li},
  title        = {Malware Detection and Prevention in {RFID} Systems},
  booktitle    = {Internet of Things and Inter-cooperative Computational Technologies
                  for Collective Intelligence},
  series       = {Studies in Computational Intelligence},
  volume       = {460},
  pages        = {143--166},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-34952-2\_6},
  doi          = {10.1007/978-3-642-34952-2\_6},
  timestamp    = {Sat, 25 Jun 2022 17:37:28 +0200},
  biburl       = {https://dblp.org/rec/series/sci/FernandoA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/HerawanNADA13,
  author       = {Tutut Herawan and
                  Ahmad Noraziah and
                  Zailani Abdullah and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  editor       = {Ngoc Thanh Nguyen and
                  Bogdan Trawinski and
                  Radoslaw P. Katarzyniak and
                  GeunSik Jo},
  title        = {{IPMA:} Indirect Patterns Mining Algorithm},
  booktitle    = {Advanced Methods for Computational Collective Intelligence},
  series       = {Studies in Computational Intelligence},
  volume       = {457},
  pages        = {187--196},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-34300-1\_18},
  doi          = {10.1007/978-3-642-34300-1\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sci/HerawanNADA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BeloglazovAB12,
  author       = {Anton Beloglazov and
                  Jemal H. Abawajy and
                  Rajkumar Buyya},
  title        = {Energy-aware resource allocation heuristics for efficient management
                  of data centers for Cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {28},
  number       = {5},
  pages        = {755--768},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.future.2011.04.017},
  doi          = {10.1016/J.FUTURE.2011.04.017},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BeloglazovAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAKKS12,
  author       = {Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Joarder Kamruzzaman and
                  Mohammad A. Karim and
                  Nurul I. Sarkar},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {7},
  number       = {3},
  pages        = {409--411},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.3.409-411},
  doi          = {10.4304/JNW.7.3.409-411},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAKKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAKKS12a,
  author       = {Salahuddin Muhammad Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Joarder Kamruzzaman and
                  Mohammad Ataul Karim and
                  Nurul I. Sarkar},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {7},
  number       = {12},
  pages        = {1909--1911},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.12.1909-1911},
  doi          = {10.4304/JNW.7.12.1909-1911},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAKKS12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/JavadiAB12,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Rajkumar Buyya},
  title        = {Failure-aware resource provisioning for hybrid Cloud infrastructure},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {72},
  number       = {10},
  pages        = {1318--1331},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jpdc.2012.06.012},
  doi          = {10.1016/J.JPDC.2012.06.012},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/JavadiAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/paapp/VijayakumarBA12,
  author       = {Vijayakumar Varadharajan and
                  R. S. D. Wahida Banu and
                  Jemal H. Abawajy},
  title        = {An efficient approach based on trust and reputation for secured selection
                  of grid resources},
  journal      = {Int. J. Parallel Emergent Distributed Syst.},
  volume       = {27},
  number       = {1},
  pages        = {1--17},
  year         = {2012},
  url          = {https://doi.org/10.1080/17445760.2011.575048},
  doi          = {10.1080/17445760.2011.575048},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/paapp/VijayakumarBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ausdm/KelarevSYAJ12,
  author       = {Andrei V. Kelarev and
                  Andrew Stranieri and
                  John Yearwood and
                  Jemal H. Abawajy and
                  Herbert F. Jelinek},
  editor       = {Yanchang Zhao and
                  Jiuyong Li and
                  Paul J. Kennedy and
                  Peter Christen},
  title        = {Improving Classi cations for Cardiac Autonomic Neuropathy Using Multi-level
                  Ensemble Classi ers and Feature Selection Based},
  booktitle    = {Tenth Australasian Data Mining Conference, AusDM 2012, Sydney, Australia,
                  December 5-7, 2012},
  series       = {{CRPIT}},
  volume       = {134},
  pages        = {93--102},
  publisher    = {Australian Computer Society},
  year         = {2012},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV134Kelarev.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ausdm/KelarevSYAJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/JavadiAS12,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Richard O. Sinnott},
  title        = {Hybrid Cloud resource provisioning policy in the presence of resource
                  failures},
  booktitle    = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  pages        = {10--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CloudCom.2012.6427521},
  doi          = {10.1109/CLOUDCOM.2012.6427521},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/JavadiAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/AbawajyK12,
  author       = {Jemal H. Abawajy and
                  Andrei V. Kelarev},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  C.{-}C. Jay Kuo and
                  Wanlei Zhou},
  title        = {A Multi-tier Ensemble Construction of Classifiers for Phishing Email
                  Detection and Filtering},
  booktitle    = {Cyberspace Safety and Security - 4th International Symposium, {CSS}
                  2012, Melbourne, Australia, December 12-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7672},
  pages        = {48--56},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35362-8\_5},
  doi          = {10.1007/978-3-642-35362-8\_5},
  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},
  biburl       = {https://dblp.org/rec/conf/css/AbawajyK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccci/HerawanNADA12,
  author       = {Tutut Herawan and
                  Ahmad Noraziah and
                  Zailani Abdullah and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  editor       = {Ngoc Thanh Nguyen and
                  Kiem Hoang and
                  Piotr Jedrzejowicz},
  title        = {{EFP-M2:} Efficient Model for Mining Frequent Patterns in Transactional
                  Database},
  booktitle    = {Computational Collective Intelligence. Technologies and Applications
                  - 4th International Conference, {ICCCI} 2012, Ho Chi Minh City, Vietnam,
                  November 28-30, 2012, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7654},
  pages        = {29--38},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34707-8\_4},
  doi          = {10.1007/978-3-642-34707-8\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccci/HerawanNADA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/AlazabHAA12,
  author       = {Ammar Alazab and
                  Michael Hobbs and
                  Jemal H. Abawajy and
                  Moutaz Alazab},
  title        = {Using feature selection for intrusion detection system},
  booktitle    = {International Symposium on Communications and Information Technologies,
                  {ISCIT} 2012, Gold Coast, Australia, October 2-5, 2012},
  pages        = {296--301},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCIT.2012.6380910},
  doi          = {10.1109/ISCIT.2012.6380910},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscit/AlazabHAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/ChonkaA12,
  author       = {Ashley Chonka and
                  Jemal H. Abawajy},
  editor       = {Leonard Barolli and
                  David Taniar and
                  Tomoya Enokido and
                  J. Wenny Rahayu and
                  Makoto Takizawa},
  title        = {Detecting and Mitigating HX-DoS Attacks against Cloud Web Services},
  booktitle    = {15th International Conference on Network-Based Information Systems,
                  NBiS 2012, Melbourne, Australia, September 26-28, 2012},
  pages        = {429--434},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/NBiS.2012.146},
  doi          = {10.1109/NBIS.2012.146},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/ChonkaA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/PattersonHA12,
  author       = {Nicholas Charles Patterson and
                  Michael Hobbs and
                  Jemal H. Abawajy},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Virtual Property Theft Detection Framework: An Algorithm to Detect
                  Virtual Propety Theft in Virtual World Environments},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {177--184},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.296},
  doi          = {10.1109/TRUSTCOM.2012.296},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/PattersonHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2012fgcn,
  editor       = {Tai{-}Hoon Kim and
                  Dae{-}Sik Ko and
                  Thanos Vasilakos and
                  Adrian Stoica and
                  Jemal H. Abawajy},
  title        = {Computer Applications for Communication, Networking, and Digital Contents
                  - International Conferences, {FGCN} and {DCA} 2012, Held as Part of
                  the Future Generation Information Technology Conference, {FGIT} 2012,
                  Gangneug, Korea, December 16-19, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {350},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35594-3},
  doi          = {10.1007/978-3-642-35594-3},
  isbn         = {978-3-642-35593-6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/2012fgcn.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FudzeeA11,
  author       = {Mohd Farhan Md Fudzee and
                  Jemal H. Abawajy},
  title        = {QoS-based adaptation service selection broker},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {27},
  number       = {3},
  pages        = {256--264},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.future.2010.09.005},
  doi          = {10.1016/J.FUTURE.2010.09.005},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FudzeeA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAKK11,
  author       = {Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Joarder Kamruzzaman and
                  Mohammad Ataul Karim},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {6},
  number       = {1},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.1.1-3},
  doi          = {10.4304/JNW.6.1.1-3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TownsendAK11,
  author       = {Ben Townsend and
                  Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  title        = {SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol
                  for Medical Sensors},
  journal      = {Sensors},
  volume       = {11},
  number       = {4},
  pages        = {4231--4243},
  year         = {2011},
  url          = {https://doi.org/10.3390/s110404231},
  doi          = {10.3390/S110404231},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/TownsendAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MahdinA11,
  author       = {Hairulnizam Mahdin and
                  Jemal H. Abawajy},
  title        = {An Approach for Removing Redundant Data from {RFID} Data Streams},
  journal      = {Sensors},
  volume       = {11},
  number       = {10},
  pages        = {9863--9877},
  year         = {2011},
  url          = {https://doi.org/10.3390/s111009863},
  doi          = {10.3390/S111009863},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/MahdinA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/BattenAD11,
  author       = {Lynn Margaret Batten and
                  Jemal H. Abawajy and
                  Robin Doss},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Boris Shishkov},
  title        = {Prevention of Information Harvesting in a Cloud Services Environment},
  booktitle    = {{CLOSER} 2011 - Proceedings of the 1st International Conference on
                  Cloud Computing and Services Science, Noordwijkerhout, Netherlands,
                  7-9 May, 2011},
  pages        = {66--72},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/BattenAD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AhmadAK11,
  author       = {Masitah Ahmad and
                  Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Jianhua Ma and
                  Wai{-}Chi Fang and
                  Byeong Ho Kang and
                  Byungjoo Park and
                  Frode Eika Sandnes and
                  Kun Chang Lee},
  title        = {Service Quality Assessment in Provision of Library Services},
  booktitle    = {{U-} and E-Service, Science and Technology - International Conference,
                  {UNESST} 2011, Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island,
                  Korea, December 8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {264},
  pages        = {83--92},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27210-3\_10},
  doi          = {10.1007/978-3-642-27210-3\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AhmadAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AbawajyK11,
  author       = {Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Haeng{-}Kon Kim and
                  Heau{-}Jo Kang and
                  Kyung Jung Kim and
                  Kiumi Akingbehin and
                  Byeong Ho Kang},
  title        = {Engaging and Effective Asynchronous Online Discussion Forums},
  booktitle    = {Software Engineering, Business Continuity, and Education - International
                  Conferences ASEA, {DRBC} and {EL} 2011, Held as Part of the Future
                  Generation Information Technology Conference, {FGIT} 2011, in Conjunction
                  with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {257},
  pages        = {695--705},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27207-3\_75},
  doi          = {10.1007/978-3-642-27207-3\_75},
  timestamp    = {Mon, 04 Nov 2019 12:36:13 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/AbawajyK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AbawajyK11a,
  author       = {Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Haeng{-}Kon Kim and
                  Heau{-}Jo Kang and
                  Kyung Jung Kim and
                  Kiumi Akingbehin and
                  Byeong Ho Kang},
  title        = {Online Learning Environment: Taxonomy of Asynchronous Online Discussion
                  Forums},
  booktitle    = {Software Engineering, Business Continuity, and Education - International
                  Conferences ASEA, {DRBC} and {EL} 2011, Held as Part of the Future
                  Generation Information Technology Conference, {FGIT} 2011, in Conjunction
                  with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {257},
  pages        = {706--714},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27207-3\_76},
  doi          = {10.1007/978-3-642-27207-3\_76},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AbawajyK11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/NinggalA11,
  author       = {Mohd Izuan Hafez Ninggal and
                  Jemal H. Abawajy},
  editor       = {Yang Xiang and
                  Alfredo Cuzzocrea and
                  Michael Hobbs and
                  Wanlei Zhou},
  title        = {Privacy Threat Analysis of Social Network Data},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 11th International
                  Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7017},
  pages        = {165--174},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24669-2\_16},
  doi          = {10.1007/978-3-642-24669-2\_16},
  timestamp    = {Thu, 21 Apr 2022 14:42:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/NinggalA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/FudzeeA11,
  author       = {Mohd Farhan Md Fudzee and
                  Jemal H. Abawajy},
  editor       = {Yang Xiang and
                  Alfredo Cuzzocrea and
                  Michael Hobbs and
                  Wanlei Zhou},
  title        = {A Protocol for Discovering Content Adaptation Services},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 11th International
                  Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7017},
  pages        = {235--244},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24669-2\_23},
  doi          = {10.1007/978-3-642-24669-2\_23},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/FudzeeA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/FernandoA11,
  author       = {Harinda Fernando and
                  Jemal H. Abawajy},
  editor       = {Yang Xiang and
                  Alfredo Cuzzocrea and
                  Michael Hobbs and
                  Wanlei Zhou},
  title        = {Securing {RFID} Systems from {SQLIA}},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 11th International
                  Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7017},
  pages        = {245--254},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24669-2\_24},
  doi          = {10.1007/978-3-642-24669-2\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/FernandoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/HamidA11,
  author       = {Isredza Rahmi A. Hamid and
                  Jemal H. Abawajy},
  editor       = {Yang Xiang and
                  Alfredo Cuzzocrea and
                  Michael Hobbs and
                  Wanlei Zhou},
  title        = {Hybrid Feature Selection for Phishing Email Detection},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 11th International
                  Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7017},
  pages        = {266--275},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24669-2\_26},
  doi          = {10.1007/978-3-642-24669-2\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/HamidA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/NikZZA11,
  author       = {Wan Nor Shuhadah Wan Nik and
                  Bing Bing Zhou and
                  Albert Y. Zomaya and
                  Jemal H. Abawajy},
  title        = {Efficient Resource Selection Algorithm for Enterprise Grid Systems},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2011, Busan, Korea, 26-28 May, 2011},
  pages        = {57--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISPA.2011.25},
  doi          = {10.1109/ISPA.2011.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/NikZZA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Abawajy11,
  author       = {Jemal H. Abawajy},
  title        = {Establishing Trust in Hybrid Cloud Computing Environments},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.18},
  doi          = {10.1109/TRUSTCOM.2011.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Abawajy11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FernandoA11,
  author       = {Harinda Fernando and
                  Jemal H. Abawajy},
  title        = {Mutual Authentication Protocol for Networked {RFID} Systems},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {417--424},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.54},
  doi          = {10.1109/TRUSTCOM.2011.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FernandoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NinggalA11,
  author       = {Mohd Izuan Hafez Ninggal and
                  Jemal H. Abawajy},
  title        = {Attack Vector Analysis and Privacy-Preserving Social Network Data
                  Publishing},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {847--852},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.113},
  doi          = {10.1109/TRUSTCOM.2011.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NinggalA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HamidA11,
  author       = {Isredza Rahmi A. Hamid and
                  Jemal H. Abawajy},
  title        = {Phishing Email Feature Selection Approach},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {916--921},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.126},
  doi          = {10.1109/TRUSTCOM.2011.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HamidA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/HerawanDA10,
  author       = {Tutut Herawan and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  title        = {A rough set approach for selecting clustering attribute},
  journal      = {Knowl. Based Syst.},
  volume       = {23},
  number       = {3},
  pages        = {220--231},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.knosys.2009.12.003},
  doi          = {10.1016/J.KNOSYS.2009.12.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/HerawanDA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/AbawajyPPR10,
  author       = {Jemal H. Abawajy and
                  Mukaddim Pathan and
                  Al{-}Sakib Khan Pathan and
                  Mustafizur Rahman},
  title        = {Network Management in Distributed Systems},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {11},
  number       = {4},
  year         = {2010},
  url          = {http://www.scpe.org/index.php/scpe/article/view/664},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/AbawajyPPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GoelAK10,
  author       = {Shivali Goel and
                  Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  title        = {Performance Analysis of Receive Diversity in Wireless Sensor Networks
                  over {GBSBE} Models},
  journal      = {Sensors},
  volume       = {10},
  number       = {12},
  pages        = {11021--11037},
  year         = {2010},
  url          = {https://doi.org/10.3390/s101211021},
  doi          = {10.3390/S101211021},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/GoelAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/FudzeeAD10,
  author       = {Mohd Farhan Md Fudzee and
                  Jemal H. Abawajy and
                  Mustafa Mat Deris},
  title        = {Multi-criteria Content Adaptation Service Selection Broker},
  booktitle    = {10th {IEEE/ACM} International Conference on Cluster, Cloud and Grid
                  Computing, CCGrid 2010, 17-20 May 2010, Melbourne, Victoria, Australia},
  pages        = {721--726},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CCGRID.2010.128},
  doi          = {10.1109/CCGRID.2010.128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/FudzeeAD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/MahdinA10,
  author       = {Hairulnizam Mahdin and
                  Jemal H. Abawajy},
  editor       = {Tai{-}Hoon Kim and
                  Jianhua Ma and
                  Wai{-}Chi Fang and
                  Byungjoo Park and
                  Byeong Ho Kang and
                  Dominik Slezak},
  title        = {An Approach to Filtering Duplicate {RFID} Data Streams},
  booktitle    = {{U-} and E-Service, Science and Technology - International Conference
                  {UNESST} 2010, Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {124},
  pages        = {125--133},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17644-9\_14},
  doi          = {10.1007/978-3-642-17644-9\_14},
  timestamp    = {Mon, 04 Nov 2019 12:36:13 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/MahdinA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AbawajyK10,
  author       = {Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Performance Analysis of Cyber Security Awareness Delivery Methods},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {142--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_16},
  doi          = {10.1007/978-3-642-17610-4\_16},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AbawajyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/Al-NeyadiA10,
  author       = {Fahed Al{-}Neyadi and
                  Jemal H. Abawajy},
  editor       = {Tai{-}Hoon Kim and
                  Young{-}Hoon Lee and
                  Byeong Ho Kang and
                  Dominik Slezak},
  title        = {A Privacy Preserving Service Broker Architecture for Data Sharing},
  booktitle    = {Future Generation Information Technology - Second International Conference,
                  {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6485},
  pages        = {450--458},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17569-5\_44},
  doi          = {10.1007/978-3-642-17569-5\_44},
  timestamp    = {Mon, 04 Nov 2019 12:36:13 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/Al-NeyadiA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gca/VijayakumarBA10,
  author       = {Vijayakumar Varadharajan and
                  R. S. D. Wahida Banu and
                  Jemal H. Abawajy},
  editor       = {Hamid R. Arabnia and
                  George A. Gravvanis and
                  Ashu M. G. Solo},
  title        = {Novel Mechanism for Evaluating Feedback in the Grid Environment on
                  Resource Allocation},
  booktitle    = {Proceedings of the 2010 International Conference on Grid Computing
                  {\&} Applications, {GCA} 2010, July 12-15, 2010, Las Vegas, Nevada,
                  {USA}},
  pages        = {11--17},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Wed, 02 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gca/VijayakumarBA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/HerawanDA10,
  author       = {Tutut Herawan and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy},
  editor       = {David Taniar and
                  Osvaldo Gervasi and
                  Beniamino Murgante and
                  Eric Pardede and
                  Bernady O. Apduhan},
  title        = {Matrices Representation of Multi Soft-Sets and Its Application},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2010, International
                  Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6018},
  pages        = {201--214},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12179-1\_19},
  doi          = {10.1007/978-3-642-12179-1\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/HerawanDA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/FudzeeAD10,
  author       = {Mohd Farhan Md Fudzee and
                  Jemal H. Abawajy and
                  Mustafa Mat Deris},
  editor       = {Patrick S{\'{e}}nac and
                  Max Ott and
                  Aruna Seneviratne},
  title        = {Service Discovery for Service-Oriented Content Adaptation},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia,
                  December 6-9, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {73},
  pages        = {308--309},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29154-8\_28},
  doi          = {10.1007/978-3-642-29154-8\_28},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/FudzeeAD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/FernandoA10,
  author       = {Harinda Fernando and
                  Jemal H. Abawajy},
  editor       = {Patrick S{\'{e}}nac and
                  Max Ott and
                  Aruna Seneviratne},
  title        = {A Hybrid Mutual Authentication Protocol for {RFID}},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia,
                  December 6-9, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {73},
  pages        = {310--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29154-8\_29},
  doi          = {10.1007/978-3-642-29154-8\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/FernandoA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/BuyyaBA10,
  author       = {Rajkumar Buyya and
                  Anton Beloglazov and
                  Jemal H. Abawajy},
  editor       = {Hamid R. Arabnia and
                  Steve C. Chiu and
                  George A. Gravvanis and
                  Minoru Ito and
                  Kazuki Joe and
                  Hiroaki Nishikawa and
                  Ashu M. G. Solo},
  title        = {Energy-Efficient Management of Data Center Resources for Cloud Computing:
                  {A} Vision, Architectural Elements, and Open Challenges},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2010, Las Vegas, Nevada,
                  USA, July 12-15, 2010, 2 Volumes},
  pages        = {6--20},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Tue, 07 Dec 2010 09:22:06 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/BuyyaBA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prima/Al-JaljouliA10,
  author       = {Raja Al{-}Jaljouli and
                  Jemal H. Abawajy},
  editor       = {Nirmit Desai and
                  Alan Liu and
                  Michael Winikoff},
  title        = {Negotiation Strategy for Mobile Agent-Based e-Negotiation},
  booktitle    = {Principles and Practice of Multi-Agent Systems - 13th International
                  Conference, {PRIMA} 2010, Kolkata, India, November 12-15, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7057},
  pages        = {137--151},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25920-3\_10},
  doi          = {10.1007/978-3-642-25920-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/prima/Al-JaljouliA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/Al-JaljouliA10,
  author       = {Raja Al{-}Jaljouli and
                  Jemal H. Abawajy},
  editor       = {Aboul Ella Hassanien and
                  Jemal H. Abawajy and
                  Ajith Abraham and
                  Hani Hagras},
  title        = {Agents Based e-Commerce and Securing Exchanged Information},
  booktitle    = {Pervasive Computing, Innovations in Intelligent Multimedia and Applications},
  series       = {Computer Communications and Networks},
  pages        = {383--404},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-84882-599-4\_17},
  doi          = {10.1007/978-1-84882-599-4\_17},
  timestamp    = {Tue, 16 May 2017 14:24:22 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/Al-JaljouliA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ccn/HAAH2010,
  editor       = {Aboul Ella Hassanien and
                  Jemal H. Abawajy and
                  Ajith Abraham and
                  Hani Hagras},
  title        = {Pervasive Computing, Innovations in Intelligent Multimedia and Applications},
  series       = {Computer Communications and Networks},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-84882-599-4},
  doi          = {10.1007/978-1-84882-599-4},
  isbn         = {978-1-84882-598-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/HAAH2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1006-0308,
  author       = {Rajkumar Buyya and
                  Anton Beloglazov and
                  Jemal H. Abawajy},
  title        = {Energy-Efficient Management of Data Center Resources for Cloud Computing:
                  {A} Vision, Architectural Elements, and Open Challenges},
  journal      = {CoRR},
  volume       = {abs/1006.0308},
  year         = {2010},
  url          = {http://arxiv.org/abs/1006.0308},
  eprinttype    = {arXiv},
  eprint       = {1006.0308},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1006-0308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Abawajy09,
  author       = {Jemal H. Abawajy},
  title        = {An efficient adaptive scheduling policy for high-performance computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {25},
  number       = {3},
  pages        = {364--370},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.future.2006.04.007},
  doi          = {10.1016/J.FUTURE.2006.04.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Abawajy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JavadiAA09,
  author       = {Bahman Javadi and
                  Mohammad K. Akbari and
                  Jemal H. Abawajy},
  title        = {Multi-cluster computing interconnection network performance modeling
                  and analysis},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {25},
  number       = {7},
  pages        = {737--746},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.future.2008.07.010},
  doi          = {10.1016/J.FUTURE.2008.07.010},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/JavadiAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/PerezSARP09,
  author       = {Mar{\'{\i}}a S. P{\'{e}}rez and
                  Alberto S{\'{a}}nchez and
                  Jemal H. Abawajy and
                  V{\'{\i}}ctor Robles and
                  Jos{\'{e}} M. Pe{\~{n}}a},
  title        = {An agent architecture for managing data resources in a grid environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {25},
  number       = {7},
  pages        = {747--755},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.future.2008.07.011},
  doi          = {10.1016/J.FUTURE.2008.07.011},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/PerezSARP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/DerisATM09,
  author       = {Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  David Taniar and
                  Ali Mamat},
  title        = {Managing data using neighbour replication on a triangular-grid structure},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {6},
  number       = {1},
  pages        = {56--65},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJHPCN.2009.026292},
  doi          = {10.1504/IJHPCN.2009.026292},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/DerisATM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/Abawajy09,
  author       = {Jemal H. Abawajy},
  title        = {Advances in pervasive computing: {GUEST} {EDITORIAL}},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {4--8},
  year         = {2009},
  url          = {https://doi.org/10.1108/17427370910950276},
  doi          = {10.1108/17427370910950276},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/Abawajy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/Abawajy09a,
  author       = {Jemal H. Abawajy},
  title        = {Human-computer interaction in ubiquitous computing environments},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {61--77},
  year         = {2009},
  url          = {https://doi.org/10.1108/17427370910950311},
  doi          = {10.1108/17427370910950311},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/Abawajy09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/Abawajy09,
  author       = {Jemal H. Abawajy},
  title        = {Adaptive hierarchical scheduling policy for enterprise grid computing
                  systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {3},
  pages        = {770--779},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.04.009},
  doi          = {10.1016/J.JNCA.2008.04.009},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/Abawajy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZabirAAK09,
  author       = {Salim Zabir and
                  Jemal H. Abawajy and
                  Farid Ahmed and
                  Mohammad A. Karim},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {4},
  number       = {10},
  pages        = {929--930},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.10.929-930},
  doi          = {10.4304/JNW.4.10.929-930},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZabirAAK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/FernandoA09,
  author       = {Harinda Fernando and
                  Jemal H. Abawajy},
  editor       = {Gabriele Kotsis and
                  David Taniar and
                  Eric Pardede and
                  Ismail Khalil},
  title        = {A {RFID} architecture framework for global supply chain applications},
  booktitle    = {iiWAS'2009 - The Eleventh International Conference on Information
                  Integration and Web-based Applications and Services, 14-16 December
                  2009, Kuala Lumpur, Malaysia},
  pages        = {313--320},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1806338.1806396},
  doi          = {10.1145/1806338.1806396},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiwas/FernandoA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/JamiAS09,
  author       = {Syed Imran Jami and
                  Jemal H. Abawajy and
                  Zubair Ahmed Shaikh},
  title        = {Information Provenance for Open Distributed Collaborative System},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {737--741},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.112},
  doi          = {10.1109/I-SPAN.2009.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispan/JamiAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/MahdinA09,
  author       = {Hairulnizam Mahdin and
                  Jemal H. Abawajy},
  title        = {An Approach to Filtering {RFID} Data Streams},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {742--746},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.124},
  doi          = {10.1109/I-SPAN.2009.124},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispan/MahdinA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/YildizAEB09,
  author       = {Mehmet Yildiz and
                  Jemal H. Abawajy and
                  Tuncay Ercan and
                  Andrew Bernoth},
  title        = {A Layered Security Approach for Cloud Computing Infrastructure},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {763--767},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.157},
  doi          = {10.1109/I-SPAN.2009.157},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispan/YildizAEB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/Abawajy09,
  author       = {Jemal H. Abawajy},
  title        = {Determining Service Trustworthiness in Intercloud Computing Environments},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {784--788},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.155},
  doi          = {10.1109/I-SPAN.2009.155},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispan/Abawajy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/IslamAW09,
  author       = {Md. Rafiqul Islam and
                  Jemal H. Abawajy and
                  Matthew J. Warren},
  title        = {Multi-tier Phishing Email Classification with an Impact of Classifier
                  Rescheduling},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {789--793},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.142},
  doi          = {10.1109/I-SPAN.2009.142},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispan/IslamAW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Abawajy09,
  author       = {Jemal H. Abawajy},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  Haining Wang and
                  Wanlei Zhou},
  title        = {Enhancing {RFID} Tag Resistance against Cloning Attack},
  booktitle    = {Third International Conference on Network and System Security, {NSS}
                  2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages        = {18--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NSS.2009.101},
  doi          = {10.1109/NSS.2009.101},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/Abawajy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/Abawajy09,
  author       = {Jemal H. Abawajy},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Design and Delivery of Undergraduate {IT} Security Management Course},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {402--411},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_41},
  doi          = {10.1007/978-3-642-02617-1\_41},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/Abawajy09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/JavadiAA08,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari},
  title        = {Performance modeling and analysis of heterogeneous meta-computing
                  systems interconnection networks},
  journal      = {Comput. Electr. Eng.},
  volume       = {34},
  number       = {6},
  pages        = {488--502},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.compeleceng.2007.09.007},
  doi          = {10.1016/J.COMPELECENG.2007.09.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/JavadiAA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/JavadiAA08,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari},
  title        = {A comprehensive analytical model of interconnection networks in large-scale
                  cluster systems},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {20},
  number       = {1},
  pages        = {75--97},
  year         = {2008},
  url          = {https://doi.org/10.1002/cpe.1222},
  doi          = {10.1002/CPE.1222},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/JavadiAA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/DerisAM08,
  author       = {Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  Ali Mamat},
  title        = {An efficient replicated data access approach for large-scale distributed
                  systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {1--9},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.future.2007.04.010},
  doi          = {10.1016/J.FUTURE.2007.04.010},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/DerisAM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcritis/Abawajy08,
  author       = {Jemal H. Abawajy},
  title        = {Security and privacy threats to volunteer computing},
  journal      = {Int. J. Crit. Infrastructures},
  volume       = {4},
  number       = {3},
  pages        = {245--255},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJCIS.2008.017439},
  doi          = {10.1504/IJCIS.2008.017439},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcritis/Abawajy08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/Abawajy08,
  author       = {Jemal H. Abawajy},
  title        = {An Online Credential Management Service for InterGrid Computing},
  booktitle    = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008},
  pages        = {101--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/APSCC.2008.74},
  doi          = {10.1109/APSCC.2008.74},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/Abawajy08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiwas/FudzeeA08,
  author       = {Mohd Farhan Md Fudzee and
                  Jemal H. Abawajy},
  editor       = {Gabriele Kotsis and
                  David Taniar and
                  Eric Pardede and
                  Ismail Khalil Ibrahim},
  title        = {A classification for content adaptation system},
  booktitle    = {iiWAS'2008 - The Tenth International Conference on Information Integration
                  and Web-based Applications Services, 24-26 November 2008, Linz, Austria},
  pages        = {426--429},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1497308.1497386},
  doi          = {10.1145/1497308.1497386},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iiwas/FudzeeA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JavadiAA07,
  author       = {Bahman Javadi and
                  Mohammad K. Akbari and
                  Jemal H. Abawajy},
  title        = {Analytical communication networks model for enterprise Grid computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {23},
  number       = {6},
  pages        = {737--747},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.future.2006.11.002},
  doi          = {10.1016/J.FUTURE.2006.11.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/JavadiAA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/JavadiAA07,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari},
  title        = {Analytical modeling of interconnection networks in heterogeneous multi-cluster
                  systems},
  journal      = {J. Supercomput.},
  volume       = {40},
  number       = {1},
  pages        = {29--47},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11227-006-0011-6},
  doi          = {10.1007/S11227-006-0011-6},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/JavadiAA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/RahamanAH07,
  author       = {Ahadur Rahaman and
                  Jemal H. Abawajy and
                  Michael Hobbs},
  title        = {Taxonomy and Survey of Location Management Systems},
  booktitle    = {6th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia},
  pages        = {369--374},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIS.2007.176},
  doi          = {10.1109/ICIS.2007.176},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/RahamanAH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACISicis/ChongAD07,
  author       = {Soon{-}Keow Chong and
                  Jemal H. Abawajy and
                  Robert A. Dew},
  title        = {A Multilevel Trust Management Framework},
  booktitle    = {6th Annual {IEEE/ACIS} International Conference on Computer and Information
                  Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia},
  pages        = {776--781},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICIS.2007.30},
  doi          = {10.1109/ICIS.2007.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACISicis/ChongAD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/JavadiAA07,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari},
  editor       = {Ljiljana Brankovic and
                  Paul D. Coddington and
                  John F. Roddick and
                  Chris Steketee and
                  James R. Warren and
                  Andrew L. Wendelborn},
  title        = {Communication Network Analysis of the Enterprise Grid Systems},
  booktitle    = {{ACSW} Frontiers 2007. Proceedings of the Fifth Australasian Symposium
                  on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian
                  Information Security Workshop (Privacy Enhancing Technologies) {(AISW}
                  2007), and the Australasian Workshop on Health Knowledge Management
                  and Discovery {(HKMD} 2007). Proceedings, Ballarat, Victoria, Australia,
                  January 30 - February 2, 2007},
  series       = {{CRPIT}},
  volume       = {68},
  pages        = {33--40},
  publisher    = {Australian Computer Society},
  year         = {2007},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV68Javadi.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/JavadiAA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipc/Al-NayadiA07,
  author       = {Fahed Al{-}Nayadi and
                  Jemal H. Abawajy},
  title        = {An Authorization Policy Management Framework for Dynamic Medical Data
                  Sharing},
  booktitle    = {The 2007 International Conference on Intelligent Pervasive Computing,
                  {IPC} 2007, Jeju Island, Korea, 11-13 October 2007},
  pages        = {313--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IPC.2007.118},
  doi          = {10.1109/IPC.2007.118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipc/Al-NayadiA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/AbawajyNA07,
  author       = {Jemal H. Abawajy and
                  Saeid Nahavandi and
                  Fahed Al{-}Nayadi},
  title        = {Sensor Node Activity Scheduling Approach},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {72--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.190},
  doi          = {10.1109/MUE.2007.190},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/AbawajyNA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/Al-NaydiAD07,
  author       = {Fahed Al{-}Nayadi and
                  Jemal H. Abawajy and
                  Mustafa Mat Deris},
  title        = {A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient
                  Information among Autonomous Healthcare Providers},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {299--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.7},
  doi          = {10.1109/MUE.2007.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/Al-NaydiAD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/ChongA07,
  author       = {Soon{-}Keow Chong and
                  Jemal H. Abawajy},
  title        = {Feedback Credibility Issues In Trust Management Systems},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {387--394},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.130},
  doi          = {10.1109/MUE.2007.130},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/ChongA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Abawajy06,
  author       = {Jemal H. Abawajy},
  title        = {Special section: Parallel input/output management techniques {(PIOMT)}
                  in cluster and grid computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {22},
  number       = {5},
  pages        = {600},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.future.2005.09.002},
  doi          = {10.1016/J.FUTURE.2005.09.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Abawajy06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Abawajy06a,
  author       = {Jemal H. Abawajy},
  title        = {Adaptive parallel {I/O} scheduling algorithm for multiprogrammed systems},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {22},
  number       = {5},
  pages        = {611--619},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.future.2005.09.008},
  doi          = {10.1016/J.FUTURE.2005.09.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Abawajy06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/AbawajyDO06,
  author       = {Jemal H. Abawajy and
                  Mustafa Mat Deris and
                  M. Omar},
  title        = {A novel data replication and management protocol for mobile computing
                  systems},
  journal      = {Mob. Inf. Syst.},
  volume       = {2},
  number       = {1},
  pages        = {3--19},
  year         = {2006},
  url          = {https://doi.org/10.1155/2006/930587},
  doi          = {10.1155/2006/930587},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/AbawajyDO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pc/JavadiAA06,
  author       = {Bahman Javadi and
                  Mohammad K. Akbari and
                  Jemal H. Abawajy},
  title        = {A performance model for analysis of heterogeneous multi-cluster systems},
  journal      = {Parallel Comput.},
  volume       = {32},
  number       = {11-12},
  pages        = {831--851},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.parco.2006.09.006},
  doi          = {10.1016/J.PARCO.2006.09.006},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pc/JavadiAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AbawajyD06,
  author       = {Jemal H. Abawajy and
                  Mustafa Mat Deris},
  title        = {Supporting Disconnected Operations in Mobile Computing},
  booktitle    = {2006 {IEEE/ACS} International Conference on Computer Systems and Applications
                  {(AICCSA} 2006), March 8-11, Dubai/Sharjah, {UAE}},
  pages        = {911--918},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AICCSA.2006.205197},
  doi          = {10.1109/AICCSA.2006.205197},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AbawajyD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/Abawajy06,
  author       = {Jemal H. Abawajy},
  title        = {Parallel {I/O} Scheduling in the Presence of Data Duplication on Multiprogrammed
                  Cluster Computing Systems},
  booktitle    = {2006 {IEEE/ACS} International Conference on Computer Systems and Applications
                  {(AICCSA} 2006), March 8-11, Dubai/Sharjah, {UAE}},
  pages        = {1118--1125},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AICCSA.2006.205228},
  doi          = {10.1109/AICCSA.2006.205228},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/Abawajy06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/JavadiAAN06,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari and
                  Saeid Nahavandi},
  title        = {Analytical Network Modeling of Heterogeneous Large-Scale Cluster Systems},
  booktitle    = {Proceedings of the 2006 {IEEE} International Conference on Cluster
                  Computing, September 25-28, 2006, Barcelona, Spain},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CLUSTR.2006.311902},
  doi          = {10.1109/CLUSTR.2006.311902},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cluster/JavadiAAN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eScience/LinAB06,
  author       = {Henry Lin and
                  Jemal H. Abawajy and
                  Rajkumar Buyya},
  title        = {Economy-Based Data Replication Broker},
  booktitle    = {Second International Conference on e-Science and Grid Technologies
                  (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands},
  pages        = {90},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/E-SCIENCE.2006.261174},
  doi          = {10.1109/E-SCIENCE.2006.261174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eScience/LinAB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/AbawajyG06,
  author       = {Jemal H. Abawajy and
                  Andrzej M. Goscinski},
  editor       = {Vassil N. Alexandrov and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {A Reputation-Based Grid Information Service},
  booktitle    = {Computational Science - {ICCS} 2006, 6th International Conference,
                  Reading, UK, May 28-31, 2006, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3994},
  pages        = {1015--1022},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11758549\_135},
  doi          = {10.1007/11758549\_135},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/AbawajyG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/MamatDAI06,
  author       = {Ali Mamat and
                  Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  Suhaila Ismail},
  editor       = {Vassil N. Alexandrov and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Managing Data Using Neighbor Replication on Triangular-Grid Structure},
  booktitle    = {Computational Science - {ICCS} 2006, 6th International Conference,
                  Reading, UK, May 28-31, 2006, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3994},
  pages        = {1071--1077},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11758549\_142},
  doi          = {10.1007/11758549\_142},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/MamatDAI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/JavadiAA06,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari},
  title        = {Analytical Modeling of Communication Latency in Multi-Cluster Systems},
  booktitle    = {12th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2006, Minneapolis, Minnesota, USA, July 12-15, 2006},
  pages        = {9--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICPADS.2006.26},
  doi          = {10.1109/ICPADS.2006.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/JavadiAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/JavadiAAN06,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari and
                  Saeid Nahavandi},
  title        = {Analysis of Interconnection Networks in Heterogeneous Multi-Cluster
                  Systems},
  booktitle    = {2006 International Conference on Parallel Processing Workshops {(ICPP}
                  Workshops 2006), 14-18 August 2006, Columbus, Ohio, {USA}},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICPPW.2006.24},
  doi          = {10.1109/ICPPW.2006.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/JavadiAAN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AbawajyH05,
  author       = {Jemal H. Abawajy and
                  Meng{-}Jye Hu},
  title        = {A new Internet meta-search engine and implementation},
  booktitle    = {2005 {ACS} / {IEEE} International Conference on Computer Systems and
                  Applications {(AICCSA} 2005), January 3-6, 2005, Cairo, Egypt},
  pages        = {103},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AICCSA.2005.1387092},
  doi          = {10.1109/AICCSA.2005.1387092},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AbawajyH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/Abawajy05,
  author       = {Jemal H. Abawajy},
  editor       = {Michael Hobbs and
                  Andrzej M. Goscinski and
                  Wanlei Zhou},
  title        = {Fault-Tolerant Dynamic Job Scheduling Policy},
  booktitle    = {Distributed and Parallel Computing, 6th International Conference on
                  Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne,
                  Australia, October 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3719},
  pages        = {165--173},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11564621\_19},
  doi          = {10.1007/11564621\_19},
  timestamp    = {Mon, 25 Apr 2022 12:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/Abawajy05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/Abawajy05a,
  author       = {Jemal H. Abawajy},
  editor       = {Michael Hobbs and
                  Andrzej M. Goscinski and
                  Wanlei Zhou},
  title        = {Job Scheduling Policy for High Throughput Grid Computing},
  booktitle    = {Distributed and Parallel Computing, 6th International Conference on
                  Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne,
                  Australia, October 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3719},
  pages        = {184--192},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11564621\_21},
  doi          = {10.1007/11564621\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/Abawajy05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/JavadiAA05,
  author       = {Bahman Javadi and
                  Jemal H. Abawajy and
                  Mohammad K. Akbari},
  editor       = {Vaidy S. Sunderam and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Performance Analysis of Interconnection Networks for Multi-cluster
                  Systems},
  booktitle    = {Computational Science - {ICCS} 2005, 5th International Conference,
                  Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3516},
  pages        = {205--212},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428862\_29},
  doi          = {10.1007/11428862\_29},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/JavadiAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Abawajy05,
  author       = {Jemal H. Abawajy},
  editor       = {Vaidy S. Sunderam and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Autonomic Job Scheduling Policy for Grid Computing},
  booktitle    = {Computational Science - {ICCS} 2005, 5th International Conference,
                  Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3516},
  pages        = {213--220},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428862\_30},
  doi          = {10.1007/11428862\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Abawajy05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/DerisAZM05,
  author       = {Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  M. Zarina and
                  Rabiei Mamat},
  editor       = {Vaidy S. Sunderam and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {High Reliability Replication Technique for Web-Server Cluster Systems},
  booktitle    = {Computational Science - {ICCS} 2005, 5th International Conference,
                  Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3516},
  pages        = {447--456},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428862\_61},
  doi          = {10.1007/11428862\_61},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/DerisAZM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Abawajy05a,
  author       = {Jemal H. Abawajy},
  editor       = {Vaidy S. Sunderam and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {An Efficient Replicated Data Management Approach for Peer-to-Peer
                  Systems},
  booktitle    = {Computational Science - {ICCS} 2005, 5th International Conference,
                  Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3516},
  pages        = {457--463},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11428862\_62},
  doi          = {10.1007/11428862\_62},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Abawajy05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/DerisAO05,
  author       = {Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  M. Omar},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {A New Approach For Efficiently Achieving High Availability in Mobile
                  Computing},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3482},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424857\_7},
  doi          = {10.1007/11424857\_7},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/DerisAO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/Abawajy05,
  author       = {Jemal H. Abawajy},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Robust Parallel Job Scheduling Infrastructure for Service-Oriented
                  Grid Computing Systems},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3483},
  pages        = {1272--1281},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424925\_132},
  doi          = {10.1007/11424925\_132},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/Abawajy05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/JavadiAA05,
  author       = {Bahman Javadi and
                  Mohammad K. Akbari and
                  Jemal H. Abawajy},
  title        = {Performance Analysis of Heterogeneous Multi-Cluster Systems},
  booktitle    = {34th International Conference on Parallel Processing Workshops {(ICPP}
                  2005 Workshops), 14-17 June 2005, Oslo, Norway},
  pages        = {493--500},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICPPW.2005.70},
  doi          = {10.1109/ICPPW.2005.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/JavadiAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npsc/AbawajyD04,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  title        = {Fault-tolerant Grid Resource Management Infrastructure},
  journal      = {Neural Parallel Sci. Comput.},
  volume       = {12},
  number       = {3},
  pages        = {289--306},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1093537},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npsc/AbawajyD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/Abawajy04,
  author       = {Jemal H. Abawajy},
  title        = {Preemptive Job Scheduling Policy For Distributively-Owned Workstation
                  Clusters},
  journal      = {Parallel Process. Lett.},
  volume       = {14},
  number       = {2},
  pages        = {255--270},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0129626404001866},
  doi          = {10.1142/S0129626404001866},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppl/Abawajy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/DerisAS04,
  author       = {Mustafa Mat Deris and
                  Jemal H. Abawajy and
                  H. M. Suzuri},
  title        = {An efficient replicated data access approach for large-scale distributed
                  systems},
  booktitle    = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
  pages        = {588--594},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CCGrid.2004.1336663},
  doi          = {10.1109/CCGRID.2004.1336663},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/DerisAS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/PerezSRPA04,
  author       = {Mar{\'{\i}}a S. P{\'{e}}rez and
                  Alberto S{\'{a}}nchez and
                  V{\'{\i}}ctor Robles and
                  Jos{\'{e}} M. Pe{\~{n}}a and
                  Jemal H. Abawajy},
  title        = {Cooperation model of a multiagent parallel file system for clusters},
  booktitle    = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
  pages        = {595--601},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CCGrid.2004.1336665},
  doi          = {10.1109/CCGRID.2004.1336665},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccgrid/PerezSRPA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Abawajy04,
  author       = {Jemal H. Abawajy},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Dynamic Parallel Job Scheduling in Multi-cluster Computing Systems},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3036},
  pages        = {27--34},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24685-5\_4},
  doi          = {10.1007/978-3-540-24685-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Abawajy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Abawajy04a,
  author       = {Jemal H. Abawajy},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {Placement of File Replicas in Data Grid Environments},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3038},
  pages        = {66--73},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24688-6\_11},
  doi          = {10.1007/978-3-540-24688-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Abawajy04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Abawajy04b,
  author       = {Jemal H. Abawajy},
  editor       = {Marian Bubak and
                  G. Dick van Albada and
                  Peter M. A. Sloot and
                  Jack J. Dongarra},
  title        = {File Replacement Algorithm for Storage Resource Managers in Data Grids},
  booktitle    = {Computational Science - {ICCS} 2004, 4th International Conference,
                  Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3038},
  pages        = {339--346},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24688-6\_46},
  doi          = {10.1007/978-3-540-24688-6\_46},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Abawajy04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/PerezSARS04,
  author       = {Mar{\'{\i}}a S. P{\'{e}}rez and
                  Alberto S{\'{a}}nchez and
                  Jemal H. Abawajy and
                  V{\'{\i}}ctor Robles and
                  Jos{\'{e}} M. Pe{\~{n}}a},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {Design and Evaluation of an Agent-Based Communication Model for a
                  Parallel File System},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3044},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24709-8\_10},
  doi          = {10.1007/978-3-540-24709-8\_10},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/PerezSARS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/Abawajy04,
  author       = {Jemal H. Abawajy},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {Fault Detection Service Architecture for Grid Computing Systems},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3044},
  pages        = {107--115},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24709-8\_12},
  doi          = {10.1007/978-3-540-24709-8\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/Abawajy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/Abawajy04,
  author       = {Jemal H. Abawajy},
  title        = {Fault-Tolerant Scheduling Policy for Grid Computing Systems},
  booktitle    = {18th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2004), {CD-ROM} / Abstracts Proceedings, 26-30 April 2004, Santa Fe,
                  New Mexico, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IPDPS.2004.1303290},
  doi          = {10.1109/IPDPS.2004.1303290},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/Abawajy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcn/Abawajy04,
  author       = {Jemal H. Abawajy},
  editor       = {M. H. Hamza},
  title        = {Grid accounting and payment architecture},
  booktitle    = {Proceedings of the {IASTED} International Conference on Parallel and
                  Distributed Computing and Networks, Innsbruck, Austria, February 17-19,
                  2004},
  pages        = {82--87},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Fri, 23 Mar 2007 19:28:53 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcn/Abawajy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sag/Abawajy04,
  author       = {Jemal H. Abawajy},
  editor       = {Pilar Herrero and
                  Mar{\'{\i}}a S. P{\'{e}}rez and
                  V{\'{\i}}ctor Robles},
  title        = {Grid Accounting Service Infrastructure for Service-Oriented Grid Computing
                  Systems},
  booktitle    = {Scientific Applications of Grid Computing, First International Workshop,
                  {SAG} 2004, Beijing, China, September 20-24, 2004, Revised Selected
                  and Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3458},
  pages        = {168--175},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11423287\_15},
  doi          = {10.1007/11423287\_15},
  timestamp    = {Tue, 11 Apr 2023 12:52:01 +0200},
  biburl       = {https://dblp.org/rec/conf/sag/Abawajy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/AbawajyD03,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  editor       = {Seong{-}Moo Yoo and
                  Hee Yong Youn},
  title        = {A Unified Resource Scheduling Approach on Cluster Computing Systems},
  booktitle    = {Proceedings of the {ISCA} 16th International Conference on Parallel
                  and Distributed Computing Systems, August 13-15, 2003, Atlantis Hotel,
                  Reno, Nevada, {USA}},
  pages        = {43--48},
  publisher    = {{ISCA}},
  year         = {2003},
  timestamp    = {Mon, 09 Aug 2021 16:35:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCApdcs/AbawajyD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/Abawajy03,
  author       = {Jemal H. Abawajy},
  title        = {Performance Analysis of Parallel {I/O} Scheduling Approaches on Cluster
                  Computing Systems},
  booktitle    = {3rd {IEEE} International Symposium on Cluster Computing and the Grid
                  (CCGrid 2003), 12-15 May 2003, Tokyo, Japan},
  pages        = {724--729},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CCGRID.2003.1199439},
  doi          = {10.1109/CCGRID.2003.1199439},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/Abawajy03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/AbawajyD03,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  title        = {Parallel Job Scheduling on Multicluster Computing Systems},
  booktitle    = {2003 {IEEE} International Conference on Cluster Computing {(CLUSTER}
                  2003), 1-4 December 2003, Kowloon, Hong Kong, China},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CLUSTR.2003.1253294},
  doi          = {10.1109/CLUSTR.2003.1253294},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cluster/AbawajyD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/Abawajy03,
  author       = {Jemal H. Abawajy},
  editor       = {Peter M. A. Sloot and
                  David Abramson and
                  Alexander V. Bogdanov and
                  Jack J. Dongarra and
                  Albert Y. Zomaya and
                  Yuri E. Gorbachev},
  title        = {Parallel {I/O} Scheduling in Multiprogrammed Cluster Computing Systems},
  booktitle    = {Computational Science - {ICCS} 2003, International Conference, Melbourne,
                  Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings,
                  Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2660},
  pages        = {223--229},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44864-0\_23},
  doi          = {10.1007/3-540-44864-0\_23},
  timestamp    = {Tue, 20 Jun 2023 16:27:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/Abawajy03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccS/ImasakiA03,
  author       = {Kenji Imasaki and
                  Jemal H. Abawajy},
  editor       = {Peter M. A. Sloot and
                  David Abramson and
                  Alexander V. Bogdanov and
                  Jack J. Dongarra and
                  Albert Y. Zomaya and
                  Yuri E. Gorbachev},
  title        = {An Adaptive Load Balancing Algorithm for Large Data Parallel Processing
                  with Communication Delay},
  booktitle    = {Computational Science - {ICCS} 2003, International Conference, Melbourne,
                  Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings,
                  Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2660},
  pages        = {242--247},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44864-0\_25},
  doi          = {10.1007/3-540-44864-0\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccS/ImasakiA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/AbawajyD03,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  title        = {Scheduling Parallel Jobs with {CPU} and {I/O} Resource Requirements
                  in Cluster Computing Systems},
  booktitle    = {11th International Workshop on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems {(MASCOTS} 2003), 12-15
                  October 2003, Orlando, FL, {USA}},
  pages        = {336--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/MASCOT.2003.1240678},
  doi          = {10.1109/MASCOT.2003.1240678},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/AbawajyD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/AbawajyD03,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {A Reconfigurable Multi-Layered Grid Scheduling Infrastructure},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} '03, June 23 - 26,
                  2003, Las Vegas, Nevada, USA, Volume 1},
  pages        = {138--144},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Fri, 05 Dec 2003 09:24:11 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/AbawajyD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/Abawajy02,
  author       = {Jemal H. Abawajy},
  title        = {Job Scheduling Policy for High Throughput Computing Environments},
  booktitle    = {9th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2002, Taiwan, ROC, December 17-20, 2002},
  pages        = {605--610},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICPADS.2002.1183466},
  doi          = {10.1109/ICPADS.2002.1183466},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/Abawajy02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/AbawajyD00,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  title        = {Parallel Job Scheduling Policy for Workstation Cluster Environments},
  booktitle    = {2000 {IEEE} International Conference on Cluster Computing {(CLUSTER}
                  2000), November 28th - December 1st, 2000, Technische Universit{\"{a}}t
                  Chemnitz, Saxony, Germany},
  pages        = {351--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CLUSTER.2000.10009},
  doi          = {10.1109/CLUSTER.2000.10009},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cluster/AbawajyD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parelec/Abawajy00,
  author       = {Jemal H. Abawajy},
  title        = {An Approach to Support a Single Service Provider Address Image for
                  Wide Area Networks Environment},
  booktitle    = {2000 International Conference on Parallel Computing in Electrical
                  Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada},
  pages        = {59--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/PCEE.2000.873602},
  doi          = {10.1109/PCEE.2000.873602},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/parelec/Abawajy00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parelec/AbawajyD00,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  title        = {Distributed Hierarchical Workstation Cluster Co-Ordination Scheme},
  booktitle    = {2000 International Conference on Parallel Computing in Electrical
                  Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada},
  pages        = {111--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/PCEE.2000.873612},
  doi          = {10.1109/PCEE.2000.873612},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/parelec/AbawajyD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/parelec/AbawajyD00a,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  title        = {Time/Space Sharing Distributed Job Scheduling Policy in a Workstation
                  Cluster Environment},
  booktitle    = {2000 International Conference on Parallel Computing in Electrical
                  Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada},
  pages        = {116--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/PCEE.2000.873613},
  doi          = {10.1109/PCEE.2000.873613},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/parelec/AbawajyD00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/AbawajyD99,
  author       = {Jemal H. Abawajy and
                  Sivarama P. Dandamudi},
  editor       = {Hamid R. Arabnia},
  title        = {An Approach to Scheduling Parallel Applications on Networks of Workstations},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {2580--2586},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Tue, 20 Apr 2004 14:47:51 +0200},
  biburl       = {https://dblp.org/rec/conf/pdpta/AbawajyD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbms/AbawajyS94,
  author       = {Jemal H. Abawajy and
                  Michael Shepherd},
  title        = {Framework for the design of coupled knowledge/data base medical information
                  systems},
  booktitle    = {Seventh Annual {IEEE} Symposium on Computer-Based Medical Systems
                  (CBMS'94), June 10-12, 1994, Winston-Salem, NC, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/CBMS.1994.315975},
  doi          = {10.1109/CBMS.1994.315975},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/cbms/AbawajyS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Abawajy93,
  author       = {Djemal H. Abawajy},
  title        = {Orphan Problems and Remedies In Distributed Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {27},
  number       = {1},
  pages        = {27--32},
  year         = {1993},
  url          = {https://doi.org/10.1145/160551.160554},
  doi          = {10.1145/160551.160554},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/Abawajy93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics