


Остановите войну!
for scientists:


default search action
Jemal H. Abawajy
Djemal H. Abawajy
Person information

- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j168]Belal Abdullah Hezam Murshed
, Suresha Mallappa, Jemal H. Abawajy
, Mufeed Ahmed Naji Saif
, Hasib Daowd Esmail Al-Ariki
, Hudhaifa Mohammed Abdulwahab
:
Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis. Artif. Intell. Rev. 56(6): 5133-5260 (2023) - [j167]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
SDN enabled BDSP in public cloud for resource optimization. Wirel. Networks 29(3): 1031-1041 (2023) - 2022
- [j166]Belal Abdullah Hezam Murshed
, Jemal H. Abawajy
, Suresha Mallappa, Mufeed Ahmed Naji Saif
, Hasib Daowd Esmail Al-Ariki
:
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform. IEEE Access 10: 25857-25871 (2022) - [j165]Fera Tri Hartanti
, Jemal H. Abawajy
, Morshed U. Chowdhury
:
Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being. IEEE Access 10: 69106-69124 (2022) - [j164]Belal Abdullah Hezam Murshed
, Jemal H. Abawajy
, Suresha Mallappa, Mufeed Ahmed Naji Saif
, Sumaia Mohammed Al-Ghuribi
, Fahd A. Ghanem
:
Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling. IEEE Access 10: 105328-105351 (2022) - [j163]Aaisha Makkar
, Uttam Ghosh
, Danda B. Rawat
, Jemal H. Abawajy:
FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing. IEEE Consumer Electron. Mag. 11(2): 21-27 (2022) - [j162]Simar Preet Singh, Rajesh Kumar, Anju Sharma, Jemal H. Abawajy, Ravneet Kaur:
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing. Clust. Comput. 25(5): 3325-3342 (2022) - [j161]Habib Mostafaei
, Shafi Afridi
, Jemal H. Abawajy
:
Network-aware worker placement for wide-area streaming analytics. Future Gener. Comput. Syst. 136: 270-281 (2022) - [j160]Md. Rafiul Hassan
, Shamsul Huda, Mohammad Mehedi Hassan, Jemal H. Abawajy
, Ahmed Alsanad, Giancarlo Fortino:
Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion. Inf. Fusion 77: 70-80 (2022) - [j159]Shaila Sharmeen
, Shamsul Huda
, Jemal H. Abawajy
, Chuadhry Mujeeb Ahmed
, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches. IEEE Internet Things J. 9(10): 7298-7310 (2022) - [j158]Hongwu Qin, Yuntao Cheng, Xiuqin Ma, Fei Li, Jemal H. Abawajy:
Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8370-8379 (2022) - [j157]Sadoon Azizi
, Mohammad Shojafar
, Jemal H. Abawajy, Rajkumar Buyya:
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach. J. Netw. Comput. Appl. 201: 103333 (2022) - [j156]Sara Ghanavati
, Jemal H. Abawajy
, Davood Izadi
:
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing. IEEE Trans. Emerg. Top. Comput. 10(1): 488-499 (2022) - [j155]Xiuqin Ma
, Hongwu Qin
, Jemal H. Abawajy
:
Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making and Parameter Reduction. IEEE Trans. Fuzzy Syst. 30(2): 357-369 (2022) - [j154]Zhou Zhou
, Mohammad Shojafar
, Jemal H. Abawajy
, Hui Yin, Hongming Lu
:
ECMS: An Edge Intelligent Energy Efficient Model in Mobile Edge Computing. IEEE Trans. Green Commun. Netw. 6(1): 238-247 (2022) - [j153]Mohammad Shojafar
, Mithun Mukherjee
, Vincenzo Piuri
, Jemal H. Abawajy
:
Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications. IEEE Trans. Ind. Informatics 18(5): 3519-3521 (2022) - [j152]Zhou Zhou
, Jemal H. Abawajy
, Mohammad Shojafar
, Morshed U. Chowdhury
:
DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network. IEEE Trans. Ind. Informatics 18(7): 4944-4953 (2022) - [j151]Sara Ghanavati
, Jemal H. Abawajy
, Davood Izadi
:
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment. IEEE Trans. Serv. Comput. 15(4): 2007-2017 (2022) - [j150]Zhou Zhou
, Kenli Li
, Jemal H. Abawajy
, Mohammad Shojafar
, Morshed Uddin Chowdhury
, Fangmin Li
, Keqin Li
:
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters. IEEE Trans. Sustain. Comput. 7(2): 371-385 (2022) - [j149]Mohit Kumar
, Avadh Kishor
, Jemal H. Abawajy
, Prabal Agarwal
, Amritpal Singh, Albert Y. Zomaya
:
ARPS: An Autonomic Resource Provisioning and Scheduling Framework for Cloud Platforms. IEEE Trans. Sustain. Comput. 7(2): 386-399 (2022) - [e11]Rozaida Ghazali, Nazri Mohd Nawi, Mustafa Mat Deris, Jemal H. Abawajy, Nureize Arbaiy:
Recent Advances in Soft Computing and Data Mining - Proceedings of the Fifth International Conference on Soft Computing and Data Mining (SCDM 2022), May 30-31, 2022, Virtual Event. Lecture Notes in Networks and Systems 457, Springer 2022, ISBN 978-3-031-00827-6 [contents] - 2021
- [j148]Gohar Zaman
, Hairulnizam Mahdin
, Khalid Hussain, Atta-ur-Rahman
, Jemal H. Abawajy
, Salama A. Mostafa
:
An Ontological Framework for Information Extraction From Diverse Scientific Sources. IEEE Access 9: 42111-42124 (2021) - [j147]Abdul Basit Darem
, Fuad A. Ghaleb
, Asma Alhashmi
, Jemal H. Abawajy, Sultan M. Alanazi, Afrah Y. AL-Rezami:
An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning. IEEE Access 9: 97180-97196 (2021) - [j146]Shouki A. Ebad
, Abdul Basit Darem
, Jemal H. Abawajy:
Measuring Software Obfuscation Quality-A Systematic Literature Review. IEEE Access 9: 99024-99038 (2021) - [j145]Akhilesh Kumar Sharma
, Gaurav Aggarwal
, Sachit Bhardwaj
, Prasun Chakrabarti
, Tulika Chakrabarti, Jemal H. Abawajy
, Siddhartha Bhattacharyya
, Richa Mishra, Anirban Das, Hairulnizam Mahdin
:
Classification of Indian Classical Music With Time-Series Matching Deep Learning Approach. IEEE Access 9: 102041-102052 (2021) - [j144]Saiba Nazah
, Md. Shamsul Huda
, Jemal H. Abawajy
, Mohammad Mehedi Hassan
:
An Unsupervised Model for Identifying and Characterizing Dark Web Forums. IEEE Access 9: 112871-112892 (2021) - [j143]Haider Kassem
, Morshed U. Chowdhury
, Jemal H. Abawajy
:
Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information. IEEE Access 9: 121686-121697 (2021) - [j142]Fera Tri Hartanti
, Jemal H. Abawajy
, Morshed U. Chowdhury
, Wervyan Shalannanda
:
Citizens' Trust Measurement in Smart Government Services. IEEE Access 9: 150663-150676 (2021) - [j141]Lamyaa Al-Omairi
, Jemal H. Abawajy, Morshed U. Chowdhury, Tahsien Al-Quraishi:
An empirical analysis of graph-based linear dimensionality reduction techniques. Concurr. Comput. Pract. Exp. 33(5) (2021) - [j140]Abdul Basit Darem
, Jemal H. Abawajy, Aaisha Makkar
, Asma Alhashmi
, Sultan M. Alanazi:
Visualization and deep-learning-based malware variant detection using OpCode-level features. Future Gener. Comput. Syst. 125: 314-323 (2021) - [j139]Fuyuan Xiao, Masayoshi Aritsugi, Jemal H. Abawajy, Zehong Cao
, Rami Al-Hmouz, Peide Liu:
Editorial on Special Issue: "Applications of Intelligent and Fuzzy Theory in Data Science". Int. J. Fuzzy Syst. 23(2): 492-493 (2021) - [j138]Zheng Xu, Jemal H. Abawajy:
Editorial: Special issue on neural computing and applications in cyber intelligence: ATCI 2020. Neural Comput. Appl. 33(3): 805-806 (2021) - [j137]Prince
, Ananda Shankar Hati
, Prasun Chakrabarti, Jemal H. Abawajy, Ng Wee Keong:
Development of energy efficient drive for ventilation system using recurrent neural network. Neural Comput. Appl. 33(14): 8659-8668 (2021) - [j136]Jemal H. Abawajy
, Abdul Basit Darem
, Asma Alhashmi
:
Feature Subset Selection for Malware Detection in Smart IoT Platforms. Sensors 21(4): 1374 (2021) - [j135]Sadoon Azizi
, Mohammad Shojafar
, Jemal H. Abawajy, Rajkumar Buyya
:
GRVMP: A Greedy Randomized Algorithm for Virtual Machine Placement in Cloud Data Centers. IEEE Syst. J. 15(2): 2571-2582 (2021) - [j134]Zhou Zhou
, Mohammad Shojafar
, Mamoun Alazab
, Jemal H. Abawajy, Fangmin Li
:
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center. IEEE Trans. Green Commun. Netw. 5(2): 658-669 (2021) - [j133]Zhou Zhou
, Mohammad Shojafar
, Jemal H. Abawajy
, Ali Kashif Bashir
:
IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network. IEEE Trans. Green Commun. Netw. 5(4): 1747-1760 (2021) - [j132]Mohammad Mehedi Hassan
, Md. Shamsul Huda
, Shaila Sharmeen
, Jemal H. Abawajy, Giancarlo Fortino
:
An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model. IEEE Trans. Ind. Informatics 17(4): 2860-2870 (2021) - [c129]Habib Mostafaei
, Shafi Afridi, Jemal H. Abawajy:
SNR: Network-aware Geo-Distributed Stream Analytics. CCGRID 2021: 820-827 - [e10]Jemal H. Abawajy, Kim-Kwang Raymond Choo
, Zheng Xu, Mohammed Atiquzzaman:
2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence (ATCI 2020), Fuyang, China, 20-22 June, 2020. Advances in Intelligent Systems and Computing 1244, Springer 2021, ISBN 978-3-030-53979-5 [contents] - [e9]Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang:
2021 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1, Fuyang, China, 9-21 June, 2021. Advances in Intelligent Systems and Computing 1398, Springer 2021, ISBN 978-3-030-79199-5 [contents] - [e8]Debasis Giri, Rajkumar Buyya, S. Ponnusamy, Debashis De, Andrew Adamatzky, Jemal H. Abawajy:
Proceedings of the Sixth International Conference on Mathematics and Computing - ICMC 2020, Gangtok, Sikkim, India, September 2020. Advances in Intelligent Systems and Computing 1262, Springer 2021, ISBN 978-981-15-8060-4 [contents] - 2020
- [j131]Shanshan Li
, Fuyuan Xiao
, Jemal H. Abawajy
:
Conflict Management of Evidence Theory Based on Belief Entropy and Negation. IEEE Access 8: 37766-37774 (2020) - [j130]Zhou Zhou
, Fangmin Li
, Jemal H. Abawajy
, Chaochao Gao:
Improved PSO Algorithm Integrated With Opposition-Based Learning and Tentative Perception in Networked Data Centres. IEEE Access 8: 55872-55880 (2020) - [j129]Saiba Nazah
, Md. Shamsul Huda
, Jemal H. Abawajy, Mohammad Mehedi Hassan
:
Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach. IEEE Access 8: 171796-171819 (2020) - [j128]Shaila Sharmeen, Md. Shamsul Huda, Jemal H. Abawajy, Mohammad Mehedi Hassan
:
An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl. Soft Comput. 89: 106089 (2020) - [j127]Fatsuma Jauro, Haruna Chiroma
, Abdulsalam Ya'u Gital
, Mubarak Almutairi
, Shafii Muhammad Abdulhamid
, Jemal H. Abawajy:
Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend. Appl. Soft Comput. 96: 106582 (2020) - [j126]Deden Witarsyah Jacob, Mohd Farhan Md Fudzee
, Mohamad Aizi Salamat, Iwan Tri Riyadi Yanto, Jemal H. Abawajy:
Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset. Int. J. Data Warehous. Min. 16(1): 39-62 (2020) - [j125]Zhou Zhou
, Fangmin Li, Huaxi Zhu, Houliang Xie, Jemal H. Abawajy, Morshed U. Chowdhury:
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments. Neural Comput. Appl. 32(6): 1531-1541 (2020) - [j124]Zheng Xu, Jemal H. Abawajy:
Special issue on Neural Computing and Applications in cyber intelligence: ATCI 2019. Neural Comput. Appl. 32(10): 5313-5314 (2020) - [j123]Jemal H. Abawajy
, Morshed U. Chowdhury, Andrei Kelarev:
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection. IEEE Trans. Cloud Comput. 8(2): 398-407 (2020) - [j122]Morshed U. Chowdhury, Jemal H. Abawajy
, Andrei Kelarev
, Herbert F. Jelinek:
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services. IEEE Trans. Cloud Comput. 8(2): 473-483 (2020) - [j121]Mohammad Shojafar
, Claudia Canali
, Riccardo Lancellotti
, Jemal H. Abawajy
:
Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems. IEEE Trans. Cloud Comput. 8(4): 1162-1175 (2020) - [c128]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed Uddin Chowdhury:
Utility-Aware Graph Dimensionality Reduction Approach. CATA 2020: 327-333 - [c127]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy, Ahmed Raad Al-Sudani:
Yawn Based Driver Fatigue Level Prediction. CATA 2020: 372-382 - [c126]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP. CCGRID 2020: 827-835 - [e7]Rozaida Ghazali, Nazri Mohd Nawi, Mustafa Mat Deris, Jemal H. Abawajy:
Recent Advances on Soft Computing and Data Mining - Proceedings of the Fourth International Conference on Soft Computing and Data Mining (SCDM 2020), Melaka, Malaysia, January 22-23, 2020. Advances in Intelligent Systems and Computing 978, Springer 2020, ISBN 978-3-030-36055-9 [contents]
2010 – 2019
- 2019
- [j120]Khalid Haruna
, Maizatul Akmar Ismail
, Mohammad Suyanto, Lubna Abdel Kareim Gabralla, Abdullahi Baffa Bichi, Sani Danjuma
, Habeebah Adamu Kakudi, Muhammad Sani Haruna, Saber Zerdoumi
, Jemal H. Abawajy, Tutut Herawan
:
A Soft Set Approach for Handling Conflict Situation on Movie Selection. IEEE Access 7: 116179-116194 (2019) - [j119]Balsam Alkouz, Zaher Al Aghbari, Jemal H. Abawajy:
Tweetluenza: Predicting flu trends from twitter data. Big Data Min. Anal. 2(4): 273-287 (2019) - [j118]Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan
, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101: 1247-1258 (2019) - [j117]Banafsj Khalifa, Ahmed Khedr, Zaher Al Aghbari, Jemal H. Abawajy:
Fuzzy logic approach to repair coverage holes in internet of things monitoring applications. IET Wirel. Sens. Syst. 9(4): 227-235 (2019) - [j116]Kim-Kwang Raymond Choo
, Jemal H. Abawajy, Md. Rafiqul Islam:
Special issue on cybersecurity in the critical infrastructure: Advances and future directions. J. Comput. Syst. Sci. 102: 40-41 (2019) - [j115]Vijayakumar Varadharajan, V. Subramaniyaswamy
, Jemal H. Abawajy, Longzhi Yang
:
Intelligent, smart and scalable cyber-physical systems. J. Intell. Fuzzy Syst. 36(5): 3935-3943 (2019) - [j114]Fuyuan Xiao, Zili Zhang, Jemal H. Abawajy:
Workflow scheduling in distributed systems under fuzzy environment. J. Intell. Fuzzy Syst. 37(4): 5323-5333 (2019) - [j113]Mohammad Mehedi Hassan, Jemal H. Abawajy, Min Chen, Meikang Qiu, Sheng Chen
:
Special Section on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends. J. Parallel Distributed Comput. 133: 170-173 (2019) - [j112]Addisalem Genta, D. K. Lobiyal, Jemal H. Abawajy:
Energy Efficient Multipath Routing Algorithm for Wireless Multimedia Sensor Network. Sensors 19(17): 3642 (2019) - [j111]Jemal H. Abawajy
, Andrei Kelarev
:
Iterative Classifier Fusion System for the Detection of Android Malware. IEEE Trans. Big Data 5(3): 282-292 (2019) - [c125]Tahsien Al-Quraishi, Jemal H. Abawajy, Naseer Al-Quraishi, Ahmad Abdalrada, Lamyaa Al-Omairi:
Predicting Breast Cancer Risk Using Subset of Genes. CoDIT 2019: 1379-1384 - [e6]Jemal H. Abawajy, Mohamed Othman, Rozaida Ghazali, Mustafa Mat Deris, Hairulnizam Mahdin, Tutut Herawan:
Proceedings of the Second International Conference on Advanced Data and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26, 2015. Lecture Notes in Electrical Engineering 520, Springer 2019, ISBN 978-981-13-1797-2 [contents] - 2018
- [j110]Md. Shamsul Huda
, Sultan Alyahya
, Md. Mohsin Ali
, Shafiq Ahmad
, Jemal H. Abawajy, Hmood Al-Dossari, John Yearwood:
A Framework for Software Defect Prediction and Metric Selection. IEEE Access 6: 2844-2858 (2018) - [j109]Shaila Sharmeen, Md. Shamsul Huda
, Jemal H. Abawajy, Walaa N. Ismail, Mohammad Mehedi Hassan
:
Malware Threats and Detection for Industrial Mobile-IoT Networks. IEEE Access 6: 15941-15957 (2018) - [j108]Zhou Zhou
, Jemal H. Abawajy
, Fangmin Li
, Zhigang Hu, Morshed U. Chowdhury
, Abdulhameed Alelaiwi, Keqin Li:
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center. IEEE Access 6: 27080-27090 (2018) - [j107]Jemal H. Abawajy, Andrei V. Kelarev, Xun Yi, Herbert F. Jelinek
:
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN. Comput. Methods Programs Biomed. 160: 85-94 (2018) - [j106]Biplob R. Ray
, Jemal H. Abawajy, Morshed U. Chowdhury
, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 78: 838-849 (2018) - [j105]Md. Shamsul Huda, Md. Rafiqul Islam
, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener. Comput. Syst. 83: 193-207 (2018) - [j104]Zhou Zhou
, Jemal H. Abawajy, Morshed U. Chowdhury
, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li
:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. Future Gener. Comput. Syst. 86: 836-850 (2018) - [j103]Jemal H. Abawajy, Md. Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan
, Ahmad Almogren
:
Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Gener. Comput. Syst. 89: 525-538 (2018) - [j102]Mahmood Javadi, Habib Mostafaei
, Morshed U. Chowdhury, Jemal H. Abawajy:
Learning automaton based topology control protocol for extending wireless sensor networks lifetime. J. Netw. Comput. Appl. 122: 128-136 (2018) - [j101]Shaobo Zhang
, Guojun Wang, Qin Liu, Jemal H. Abawajy:
A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18): 6121-6133 (2018) - [j100]Raja Al-Jaljouli, Jemal H. Abawajy, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce. IEEE Trans. Serv. Comput. 11(2): 415-429 (2018) - [c124]Xin Li, Liangyuan Wang, Jemal H. Abawajy, Xiaolin Qin:
Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers. ICA3PP (2) 2018: 630-644 - [c123]Xin Li, Zhen Lian, Xiaolin Qin, Jemal H. Abawajy:
Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 816-823 - [c122]Ahmad Shaker Abdalrada, Jemal H. Abawajy, Morshed U. Chowdhury
, Sutharshan Rajasegarar
, Tahsien Al-Quraishi, Herbert F. Jelinek
:
Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population. SCDM 2018: 135-146 - [c121]Tahsien Al-Quraishi, Jemal H. Abawajy, Morshed U. Chowdhury
, Sutharshan Rajasegarar, Ahmad Shaker Abdalrada:
Breast Cancer Recurrence Prediction Using Random Forest Model. SCDM 2018: 318-329 - [e5]Rozaida Ghazali, Mustafa Mat Deris, Nazri Mohd Nawi, Jemal H. Abawajy:
Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, February 06-07, 2018. Advances in Intelligent Systems and Computing 700, Springer 2018, ISBN 978-3-319-72549-9 [contents] - 2017
- [j99]Haruna Chiroma
, Nor Liyana Mohd Shuib
, Adamu I. Abubakar, Akram M. Zeki
, Abdulsalam Ya'u Gital
, Tutut Herawan
, Jemal H. Abawajy:
Advances in Teaching and Learning on Facebook in Higher Institutions. IEEE Access 5: 480-500 (2017) - [j98]Enzo Baccarelli, Paola Gabriela Vinueza Naranjo
, Michele Scarpiniti, Mohammad Shojafar
, Jemal H. Abawajy:
Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study. IEEE Access 5: 9882-9910 (2017) - [j97]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi, Abdulhameed Alelaiwi:
Cloud-assisted IoT-based health status monitoring framework. Clust. Comput. 20(2): 1843-1853 (2017) - [j96]Md. Mohsin Ali
, Md. Shamsul Huda, Jemal H. Abawajy, Sultan Alyahya
, Hmood Al-Dossari, John Yearwood:
A parallel framework for software defect detection and metric selection on cloud computing. Clust. Comput. 20(3): 2267-2281 (2017) - [j95]Jemal H. Abawajy, Mohammad Mehedi Hassan:
Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System. IEEE Commun. Mag. 55(1): 48-53 (2017) - [j94]Jemal H. Abawajy
, Md. Rafiqul Islam:
Applications and techniques in information and network security. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j93]Morshed U. Chowdhury
, Jemal H. Abawajy, Andrei V. Kelarev, T. Hochin:
Multilayer hybrid strategy for phishing email zero-day filtering. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j92]Md. Shamsul Huda
, Jemal H. Abawajy, Mali Abdollahian
, Md. Rafiqul Islam, John Yearwood:
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j91]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [j90]Baker Alrubaiey, Jemal H. Abawajy:
Virtual networks dependability assessment framework. Int. J. High Perform. Comput. Netw. 10(1/2): 3-12 (2017) - [j89]Kim-Kwang Raymond Choo
, Jemal H. Abawajy, Md. Rafiqul Islam:
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. J. Comput. Syst. Sci. 83(1): 1-2 (2017) - [j88]Nasser R. Sabar
, Jemal H. Abawajy, John Yearwood:
Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution Algorithm for Big Data Optimization Problems. IEEE Trans. Evol. Comput. 21(2): 315-327 (2017) - [c120]Jie Wang, Lili Yang, Jie Wu, Jemal H. Abawajy:
Clustering analysis for malicious network traffic. ICC 2017: 1-6 - [c119]Jemal H. Abawajy, A. Richard, Zaher Al Aghbari:
Securing Websites Against Homograph Attacks. ATCS/SePrIoT@SecureComm 2017: 47-59 - [c118]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem
, Asma Alhashmi
:
Privacy Threat Analysis of Mobile Social Network Data Publishing. ATCS/SePrIoT@SecureComm 2017: 60-68 - 2016
- [j87]Davood Izadi, Sara Ghanavati, Jemal H. Abawajy, Tutut Herawan
:
An alternative data collection scheduling scheme in wireless sensor networks. Computing 98(12): 1287-1304 (2016) - [j86]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan
:
Privacy Preserving Social Network Data Publication. IEEE Commun. Surv. Tutorials 18(3): 1974-1997 (2016) - [j85]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan
:
Vertex re-identification attack using neighbourhood-pair properties. Concurr. Comput. Pract. Exp. 28(10): 2906-2919 (2016) - [j84]Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. Future Gener. Comput. Syst. 55: 224-226 (2016) - [j83]Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab
, Mali Abdollahian
, Md. Rafiqul Islam, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55: 376-390 (2016) - [j82]Nancy Victor, Daphne Lopez, Jemal H. Abawajy:
Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1): 61-75 (2016) - [j81]M. Anwar Hossain
, Jemal H. Abawajy, Raúl García-Castro, Wen-Huang Cheng, Dewan Tanvir Ahmed:
Sensor-Web Systems, Applications, and Services. Int. J. Distributed Sens. Networks 12(4): 5349568:1-5349568:2 (2016) - [j80]