default search action
BibTeX records: Jemal H. Abawajy
@article{DBLP:journals/csur/ShahidinejadA24, author = {Ali Shahidinejad and Jemal H. Abawajy}, title = {An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT}, journal = {{ACM} Comput. Surv.}, volume = {56}, number = {7}, pages = {186:1--186:38}, year = {2024}, url = {https://doi.org/10.1145/3645087}, doi = {10.1145/3645087}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ShahidinejadA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/SalimiAA24, author = {Rezvan Salimi and Sadoon Azizi and Jemal H. Abawajy}, title = {A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog-cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {5}, year = {2024}, url = {https://doi.org/10.1002/ett.4980}, doi = {10.1002/ETT.4980}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/SalimiAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShahidinejadA24, author = {Ali Shahidinejad and Jemal H. Abawajy}, title = {Efficient Provably Secure Authentication Protocol for Multidomain IIoT Using a Combined Off-Chain and On-Chain Approach}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {9}, pages = {15241--15251}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3347677}, doi = {10.1109/JIOT.2023.3347677}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ShahidinejadA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AlJabriAH24, author = {Zainab AlJabri and Jemal H. Abawajy and Shamsul Huda}, title = {MDS-Based Cloned Device Detection in IoT-Fog Network}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {12}, pages = {22128--22139}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3379392}, doi = {10.1109/JIOT.2024.3379392}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AlJabriAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/ShahidinejadAH24, author = {Ali Shahidinejad and Jemal H. Abawajy and Shamsul Huda}, title = {Untraceable blockchain-assisted authentication and key exchange in medical consortiums}, journal = {J. Syst. Archit.}, volume = {151}, pages = {103143}, year = {2024}, url = {https://doi.org/10.1016/j.sysarc.2024.103143}, doi = {10.1016/J.SYSARC.2024.103143}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/ShahidinejadAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HudaIAKA24, author = {Shamsul Huda and Md. Rezaul Islam and Jemal H. Abawajy and Vinay Naga Vamsi Kottala and Shafiq Ahmad}, title = {A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System}, journal = {Sensors}, volume = {24}, number = {16}, pages = {5282}, year = {2024}, url = {https://doi.org/10.3390/s24165282}, doi = {10.3390/S24165282}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HudaIAKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/ShahidinejadA24, author = {Ali Shahidinejad and Jemal H. Abawajy}, title = {Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {543--553}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3347598}, doi = {10.1109/TCE.2023.3347598}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/ShahidinejadA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/QinWMA24, author = {Hongwu Qin and Yibo Wang and Xiuqin Ma and Jemal H. Abawajy}, title = {A Novel Choquet Integral-Based {VIKOR} Approach Under Q-Rung Orthopair Hesitant Fuzzy Environment}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {32}, number = {5}, pages = {2890--2902}, year = {2024}, url = {https://doi.org/10.1109/TFUZZ.2024.3364253}, doi = {10.1109/TFUZZ.2024.3364253}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/QinWMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShahidinejadAH24, author = {Ali Shahidinejad and Jemal H. Abawajy and Shamsul Huda}, title = {Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {6738--6750}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3423724}, doi = {10.1109/TIFS.2024.3423724}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShahidinejadAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ShahidinejadA24, author = {Ali Shahidinejad and Jemal H. Abawajy}, title = {Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {11}, number = {3}, pages = {2661--2674}, year = {2024}, url = {https://doi.org/10.1109/TNSE.2023.3347594}, doi = {10.1109/TNSE.2023.3347594}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ShahidinejadA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/ShahidinejadAH24, author = {Ali Shahidinejad and Jemal H. Abawajy and Shamsul Huda}, title = {Anonymous lattice-based authentication protocol for vehicular communications}, journal = {Veh. Commun.}, volume = {48}, pages = {100803}, year = {2024}, url = {https://doi.org/10.1016/j.vehcom.2024.100803}, doi = {10.1016/J.VEHCOM.2024.100803}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/ShahidinejadAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChoudhryAHR23, author = {Nomica Choudhry and Jemal H. Abawajy and Shamsul Huda and Imran Rao}, title = {A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection}, journal = {{IEEE} Access}, volume = {11}, pages = {114680--114713}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3321800}, doi = {10.1109/ACCESS.2023.3321800}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChoudhryAHR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/air/MurshedMASAA23, author = {Belal Abdullah Hezam Murshed and Suresha Mallappa and Jemal H. Abawajy and Mufeed Ahmed Naji Saif and Hasib Daowd Esmail Al{-}Ariki and Hudhaifa Mohammed Abdulwahab}, title = {Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis}, journal = {Artif. Intell. Rev.}, volume = {56}, number = {6}, pages = {5133--5260}, year = {2023}, url = {https://doi.org/10.1007/s10462-022-10254-w}, doi = {10.1007/S10462-022-10254-W}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/air/MurshedMASAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/diot/XuJNA23, author = {Zheng Xu and Deepak Kumar Jain and S. Neelakandan and Jemal H. Abawajy}, title = {Hunger games search optimization with deep learning model for sustainable supply chain management}, journal = {Discov. Internet Things}, volume = {3}, number = {1}, pages = {10}, year = {2023}, url = {https://doi.org/10.1007/s43926-023-00040-7}, doi = {10.1007/S43926-023-00040-7}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/diot/XuJNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/MurshedMASAG23, author = {Belal Abdullah Hezam Murshed and Suresha Mallappa and Jemal H. Abawajy and Mufeed Ahmed Naji Saif and Hudhaifa Mohammed Abdulwahab and Fahd A. Ghanem}, title = {{FAEO-ECNN:} cyberbullying detection in social media platforms using topic modelling and deep learning}, journal = {Multim. Tools Appl.}, volume = {82}, number = {30}, pages = {46611--46650}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-15372-3}, doi = {10.1007/S11042-023-15372-3}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/MurshedMASAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/YanA23, author = {Yuwei Yan and Jemal H. Abawajy}, title = {Special issue on neural computing and applications in cyber intelligence: {ATCI} 2022}, journal = {Neural Comput. Appl.}, volume = {35}, number = {35}, pages = {24563--24564}, year = {2023}, url = {https://doi.org/10.1007/s00521-023-09101-y}, doi = {10.1007/S00521-023-09101-Y}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/YanA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ShahidinejadA23, author = {Ali Shahidinejad and Jemal H. Abawajy}, title = {Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {6623--6633}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3319280}, doi = {10.1109/JSYST.2023.3319280}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/ShahidinejadA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/AlMansooriAC23, author = {Ahmed Al{-}Mansoori and Jemal H. Abawajy and Morshed U. Chowdhury}, title = {{SDN} enabled {BDSP} in public cloud for resource optimization}, journal = {Wirel. Networks}, volume = {29}, number = {3}, pages = {1031--1041}, year = {2023}, url = {https://doi.org/10.1007/s11276-018-1887-9}, doi = {10.1007/S11276-018-1887-9}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/AlMansooriAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/0001HSWA23, author = {Zhou Zhou and Yonggui Han and Mohammad Shojafar and Zhongsheng Wang and Jemal H. Abawajy}, editor = {Jia Hu and Geyong Min and Guojun Wang and Nektarios Georgalas}, title = {A reliable edge server placement strategy based on {DDPG} in the Internet of Vehicles}, booktitle = {22nd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023}, pages = {2587--2594}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00361}, doi = {10.1109/TRUSTCOM60117.2023.00361}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/0001HSWA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MurshedAMSA22, author = {Belal Abdullah Hezam Murshed and Jemal H. Abawajy and Suresha Mallappa and Mufeed Ahmed Naji Saif and Hasib Daowd Esmail Al{-}Ariki}, title = {{DEA-RNN:} {A} Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform}, journal = {{IEEE} Access}, volume = {10}, pages = {25857--25871}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3153675}, doi = {10.1109/ACCESS.2022.3153675}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MurshedAMSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HartantiAC22, author = {Fera Tri Hartanti and Jemal H. Abawajy and Morshed U. Chowdhury}, title = {Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being}, journal = {{IEEE} Access}, volume = {10}, pages = {69106--69124}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3186325}, doi = {10.1109/ACCESS.2022.3186325}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HartantiAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MurshedAMSAG22, author = {Belal Abdullah Hezam Murshed and Jemal H. Abawajy and Suresha Mallappa and Mufeed Ahmed Naji Saif and Sumaia Mohammed Al{-}Ghuribi and Fahd A. Ghanem}, title = {Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling}, journal = {{IEEE} Access}, volume = {10}, pages = {105328--105351}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3211396}, doi = {10.1109/ACCESS.2022.3211396}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MurshedAMSAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/MakkarGRA22, author = {Aaisha Makkar and Uttam Ghosh and Danda B. Rawat and Jemal H. Abawajy}, title = {FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {11}, number = {2}, pages = {21--27}, year = {2022}, url = {https://doi.org/10.1109/MCE.2020.3048926}, doi = {10.1109/MCE.2020.3048926}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/MakkarGRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SinghKSAK22, author = {Simar Preet Singh and Rajesh Kumar and Anju Sharma and Jemal H. Abawajy and Ravneet Kaur}, title = {Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing}, journal = {Clust. Comput.}, volume = {25}, number = {5}, pages = {3325--3342}, year = {2022}, url = {https://doi.org/10.1007/s10586-022-03554-x}, doi = {10.1007/S10586-022-03554-X}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SinghKSAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MostafaeiAA22, author = {Habib Mostafaei and Shafi Afridi and Jemal H. Abawajy}, title = {Network-aware worker placement for wide-area streaming analytics}, journal = {Future Gener. Comput. Syst.}, volume = {136}, pages = {270--281}, year = {2022}, url = {https://doi.org/10.1016/j.future.2022.06.009}, doi = {10.1016/J.FUTURE.2022.06.009}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/MostafaeiAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/HassanHHAAF22, author = {Md. Rafiul Hassan and Shamsul Huda and Mohammad Mehedi Hassan and Jemal H. Abawajy and Ahmed Alsanad and Giancarlo Fortino}, title = {Early detection of cardiovascular autonomic neuropathy: {A} multi-class classification model based on feature selection and deep learning feature fusion}, journal = {Inf. Fusion}, volume = {77}, pages = {70--80}, year = {2022}, url = {https://doi.org/10.1016/j.inffus.2021.07.010}, doi = {10.1016/J.INFFUS.2021.07.010}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/HassanHHAAF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SharmeenHAAHF22, author = {Shaila Sharmeen and Shamsul Huda and Jemal H. Abawajy and Chuadhry Mujeeb Ahmed and Mohammad Mehedi Hassan and Giancarlo Fortino}, title = {An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {10}, pages = {7298--7310}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3100461}, doi = {10.1109/JIOT.2021.3100461}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SharmeenHAAHF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/QinCMLA22, author = {Hongwu Qin and Yuntao Cheng and Xiuqin Ma and Fei Li and Jemal H. Abawajy}, title = {Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {A}}, pages = {8370--8379}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.08.017}, doi = {10.1016/J.JKSUCI.2022.08.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/QinCMLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AziziSAB22, author = {Sadoon Azizi and Mohammad Shojafar and Jemal H. Abawajy and Rajkumar Buyya}, title = {Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: {A} semi-greedy approach}, journal = {J. Netw. Comput. Appl.}, volume = {201}, pages = {103333}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2022.103333}, doi = {10.1016/J.JNCA.2022.103333}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/AziziSAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/GhanavatiAI22, author = {Sara Ghanavati and Jemal H. Abawajy and Davood Izadi}, title = {Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {10}, number = {1}, pages = {488--499}, year = {2022}, url = {https://doi.org/10.1109/TETC.2020.3033672}, doi = {10.1109/TETC.2020.3033672}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/GhanavatiAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/MaQA22, author = {Xiuqin Ma and Hongwu Qin and Jemal H. Abawajy}, title = {Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making and Parameter Reduction}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {30}, number = {2}, pages = {357--369}, year = {2022}, url = {https://doi.org/10.1109/TFUZZ.2020.3039335}, doi = {10.1109/TFUZZ.2020.3039335}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tfs/MaQA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/ZhouSAYL22, author = {Zhou Zhou and Mohammad Shojafar and Jemal H. Abawajy and Hui Yin and Hongming Lu}, title = {{ECMS:} An Edge Intelligent Energy Efficient Model in Mobile Edge Computing}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {6}, number = {1}, pages = {238--247}, year = {2022}, url = {https://doi.org/10.1109/TGCN.2021.3121961}, doi = {10.1109/TGCN.2021.3121961}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgcn/ZhouSAYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ShojafarMPA22, author = {Mohammad Shojafar and Mithun Mukherjee and Vincenzo Piuri and Jemal H. Abawajy}, title = {Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {5}, pages = {3519--3521}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3128972}, doi = {10.1109/TII.2021.3128972}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/ShojafarMPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhouASC22, author = {Zhou Zhou and Jemal H. Abawajy and Mohammad Shojafar and Morshed U. Chowdhury}, title = {{DEHM:} An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {7}, pages = {4944--4953}, year = {2022}, url = {https://doi.org/10.1109/TII.2022.3140854}, doi = {10.1109/TII.2022.3140854}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/ZhouASC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/GhanavatiAI22, author = {Sara Ghanavati and Jemal H. Abawajy and Davood Izadi}, title = {An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {4}, pages = {2007--2017}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3028575}, doi = {10.1109/TSC.2020.3028575}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/GhanavatiAI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/ZhouLASCLL22, author = {Zhou Zhou and Kenli Li and Jemal H. Abawajy and Mohammad Shojafar and Morshed Uddin Chowdhury and Fangmin Li and Keqin Li}, title = {An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {7}, number = {2}, pages = {371--385}, year = {2022}, url = {https://doi.org/10.1109/TSUSC.2021.3115388}, doi = {10.1109/TSUSC.2021.3115388}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsusc/ZhouLASCLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/KumarKAASZ22, author = {Mohit Kumar and Avadh Kishor and Jemal H. Abawajy and Prabal Agarwal and Amritpal Singh and Albert Y. Zomaya}, title = {{ARPS:} An Autonomic Resource Provisioning and Scheduling Framework for Cloud Platforms}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {7}, number = {2}, pages = {386--399}, year = {2022}, url = {https://doi.org/10.1109/TSUSC.2021.3110245}, doi = {10.1109/TSUSC.2021.3110245}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/KumarKAASZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scdm/2022, editor = {Rozaida Ghazali and Nazri Mohd Nawi and Mustafa Mat Deris and Jemal H. Abawajy and Nureize Arbaiy}, title = {Recent Advances in Soft Computing and Data Mining - Proceedings of the Fifth International Conference on Soft Computing and Data Mining {(SCDM} 2022), May 30-31, 2022, Virtual Event}, series = {Lecture Notes in Networks and Systems}, volume = {457}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-00828-3}, doi = {10.1007/978-3-031-00828-3}, isbn = {978-3-031-00827-6}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scdm/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZamanMHAAM21, author = {Gohar Zaman and Hairulnizam Mahdin and Khalid Hussain and Atta{-}ur{-}Rahman and Jemal H. Abawajy and Salama A. Mostafa}, title = {An Ontological Framework for Information Extraction From Diverse Scientific Sources}, journal = {{IEEE} Access}, volume = {9}, pages = {42111--42124}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3063181}, doi = {10.1109/ACCESS.2021.3063181}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZamanMHAAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DaremGAAAA21, author = {Abdul Basit Darem and Fuad A. Ghaleb and Asma Alhashmi and Jemal H. Abawajy and Sultan Munadi Alanazi and Afrah Y. AL{-}Rezami}, title = {An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning}, journal = {{IEEE} Access}, volume = {9}, pages = {97180--97196}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3093366}, doi = {10.1109/ACCESS.2021.3093366}, timestamp = {Sun, 28 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DaremGAAAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/EbadDA21, author = {Shouki A. Ebad and Abdul Basit Darem and Jemal H. Abawajy}, title = {Measuring Software Obfuscation Quality-A Systematic Literature Review}, journal = {{IEEE} Access}, volume = {9}, pages = {99024--99038}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3094517}, doi = {10.1109/ACCESS.2021.3094517}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/EbadDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SharmaABCCABMDM21, author = {Akhilesh Kumar Sharma and Gaurav Aggarwal and Sachit Bhardwaj and Prasun Chakrabarti and Tulika Chakrabarti and Jemal H. Abawajy and Siddhartha Bhattacharyya and Richa Mishra and Anirban Das and Hairulnizam Mahdin}, title = {Classification of Indian Classical Music With Time-Series Matching Deep Learning Approach}, journal = {{IEEE} Access}, volume = {9}, pages = {102041--102052}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3093911}, doi = {10.1109/ACCESS.2021.3093911}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SharmaABCCABMDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NazahHAH21, author = {Saiba Nazah and Md. Shamsul Huda and Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {An Unsupervised Model for Identifying and Characterizing Dark Web Forums}, journal = {{IEEE} Access}, volume = {9}, pages = {112871--112892}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3103319}, doi = {10.1109/ACCESS.2021.3103319}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NazahHAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KassemCA21, author = {Haider Kassem and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information}, journal = {{IEEE} Access}, volume = {9}, pages = {121686--121697}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3108561}, doi = {10.1109/ACCESS.2021.3108561}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KassemCA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HartantiACS21, author = {Fera Tri Hartanti and Jemal H. Abawajy and Morshed U. Chowdhury and Wervyan Shalannanda}, title = {Citizens' Trust Measurement in Smart Government Services}, journal = {{IEEE} Access}, volume = {9}, pages = {150663--150676}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3124206}, doi = {10.1109/ACCESS.2021.3124206}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HartantiACS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Al-OmairiACA21, author = {Lamyaa Al{-}Omairi and Jemal H. Abawajy and Morshed U. Chowdhury and Tahsien Al{-}Quraishi}, title = {An empirical analysis of graph-based linear dimensionality reduction techniques}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {5}, year = {2021}, url = {https://doi.org/10.1002/cpe.5990}, doi = {10.1002/CPE.5990}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Al-OmairiACA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DaremAMAA21, author = {Abdul Basit Darem and Jemal H. Abawajy and Aaisha Makkar and Asma Alhashmi and Sultan Munadi Alanazi}, title = {Visualization and deep-learning-based malware variant detection using OpCode-level features}, journal = {Future Gener. Comput. Syst.}, volume = {125}, pages = {314--323}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.06.032}, doi = {10.1016/J.FUTURE.2021.06.032}, timestamp = {Sun, 28 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/DaremAMAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfs/XiaoAACAL21, author = {Fuyuan Xiao and Masayoshi Aritsugi and Jemal H. Abawajy and Zehong Cao and Rami Al{-}Hmouz and Peide Liu}, title = {Editorial on Special Issue: "Applications of Intelligent and Fuzzy Theory in Data Science"}, journal = {Int. J. Fuzzy Syst.}, volume = {23}, number = {2}, pages = {492--493}, year = {2021}, url = {https://doi.org/10.1007/s40815-021-01091-0}, doi = {10.1007/S40815-021-01091-0}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijfs/XiaoAACAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/XuA21, author = {Zheng Xu and Jemal H. Abawajy}, title = {Editorial: Special issue on neural computing and applications in cyber intelligence: {ATCI} 2020}, journal = {Neural Comput. Appl.}, volume = {33}, number = {3}, pages = {805--806}, year = {2021}, url = {https://doi.org/10.1007/s00521-020-05653-5}, doi = {10.1007/S00521-020-05653-5}, timestamp = {Wed, 31 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/XuA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/PrinceHCAK21, author = {Prince and Ananda Shankar Hati and Prasun Chakrabarti and Jemal H. Abawajy and Ng Wee Keong}, title = {Development of energy efficient drive for ventilation system using recurrent neural network}, journal = {Neural Comput. Appl.}, volume = {33}, number = {14}, pages = {8659--8668}, year = {2021}, url = {https://doi.org/10.1007/s00521-020-05615-x}, doi = {10.1007/S00521-020-05615-X}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/PrinceHCAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AbawajyDA21, author = {Jemal H. Abawajy and Abdul Basit Darem and Asma Alhashmi}, title = {Feature Subset Selection for Malware Detection in Smart IoT Platforms}, journal = {Sensors}, volume = {21}, number = {4}, pages = {1374}, year = {2021}, url = {https://doi.org/10.3390/s21041374}, doi = {10.3390/S21041374}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AbawajyDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/AziziSAB21, author = {Sadoon Azizi and Mohammad Shojafar and Jemal H. Abawajy and Rajkumar Buyya}, title = {{GRVMP:} {A} Greedy Randomized Algorithm for Virtual Machine Placement in Cloud Data Centers}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {2}, pages = {2571--2582}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.3002721}, doi = {10.1109/JSYST.2020.3002721}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/AziziSAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/ZhouSAAL21, author = {Zhou Zhou and Mohammad Shojafar and Mamoun Alazab and Jemal H. Abawajy and Fangmin Li}, title = {{AFED-EF:} An Energy-Efficient {VM} Allocation Algorithm for IoT Applications in a Cloud Data Center}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {5}, number = {2}, pages = {658--669}, year = {2021}, url = {https://doi.org/10.1109/TGCN.2021.3067309}, doi = {10.1109/TGCN.2021.3067309}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgcn/ZhouSAAL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/ZhouSAB21, author = {Zhou Zhou and Mohammad Shojafar and Jemal H. Abawajy and Ali Kashif Bashir}, title = {{IADE:} An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {5}, number = {4}, pages = {1747--1760}, year = {2021}, url = {https://doi.org/10.1109/TGCN.2021.3111909}, doi = {10.1109/TGCN.2021.3111909}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgcn/ZhouSAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HassanHSAF21, author = {Mohammad Mehedi Hassan and Md. Shamsul Huda and Shaila Sharmeen and Jemal H. Abawajy and Giancarlo Fortino}, title = {An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {4}, pages = {2860--2870}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3015026}, doi = {10.1109/TII.2020.3015026}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/HassanHSAF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/MostafaeiAA21, author = {Habib Mostafaei and Shafi Afridi and Jemal H. Abawajy}, editor = {Laurent Lef{\`{e}}vre and Stacy Patterson and Young Choon Lee and Haiying Shen and Shashikant Ilager and Mohammad Goudarzi and Adel Nadjaran Toosi and Rajkumar Buyya}, title = {{SNR:} Network-aware Geo-Distributed Stream Analytics}, booktitle = {21st {IEEE/ACM} International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2021, Melbourne, Australia, May 10-13, 2021}, pages = {820--827}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CCGrid51090.2021.00100}, doi = {10.1109/CCGRID51090.2021.00100}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccgrid/MostafaeiAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atci/2020, editor = {Jemal H. Abawajy and Kim{-}Kwang Raymond Choo and Zheng Xu and Mohammed Atiquzzaman}, title = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-53980-1}, doi = {10.1007/978-3-030-53980-1}, isbn = {978-3-030-53979-5}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atci/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atci/2021-1, editor = {Jemal H. Abawajy and Zheng Xu and Mohammed Atiquzzaman and Xiaolu Zhang}, title = {2021 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2021) Volume 1, Fuyang, China, 9-21 June, 2021}, series = {Advances in Intelligent Systems and Computing}, volume = {1398}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-79200-8}, doi = {10.1007/978-3-030-79200-8}, isbn = {978-3-030-79199-5}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/atci/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icmc2/2020, editor = {Debasis Giri and Rajkumar Buyya and S. Ponnusamy and Debashis De and Andrew Adamatzky and Jemal H. Abawajy}, title = {Proceedings of the Sixth International Conference on Mathematics and Computing - {ICMC} 2020, Gangtok, Sikkim, India, September 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1262}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-15-8061-1}, doi = {10.1007/978-981-15-8061-1}, isbn = {978-981-15-8060-4}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmc2/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiXA20, author = {Shanshan Li and Fuyuan Xiao and Jemal H. Abawajy}, title = {Conflict Management of Evidence Theory Based on Belief Entropy and Negation}, journal = {{IEEE} Access}, volume = {8}, pages = {37766--37774}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2975802}, doi = {10.1109/ACCESS.2020.2975802}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiXA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouLAG20, author = {Zhou Zhou and Fangmin Li and Jemal H. Abawajy and Chaochao Gao}, title = {Improved {PSO} Algorithm Integrated With Opposition-Based Learning and Tentative Perception in Networked Data Centres}, journal = {{IEEE} Access}, volume = {8}, pages = {55872--55880}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2981972}, doi = {10.1109/ACCESS.2020.2981972}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhouLAG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NazahHAH20, author = {Saiba Nazah and Md. Shamsul Huda and Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {Evolution of Dark Web Threat Analysis and Detection: {A} Systematic Approach}, journal = {{IEEE} Access}, volume = {8}, pages = {171796--171819}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3024198}, doi = {10.1109/ACCESS.2020.3024198}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NazahHAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/SharmeenHAH20, author = {Shaila Sharmeen and Md. Shamsul Huda and Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches}, journal = {Appl. Soft Comput.}, volume = {89}, pages = {106089}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2020.106089}, doi = {10.1016/J.ASOC.2020.106089}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/SharmeenHAH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/JauroCGAAA20, author = {Fatsuma Jauro and Haruna Chiroma and Abdulsalam Ya'u Gital and Mubarak Almutairi and Shafii Muhammad Abdulhamid and Jemal H. Abawajy}, title = {Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend}, journal = {Appl. Soft Comput.}, volume = {96}, pages = {106582}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2020.106582}, doi = {10.1016/J.ASOC.2020.106582}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/JauroCGAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/JacobFSYA20, author = {Deden Witarsyah Jacob and Mohd Farhan Md Fudzee and Mohamad Aizi Salamat and Iwan Tri Riyadi Yanto and Jemal H. Abawajy}, title = {Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset}, journal = {Int. J. Data Warehous. Min.}, volume = {16}, number = {1}, pages = {39--62}, year = {2020}, url = {https://doi.org/10.4018/IJDWM.2020010103}, doi = {10.4018/IJDWM.2020010103}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdwm/JacobFSYA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZhouLZXAC20, author = {Zhou Zhou and Fangmin Li and Huaxi Zhu and Houliang Xie and Jemal H. Abawajy and Morshed U. Chowdhury}, title = {An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments}, journal = {Neural Comput. Appl.}, volume = {32}, number = {6}, pages = {1531--1541}, year = {2020}, url = {https://doi.org/10.1007/s00521-019-04119-7}, doi = {10.1007/S00521-019-04119-7}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/ZhouLZXAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/XuA20, author = {Zheng Xu and Jemal H. Abawajy}, title = {Special issue on Neural Computing and Applications in cyber intelligence: {ATCI} 2019}, journal = {Neural Comput. Appl.}, volume = {32}, number = {10}, pages = {5313--5314}, year = {2020}, url = {https://doi.org/10.1007/s00521-020-04889-5}, doi = {10.1007/S00521-020-04889-5}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/XuA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/AbawajyCK20, author = {Jemal H. Abawajy and Morshed U. Chowdhury and Andrei Kelarev}, title = {Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {2}, pages = {398--407}, year = {2020}, url = {https://doi.org/10.1109/TCC.2015.2481378}, doi = {10.1109/TCC.2015.2481378}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/AbawajyCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ChowdhuryAKJ20, author = {Morshed U. Chowdhury and Jemal H. Abawajy and Andrei Kelarev and Herbert F. Jelinek}, title = {A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {2}, pages = {473--483}, year = {2020}, url = {https://doi.org/10.1109/TCC.2016.2567389}, doi = {10.1109/TCC.2016.2567389}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ChowdhuryAKJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ShojafarCLA20, author = {Mohammad Shojafar and Claudia Canali and Riccardo Lancellotti and Jemal H. Abawajy}, title = {Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {4}, pages = {1162--1175}, year = {2020}, url = {https://doi.org/10.1109/TCC.2016.2617367}, doi = {10.1109/TCC.2016.2617367}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/ShojafarCLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cata/Al-OmairiAC20, author = {Lamyaa Al{-}Omairi and Jemal H. Abawajy and Morshed Uddin Chowdhury}, editor = {Gordon Lee and Ying Jin}, title = {Utility-Aware Graph Dimensionality Reduction Approach}, booktitle = {Proceedings of 35th International Conference on Computers and Their Applications, {CATA} 2020, San Francisco, California, USA, March 23-25, 2020}, series = {EPiC Series in Computing}, volume = {69}, pages = {327--333}, publisher = {EasyChair}, year = {2020}, url = {https://doi.org/10.29007/2p7l}, doi = {10.29007/2P7L}, timestamp = {Sun, 15 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cata/Al-OmairiAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cata/KassemCAA20, author = {Haider Kassem and Morshed U. Chowdhury and Jemal H. Abawajy and Ahmed Raad Al{-}Sudani}, editor = {Gordon Lee and Ying Jin}, title = {Yawn Based Driver Fatigue Level Prediction}, booktitle = {Proceedings of 35th International Conference on Computers and Their Applications, {CATA} 2020, San Francisco, California, USA, March 23-25, 2020}, series = {EPiC Series in Computing}, volume = {69}, pages = {372--382}, publisher = {EasyChair}, year = {2020}, url = {https://doi.org/10.29007/67kk}, doi = {10.29007/67KK}, timestamp = {Sun, 15 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cata/KassemCAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/Al-MansooriAC20, author = {Ahmed Al{-}Mansoori and Jemal H. Abawajy and Morshed U. Chowdhury}, title = {{BDSP} in the cloud: Scheduling and Load Balancing utlizing {SDN} and {CEP}}, booktitle = {20th {IEEE/ACM} International Symposium on Cluster, Cloud and Internet Computing, {CCGRID} 2020, Melbourne, Australia, May 11-14, 2020}, pages = {827--835}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CCGrid49817.2020.000-2}, doi = {10.1109/CCGRID49817.2020.000-2}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/Al-MansooriAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scdm/2020, editor = {Rozaida Ghazali and Nazri Mohd Nawi and Mustafa Mat Deris and Jemal H. Abawajy}, title = {Recent Advances on Soft Computing and Data Mining - Proceedings of the Fourth International Conference on Soft Computing and Data Mining {(SCDM} 2020), Melaka, Malaysia, January 22-23, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {978}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-36056-6}, doi = {10.1007/978-3-030-36056-6}, isbn = {978-3-030-36055-9}, timestamp = {Tue, 17 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scdm/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HarunaISGBDKHZA19, author = {Khalid Haruna and Maizatul Akmar Ismail and Mohammad Suyanto and Lubna Abdel Kareim Gabralla and Abdullahi Baffa Bichi and Sani Danjuma and Habeebah Adamu Kakudi and Muhammad Sani Haruna and Saber Zerdoumi and Jemal H. Abawajy and Tutut Herawan}, title = {A Soft Set Approach for Handling Conflict Situation on Movie Selection}, journal = {{IEEE} Access}, volume = {7}, pages = {116179--116194}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2892778}, doi = {10.1109/ACCESS.2019.2892778}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HarunaISGBDKHZA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdatama/AlkouzAA19, author = {Balsam Alkouz and Zaher Al Aghbari and Jemal H. Abawajy}, title = {Tweetluenza: Predicting flu trends from twitter data}, journal = {Big Data Min. Anal.}, volume = {2}, number = {4}, pages = {273--287}, year = {2019}, url = {https://doi.org/10.26599/BDMA.2019.9020012}, doi = {10.26599/BDMA.2019.9020012}, timestamp = {Sat, 09 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdatama/AlkouzAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HudaAAPH19, author = {Md. Shamsul Huda and Jemal H. Abawajy and Baker Al{-}Rubaie and Lei Pan and Mohammad Mehedi Hassan}, title = {Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks}, journal = {Future Gener. Comput. Syst.}, volume = {101}, pages = {1247--1258}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.07.005}, doi = {10.1016/J.FUTURE.2019.07.005}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HudaAAPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-wss/KhalifaKAA19, author = {Banafsj Khalifa and Ahmed Khedr and Zaher Al Aghbari and Jemal H. Abawajy}, title = {Fuzzy logic approach to repair coverage holes in internet of things monitoring applications}, journal = {{IET} Wirel. Sens. Syst.}, volume = {9}, number = {4}, pages = {227--235}, year = {2019}, url = {https://doi.org/10.1049/iet-wss.2018.5174}, doi = {10.1049/IET-WSS.2018.5174}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-wss/KhalifaKAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChooAI19, author = {Kim{-}Kwang Raymond Choo and Jemal H. Abawajy and Md. Rafiqul Islam}, title = {Special issue on cybersecurity in the critical infrastructure: Advances and future directions}, journal = {J. Comput. Syst. Sci.}, volume = {102}, pages = {40--41}, year = {2019}, url = {https://doi.org/10.1016/j.jcss.2016.08.002}, doi = {10.1016/J.JCSS.2016.08.002}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ChooAI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/VaradharajanSAY19, author = {Vijayakumar Varadharajan and V. Subramaniyaswamy and Jemal H. Abawajy and Longzhi Yang}, title = {Intelligent, smart and scalable cyber-physical systems}, journal = {J. Intell. Fuzzy Syst.}, volume = {36}, number = {5}, pages = {3935--3943}, year = {2019}, url = {https://doi.org/10.3233/JIFS-179108}, doi = {10.3233/JIFS-179108}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/VaradharajanSAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/XiaoZA19, author = {Fuyuan Xiao and Zili Zhang and Jemal H. Abawajy}, title = {Workflow scheduling in distributed systems under fuzzy environment}, journal = {J. Intell. Fuzzy Syst.}, volume = {37}, number = {4}, pages = {5323--5333}, year = {2019}, url = {https://doi.org/10.3233/JIFS-190483}, doi = {10.3233/JIFS-190483}, timestamp = {Thu, 20 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/XiaoZA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/HassanACQC19, author = {Mohammad Mehedi Hassan and Jemal H. Abawajy and Min Chen and Meikang Qiu and Sheng Chen}, title = {Special Section on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends}, journal = {J. Parallel Distributed Comput.}, volume = {133}, pages = {170--173}, year = {2019}, url = {https://doi.org/10.1016/j.jpdc.2019.07.004}, doi = {10.1016/J.JPDC.2019.07.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/HassanACQC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GentaLA19, author = {Addisalem Genta and D. K. Lobiyal and Jemal H. Abawajy}, title = {Energy Efficient Multipath Routing Algorithm for Wireless Multimedia Sensor Network}, journal = {Sensors}, volume = {19}, number = {17}, pages = {3642}, year = {2019}, url = {https://doi.org/10.3390/s19173642}, doi = {10.3390/S19173642}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GentaLA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/AbawajyK19, author = {Jemal H. Abawajy and Andrei Kelarev}, title = {Iterative Classifier Fusion System for the Detection of Android Malware}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {3}, pages = {282--292}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2017.2676100}, doi = {10.1109/TBDATA.2017.2676100}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/AbawajyK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codit/Al-QuraishiAAAA19, author = {Tahsien Al{-}Quraishi and Jemal H. Abawajy and Naseer Al{-}Quraishi and Ahmad Abdalrada and Lamyaa Al{-}Omairi}, title = {Predicting Breast Cancer Risk Using Subset of Genes}, booktitle = {6th International Conference on Control, Decision and Information Technologies, CoDIT 2019, Paris, France, April 23-26, 2019}, pages = {1379--1384}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CoDIT.2019.8820378}, doi = {10.1109/CODIT.2019.8820378}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codit/Al-QuraishiAAAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/daeng/2015, editor = {Jemal H. Abawajy and Mohamed Othman and Rozaida Ghazali and Mustafa Mat Deris and Hairulnizam Mahdin and Tutut Herawan}, title = {Proceedings of the Second International Conference on Advanced Data and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26, 2015}, series = {Lecture Notes in Electrical Engineering}, volume = {520}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-1799-6}, doi = {10.1007/978-981-13-1799-6}, isbn = {978-981-13-1797-2}, timestamp = {Fri, 16 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/daeng/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HudaAAAAAY18, author = {Md. Shamsul Huda and Sultan Alyahya and Md. Mohsin Ali and Shafiq Ahmad and Jemal H. Abawajy and Hmood Al{-}Dossari and John Yearwood}, title = {A Framework for Software Defect Prediction and Metric Selection}, journal = {{IEEE} Access}, volume = {6}, pages = {2844--2858}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2785445}, doi = {10.1109/ACCESS.2017.2785445}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HudaAAAAAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SharmeenHAIH18, author = {Shaila Sharmeen and Md. Shamsul Huda and Jemal H. Abawajy and Walaa N. Ismail and Mohammad Mehedi Hassan}, title = {Malware Threats and Detection for Industrial Mobile-IoT Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {15941--15957}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2815660}, doi = {10.1109/ACCESS.2018.2815660}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SharmeenHAIH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouALHCAL18, author = {Zhou Zhou and Jemal H. Abawajy and Fangmin Li and Zhigang Hu and Morshed U. Chowdhury and Abdulhameed Alelaiwi and Keqin Li}, title = {Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center}, journal = {{IEEE} Access}, volume = {6}, pages = {27080--27090}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2732458}, doi = {10.1109/ACCESS.2017.2732458}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhouALHCAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/AbawajyKYJ18, author = {Jemal H. Abawajy and Andrei V. Kelarev and Xun Yi and Herbert F. Jelinek}, title = {Minimal ensemble based on subset selection using {ECG} to diagnose categories of {CAN}}, journal = {Comput. Methods Programs Biomed.}, volume = {160}, pages = {85--94}, year = {2018}, url = {https://doi.org/10.1016/j.cmpb.2018.01.019}, doi = {10.1016/J.CMPB.2018.01.019}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cmpb/AbawajyKYJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RayACA18, author = {Biplob R. Ray and Jemal H. Abawajy and Morshed U. Chowdhury and Abdulhameed Alelaiwi}, title = {Universal and secure object ownership transfer protocol for the Internet of Things}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {838--849}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.02.020}, doi = {10.1016/J.FUTURE.2017.02.020}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/RayACA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HudaIAYHF18, author = {Md. Shamsul Huda and Md. Rafiqul Islam and Jemal H. Abawajy and John Yearwood and Mohammad Mehedi Hassan and Giancarlo Fortino}, title = {A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection}, journal = {Future Gener. Comput. Syst.}, volume = {83}, pages = {193--207}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.12.037}, doi = {10.1016/J.FUTURE.2017.12.037}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HudaIAYHF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhouACHLCEL18, author = {Zhou Zhou and Jemal H. Abawajy and Morshed U. Chowdhury and Zhigang Hu and Keqin Li and Hongbing Cheng and Abdulhameed A. Al Elaiwi and Fangmin Li}, title = {Minimizing {SLA} violation and power consumption in Cloud data centers using adaptive energy-aware algorithms}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {836--850}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.07.048}, doi = {10.1016/J.FUTURE.2017.07.048}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ZhouACHLCEL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AbawajyHSHA18, author = {Jemal H. Abawajy and Md. Shamsul Huda and Shaila Sharmeen and Mohammad Mehedi Hassan and Ahmad Almogren}, title = {Identifying cyber threats to mobile-IoT applications in edge computing paradigm}, journal = {Future Gener. Comput. Syst.}, volume = {89}, pages = {525--538}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.06.053}, doi = {10.1016/J.FUTURE.2018.06.053}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AbawajyHSHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JavadiMCA18, author = {Mahmood Javadi and Habib Mostafaei and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Learning automaton based topology control protocol for extending wireless sensor networks lifetime}, journal = {J. Netw. Comput. Appl.}, volume = {122}, pages = {128--136}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.08.012}, doi = {10.1016/J.JNCA.2018.08.012}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JavadiMCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhangWLA18, author = {Shaobo Zhang and Guojun Wang and Qin Liu and Jemal H. Abawajy}, title = {A trajectory privacy-preserving scheme based on query exchange in mobile social networks}, journal = {Soft Comput.}, volume = {22}, number = {18}, pages = {6121--6133}, year = {2018}, url = {https://doi.org/10.1007/s00500-017-2676-6}, doi = {10.1007/S00500-017-2676-6}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ZhangWLA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/Al-JaljouliAHA18, author = {Raja Al{-}Jaljouli and Jemal H. Abawajy and Mohammad Mehedi Hassan and Abdulhameed Alelaiwi}, title = {Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {11}, number = {2}, pages = {415--429}, year = {2018}, url = {https://doi.org/10.1109/TSC.2016.2560160}, doi = {10.1109/TSC.2016.2560160}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/Al-JaljouliAHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LiWAQ18, author = {Xin Li and Liangyuan Wang and Jemal H. Abawajy and Xiaolin Qin}, editor = {Jaideep Vaidya and Jin Li}, title = {Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11335}, pages = {630--644}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05054-2\_47}, doi = {10.1007/978-3-030-05054-2\_47}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/LiWAQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/LiLQA18, author = {Xin Li and Zhen Lian and Xiaolin Qin and Jemal H. Abawajy}, editor = {Jinjun Chen and Laurence T. Yang}, title = {Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System}, booktitle = {{IEEE} International Conference on Parallel {\&} Distributed Processing with Applications, Ubiquitous Computing {\&} Communications, Big Data {\&} Cloud Computing, Social Computing {\&} Networking, Sustainable Computing {\&} Communications, ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018, Melbourne, Australia, December 11-13, 2018}, pages = {816--823}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BDCloud.2018.00122}, doi = {10.1109/BDCLOUD.2018.00122}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/LiLQA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scdm/AbdalradaACRAJ18, author = {Ahmad Shaker Abdalrada and Jemal H. Abawajy and Morshed U. Chowdhury and Sutharshan Rajasegarar and Tahsien Al{-}Quraishi and Herbert F. Jelinek}, editor = {Rozaida Ghazali and Mustafa Mat Deris and Nazri Mohd Nawi and Jemal H. Abawajy}, title = {Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population}, booktitle = {Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining {(SCDM} 2018), Johor, Malaysia, February 06-07, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {700}, pages = {135--146}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72550-5\_14}, doi = {10.1007/978-3-319-72550-5\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scdm/AbdalradaACRAJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scdm/Al-QuraishiACRA18, author = {Tahsien Al{-}Quraishi and Jemal H. Abawajy and Morshed U. Chowdhury and Sutharshan Rajasegarar and Ahmad Shaker Abdalrada}, editor = {Rozaida Ghazali and Mustafa Mat Deris and Nazri Mohd Nawi and Jemal H. Abawajy}, title = {Breast Cancer Recurrence Prediction Using Random Forest Model}, booktitle = {Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining {(SCDM} 2018), Johor, Malaysia, February 06-07, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {700}, pages = {318--329}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72550-5\_31}, doi = {10.1007/978-3-319-72550-5\_31}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scdm/Al-QuraishiACRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/scdm/2018, editor = {Rozaida Ghazali and Mustafa Mat Deris and Nazri Mohd Nawi and Jemal H. Abawajy}, title = {Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining {(SCDM} 2018), Johor, Malaysia, February 06-07, 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {700}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72550-5}, doi = {10.1007/978-3-319-72550-5}, isbn = {978-3-319-72549-9}, timestamp = {Wed, 17 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scdm/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChiromaSAZGHA17, author = {Haruna Chiroma and Nor Liyana Mohd Shuib and Adamu I. Abubakar and Akram M. Zeki and Abdulsalam Ya'u Gital and Tutut Herawan and Jemal H. Abawajy}, title = {Advances in Teaching and Learning on Facebook in Higher Institutions}, journal = {{IEEE} Access}, volume = {5}, pages = {480--500}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2016.2643682}, doi = {10.1109/ACCESS.2016.2643682}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChiromaSAZGHA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BaccarelliNSSA17, author = {Enzo Baccarelli and Paola Gabriela Vinueza Naranjo and Michele Scarpiniti and Mohammad Shojafar and Jemal H. Abawajy}, title = {Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study}, journal = {{IEEE} Access}, volume = {5}, pages = {9882--9910}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2702013}, doi = {10.1109/ACCESS.2017.2702013}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BaccarelliNSSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/GhanavatiAIA17, author = {Sara Ghanavati and Jemal H. Abawajy and Davood Izadi and Abdulhameed Alelaiwi}, title = {Cloud-assisted IoT-based health status monitoring framework}, journal = {Clust. Comput.}, volume = {20}, number = {2}, pages = {1843--1853}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0847-y}, doi = {10.1007/S10586-017-0847-Y}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/GhanavatiAIA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AliHAAAY17, author = {Md. Mohsin Ali and Md. Shamsul Huda and Jemal H. Abawajy and Sultan Alyahya and Hmood Al{-}Dossari and John Yearwood}, title = {A parallel framework for software defect detection and metric selection on cloud computing}, journal = {Clust. Comput.}, volume = {20}, number = {3}, pages = {2267--2281}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0892-6}, doi = {10.1007/S10586-017-0892-6}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/AliHAAAY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/AbawajyH17, author = {Jemal H. Abawajy and Mohammad Mehedi Hassan}, title = {Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {1}, pages = {48--53}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600374CM}, doi = {10.1109/MCOM.2017.1600374CM}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/AbawajyH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Abawajy017, author = {Jemal H. Abawajy and Md. Rafiqul Islam}, title = {Applications and techniques in information and network security}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {23}, year = {2017}, url = {https://doi.org/10.1002/cpe.4351}, doi = {10.1002/CPE.4351}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Abawajy017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChowdhuryAKH17, author = {Morshed U. Chowdhury and Jemal H. Abawajy and Andrei V. Kelarev and Teruhisa Hochin}, title = {Multilayer hybrid strategy for phishing email zero-day filtering}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {23}, year = {2017}, url = {https://doi.org/10.1002/cpe.3929}, doi = {10.1002/CPE.3929}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChowdhuryAKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HudaAA0Y17, author = {Md. Shamsul Huda and Jemal H. Abawajy and Mali Abdollahian and Md. Rafiqul Islam and John Yearwood}, title = {A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {23}, year = {2017}, url = {https://doi.org/10.1002/cpe.3912}, doi = {10.1002/CPE.3912}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/HudaAA0Y17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LuoLAW17, author = {Entao Luo and Qin Liu and Jemal H. Abawajy and Guojun Wang}, title = {Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks}, journal = {Future Gener. Comput. Syst.}, volume = {68}, pages = {222--233}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.09.013}, doi = {10.1016/J.FUTURE.2016.09.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/LuoLAW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/AlrubaieyA17, author = {Baker Alrubaiey and Jemal H. Abawajy}, title = {Virtual networks dependability assessment framework}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {10}, number = {1/2}, pages = {3--12}, year = {2017}, url = {https://doi.org/10.1504/IJHPCN.2017.10003758}, doi = {10.1504/IJHPCN.2017.10003758}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/AlrubaieyA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/ChooAI17, author = {Kim{-}Kwang Raymond Choo and Jemal H. Abawajy and Md. Rafiqul Islam}, title = {Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions}, journal = {J. Comput. Syst. Sci.}, volume = {83}, number = {1}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.09.001}, doi = {10.1016/J.JCSS.2016.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/ChooAI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tec/SabarAY17, author = {Nasser R. Sabar and Jemal H. Abawajy and John Yearwood}, title = {Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution Algorithm for Big Data Optimization Problems}, journal = {{IEEE} Trans. Evol. Comput.}, volume = {21}, number = {2}, pages = {315--327}, year = {2017}, url = {https://doi.org/10.1109/TEVC.2016.2602860}, doi = {10.1109/TEVC.2016.2602860}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tec/SabarAY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangYWA17, author = {Jie Wang and Lili Yang and Jie Wu and Jemal H. Abawajy}, title = {Clustering analysis for malicious network traffic}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7997375}, doi = {10.1109/ICC.2017.7997375}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangYWA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AbawajyRA17, author = {Jemal H. Abawajy and A. Richard and Zaher Al Aghbari}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Securing Websites Against Homograph Attacks}, booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {239}, pages = {47--59}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78816-6\_4}, doi = {10.1007/978-3-319-78816-6\_4}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AbawajyRA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AbawajyNADA17, author = {Jemal H. Abawajy and Mohd Izuan Hafez Ninggal and Zaher Al Aghbari and Abdul Basit Darem and Asma Alhashmi}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Privacy Threat Analysis of Mobile Social Network Data Publishing}, booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {239}, pages = {60--68}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78816-6\_5}, doi = {10.1007/978-3-319-78816-6\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AbawajyNADA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/IzadiGAH16, author = {Davood Izadi and Sara Ghanavati and Jemal H. Abawajy and Tutut Herawan}, title = {An alternative data collection scheduling scheme in wireless sensor networks}, journal = {Computing}, volume = {98}, number = {12}, pages = {1287--1304}, year = {2016}, url = {https://doi.org/10.1007/s00607-016-0484-y}, doi = {10.1007/S00607-016-0484-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/IzadiGAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/AbawajyNH16, author = {Jemal H. Abawajy and Mohd Izuan Hafez Ninggal and Tutut Herawan}, title = {Privacy Preserving Social Network Data Publication}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {18}, number = {3}, pages = {1974--1997}, year = {2016}, url = {https://doi.org/10.1109/COMST.2016.2533668}, doi = {10.1109/COMST.2016.2533668}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/AbawajyNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/AbawajyNH16, author = {Jemal H. Abawajy and Mohd Izuan Hafez Ninggal and Tutut Herawan}, title = {Vertex re-identification attack using neighbourhood-pair properties}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {10}, pages = {2906--2919}, year = {2016}, url = {https://doi.org/10.1002/cpe.3687}, doi = {10.1002/CPE.3687}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/AbawajyNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AbawajyWYJ16, author = {Jemal H. Abawajy and Guojun Wang and Laurence T. Yang and Bahman Javadi}, title = {Trust, Security and Privacy in Emerging Distributed Systems}, journal = {Future Gener. Comput. Syst.}, volume = {55}, pages = {224--226}, year = {2016}, url = {https://doi.org/10.1016/j.future.2015.11.008}, doi = {10.1016/J.FUTURE.2015.11.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AbawajyWYJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HudaAAA0Y16, author = {Md. Shamsul Huda and Jemal H. Abawajy and Mamoun Alazab and Mali Abdollahian and Md. Rafiqul Islam and John Yearwood}, title = {Hybrids of support vector machine wrapper and filter based framework for malware detection}, journal = {Future Gener. Comput. Syst.}, volume = {55}, pages = {376--390}, year = {2016}, url = {https://doi.org/10.1016/j.future.2014.06.001}, doi = {10.1016/J.FUTURE.2014.06.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/HudaAAA0Y16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbdi/VictorLA16, author = {Nancy Victor and Daphne Lopez and Jemal H. Abawajy}, title = {Privacy models for big data: a survey}, journal = {Int. J. Big Data Intell.}, volume = {3}, number = {1}, pages = {61--75}, year = {2016}, url = {https://doi.org/10.1504/IJBDI.2016.073904}, doi = {10.1504/IJBDI.2016.073904}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbdi/VictorLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/HossainAGCA16, author = {M. Anwar Hossain and Jemal H. Abawajy and Ra{\'{u}}l Garc{\'{\i}}a{-}Castro and Wen{-}Huang Cheng and Dewan Tanvir Ahmed}, title = {Sensor-Web Systems, Applications, and Services}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {4}, pages = {5349568:1--5349568:2}, year = {2016}, url = {https://doi.org/10.1155/2016/5349568}, doi = {10.1155/2016/5349568}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/HossainAGCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RayCA16, author = {Biplob R. Ray and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Secure Object Tracking Protocol for the Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {3}, number = {4}, pages = {544--553}, year = {2016}, url = {https://doi.org/10.1109/JIOT.2016.2572729}, doi = {10.1109/JIOT.2016.2572729}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RayCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AbawajyZS16, author = {Jemal H. Abawajy and Albert Y. Zomaya and Ivan Stojmenovic}, title = {Network computing and applications for Big Data analytics}, journal = {J. Netw. Comput. Appl.}, volume = {59}, pages = {361}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.11.007}, doi = {10.1016/J.JNCA.2015.11.007}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AbawajyZS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Bhattacharya0A16, author = {Maumita Bhattacharya and Md. Rafiqul Islam and Jemal H. Abawajy}, title = {Evolutionary optimization: {A} big data perspective}, journal = {J. Netw. Comput. Appl.}, volume = {59}, pages = {416--426}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2014.07.032}, doi = {10.1016/J.JNCA.2014.07.032}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Bhattacharya0A16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/KamaludinMA16, author = {Hazalila Kamaludin and Hairulnizam Mahdin and Jemal H. Abawajy}, title = {Filtering Redundant Data from {RFID} Data Streams}, journal = {J. Sensors}, volume = {2016}, pages = {7107914:1--7107914:7}, year = {2016}, url = {https://doi.org/10.1155/2016/7107914}, doi = {10.1155/2016/7107914}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/KamaludinMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/titb/AbawajyKCJ16, author = {Jemal H. Abawajy and Andrei V. Kelarev and Morshed U. Chowdhury and Herbert F. Jelinek}, title = {Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles}, journal = {{IEEE} J. Biomed. Health Informatics}, volume = {20}, number = {1}, pages = {408--415}, year = {2016}, url = {https://doi.org/10.1109/JBHI.2014.2363177}, doi = {10.1109/JBHI.2014.2363177}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/titb/AbawajyKCJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/AlrubaieyA16, author = {Baker Alrubaiey and Jemal H. Abawajy}, editor = {Guojun Wang and Yanbo Han and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Prediction of Virtual Networks Substrata Failures}, booktitle = {Advances in Services Computing - 10th Asia-Pacific Services Computing Conference, {APSCC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10065}, pages = {423--434}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49178-3\_32}, doi = {10.1007/978-3-319-49178-3\_32}, timestamp = {Mon, 23 Jan 2023 10:33:27 +0100}, biburl = {https://dblp.org/rec/conf/apscc/AlrubaieyA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/GhanavatiAI16, author = {Sara Ghanavati and Jemal H. Abawajy and Davood Izadi}, title = {{ECG} rate control scheme in pervasive health care monitoring system}, booktitle = {2016 {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE} 2016, Vancouver, BC, Canada, July 24-29, 2016}, pages = {2265--2270}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/FUZZ-IEEE.2016.7737975}, doi = {10.1109/FUZZ-IEEE.2016.7737975}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/GhanavatiAI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/GhanavatiAI16, author = {Sara Ghanavati and Jemal H. Abawajy and Davood Izadi}, title = {An alternative sensor Cloud architecture for vital signs monitoring}, booktitle = {2016 International Joint Conference on Neural Networks, {IJCNN} 2016, Vancouver, BC, Canada, July 24-29, 2016}, pages = {2827--2833}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IJCNN.2016.7727556}, doi = {10.1109/IJCNN.2016.7727556}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/GhanavatiAI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itnac/Al-RubaieyA16, author = {Baker Al{-}Rubaiey and Jemal H. Abawajy}, title = {Failure detection in virtual network environment}, booktitle = {26th International Telecommunication Networks and Applications Conference, {ITNAC} 2016, Dunedin, New Zealand, December 7-9, 2016}, pages = {149--152}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ATNAC.2016.7878800}, doi = {10.1109/ATNAC.2016.7878800}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itnac/Al-RubaieyA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scdm/RisnumawanSAS16, author = {Anhar Risnumawan and Indra Adji Sulistijono and Jemal H. Abawajy and Younes Saadi}, editor = {Tutut Herawan and Rozaida Ghazali and Nazri Mohd Nawi and Mustafa Mat Deris}, title = {Text Detection in Low Resolution Scene Images Using Convolutional Neural Network}, booktitle = {Recent Advances on Soft Computing and Data Mining - The Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016, Proceedings}, series = {Advances in Intelligent Systems and Computing}, volume = {549}, pages = {366--375}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51281-5\_37}, doi = {10.1007/978-3-319-51281-5\_37}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scdm/RisnumawanSAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scdm/FudzeeHMKA16, author = {Mohd Farhan Md Fudzee and Mohamud Hassan and Hairulnizam Mahdin and Shahreen Kasim and Jemal H. Abawajy}, editor = {Tutut Herawan and Rozaida Ghazali and Nazri Mohd Nawi and Mustafa Mat Deris}, title = {A Framework to Analyze Quality of Service (QoS) for Text-To-Speech {(TTS)} Services}, booktitle = {Recent Advances on Soft Computing and Data Mining - The Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016, Proceedings}, series = {Advances in Intelligent Systems and Computing}, volume = {549}, pages = {589--597}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51281-5\_59}, doi = {10.1007/978-3-319-51281-5\_59}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scdm/FudzeeHMKA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RayCA16, author = {Biplob R. Ray and Morshed U. Chowdhury and Jemal H. Abawajy}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {A Multi-protocol Security Framework to Support Internet of Things}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {257--270}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_14}, doi = {10.1007/978-3-319-59608-2\_14}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/RayCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/softcom/PooranianNRMA16, author = {Zahra Pooranian and Nima Nikmehr and Sajad Najafi Ravadanegh and Hairulnizam Mahdin and Jemal H. Abawajy}, title = {Economical and environmental operation of smart networked microgrids under uncertainties using {NSGA-II}}, booktitle = {24th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2016, Split, Croatia, September 22-24, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SOFTCOM.2016.7772136}, doi = {10.1109/SOFTCOM.2016.7772136}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/softcom/PooranianNRMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/AbawajyF15, author = {Jemal H. Abawajy and Harinda Fernando}, title = {Policy-based {SQLIA} detection and prevention approach for {RFID} systems}, journal = {Comput. Stand. Interfaces}, volume = {38}, pages = {64--71}, year = {2015}, url = {https://doi.org/10.1016/j.csi.2014.08.005}, doi = {10.1016/J.CSI.2014.08.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/AbawajyF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejgta/AbawajyK015, author = {Jemal H. Abawajy and Andrei V. Kelarev and Joe Ryan}, title = {Ideal basis in constructions defined by directed graphs}, journal = {Electron. J. Graph Theory Appl.}, volume = {3}, number = {1}, pages = {35--49}, year = {2015}, url = {https://doi.org/10.5614/ejgta.2015.3.1.5}, doi = {10.5614/EJGTA.2015.3.1.5}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejgta/AbawajyK015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijtmcc/ChongA15, author = {Soon{-}Keow Chong and Jemal H. Abawajy}, title = {Mitigating malicious feedback attacks in trust management systems}, journal = {Int. J. Trust. Manag. Comput. Commun.}, volume = {3}, number = {1}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.1504/IJTMCC.2015.072455}, doi = {10.1504/IJTMCC.2015.072455}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijtmcc/ChongA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jco/PooranianSAA15, author = {Zahra Pooranian and Mohammad Shojafar and Jemal H. Abawajy and Ajith Abraham}, title = {An efficient meta-heuristic algorithm for grid computing}, journal = {J. Comb. Optim.}, volume = {30}, number = {3}, pages = {413--434}, year = {2015}, url = {https://doi.org/10.1007/s10878-013-9644-6}, doi = {10.1007/S10878-013-9644-6}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jco/PooranianSAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/NinggalA15, author = {Mohd Izuan Hafez Ninggal and Jemal H. Abawajy}, title = {Utility-aware social network graph anonymization}, journal = {J. Netw. Comput. Appl.}, volume = {56}, pages = {137--148}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.05.013}, doi = {10.1016/J.JNCA.2015.05.013}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/NinggalA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mics/AbawajyKM015, author = {Jemal H. Abawajy and Andrei V. Kelarev and Mirka Miller and Joseph F. Ryan}, title = {Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications}, journal = {Math. Comput. Sci.}, volume = {9}, number = {2}, pages = {127--137}, year = {2015}, url = {https://doi.org/10.1007/s11786-015-0217-1}, doi = {10.1007/S11786-015-0217-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mics/AbawajyKM015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AbawajyF15, author = {Jemal H. Abawajy and Mohd Farhan Md Fudzee}, title = {Dynamic path determination policy for distributed multimedia content adaptation}, journal = {Multim. Tools Appl.}, volume = {74}, number = {19}, pages = {8325--8341}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1735-y}, doi = {10.1007/S11042-013-1735-Y}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AbawajyF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/AbawajyFD15, author = {Jemal H. Abawajy and Mohd Farhan Md Fudzee and Mustafa Mat Deris}, title = {Multimedia content adaptation service discovery mechanism}, journal = {Multim. Tools Appl.}, volume = {74}, number = {19}, pages = {8365--8378}, year = {2015}, url = {https://doi.org/10.1007/s11042-013-1696-1}, doi = {10.1007/S11042-013-1696-1}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/AbawajyFD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/Abawajy15, author = {Jemal H. Abawajy}, title = {Comprehensive analysis of big data variety landscape}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {30}, number = {1}, pages = {5--14}, year = {2015}, url = {https://doi.org/10.1080/17445760.2014.925548}, doi = {10.1080/17445760.2014.925548}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/Abawajy15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ShojafarADAPA15, author = {Mohammad Shojafar and Jemal H. Abawajy and Zia Delkhah and Ali Ahmadi and Zahra Pooranian and Ajith Abraham}, title = {An efficient and distributed file search in unstructured peer-to-peer networks}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {1}, pages = {120--136}, year = {2015}, url = {https://doi.org/10.1007/s12083-013-0236-0}, doi = {10.1007/S12083-013-0236-0}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ShojafarADAPA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/IzadiAGH15, author = {Davood Izadi and Jemal H. Abawajy and Sara Ghanavati and Tutut Herawan}, title = {A Data Fusion Method in Wireless Sensor Networks}, journal = {Sensors}, volume = {15}, number = {2}, pages = {2964--2979}, year = {2015}, url = {https://doi.org/10.3390/s150202964}, doi = {10.3390/S150202964}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/IzadiAGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/AbawajyFHA15, author = {Jemal H. Abawajy and Mohd Farhan Md Fudzee and Mohammad Mehedi Hassan and Majed A. AlRubaian}, title = {Service level agreement management framework for utility-oriented computing platforms}, journal = {J. Supercomput.}, volume = {71}, number = {11}, pages = {4287--4303}, year = {2015}, url = {https://doi.org/10.1007/s11227-015-1526-5}, doi = {10.1007/S11227-015-1526-5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/AbawajyFHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/BansalA15, author = {Shivali G. Bansal and Jemal H. Abawajy}, title = {Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions}, journal = {Wirel. Commun. Mob. Comput.}, volume = {15}, number = {4}, pages = {649--665}, year = {2015}, url = {https://doi.org/10.1002/wcm.2370}, doi = {10.1002/WCM.2370}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/BansalA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccbd/NikZZA15, author = {Wan Nor Shuhadah Wan Nik and Bing Bing Zhou and Albert Y. Zomaya and Jemal H. Abawajy}, title = {A Framework for Implementing Asynchronous Replication Scheme in Utility-Based Computing Environment}, booktitle = {International Conference on Cloud Computing and Big Data, {CCBD} 2015, Shanghai, China, November 4-6, 2015}, pages = {183--190}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CCBD.2015.42}, doi = {10.1109/CCBD.2015.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccbd/NikZZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/daeng/AzizAHN15, author = {Maslina Abdul Aziz and Jemal H. Abawajy and Ikram Ul Haq and Ida Normaya Mohd Nasir}, editor = {Jemal H. Abawajy and Mohamed Othman and Rozaida Ghazali and Mustafa Mat Deris and Hairulnizam Mahdin and Tutut Herawan}, title = {A Survey of Big Workflow}, booktitle = {Proceedings of the Second International Conference on Advanced Data and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26, 2015}, series = {Lecture Notes in Electrical Engineering}, volume = {520}, pages = {529--539}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-981-13-1799-6\_55}, doi = {10.1007/978-981-13-1799-6\_55}, timestamp = {Fri, 16 Aug 2019 10:59:15 +0200}, biburl = {https://dblp.org/rec/conf/daeng/AzizAHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/AzizAH15, author = {Maslina Abdul Aziz and Jemal H. Abawajy and Tutut Herawan}, editor = {Adnan Yazici and Nikhil R. Pal and Uzay Kaymak and Trevor Martin and Hisao Ishibuchi and Chin{-}Teng Lin and Jo{\~{a}}o M. C. Sousa and B{\"{u}}lent T{\"{u}}tmez}, title = {Layered workflow scheduling algorithm}, booktitle = {2015 {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE} 2015, Istanbul, Turkey, August 2-5, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/FUZZ-IEEE.2015.7338091}, doi = {10.1109/FUZZ-IEEE.2015.7338091}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/AzizAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ShojafarCAB15, author = {Mohammad Shojafar and Nicola Cordeschi and Jemal H. Abawajy and Enzo Baccarelli}, title = {Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for {TCP/IP} Mobile Cloud}, booktitle = {2015 {IEEE} Globecom Workshops, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOMW.2015.7413988}, doi = {10.1109/GLOCOMW.2015.7413988}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ShojafarCAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/AbawajyH15, author = {Jemal H. Abawajy and Mohammad Mehedi Hassan}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Reliability-Aware Distributed Computing Scheduling Policy}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {627--632}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_57}, doi = {10.1007/978-3-319-27161-3\_57}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/AbawajyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TownsendA15, author = {Ben Townsend and Jemal H. Abawajy}, editor = {Bhavani Thuraisingham and XiaoFeng Wang and Vinod Yegneswaran}, title = {Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems}, booktitle = {Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {164}, pages = {725--737}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28865-9\_48}, doi = {10.1007/978-3-319-28865-9\_48}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/TownsendA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/RayHAJ15, author = {Biplob R. Ray and Morshed U. Chowdhury and Jemal H. Abawajy and Monika Jesmin}, title = {Secure object tracking protocol for Networked {RFID} Systems}, booktitle = {16th {IEEE/ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2015, Takamatsu, Japan, June 1-3, 2015}, pages = {135--141}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SNPD.2015.7176190}, doi = {10.1109/SNPD.2015.7176190}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/RayHAJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sscc/2015, editor = {Jemal H. Abawajy and Sougata Mukherjea and Sabu M. Thampi and Antonio Ruiz{-}Mart{\'{\i}}nez}, title = {Security in Computing and Communications - Third International Symposium, {SSCC} 2015, Kochi, India, August 10-13, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {536}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22915-7}, doi = {10.1007/978-3-319-22915-7}, isbn = {978-3-319-22914-0}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sscc/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/Abawajy14, author = {Jemal H. Abawajy}, title = {User preference of cyber security awareness delivery methods}, journal = {Behav. Inf. Technol.}, volume = {33}, number = {3}, pages = {236--247}, year = {2014}, url = {https://doi.org/10.1080/0144929X.2012.708787}, doi = {10.1080/0144929X.2012.708787}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/Abawajy14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/RayAC14, author = {Biplob R. Ray and Jemal H. Abawajy and Morshed U. Chowdhury}, title = {Scalable {RFID} security framework and protocol supporting Internet of Things}, journal = {Comput. Networks}, volume = {67}, pages = {89--103}, year = {2014}, url = {https://doi.org/10.1016/j.comnet.2014.03.023}, doi = {10.1016/J.COMNET.2014.03.023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/RayAC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HamidA14, author = {Isredza Rahmi A. Hamid and Jemal H. Abawajy}, title = {An approach for profiling phishing activities}, journal = {Comput. Secur.}, volume = {45}, pages = {27--41}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.04.002}, doi = {10.1016/J.COSE.2014.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HamidA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ChandrasekaranCAN14, author = {Srimathi Chandrasekaran and Eunmi Choi and Jemal H. Abawajy and Rajesh Natarajan}, title = {Sensor Grid Middleware Metamodeling and Analysis}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/805708}, doi = {10.1155/2014/805708}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ChandrasekaranCAN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/HassanPHA14, author = {Mohammad Mehedi Hassan and Al{-}Sakib Khan Pathan and Eui{-}Nam Huh and Jemal H. Abawajy}, title = {Emerging Sensor-Cloud Technology for Pervasive Services and Applications}, journal = {Int. J. Distributed Sens. Networks}, volume = {10}, year = {2014}, url = {https://doi.org/10.1155/2014/610106}, doi = {10.1155/2014/610106}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/HassanPHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AlazabHAKA14, author = {Ammar Alazab and Michael Hobbs and Jemal H. Abawajy and Ansam Khraisat and Mamoun Alazab}, title = {Using response action with intelligent intrusion detection and prevention system against web application malware}, journal = {Inf. Manag. Comput. Secur.}, volume = {22}, number = {5}, pages = {431--449}, year = {2014}, url = {https://doi.org/10.1108/IMCS-02-2013-0007}, doi = {10.1108/IMCS-02-2013-0007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AlazabHAKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AbawajyBKC14, author = {Jemal H. Abawajy and Gleb Beliakov and Andrei V. Kelarev and Morshed U. Chowdhury}, title = {Iterative Construction of Hierarchical Classifiers for Phishing Website Detection}, journal = {J. Networks}, volume = {9}, number = {8}, pages = {2089--2098}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.8.2089-2098}, doi = {10.4304/JNW.9.8.2089-2098}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AbawajyBKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AbawajyKC14, author = {Jemal H. Abawajy and Andrei V. Kelarev and Morshed U. Chowdhury}, title = {Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking}, journal = {J. Networks}, volume = {9}, number = {9}, pages = {2259--2268}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.9.2259-2268}, doi = {10.4304/JNW.9.9.2259-2268}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AbawajyKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AbawajyI14, author = {Jemal H. Abawajy and Md. Rafiqul Islam}, title = {Guest Editorial}, journal = {J. Networks}, volume = {9}, number = {11}, pages = {2875--2877}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.11.2875-2877}, doi = {10.4304/JNW.9.11.2875-2877}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AbawajyI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/AlazabHAIYVB14, author = {Mamoun Alazab and Md. Shamsul Huda and Jemal H. Abawajy and Md. Rafiqul Islam and John Yearwood and Sitalakshmi Venkatraman and Roderic Broadhurst}, title = {A Hybrid Wrapper-Filter Approach for Malware Detection}, journal = {J. Networks}, volume = {9}, number = {11}, pages = {2878--2891}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.11.2878-2891}, doi = {10.4304/JNW.9.11.2878-2891}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/AlazabHAIYVB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ChowdhuryCA14, author = {Belal Chowdhury and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Securing a Smart Anti-counterfeit Web Application}, journal = {J. Networks}, volume = {9}, number = {11}, pages = {2925--2933}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.11.2925-2933}, doi = {10.4304/JNW.9.11.2925-2933}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ChowdhuryCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAKKS14, author = {Salahuddin Muhammad Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Joarder Kamruzzaman and Mohammad A. Karim and Nurul I. Sarkar}, title = {Guest Editorial}, journal = {J. Networks}, volume = {9}, number = {12}, pages = {3189--3191}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.12.3189-3191}, doi = {10.4304/JNW.9.12.3189-3191}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAKKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/AbawajyD14, author = {Jemal H. Abawajy and Mustafa Mat Deris}, title = {Data Replication Approach with Consistency Guarantee for Data Grid}, journal = {{IEEE} Trans. Computers}, volume = {63}, number = {12}, pages = {2975--2987}, year = {2014}, url = {https://doi.org/10.1109/TC.2013.183}, doi = {10.1109/TC.2013.183}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/AbawajyD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/AbawajyKC14, author = {Jemal H. Abawajy and Andrei V. Kelarev and Morshed U. Chowdhury}, title = {Large Iterative Multitier Ensemble Classifiers for Security of Big Data}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {2}, number = {3}, pages = {352--363}, year = {2014}, url = {https://doi.org/10.1109/TETC.2014.2316510}, doi = {10.1109/TETC.2014.2316510}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/AbawajyKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/MaQSHA14, author = {Xiuqin Ma and Hongwu Qin and Norrozila Sulaiman and Tutut Herawan and Jemal H. Abawajy}, title = {The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and Its Related Algorithms}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {22}, number = {1}, pages = {57--71}, year = {2014}, url = {https://doi.org/10.1109/TFUZZ.2013.2246571}, doi = {10.1109/TFUZZ.2013.2246571}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/MaQSHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/JavanmardiSSAS14, author = {Saeed Javanmardi and Mohammad Shojafar and Shahdad Shariatmadari and Jemal H. Abawajy and Mukesh Singhal}, title = {{PGSW-OS:} a novel approach for resource management in a semantic web operating system based on a {P2P} grid architecture}, journal = {J. Supercomput.}, volume = {69}, number = {2}, pages = {955--975}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1221-y}, doi = {10.1007/S11227-014-1221-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/JavanmardiSSAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/NawiKRAHA14, author = {Nazri Mohd Nawi and Abdullah Khan and M. Z. Rehman and Maslina Abdul Aziz and Tutut Herawan and Jemal H. Abawajy}, editor = {Chu Kiong Loo and Keem Siah Yap and Kok Wai Wong and Andrew Teoh Beng Jin and Kaizhu Huang}, title = {Neural Network Training by Hybrid Accelerated Cuckoo Particle Swarm Optimization Algorithm}, booktitle = {Neural Information Processing - 21st International Conference, {ICONIP} 2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8835}, pages = {237--244}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12640-1\_29}, doi = {10.1007/978-3-319-12640-1\_29}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconip/NawiKRAHA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/NawiKRAHA14a, author = {Nazri Mohd Nawi and Abdullah Khan and M. Z. Rehman and Maslina Abdul Aziz and Tutut Herawan and Jemal H. Abawajy}, editor = {Chu Kiong Loo and Keem Siah Yap and Kok Wai Wong and Andrew Teoh Beng Jin and Kaizhu Huang}, title = {An Accelerated Particle Swarm Optimization Based Levenberg Marquardt Back Propagation Algorithm}, booktitle = {Neural Information Processing - 21st International Conference, {ICONIP} 2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8835}, pages = {245--253}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12640-1\_30}, doi = {10.1007/978-3-319-12640-1\_30}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconip/NawiKRAHA14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/ShahHGNAA14, author = {Habib Shah and Tutut Herawan and Rozaida Ghazali and Rashid Naseem and Maslina Abdul Aziz and Jemal H. Abawajy}, editor = {Chu Kiong Loo and Keem Siah Yap and Kok Wai Wong and Andrew Teoh Beng Jin and Kaizhu Huang}, title = {An Improved Gbest Guided Artificial Bee Colony {(IGGABC)} Algorithm for Classification and Prediction Tasks}, booktitle = {Neural Information Processing - 21st International Conference, {ICONIP} 2014, Kuching, Malaysia, November 3-6, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8834}, pages = {559--569}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12637-1\_70}, doi = {10.1007/978-3-319-12637-1\_70}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iconip/ShahHGNAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/chb/SalehiAB14, author = {Mohsen Amini Salehi and Jemal H. Abawajy and Rajkumar Buyya}, editor = {Teofilo F. Gonzalez and Jorge Diaz{-}Herrera and Allen Tucker}, title = {Taxonomy of Contention Management in Interconnected Distributed Systems}, booktitle = {Computing Handbook, Third Edition: Computer Science and Software Engineering}, pages = {57: 1--33}, publisher = {{CRC} Press}, year = {2014}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/crc/chb/SalehiAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/daeng/2013, editor = {Tutut Herawan and Mustafa Mat Deris and Jemal H. Abawajy}, title = {Proceedings of the First International Conference on Advanced Data and Information Engineering, DaEng 2013, Kuala Lumpur, Malaysia, December 16-18, 2013}, series = {Lecture Notes in Electrical Engineering}, volume = {285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-981-4585-18-7}, doi = {10.1007/978-981-4585-18-7}, isbn = {978-981-4585-17-0}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/daeng/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/artmed/StranieriAKHCJ13, author = {Andrew Stranieri and Jemal H. Abawajy and Andrei V. Kelarev and Md. Shamsul Huda and Morshed U. Chowdhury and Herbert F. Jelinek}, title = {An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy}, journal = {Artif. Intell. Medicine}, volume = {58}, number = {3}, pages = {185--193}, year = {2013}, url = {https://doi.org/10.1016/j.artmed.2013.04.007}, doi = {10.1016/J.ARTMED.2013.04.007}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/artmed/StranieriAKHCJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/AbawajyKCSJ13, author = {Jemal H. Abawajy and Andrei V. Kelarev and Morshed U. Chowdhury and Andrew Stranieri and Herbert F. Jelinek}, title = {Predicting cardiac autonomic neuropathy category for diabetic data with missing values}, journal = {Comput. Biol. Medicine}, volume = {43}, number = {10}, pages = {1328--1333}, year = {2013}, url = {https://doi.org/10.1016/j.compbiomed.2013.07.002}, doi = {10.1016/J.COMPBIOMED.2013.07.002}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/AbawajyKCSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/AbawajyKC13, author = {Jemal H. Abawajy and Andrei V. Kelarev and Morshed U. Chowdhury}, title = {Multistage approach for clustering and classification of {ECG} data}, journal = {Comput. Methods Programs Biomed.}, volume = {112}, number = {3}, pages = {720--730}, year = {2013}, url = {https://doi.org/10.1016/j.cmpb.2013.08.002}, doi = {10.1016/J.CMPB.2013.08.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cmpb/AbawajyKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/AbawajyJSH13, author = {Jemal H. Abawajy and Syed Imran Jami and Zubair Ahmed Shaikh and Syed A. Hammad}, title = {A framework for scalable distributed provenance storage system}, journal = {Comput. Stand. Interfaces}, volume = {35}, number = {1}, pages = {179--186}, year = {2013}, url = {https://doi.org/10.1016/j.csi.2012.07.001}, doi = {10.1016/J.CSI.2012.07.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/AbawajyJSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejgta/AbawajyKC13, author = {Jemal H. Abawajy and Andrei V. Kelarev and Morshed U. Chowdhury}, title = {Power graphs: {A} survey}, journal = {Electron. J. Graph Theory Appl.}, volume = {1}, number = {2}, pages = {125--147}, year = {2013}, url = {https://doi.org/10.5614/ejgta.2013.1.2.6}, doi = {10.5614/EJGTA.2013.1.2.6}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejgta/AbawajyKC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijimai/PooranianSAS13, author = {Zahra Pooranian and Mohammad Shojafar and Jemal H. Abawajy and Mukesh Singhal}, title = {{GLOA:} {A} New Job Scheduling Algorithm for Grid Computing}, journal = {Int. J. Interact. Multim. Artif. Intell.}, volume = {2}, number = {1}, pages = {59--64}, year = {2013}, url = {https://doi.org/10.9781/ijimai.2013.218}, doi = {10.9781/IJIMAI.2013.218}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijimai/PooranianSAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/AlazabHAK13, author = {Ammar Alazab and Michael Hobbs and Jemal H. Abawajy and Ansam Khraisat}, title = {Malware Detection and Prevention System Based on Multi-Stage Rules}, journal = {Int. J. Inf. Secur. Priv.}, volume = {7}, number = {2}, pages = {29--43}, year = {2013}, url = {https://doi.org/10.4018/jisp.2013040102}, doi = {10.4018/JISP.2013040102}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/AlazabHAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijndc/RayCA13, author = {Biplob Rakshit Ray and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for {RFID} Tag}, journal = {Int. J. Networked Distributed Comput.}, volume = {1}, number = {2}, pages = {79--88}, year = {2013}, url = {https://doi.org/10.2991/ijndc.2013.1.2.2}, doi = {10.2991/IJNDC.2013.1.2.2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijndc/RayCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcse/ShojafarPAM13, author = {Mohammad Shojafar and Zahra Pooranian and Jemal H. Abawajy and Mohammad Reza Meybodi}, title = {An Efficient Scheduling Method for Grid Systems Based on a Hierarchical Stochastic Petri Net}, journal = {J. Comput. Sci. Eng.}, volume = {7}, number = {1}, pages = {44--52}, year = {2013}, url = {https://doi.org/10.5626/JCSE.2013.7.1.44}, doi = {10.5626/JCSE.2013.7.1.44}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcse/ShojafarPAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/KelarevASJ13, author = {Andrei V. Kelarev and Jemal H. Abawajy and Andrew Stranieri and Herbert F. Jelinek}, title = {Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes}, journal = {Int. J. Data Warehous. Min.}, volume = {9}, number = {4}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/ijdwm.2013100101}, doi = {10.4018/IJDWM.2013100101}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdwm/KelarevASJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/IzadiAG13, author = {Davood Izadi and Jemal H. Abawajy and Sara Ghanavati}, title = {Fuzzy logic optimized wireless sensor network routing protocol}, journal = {J. High Speed Networks}, volume = {19}, number = {2}, pages = {115--128}, year = {2013}, url = {https://doi.org/10.3233/JHS-130467}, doi = {10.3233/JHS-130467}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/IzadiAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/IslamA13, author = {Md. Rafiqul Islam and Jemal H. Abawajy}, title = {A multi-tier phishing detection and filtering approach}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {1}, pages = {324--335}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.05.009}, doi = {10.1016/J.JNCA.2012.05.009}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/IslamA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Abawajy13, author = {Jemal H. Abawajy}, title = {{SQLIA} detection and prevention approach for {RFID} systems}, journal = {J. Syst. Softw.}, volume = {86}, number = {3}, pages = {751--758}, year = {2013}, url = {https://doi.org/10.1016/j.jss.2012.11.022}, doi = {10.1016/J.JSS.2012.11.022}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Abawajy13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/GhanavatiAI13, author = {Sara Ghanavati and Jemal H. Abawajy and Davood Izadi}, title = {A fuzzy technique to control congestion in {WSN}}, booktitle = {The 2013 International Joint Conference on Neural Networks, {IJCNN} 2013, Dallas, TX, USA, August 4-9, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IJCNN.2013.6706958}, doi = {10.1109/IJCNN.2013.6706958}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/GhanavatiAI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/IzadiAG13, author = {Davood Izadi and Jemal H. Abawajy and Sara Ghanavati}, title = {A new energy efficient cluster-head and backup selection scheme in {WSN}}, booktitle = {{IEEE} 14th International Conference on Information Reuse {\&} Integration, {IRI} 2013, San Francisco, CA, USA, August 14-16, 2013}, pages = {408--415}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IRI.2013.6642500}, doi = {10.1109/IRI.2013.6642500}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/IzadiAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/NinggalA13, author = {Mohd Izuan Hafez Ninggal and Jemal H. Abawajy}, editor = {Ivan Stojmenovic and Zixue Cheng and Song Guo}, title = {Neighbourhood-Pair Attack in Social Network Data Publishing}, booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, {MOBIQUITOUS} 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {131}, pages = {726--731}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-11569-6\_61}, doi = {10.1007/978-3-319-11569-6\_61}, timestamp = {Fri, 13 Jul 2018 15:02:09 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/NinggalA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secnet/AlazabHAK13, author = {Ammar Alazab and Michael Hobbs and Jemal H. Abawajy and Ansam Khraisat}, editor = {Ali Ismail Awad and Aboul Ella Hassanien and Kensuke Baba}, title = {Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware}, booktitle = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {381}, pages = {177--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40597-6\_15}, doi = {10.1007/978-3-642-40597-6\_15}, timestamp = {Wed, 19 May 2021 08:32:23 +0200}, biburl = {https://dblp.org/rec/conf/secnet/AlazabHAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChowdhuryCA13, author = {Belal Chowdhury and Morshed U. Chowdhury and Jemal H. Abawajy}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Securing a Web-Based Anti-counterfeit {RFID} System}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {342--355}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_21}, doi = {10.1007/978-3-319-04283-1\_21}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChowdhuryCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MasudIA13, author = {Md. Anwar Hossain Masud and Md. Rafiqul Islam and Jemal H. Abawajy}, editor = {Tanveer A. Zia and Albert Y. Zomaya and Vijay Varadharajan and Zhuoqing Morley Mao}, title = {Security Concerns and Remedy in a Cloud Based E-learning System}, booktitle = {Security and Privacy in Communication Networks - 9th International {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {127}, pages = {356--366}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04283-1\_22}, doi = {10.1007/978-3-319-04283-1\_22}, timestamp = {Mon, 28 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MasudIA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/RayCA13, author = {Biplob R. Ray and Morshed U. Chowdhury and Jemal H. Abawajy}, title = {Critical Analysis and Comparative Study of Security for Networked {RFID} Systems}, booktitle = {14th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2013, Honolulu, Hawaii, USA, 1-3 July, 2013}, pages = {197--202}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SNPD.2013.41}, doi = {10.1109/SNPD.2013.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/RayCA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NinggalA13, author = {Mohd Izuan Hafez Ninggal and Jemal H. Abawajy}, title = {Preserving Utility in Social Network Graph Anonymization}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {226--232}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.31}, doi = {10.1109/TRUSTCOM.2013.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NinggalA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamidA13, author = {Isredza Rahmi A. Hamid and Jemal H. Abawajy}, title = {Profiling Phishing Email Based on Clustering Approach}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {628--635}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.76}, doi = {10.1109/TRUSTCOM.2013.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HamidA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AlazabAHLK13, author = {Ammar Alazab and Jemal H. Abawajy and Michael Hobbs and Robert Layton and Ansam Khraisat}, title = {Crime Toolkits: The Productisation of Cybercrime}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {1626--1632}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.273}, doi = {10.1109/TRUSTCOM.2013.273}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AlazabAHLK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/FernandoA13, author = {Harinda Fernando and Jemal H. Abawajy}, editor = {Nik Bessis and Fatos Xhafa and Dora Varvarigou and Richard Hill and Maozhen Li}, title = {Malware Detection and Prevention in {RFID} Systems}, booktitle = {Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence}, series = {Studies in Computational Intelligence}, volume = {460}, pages = {143--166}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-34952-2\_6}, doi = {10.1007/978-3-642-34952-2\_6}, timestamp = {Sat, 25 Jun 2022 17:37:28 +0200}, biburl = {https://dblp.org/rec/series/sci/FernandoA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/HerawanNADA13, author = {Tutut Herawan and Ahmad Noraziah and Zailani Abdullah and Mustafa Mat Deris and Jemal H. Abawajy}, editor = {Ngoc Thanh Nguyen and Bogdan Trawinski and Radoslaw P. Katarzyniak and GeunSik Jo}, title = {{IPMA:} Indirect Patterns Mining Algorithm}, booktitle = {Advanced Methods for Computational Collective Intelligence}, series = {Studies in Computational Intelligence}, volume = {457}, pages = {187--196}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-34300-1\_18}, doi = {10.1007/978-3-642-34300-1\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sci/HerawanNADA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BeloglazovAB12, author = {Anton Beloglazov and Jemal H. Abawajy and Rajkumar Buyya}, title = {Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {28}, number = {5}, pages = {755--768}, year = {2012}, url = {https://doi.org/10.1016/j.future.2011.04.017}, doi = {10.1016/J.FUTURE.2011.04.017}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BeloglazovAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAKKS12, author = {Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Joarder Kamruzzaman and Mohammad A. Karim and Nurul I. Sarkar}, title = {Guest Editorial}, journal = {J. Networks}, volume = {7}, number = {3}, pages = {409--411}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.3.409-411}, doi = {10.4304/JNW.7.3.409-411}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAKKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAKKS12a, author = {Salahuddin Muhammad Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Joarder Kamruzzaman and Mohammad Ataul Karim and Nurul I. Sarkar}, title = {Guest Editorial}, journal = {J. Networks}, volume = {7}, number = {12}, pages = {1909--1911}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.12.1909-1911}, doi = {10.4304/JNW.7.12.1909-1911}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAKKS12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/JavadiAB12, author = {Bahman Javadi and Jemal H. Abawajy and Rajkumar Buyya}, title = {Failure-aware resource provisioning for hybrid Cloud infrastructure}, journal = {J. Parallel Distributed Comput.}, volume = {72}, number = {10}, pages = {1318--1331}, year = {2012}, url = {https://doi.org/10.1016/j.jpdc.2012.06.012}, doi = {10.1016/J.JPDC.2012.06.012}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/JavadiAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/paapp/VijayakumarBA12, author = {Vijayakumar Varadharajan and R. S. D. Wahida Banu and Jemal H. Abawajy}, title = {An efficient approach based on trust and reputation for secured selection of grid resources}, journal = {Int. J. Parallel Emergent Distributed Syst.}, volume = {27}, number = {1}, pages = {1--17}, year = {2012}, url = {https://doi.org/10.1080/17445760.2011.575048}, doi = {10.1080/17445760.2011.575048}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/paapp/VijayakumarBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ausdm/KelarevSYAJ12, author = {Andrei V. Kelarev and Andrew Stranieri and John Yearwood and Jemal H. Abawajy and Herbert F. Jelinek}, editor = {Yanchang Zhao and Jiuyong Li and Paul J. Kennedy and Peter Christen}, title = {Improving Classi cations for Cardiac Autonomic Neuropathy Using Multi-level Ensemble Classi ers and Feature Selection Based}, booktitle = {Tenth Australasian Data Mining Conference, AusDM 2012, Sydney, Australia, December 5-7, 2012}, series = {{CRPIT}}, volume = {134}, pages = {93--102}, publisher = {Australian Computer Society}, year = {2012}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV134Kelarev.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/ausdm/KelarevSYAJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/JavadiAS12, author = {Bahman Javadi and Jemal H. Abawajy and Richard O. Sinnott}, title = {Hybrid Cloud resource provisioning policy in the presence of resource failures}, booktitle = {4th {IEEE} International Conference on Cloud Computing Technology and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6, 2012}, pages = {10--17}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CloudCom.2012.6427521}, doi = {10.1109/CLOUDCOM.2012.6427521}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/JavadiAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/AbawajyK12, author = {Jemal H. Abawajy and Andrei V. Kelarev}, editor = {Yang Xiang and Javier L{\'{o}}pez and C.{-}C. Jay Kuo and Wanlei Zhou}, title = {A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering}, booktitle = {Cyberspace Safety and Security - 4th International Symposium, {CSS} 2012, Melbourne, Australia, December 12-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7672}, pages = {48--56}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35362-8\_5}, doi = {10.1007/978-3-642-35362-8\_5}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/css/AbawajyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccci/HerawanNADA12, author = {Tutut Herawan and Ahmad Noraziah and Zailani Abdullah and Mustafa Mat Deris and Jemal H. Abawajy}, editor = {Ngoc Thanh Nguyen and Kiem Hoang and Piotr Jedrzejowicz}, title = {{EFP-M2:} Efficient Model for Mining Frequent Patterns in Transactional Database}, booktitle = {Computational Collective Intelligence. Technologies and Applications - 4th International Conference, {ICCCI} 2012, Ho Chi Minh City, Vietnam, November 28-30, 2012, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7654}, pages = {29--38}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34707-8\_4}, doi = {10.1007/978-3-642-34707-8\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccci/HerawanNADA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscit/AlazabHAA12, author = {Ammar Alazab and Michael Hobbs and Jemal H. Abawajy and Moutaz Alazab}, title = {Using feature selection for intrusion detection system}, booktitle = {International Symposium on Communications and Information Technologies, {ISCIT} 2012, Gold Coast, Australia, October 2-5, 2012}, pages = {296--301}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISCIT.2012.6380910}, doi = {10.1109/ISCIT.2012.6380910}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscit/AlazabHAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/ChonkaA12, author = {Ashley Chonka and Jemal H. Abawajy}, editor = {Leonard Barolli and David Taniar and Tomoya Enokido and J. Wenny Rahayu and Makoto Takizawa}, title = {Detecting and Mitigating HX-DoS Attacks against Cloud Web Services}, booktitle = {15th International Conference on Network-Based Information Systems, NBiS 2012, Melbourne, Australia, September 26-28, 2012}, pages = {429--434}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/NBiS.2012.146}, doi = {10.1109/NBIS.2012.146}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/ChonkaA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/PattersonHA12, author = {Nicholas Charles Patterson and Michael Hobbs and Jemal H. Abawajy}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {177--184}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.296}, doi = {10.1109/TRUSTCOM.2012.296}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/PattersonHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fgit/2012fgcn, editor = {Tai{-}Hoon Kim and Dae{-}Sik Ko and Thanos Vasilakos and Adrian Stoica and Jemal H. Abawajy}, title = {Computer Applications for Communication, Networking, and Digital Contents - International Conferences, {FGCN} and {DCA} 2012, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2012, Gangneug, Korea, December 16-19, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {350}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35594-3}, doi = {10.1007/978-3-642-35594-3}, isbn = {978-3-642-35593-6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/2012fgcn.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/FudzeeA11, author = {Mohd Farhan Md Fudzee and Jemal H. Abawajy}, title = {QoS-based adaptation service selection broker}, journal = {Future Gener. Comput. Syst.}, volume = {27}, number = {3}, pages = {256--264}, year = {2011}, url = {https://doi.org/10.1016/j.future.2010.09.005}, doi = {10.1016/J.FUTURE.2010.09.005}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/FudzeeA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAKK11, author = {Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Joarder Kamruzzaman and Mohammad Ataul Karim}, title = {Guest Editorial}, journal = {J. Networks}, volume = {6}, number = {1}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.1.1-3}, doi = {10.4304/JNW.6.1.1-3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TownsendAK11, author = {Ben Townsend and Jemal H. Abawajy and Tai{-}Hoon Kim}, title = {SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors}, journal = {Sensors}, volume = {11}, number = {4}, pages = {4231--4243}, year = {2011}, url = {https://doi.org/10.3390/s110404231}, doi = {10.3390/S110404231}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/TownsendAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MahdinA11, author = {Hairulnizam Mahdin and Jemal H. Abawajy}, title = {An Approach for Removing Redundant Data from {RFID} Data Streams}, journal = {Sensors}, volume = {11}, number = {10}, pages = {9863--9877}, year = {2011}, url = {https://doi.org/10.3390/s111009863}, doi = {10.3390/S111009863}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/MahdinA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/BattenAD11, author = {Lynn Margaret Batten and Jemal H. Abawajy and Robin Doss}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Boris Shishkov}, title = {Prevention of Information Harvesting in a Cloud Services Environment}, booktitle = {{CLOSER} 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, Netherlands, 7-9 May, 2011}, pages = {66--72}, publisher = {SciTePress}, year = {2011}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/closer/BattenAD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AhmadAK11, author = {Masitah Ahmad and Jemal H. Abawajy and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Jianhua Ma and Wai{-}Chi Fang and Byeong Ho Kang and Byungjoo Park and Frode Eika Sandnes and Kun Chang Lee}, title = {Service Quality Assessment in Provision of Library Services}, booktitle = {{U-} and E-Service, Science and Technology - International Conference, {UNESST} 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {264}, pages = {83--92}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27210-3\_10}, doi = {10.1007/978-3-642-27210-3\_10}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AhmadAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AbawajyK11, author = {Jemal H. Abawajy and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Haeng{-}Kon Kim and Heau{-}Jo Kang and Kyung Jung Kim and Kiumi Akingbehin and Byeong Ho Kang}, title = {Engaging and Effective Asynchronous Online Discussion Forums}, booktitle = {Software Engineering, Business Continuity, and Education - International Conferences ASEA, {DRBC} and {EL} 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {257}, pages = {695--705}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27207-3\_75}, doi = {10.1007/978-3-642-27207-3\_75}, timestamp = {Mon, 04 Nov 2019 12:36:13 +0100}, biburl = {https://dblp.org/rec/conf/fgit/AbawajyK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AbawajyK11a, author = {Jemal H. Abawajy and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Haeng{-}Kon Kim and Heau{-}Jo Kang and Kyung Jung Kim and Kiumi Akingbehin and Byeong Ho Kang}, title = {Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums}, booktitle = {Software Engineering, Business Continuity, and Education - International Conferences ASEA, {DRBC} and {EL} 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {257}, pages = {706--714}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27207-3\_76}, doi = {10.1007/978-3-642-27207-3\_76}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AbawajyK11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/NinggalA11, author = {Mohd Izuan Hafez Ninggal and Jemal H. Abawajy}, editor = {Yang Xiang and Alfredo Cuzzocrea and Michael Hobbs and Wanlei Zhou}, title = {Privacy Threat Analysis of Social Network Data}, booktitle = {Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7017}, pages = {165--174}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24669-2\_16}, doi = {10.1007/978-3-642-24669-2\_16}, timestamp = {Thu, 21 Apr 2022 14:42:07 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/NinggalA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/FudzeeA11, author = {Mohd Farhan Md Fudzee and Jemal H. Abawajy}, editor = {Yang Xiang and Alfredo Cuzzocrea and Michael Hobbs and Wanlei Zhou}, title = {A Protocol for Discovering Content Adaptation Services}, booktitle = {Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7017}, pages = {235--244}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24669-2\_23}, doi = {10.1007/978-3-642-24669-2\_23}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/FudzeeA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/FernandoA11, author = {Harinda Fernando and Jemal H. Abawajy}, editor = {Yang Xiang and Alfredo Cuzzocrea and Michael Hobbs and Wanlei Zhou}, title = {Securing {RFID} Systems from {SQLIA}}, booktitle = {Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7017}, pages = {245--254}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24669-2\_24}, doi = {10.1007/978-3-642-24669-2\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/FernandoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/HamidA11, author = {Isredza Rahmi A. Hamid and Jemal H. Abawajy}, editor = {Yang Xiang and Alfredo Cuzzocrea and Michael Hobbs and Wanlei Zhou}, title = {Hybrid Feature Selection for Phishing Email Detection}, booktitle = {Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7017}, pages = {266--275}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24669-2\_26}, doi = {10.1007/978-3-642-24669-2\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/HamidA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/NikZZA11, author = {Wan Nor Shuhadah Wan Nik and Bing Bing Zhou and Albert Y. Zomaya and Jemal H. Abawajy}, title = {Efficient Resource Selection Algorithm for Enterprise Grid Systems}, booktitle = {{IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA} 2011, Busan, Korea, 26-28 May, 2011}, pages = {57--62}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ISPA.2011.25}, doi = {10.1109/ISPA.2011.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/NikZZA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Abawajy11, author = {Jemal H. Abawajy}, title = {Establishing Trust in Hybrid Cloud Computing Environments}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {118--125}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.18}, doi = {10.1109/TRUSTCOM.2011.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Abawajy11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FernandoA11, author = {Harinda Fernando and Jemal H. Abawajy}, title = {Mutual Authentication Protocol for Networked {RFID} Systems}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {417--424}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.54}, doi = {10.1109/TRUSTCOM.2011.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FernandoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/NinggalA11, author = {Mohd Izuan Hafez Ninggal and Jemal H. Abawajy}, title = {Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {847--852}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.113}, doi = {10.1109/TRUSTCOM.2011.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/NinggalA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HamidA11, author = {Isredza Rahmi A. Hamid and Jemal H. Abawajy}, title = {Phishing Email Feature Selection Approach}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {916--921}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.126}, doi = {10.1109/TRUSTCOM.2011.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HamidA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/HerawanDA10, author = {Tutut Herawan and Mustafa Mat Deris and Jemal H. Abawajy}, title = {A rough set approach for selecting clustering attribute}, journal = {Knowl. Based Syst.}, volume = {23}, number = {3}, pages = {220--231}, year = {2010}, url = {https://doi.org/10.1016/j.knosys.2009.12.003}, doi = {10.1016/J.KNOSYS.2009.12.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/HerawanDA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/AbawajyPPR10, author = {Jemal H. Abawajy and Mukaddim Pathan and Al{-}Sakib Khan Pathan and Mustafizur Rahman}, title = {Network Management in Distributed Systems}, journal = {Scalable Comput. Pract. Exp.}, volume = {11}, number = {4}, year = {2010}, url = {http://www.scpe.org/index.php/scpe/article/view/664}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/AbawajyPPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GoelAK10, author = {Shivali Goel and Jemal H. Abawajy and Tai{-}Hoon Kim}, title = {Performance Analysis of Receive Diversity in Wireless Sensor Networks over {GBSBE} Models}, journal = {Sensors}, volume = {10}, number = {12}, pages = {11021--11037}, year = {2010}, url = {https://doi.org/10.3390/s101211021}, doi = {10.3390/S101211021}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GoelAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/FudzeeAD10, author = {Mohd Farhan Md Fudzee and Jemal H. Abawajy and Mustafa Mat Deris}, title = {Multi-criteria Content Adaptation Service Selection Broker}, booktitle = {10th {IEEE/ACM} International Conference on Cluster, Cloud and Grid Computing, CCGrid 2010, 17-20 May 2010, Melbourne, Victoria, Australia}, pages = {721--726}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CCGRID.2010.128}, doi = {10.1109/CCGRID.2010.128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/FudzeeAD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/MahdinA10, author = {Hairulnizam Mahdin and Jemal H. Abawajy}, editor = {Tai{-}Hoon Kim and Jianhua Ma and Wai{-}Chi Fang and Byungjoo Park and Byeong Ho Kang and Dominik Slezak}, title = {An Approach to Filtering Duplicate {RFID} Data Streams}, booktitle = {{U-} and E-Service, Science and Technology - International Conference {UNESST} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {124}, pages = {125--133}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17644-9\_14}, doi = {10.1007/978-3-642-17644-9\_14}, timestamp = {Tue, 20 Aug 2024 07:54:45 +0200}, biburl = {https://dblp.org/rec/conf/fgit/MahdinA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AbawajyK10, author = {Jemal H. Abawajy and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Performance Analysis of Cyber Security Awareness Delivery Methods}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {142--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_16}, doi = {10.1007/978-3-642-17610-4\_16}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AbawajyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/Al-NeyadiA10, author = {Fahed Al{-}Neyadi and Jemal H. Abawajy}, editor = {Tai{-}Hoon Kim and Young{-}Hoon Lee and Byeong Ho Kang and Dominik Slezak}, title = {A Privacy Preserving Service Broker Architecture for Data Sharing}, booktitle = {Future Generation Information Technology - Second International Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6485}, pages = {450--458}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17569-5\_44}, doi = {10.1007/978-3-642-17569-5\_44}, timestamp = {Mon, 04 Nov 2019 12:36:13 +0100}, biburl = {https://dblp.org/rec/conf/fgit/Al-NeyadiA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gca/VijayakumarBA10, author = {Vijayakumar Varadharajan and R. S. D. Wahida Banu and Jemal H. Abawajy}, editor = {Hamid R. Arabnia and George A. Gravvanis and Ashu M. G. Solo}, title = {Novel Mechanism for Evaluating Feedback in the Grid Environment on Resource Allocation}, booktitle = {Proceedings of the 2010 International Conference on Grid Computing {\&} Applications, {GCA} 2010, July 12-15, 2010, Las Vegas, Nevada, {USA}}, pages = {11--17}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Wed, 02 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gca/VijayakumarBA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/HerawanDA10, author = {Tutut Herawan and Mustafa Mat Deris and Jemal H. Abawajy}, editor = {David Taniar and Osvaldo Gervasi and Beniamino Murgante and Eric Pardede and Bernady O. Apduhan}, title = {Matrices Representation of Multi Soft-Sets and Its Application}, booktitle = {Computational Science and Its Applications - {ICCSA} 2010, International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {6018}, pages = {201--214}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12179-1\_19}, doi = {10.1007/978-3-642-12179-1\_19}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/HerawanDA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/FudzeeAD10, author = {Mohd Farhan Md Fudzee and Jemal H. Abawajy and Mustafa Mat Deris}, editor = {Patrick S{\'{e}}nac and Max Ott and Aruna Seneviratne}, title = {Service Discovery for Service-Oriented Content Adaptation}, booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {73}, pages = {308--309}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-29154-8\_28}, doi = {10.1007/978-3-642-29154-8\_28}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/FudzeeAD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/FernandoA10, author = {Harinda Fernando and Jemal H. Abawajy}, editor = {Patrick S{\'{e}}nac and Max Ott and Aruna Seneviratne}, title = {A Hybrid Mutual Authentication Protocol for {RFID}}, booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {73}, pages = {310--311}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-29154-8\_29}, doi = {10.1007/978-3-642-29154-8\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobiquitous/FernandoA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/BuyyaBA10, author = {Rajkumar Buyya and Anton Beloglazov and Jemal H. Abawajy}, editor = {Hamid R. Arabnia and Steve C. Chiu and George A. Gravvanis and Minoru Ito and Kazuki Joe and Hiroaki Nishikawa and Ashu M. G. Solo}, title = {Energy-Efficient Management of Data Center Resources for Cloud Computing: {A} Vision, Architectural Elements, and Open Challenges}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 2010, Las Vegas, Nevada, USA, July 12-15, 2010, 2 Volumes}, pages = {6--20}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Tue, 07 Dec 2010 09:22:06 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/BuyyaBA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prima/Al-JaljouliA10, author = {Raja Al{-}Jaljouli and Jemal H. Abawajy}, editor = {Nirmit Desai and Alan Liu and Michael Winikoff}, title = {Negotiation Strategy for Mobile Agent-Based e-Negotiation}, booktitle = {Principles and Practice of Multi-Agent Systems - 13th International Conference, {PRIMA} 2010, Kolkata, India, November 12-15, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7057}, pages = {137--151}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25920-3\_10}, doi = {10.1007/978-3-642-25920-3\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/prima/Al-JaljouliA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/Al-JaljouliA10, author = {Raja Al{-}Jaljouli and Jemal H. Abawajy}, editor = {Aboul Ella Hassanien and Jemal H. Abawajy and Ajith Abraham and Hani Hagras}, title = {Agents Based e-Commerce and Securing Exchanged Information}, booktitle = {Pervasive Computing, Innovations in Intelligent Multimedia and Applications}, series = {Computer Communications and Networks}, pages = {383--404}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-84882-599-4\_17}, doi = {10.1007/978-1-84882-599-4\_17}, timestamp = {Tue, 16 May 2017 14:24:22 +0200}, biburl = {https://dblp.org/rec/series/ccn/Al-JaljouliA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ccn/HAAH2010, editor = {Aboul Ella Hassanien and Jemal H. Abawajy and Ajith Abraham and Hani Hagras}, title = {Pervasive Computing, Innovations in Intelligent Multimedia and Applications}, series = {Computer Communications and Networks}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-84882-599-4}, doi = {10.1007/978-1-84882-599-4}, isbn = {978-1-84882-598-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ccn/HAAH2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1006-0308, author = {Rajkumar Buyya and Anton Beloglazov and Jemal H. Abawajy}, title = {Energy-Efficient Management of Data Center Resources for Cloud Computing: {A} Vision, Architectural Elements, and Open Challenges}, journal = {CoRR}, volume = {abs/1006.0308}, year = {2010}, url = {http://arxiv.org/abs/1006.0308}, eprinttype = {arXiv}, eprint = {1006.0308}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1006-0308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Abawajy09, author = {Jemal H. Abawajy}, title = {An efficient adaptive scheduling policy for high-performance computing}, journal = {Future Gener. Comput. Syst.}, volume = {25}, number = {3}, pages = {364--370}, year = {2009}, url = {https://doi.org/10.1016/j.future.2006.04.007}, doi = {10.1016/J.FUTURE.2006.04.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JavadiAA09, author = {Bahman Javadi and Mohammad K. Akbari and Jemal H. Abawajy}, title = {Multi-cluster computing interconnection network performance modeling and analysis}, journal = {Future Gener. Comput. Syst.}, volume = {25}, number = {7}, pages = {737--746}, year = {2009}, url = {https://doi.org/10.1016/j.future.2008.07.010}, doi = {10.1016/J.FUTURE.2008.07.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/JavadiAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/PerezSARP09, author = {Mar{\'{\i}}a S. P{\'{e}}rez and Alberto S{\'{a}}nchez and Jemal H. Abawajy and V{\'{\i}}ctor Robles and Jos{\'{e}} M. Pe{\~{n}}a}, title = {An agent architecture for managing data resources in a grid environment}, journal = {Future Gener. Comput. Syst.}, volume = {25}, number = {7}, pages = {747--755}, year = {2009}, url = {https://doi.org/10.1016/j.future.2008.07.011}, doi = {10.1016/J.FUTURE.2008.07.011}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/PerezSARP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/DerisATM09, author = {Mustafa Mat Deris and Jemal H. Abawajy and David Taniar and Ali Mamat}, title = {Managing data using neighbour replication on a triangular-grid structure}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {6}, number = {1}, pages = {56--65}, year = {2009}, url = {https://doi.org/10.1504/IJHPCN.2009.026292}, doi = {10.1504/IJHPCN.2009.026292}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/DerisATM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/Abawajy09, author = {Jemal H. Abawajy}, title = {Advances in pervasive computing: {GUEST} {EDITORIAL}}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {5}, number = {1}, pages = {4--8}, year = {2009}, url = {https://doi.org/10.1108/17427370910950276}, doi = {10.1108/17427370910950276}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/Abawajy09a, author = {Jemal H. Abawajy}, title = {Human-computer interaction in ubiquitous computing environments}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {5}, number = {1}, pages = {61--77}, year = {2009}, url = {https://doi.org/10.1108/17427370910950311}, doi = {10.1108/17427370910950311}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/Abawajy09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Abawajy09, author = {Jemal H. Abawajy}, title = {Adaptive hierarchical scheduling policy for enterprise grid computing systems}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {3}, pages = {770--779}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.009}, doi = {10.1016/J.JNCA.2008.04.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZabirAAK09, author = {Salim Zabir and Jemal H. Abawajy and Farid Ahmed and Mohammad A. Karim}, title = {Guest Editorial}, journal = {J. Networks}, volume = {4}, number = {10}, pages = {929--930}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.10.929-930}, doi = {10.4304/JNW.4.10.929-930}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZabirAAK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/FernandoA09, author = {Harinda Fernando and Jemal H. Abawajy}, editor = {Gabriele Kotsis and David Taniar and Eric Pardede and Ismail Khalil}, title = {A {RFID} architecture framework for global supply chain applications}, booktitle = {iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia}, pages = {313--320}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1806338.1806396}, doi = {10.1145/1806338.1806396}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiwas/FernandoA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/JamiAS09, author = {Syed Imran Jami and Jemal H. Abawajy and Zubair Ahmed Shaikh}, title = {Information Provenance for Open Distributed Collaborative System}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {737--741}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.112}, doi = {10.1109/I-SPAN.2009.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/JamiAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/MahdinA09, author = {Hairulnizam Mahdin and Jemal H. Abawajy}, title = {An Approach to Filtering {RFID} Data Streams}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {742--746}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.124}, doi = {10.1109/I-SPAN.2009.124}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/MahdinA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/YildizAEB09, author = {Mehmet Yildiz and Jemal H. Abawajy and Tuncay Ercan and Andrew Bernoth}, title = {A Layered Security Approach for Cloud Computing Infrastructure}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {763--767}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.157}, doi = {10.1109/I-SPAN.2009.157}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispan/YildizAEB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/Abawajy09, author = {Jemal H. Abawajy}, title = {Determining Service Trustworthiness in Intercloud Computing Environments}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {784--788}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.155}, doi = {10.1109/I-SPAN.2009.155}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/IslamAW09, author = {Md. Rafiqul Islam and Jemal H. Abawajy and Matthew J. Warren}, title = {Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {789--793}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.142}, doi = {10.1109/I-SPAN.2009.142}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispan/IslamAW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Abawajy09, author = {Jemal H. Abawajy}, editor = {Yang Xiang and Javier L{\'{o}}pez and Haining Wang and Wanlei Zhou}, title = {Enhancing {RFID} Tag Resistance against Cloning Attack}, booktitle = {Third International Conference on Network and System Security, {NSS} 2009, Gold Coast, Queensland, Australia, October 19-21, 2009}, pages = {18--23}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NSS.2009.101}, doi = {10.1109/NSS.2009.101}, timestamp = {Thu, 15 Aug 2024 07:54:34 +0200}, biburl = {https://dblp.org/rec/conf/nss/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/Abawajy09, author = {Jemal H. Abawajy}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Design and Delivery of Undergraduate {IT} Security Management Course}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {402--411}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_41}, doi = {10.1007/978-3-642-02617-1\_41}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/Abawajy09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/JavadiAA08, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari}, title = {Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks}, journal = {Comput. Electr. Eng.}, volume = {34}, number = {6}, pages = {488--502}, year = {2008}, url = {https://doi.org/10.1016/j.compeleceng.2007.09.007}, doi = {10.1016/J.COMPELECENG.2007.09.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/JavadiAA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/JavadiAA08, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari}, title = {A comprehensive analytical model of interconnection networks in large-scale cluster systems}, journal = {Concurr. Comput. Pract. Exp.}, volume = {20}, number = {1}, pages = {75--97}, year = {2008}, url = {https://doi.org/10.1002/cpe.1222}, doi = {10.1002/CPE.1222}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/JavadiAA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/DerisAM08, author = {Mustafa Mat Deris and Jemal H. Abawajy and Ali Mamat}, title = {An efficient replicated data access approach for large-scale distributed systems}, journal = {Future Gener. Comput. Syst.}, volume = {24}, number = {1}, pages = {1--9}, year = {2008}, url = {https://doi.org/10.1016/j.future.2007.04.010}, doi = {10.1016/J.FUTURE.2007.04.010}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/DerisAM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcritis/Abawajy08, author = {Jemal H. Abawajy}, title = {Security and privacy threats to volunteer computing}, journal = {Int. J. Crit. Infrastructures}, volume = {4}, number = {3}, pages = {245--255}, year = {2008}, url = {https://doi.org/10.1504/IJCIS.2008.017439}, doi = {10.1504/IJCIS.2008.017439}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcritis/Abawajy08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/Abawajy08, author = {Jemal H. Abawajy}, title = {An Online Credential Management Service for InterGrid Computing}, booktitle = {Proceedings of the 3rd {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2008, Yilan, Taiwan, 9-12 December 2008}, pages = {101--106}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/APSCC.2008.74}, doi = {10.1109/APSCC.2008.74}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/Abawajy08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiwas/FudzeeA08, author = {Mohd Farhan Md Fudzee and Jemal H. Abawajy}, editor = {Gabriele Kotsis and David Taniar and Eric Pardede and Ismail Khalil Ibrahim}, title = {A classification for content adaptation system}, booktitle = {iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria}, pages = {426--429}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1497308.1497386}, doi = {10.1145/1497308.1497386}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iiwas/FudzeeA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JavadiAA07, author = {Bahman Javadi and Mohammad K. Akbari and Jemal H. Abawajy}, title = {Analytical communication networks model for enterprise Grid computing}, journal = {Future Gener. Comput. Syst.}, volume = {23}, number = {6}, pages = {737--747}, year = {2007}, url = {https://doi.org/10.1016/j.future.2006.11.002}, doi = {10.1016/J.FUTURE.2006.11.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/JavadiAA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/JavadiAA07, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari}, title = {Analytical modeling of interconnection networks in heterogeneous multi-cluster systems}, journal = {J. Supercomput.}, volume = {40}, number = {1}, pages = {29--47}, year = {2007}, url = {https://doi.org/10.1007/s11227-006-0011-6}, doi = {10.1007/S11227-006-0011-6}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/JavadiAA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/RahamanAH07, author = {Ahadur Rahaman and Jemal H. Abawajy and Michael Hobbs}, title = {Taxonomy and Survey of Location Management Systems}, booktitle = {6th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia}, pages = {369--374}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICIS.2007.176}, doi = {10.1109/ICIS.2007.176}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/RahamanAH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACISicis/ChongAD07, author = {Soon{-}Keow Chong and Jemal H. Abawajy and Robert A. Dew}, title = {A Multilevel Trust Management Framework}, booktitle = {6th Annual {IEEE/ACIS} International Conference on Computer and Information Science {(ICIS} 2007), 11-13 July 2007, Melbourne, Australia}, pages = {776--781}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICIS.2007.30}, doi = {10.1109/ICIS.2007.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACISicis/ChongAD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/JavadiAA07, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari}, editor = {Ljiljana Brankovic and Paul D. Coddington and John F. Roddick and Chris Steketee and James R. Warren and Andrew L. Wendelborn}, title = {Communication Network Analysis of the Enterprise Grid Systems}, booktitle = {{ACSW} Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) {(AISW} 2007), and the Australasian Workshop on Health Knowledge Management and Discovery {(HKMD} 2007). Proceedings, Ballarat, Victoria, Australia, January 30 - February 2, 2007}, series = {{CRPIT}}, volume = {68}, pages = {33--40}, publisher = {Australian Computer Society}, year = {2007}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV68Javadi.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/JavadiAA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipc/Al-NayadiA07, author = {Fahed Al{-}Nayadi and Jemal H. Abawajy}, title = {An Authorization Policy Management Framework for Dynamic Medical Data Sharing}, booktitle = {The 2007 International Conference on Intelligent Pervasive Computing, {IPC} 2007, Jeju Island, Korea, 11-13 October 2007}, pages = {313--318}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IPC.2007.118}, doi = {10.1109/IPC.2007.118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipc/Al-NayadiA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/AbawajyNA07, author = {Jemal H. Abawajy and Saeid Nahavandi and Fahed Al{-}Nayadi}, title = {Sensor Node Activity Scheduling Approach}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {72--77}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.190}, doi = {10.1109/MUE.2007.190}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/AbawajyNA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/Al-NaydiAD07, author = {Fahed Al{-}Nayadi and Jemal H. Abawajy and Mustafa Mat Deris}, title = {A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient Information among Autonomous Healthcare Providers}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {299--306}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.7}, doi = {10.1109/MUE.2007.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/Al-NaydiAD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/ChongA07, author = {Soon{-}Keow Chong and Jemal H. Abawajy}, title = {Feedback Credibility Issues In Trust Management Systems}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {387--394}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.130}, doi = {10.1109/MUE.2007.130}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/ChongA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Abawajy06, author = {Jemal H. Abawajy}, title = {Special section: Parallel input/output management techniques {(PIOMT)} in cluster and grid computing}, journal = {Future Gener. Comput. Syst.}, volume = {22}, number = {5}, pages = {600}, year = {2006}, url = {https://doi.org/10.1016/j.future.2005.09.002}, doi = {10.1016/J.FUTURE.2005.09.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Abawajy06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Abawajy06a, author = {Jemal H. Abawajy}, title = {Adaptive parallel {I/O} scheduling algorithm for multiprogrammed systems}, journal = {Future Gener. Comput. Syst.}, volume = {22}, number = {5}, pages = {611--619}, year = {2006}, url = {https://doi.org/10.1016/j.future.2005.09.008}, doi = {10.1016/J.FUTURE.2005.09.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Abawajy06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/AbawajyDO06, author = {Jemal H. Abawajy and Mustafa Mat Deris and M. Omar}, title = {A novel data replication and management protocol for mobile computing systems}, journal = {Mob. Inf. Syst.}, volume = {2}, number = {1}, pages = {3--19}, year = {2006}, url = {https://doi.org/10.1155/2006/930587}, doi = {10.1155/2006/930587}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/AbawajyDO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/JavadiAA06, author = {Bahman Javadi and Mohammad K. Akbari and Jemal H. Abawajy}, title = {A performance model for analysis of heterogeneous multi-cluster systems}, journal = {Parallel Comput.}, volume = {32}, number = {11-12}, pages = {831--851}, year = {2006}, url = {https://doi.org/10.1016/j.parco.2006.09.006}, doi = {10.1016/J.PARCO.2006.09.006}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/JavadiAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AbawajyD06, author = {Jemal H. Abawajy and Mustafa Mat Deris}, title = {Supporting Disconnected Operations in Mobile Computing}, booktitle = {2006 {IEEE/ACS} International Conference on Computer Systems and Applications {(AICCSA} 2006), March 8-11, Dubai/Sharjah, {UAE}}, pages = {911--918}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AICCSA.2006.205197}, doi = {10.1109/AICCSA.2006.205197}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AbawajyD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/Abawajy06, author = {Jemal H. Abawajy}, title = {Parallel {I/O} Scheduling in the Presence of Data Duplication on Multiprogrammed Cluster Computing Systems}, booktitle = {2006 {IEEE/ACS} International Conference on Computer Systems and Applications {(AICCSA} 2006), March 8-11, Dubai/Sharjah, {UAE}}, pages = {1118--1125}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AICCSA.2006.205228}, doi = {10.1109/AICCSA.2006.205228}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/Abawajy06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/JavadiAAN06, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari and Saeid Nahavandi}, title = {Analytical Network Modeling of Heterogeneous Large-Scale Cluster Systems}, booktitle = {Proceedings of the 2006 {IEEE} International Conference on Cluster Computing, September 25-28, 2006, Barcelona, Spain}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CLUSTR.2006.311902}, doi = {10.1109/CLUSTR.2006.311902}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/JavadiAAN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/LinAB06, author = {Henry Lin and Jemal H. Abawajy and Rajkumar Buyya}, title = {Economy-Based Data Replication Broker}, booktitle = {Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands}, pages = {90}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/E-SCIENCE.2006.261174}, doi = {10.1109/E-SCIENCE.2006.261174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eScience/LinAB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/AbawajyG06, author = {Jemal H. Abawajy and Andrzej M. Goscinski}, editor = {Vassil N. Alexandrov and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {A Reputation-Based Grid Information Service}, booktitle = {Computational Science - {ICCS} 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3994}, pages = {1015--1022}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11758549\_135}, doi = {10.1007/11758549\_135}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/AbawajyG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/MamatDAI06, author = {Ali Mamat and Mustafa Mat Deris and Jemal H. Abawajy and Suhaila Ismail}, editor = {Vassil N. Alexandrov and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Managing Data Using Neighbor Replication on Triangular-Grid Structure}, booktitle = {Computational Science - {ICCS} 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3994}, pages = {1071--1077}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11758549\_142}, doi = {10.1007/11758549\_142}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/MamatDAI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/JavadiAA06, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari}, title = {Analytical Modeling of Communication Latency in Multi-Cluster Systems}, booktitle = {12th International Conference on Parallel and Distributed Systems, {ICPADS} 2006, Minneapolis, Minnesota, USA, July 12-15, 2006}, pages = {9--14}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICPADS.2006.26}, doi = {10.1109/ICPADS.2006.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/JavadiAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/JavadiAAN06, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari and Saeid Nahavandi}, title = {Analysis of Interconnection Networks in Heterogeneous Multi-Cluster Systems}, booktitle = {2006 International Conference on Parallel Processing Workshops {(ICPP} Workshops 2006), 14-18 August 2006, Columbus, Ohio, {USA}}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICPPW.2006.24}, doi = {10.1109/ICPPW.2006.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/JavadiAAN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AbawajyH05, author = {Jemal H. Abawajy and Meng{-}Jye Hu}, title = {A new Internet meta-search engine and implementation}, booktitle = {2005 {ACS} / {IEEE} International Conference on Computer Systems and Applications {(AICCSA} 2005), January 3-6, 2005, Cairo, Egypt}, pages = {103}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AICCSA.2005.1387092}, doi = {10.1109/AICCSA.2005.1387092}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AbawajyH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/Abawajy05, author = {Jemal H. Abawajy}, editor = {Michael Hobbs and Andrzej M. Goscinski and Wanlei Zhou}, title = {Fault-Tolerant Dynamic Job Scheduling Policy}, booktitle = {Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3719}, pages = {165--173}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11564621\_19}, doi = {10.1007/11564621\_19}, timestamp = {Mon, 25 Apr 2022 12:52:22 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/Abawajy05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/Abawajy05a, author = {Jemal H. Abawajy}, editor = {Michael Hobbs and Andrzej M. Goscinski and Wanlei Zhou}, title = {Job Scheduling Policy for High Throughput Grid Computing}, booktitle = {Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3719}, pages = {184--192}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11564621\_21}, doi = {10.1007/11564621\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/Abawajy05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/JavadiAA05, author = {Bahman Javadi and Jemal H. Abawajy and Mohammad K. Akbari}, editor = {Vaidy S. Sunderam and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Performance Analysis of Interconnection Networks for Multi-cluster Systems}, booktitle = {Computational Science - {ICCS} 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3516}, pages = {205--212}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428862\_29}, doi = {10.1007/11428862\_29}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/JavadiAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Abawajy05, author = {Jemal H. Abawajy}, editor = {Vaidy S. Sunderam and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Autonomic Job Scheduling Policy for Grid Computing}, booktitle = {Computational Science - {ICCS} 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3516}, pages = {213--220}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428862\_30}, doi = {10.1007/11428862\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Abawajy05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/DerisAZM05, author = {Mustafa Mat Deris and Jemal H. Abawajy and M. Zarina and Rabiei Mamat}, editor = {Vaidy S. Sunderam and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {High Reliability Replication Technique for Web-Server Cluster Systems}, booktitle = {Computational Science - {ICCS} 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3516}, pages = {447--456}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428862\_61}, doi = {10.1007/11428862\_61}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/DerisAZM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Abawajy05a, author = {Jemal H. Abawajy}, editor = {Vaidy S. Sunderam and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {An Efficient Replicated Data Management Approach for Peer-to-Peer Systems}, booktitle = {Computational Science - {ICCS} 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3516}, pages = {457--463}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11428862\_62}, doi = {10.1007/11428862\_62}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Abawajy05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/DerisAO05, author = {Mustafa Mat Deris and Jemal H. Abawajy and M. Omar}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {A New Approach For Efficiently Achieving High Availability in Mobile Computing}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3482}, pages = {60--68}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424857\_7}, doi = {10.1007/11424857\_7}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/DerisAO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/Abawajy05, author = {Jemal H. Abawajy}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Robust Parallel Job Scheduling Infrastructure for Service-Oriented Grid Computing Systems}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {3483}, pages = {1272--1281}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424925\_132}, doi = {10.1007/11424925\_132}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/Abawajy05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/JavadiAA05, author = {Bahman Javadi and Mohammad K. Akbari and Jemal H. Abawajy}, title = {Performance Analysis of Heterogeneous Multi-Cluster Systems}, booktitle = {34th International Conference on Parallel Processing Workshops {(ICPP} 2005 Workshops), 14-17 June 2005, Oslo, Norway}, pages = {493--500}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICPPW.2005.70}, doi = {10.1109/ICPPW.2005.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/JavadiAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npsc/AbawajyD04, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, title = {Fault-tolerant Grid Resource Management Infrastructure}, journal = {Neural Parallel Sci. Comput.}, volume = {12}, number = {3}, pages = {289--306}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1093537}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npsc/AbawajyD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppl/Abawajy04, author = {Jemal H. Abawajy}, title = {Preemptive Job Scheduling Policy For Distributively-Owned Workstation Clusters}, journal = {Parallel Process. Lett.}, volume = {14}, number = {2}, pages = {255--270}, year = {2004}, url = {https://doi.org/10.1142/S0129626404001866}, doi = {10.1142/S0129626404001866}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppl/Abawajy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/DerisAS04, author = {Mustafa Mat Deris and Jemal H. Abawajy and H. M. Suzuri}, title = {An efficient replicated data access approach for large-scale distributed systems}, booktitle = {4th {IEEE/ACM} International Symposium on Cluster Computing and the Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}}, pages = {588--594}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CCGrid.2004.1336663}, doi = {10.1109/CCGRID.2004.1336663}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/DerisAS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/PerezSRPA04, author = {Mar{\'{\i}}a S. P{\'{e}}rez and Alberto S{\'{a}}nchez and V{\'{\i}}ctor Robles and Jos{\'{e}} M. Pe{\~{n}}a and Jemal H. Abawajy}, title = {Cooperation model of a multiagent parallel file system for clusters}, booktitle = {4th {IEEE/ACM} International Symposium on Cluster Computing and the Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}}, pages = {595--601}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CCGrid.2004.1336665}, doi = {10.1109/CCGRID.2004.1336665}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccgrid/PerezSRPA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Abawajy04, author = {Jemal H. Abawajy}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Dynamic Parallel Job Scheduling in Multi-cluster Computing Systems}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3036}, pages = {27--34}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24685-5\_4}, doi = {10.1007/978-3-540-24685-5\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Abawajy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Abawajy04a, author = {Jemal H. Abawajy}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {Placement of File Replicas in Data Grid Environments}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3038}, pages = {66--73}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24688-6\_11}, doi = {10.1007/978-3-540-24688-6\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Abawajy04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Abawajy04b, author = {Jemal H. Abawajy}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {File Replacement Algorithm for Storage Resource Managers in Data Grids}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3038}, pages = {339--346}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24688-6\_46}, doi = {10.1007/978-3-540-24688-6\_46}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Abawajy04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/PerezSARS04, author = {Mar{\'{\i}}a S. P{\'{e}}rez and Alberto S{\'{a}}nchez and Jemal H. Abawajy and V{\'{\i}}ctor Robles and Jos{\'{e}} M. Pe{\~{n}}a}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Design and Evaluation of an Agent-Based Communication Model for a Parallel File System}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3044}, pages = {87--96}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24709-8\_10}, doi = {10.1007/978-3-540-24709-8\_10}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/PerezSARS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/Abawajy04, author = {Jemal H. Abawajy}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Fault Detection Service Architecture for Grid Computing Systems}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3044}, pages = {107--115}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24709-8\_12}, doi = {10.1007/978-3-540-24709-8\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/Abawajy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/Abawajy04, author = {Jemal H. Abawajy}, title = {Fault-Tolerant Scheduling Policy for Grid Computing Systems}, booktitle = {18th International Parallel and Distributed Processing Symposium {(IPDPS} 2004), {CD-ROM} / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, {USA}}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IPDPS.2004.1303290}, doi = {10.1109/IPDPS.2004.1303290}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/Abawajy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcn/Abawajy04, author = {Jemal H. Abawajy}, editor = {M. H. Hamza}, title = {Grid accounting and payment architecture}, booktitle = {Proceedings of the {IASTED} International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Austria, February 17-19, 2004}, pages = {82--87}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Fri, 23 Mar 2007 19:28:53 +0100}, biburl = {https://dblp.org/rec/conf/pdcn/Abawajy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sag/Abawajy04, author = {Jemal H. Abawajy}, editor = {Pilar Herrero and Mar{\'{\i}}a S. P{\'{e}}rez and V{\'{\i}}ctor Robles}, title = {Grid Accounting Service Infrastructure for Service-Oriented Grid Computing Systems}, booktitle = {Scientific Applications of Grid Computing, First International Workshop, {SAG} 2004, Beijing, China, September 20-24, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3458}, pages = {168--175}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11423287\_15}, doi = {10.1007/11423287\_15}, timestamp = {Tue, 11 Apr 2023 12:52:01 +0200}, biburl = {https://dblp.org/rec/conf/sag/Abawajy04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCApdcs/AbawajyD03, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, editor = {Seong{-}Moo Yoo and Hee Yong Youn}, title = {A Unified Resource Scheduling Approach on Cluster Computing Systems}, booktitle = {Proceedings of the {ISCA} 16th International Conference on Parallel and Distributed Computing Systems, August 13-15, 2003, Atlantis Hotel, Reno, Nevada, {USA}}, pages = {43--48}, publisher = {{ISCA}}, year = {2003}, timestamp = {Mon, 09 Aug 2021 16:35:48 +0200}, biburl = {https://dblp.org/rec/conf/ISCApdcs/AbawajyD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/Abawajy03, author = {Jemal H. Abawajy}, title = {Performance Analysis of Parallel {I/O} Scheduling Approaches on Cluster Computing Systems}, booktitle = {3rd {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2003), 12-15 May 2003, Tokyo, Japan}, pages = {724--729}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CCGRID.2003.1199439}, doi = {10.1109/CCGRID.2003.1199439}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/Abawajy03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/AbawajyD03, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, title = {Parallel Job Scheduling on Multicluster Computing Systems}, booktitle = {2003 {IEEE} International Conference on Cluster Computing {(CLUSTER} 2003), 1-4 December 2003, Kowloon, Hong Kong, China}, pages = {11--18}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CLUSTR.2003.1253294}, doi = {10.1109/CLUSTR.2003.1253294}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/AbawajyD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/Abawajy03, author = {Jemal H. Abawajy}, editor = {Peter M. A. Sloot and David Abramson and Alexander V. Bogdanov and Jack J. Dongarra and Albert Y. Zomaya and Yuri E. Gorbachev}, title = {Parallel {I/O} Scheduling in Multiprogrammed Cluster Computing Systems}, booktitle = {Computational Science - {ICCS} 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {2660}, pages = {223--229}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44864-0\_23}, doi = {10.1007/3-540-44864-0\_23}, timestamp = {Tue, 20 Jun 2023 16:27:45 +0200}, biburl = {https://dblp.org/rec/conf/iccS/Abawajy03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/ImasakiA03, author = {Kenji Imasaki and Jemal H. Abawajy}, editor = {Peter M. A. Sloot and David Abramson and Alexander V. Bogdanov and Jack J. Dongarra and Albert Y. Zomaya and Yuri E. Gorbachev}, title = {An Adaptive Load Balancing Algorithm for Large Data Parallel Processing with Communication Delay}, booktitle = {Computational Science - {ICCS} 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {2660}, pages = {242--247}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44864-0\_25}, doi = {10.1007/3-540-44864-0\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccS/ImasakiA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/AbawajyD03, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, title = {Scheduling Parallel Jobs with {CPU} and {I/O} Resource Requirements in Cluster Computing Systems}, booktitle = {11th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS} 2003), 12-15 October 2003, Orlando, FL, {USA}}, pages = {336--343}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/MASCOT.2003.1240678}, doi = {10.1109/MASCOT.2003.1240678}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/AbawajyD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/AbawajyD03, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {A Reconfigurable Multi-Layered Grid Scheduling Infrastructure}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1}, pages = {138--144}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Fri, 05 Dec 2003 09:24:11 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/AbawajyD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/Abawajy02, author = {Jemal H. Abawajy}, title = {Job Scheduling Policy for High Throughput Computing Environments}, booktitle = {9th International Conference on Parallel and Distributed Systems, {ICPADS} 2002, Taiwan, ROC, December 17-20, 2002}, pages = {605--610}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICPADS.2002.1183466}, doi = {10.1109/ICPADS.2002.1183466}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/Abawajy02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/AbawajyD00, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, title = {Parallel Job Scheduling Policy for Workstation Cluster Environments}, booktitle = {2000 {IEEE} International Conference on Cluster Computing {(CLUSTER} 2000), November 28th - December 1st, 2000, Technische Universit{\"{a}}t Chemnitz, Saxony, Germany}, pages = {351--352}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.ieeecomputersociety.org/10.1109/CLUSTER.2000.10009}, doi = {10.1109/CLUSTER.2000.10009}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/AbawajyD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parelec/Abawajy00, author = {Jemal H. Abawajy}, title = {An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment}, booktitle = {2000 International Conference on Parallel Computing in Electrical Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada}, pages = {59--63}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/PCEE.2000.873602}, doi = {10.1109/PCEE.2000.873602}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/parelec/Abawajy00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parelec/AbawajyD00, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, title = {Distributed Hierarchical Workstation Cluster Co-Ordination Scheme}, booktitle = {2000 International Conference on Parallel Computing in Electrical Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada}, pages = {111--115}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/PCEE.2000.873612}, doi = {10.1109/PCEE.2000.873612}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/parelec/AbawajyD00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/parelec/AbawajyD00a, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, title = {Time/Space Sharing Distributed Job Scheduling Policy in a Workstation Cluster Environment}, booktitle = {2000 International Conference on Parallel Computing in Electrical Engineering {(PARELEC} 2000), 27-30 August 2000, Quebec, Canada}, pages = {116--120}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/PCEE.2000.873613}, doi = {10.1109/PCEE.2000.873613}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/parelec/AbawajyD00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/AbawajyD99, author = {Jemal H. Abawajy and Sivarama P. Dandamudi}, editor = {Hamid R. Arabnia}, title = {An Approach to Scheduling Parallel Applications on Networks of Workstations}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1999, June 28 - July 1, 1999, Las Vegas, Nevada, {USA}}, pages = {2580--2586}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Tue, 30 Jul 2024 10:34:32 +0200}, biburl = {https://dblp.org/rec/conf/pdpta/AbawajyD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/AbawajyS94, author = {Jemal H. Abawajy and Michael Shepherd}, title = {Framework for the design of coupled knowledge/data base medical information systems}, booktitle = {Seventh Annual {IEEE} Symposium on Computer-Based Medical Systems (CBMS'94), June 10-12, 1994, Winston-Salem, NC, {USA}}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/CBMS.1994.315975}, doi = {10.1109/CBMS.1994.315975}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/cbms/AbawajyS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/Abawajy93, author = {Djemal H. Abawajy}, title = {Orphan Problems and Remedies In Distributed Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {27}, number = {1}, pages = {27--32}, year = {1993}, url = {https://doi.org/10.1145/160551.160554}, doi = {10.1145/160551.160554}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/Abawajy93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.