
Jemal H. Abawajy
Person information
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j129]Shanshan Li
, Fuyuan Xiao
, Jemal H. Abawajy
:
Conflict Management of Evidence Theory Based on Belief Entropy and Negation. IEEE Access 8: 37766-37774 (2020) - [j128]Zhou Zhou, Fangmin Li
, Jemal H. Abawajy
, Chaochao Gao:
Improved PSO Algorithm Integrated With Opposition-Based Learning and Tentative Perception in Networked Data Centres. IEEE Access 8: 55872-55880 (2020) - [j127]Shaila Sharmeen, Md. Shamsul Huda, Jemal H. Abawajy, Mohammad Mehedi Hassan
:
An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl. Soft Comput. 89: 106089 (2020) - [j126]Fatsuma Jauro, Haruna Chiroma
, Abdulsalam Ya'u Gital, Mubarak Almutairi, Shafii Muhammad Abdulhamid
, Jemal H. Abawajy:
Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend. Appl. Soft Comput. 96: 106582 (2020) - [j125]Deden Witarsyah Jacob, Mohd Farhan Md Fudzee, Mohamad Aizi Salamat, Iwan Tri Riyadi Yanto, Jemal H. Abawajy:
Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset. Int. J. Data Warehous. Min. 16(1): 39-62 (2020) - [j124]Zhou Zhou, Fangmin Li, Huaxi Zhu, Houliang Xie, Jemal H. Abawajy, Morshed U. Chowdhury:
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments. Neural Comput. Appl. 32(6): 1531-1541 (2020) - [j123]Zheng Xu, Jemal H. Abawajy:
Special issue on Neural Computing and Applications in cyber intelligence: ATCI 2019. Neural Comput. Appl. 32(10): 5313-5314 (2020) - [j122]Jemal H. Abawajy
, Morshed U. Chowdhury, Andrei Kelarev:
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection. IEEE Trans. Cloud Comput. 8(2): 398-407 (2020) - [j121]Morshed U. Chowdhury, Jemal H. Abawajy
, Andrei Kelarev
, Herbert F. Jelinek:
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services. IEEE Trans. Cloud Comput. 8(2): 473-483 (2020) - [j120]Mohammad Shojafar
, Claudia Canali
, Riccardo Lancellotti
, Jemal H. Abawajy
:
Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems. IEEE Trans. Cloud Comput. 8(4): 1162-1175 (2020) - [c125]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed Uddin Chowdhury:
Utility-Aware Graph Dimensionality Reduction Approach. CATA 2020: 327-333 - [c124]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy, Ahmed Raad Al-Sudani:
Yawn Based Driver Fatigue Level Prediction. CATA 2020: 372-382 - [e7]Rozaida Ghazali, Nazri Mohd Nawi, Mustafa Mat Deris, Jemal H. Abawajy:
Recent Advances on Soft Computing and Data Mining - Proceedings of the Fourth International Conference on Soft Computing and Data Mining (SCDM 2020), Melaka, Malaysia, January 22-23, 2020. Advances in Intelligent Systems and Computing 978, Springer 2020, ISBN 978-3-030-36055-9 [contents]
2010 – 2019
- 2019
- [j119]Khalid Haruna
, Maizatul Akmar Ismail, Mohammad Suyanto, Lubna A. Gabralla, Abdullahi Baffa Bichi, Sani Danjuma
, Habeebah Adamu Kakudi, Muhammad Sani Haruna, Saber Zerdoumi
, Jemal H. Abawajy, Tutut Herawan
:
A Soft Set Approach for Handling Conflict Situation on Movie Selection. IEEE Access 7: 116179-116194 (2019) - [j118]Balsam Alkouz, Zaher Al Aghbari, Jemal H. Abawajy:
Tweetluenza: Predicting flu trends from twitter data. Big Data Min. Anal. 2(4): 273-287 (2019) - [j117]Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan
, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101: 1247-1258 (2019) - [j116]Banafsj Khalifa, Ahmed Khedr, Zaher Al Aghbari, Jemal H. Abawajy:
Fuzzy logic approach to repair coverage holes in internet of things monitoring applications. IET Wirel. Sens. Syst. 9(4): 227-235 (2019) - [j115]Kim-Kwang Raymond Choo
, Jemal H. Abawajy, Md. Rafiqul Islam:
Special issue on cybersecurity in the critical infrastructure: Advances and future directions. J. Comput. Syst. Sci. 102: 40-41 (2019) - [j114]Vijayakumar Varadharajan, V. Subramaniyaswamy
, Jemal H. Abawajy, Longzhi Yang
:
Intelligent, smart and scalable cyber-physical systems. J. Intell. Fuzzy Syst. 36(5): 3935-3943 (2019) - [j113]Fuyuan Xiao, Zili Zhang, Jemal H. Abawajy:
Workflow scheduling in distributed systems under fuzzy environment. J. Intell. Fuzzy Syst. 37(4): 5323-5333 (2019) - [j112]Mohammad Mehedi Hassan, Jemal H. Abawajy, Min Chen, Meikang Qiu, Sheng Chen:
Special Section on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends. J. Parallel Distributed Comput. 133: 170-173 (2019) - [j111]Addisalem Genta, D. K. Lobiyal, Jemal H. Abawajy:
Energy Efficient Multipath Routing Algorithm for Wireless Multimedia Sensor Network. Sensors 19(17): 3642 (2019) - [j110]Jemal H. Abawajy
, Andrei Kelarev
:
Iterative Classifier Fusion System for the Detection of Android Malware. IEEE Trans. Big Data 5(3): 282-292 (2019) - [c123]Tahsien Al-Quraishi, Jemal H. Abawajy, Naseer Al-Quraishi, Ahmad Abdalrada, Lamyaa Al-Omairi:
Predicting Breast Cancer Risk Using Subset of Genes. CoDIT 2019: 1379-1384 - [e6]Jemal H. Abawajy, Mohamed Othman, Rozaida Ghazali, Mustafa Mat Deris, Hairulnizam Mahdin, Tutut Herawan:
Proceedings of the Second International Conference on Advanced Data and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26, 2015. Lecture Notes in Electrical Engineering 520, Springer 2019, ISBN 978-981-13-1797-2 [contents] - 2018
- [j109]Md. Shamsul Huda
, Sultan Alyahya
, Md. Mohsin Ali
, Shafiq Ahmad
, Jemal H. Abawajy, Hmood Al-Dossari, John Yearwood:
A Framework for Software Defect Prediction and Metric Selection. IEEE Access 6: 2844-2858 (2018) - [j108]Shaila Sharmeen, Md. Shamsul Huda
, Jemal H. Abawajy, Walaa N. Ismail, Mohammad Mehedi Hassan
:
Malware Threats and Detection for Industrial Mobile-IoT Networks. IEEE Access 6: 15941-15957 (2018) - [j107]Zhou Zhou, Jemal H. Abawajy
, Fangmin Li
, Zhigang Hu, Morshed U. Chowdhury
, Abdulhameed Alelaiwi, Keqin Li:
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center. IEEE Access 6: 27080-27090 (2018) - [j106]Jemal H. Abawajy, Andrei V. Kelarev, Xun Yi, Herbert F. Jelinek
:
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN. Comput. Methods Programs Biomed. 160: 85-94 (2018) - [j105]Biplob R. Ray
, Jemal H. Abawajy, Morshed U. Chowdhury
, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 78: 838-849 (2018) - [j104]Md. Shamsul Huda, Md. Rafiqul Islam, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan
, Giancarlo Fortino
:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener. Comput. Syst. 83: 193-207 (2018) - [j103]Zhou Zhou, Jemal H. Abawajy, Morshed U. Chowdhury
, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li
:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. Future Gener. Comput. Syst. 86: 836-850 (2018) - [j102]Jemal H. Abawajy, Md. Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan
, Ahmad Almogren:
Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Gener. Comput. Syst. 89: 525-538 (2018) - [j101]Mahmood Javadi, Habib Mostafaei
, Morshed U. Chowdhury, Jemal H. Abawajy:
Learning automaton based topology control protocol for extending wireless sensor networks lifetime. J. Netw. Comput. Appl. 122: 128-136 (2018) - [j100]Shaobo Zhang, Guojun Wang, Qin Liu, Jemal H. Abawajy:
A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18): 6121-6133 (2018) - [j99]Raja Al-Jaljouli, Jemal H. Abawajy, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce. IEEE Trans. Serv. Comput. 11(2): 415-429 (2018) - [c122]Xin Li, Liangyuan Wang, Jemal H. Abawajy, Xiaolin Qin:
Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers. ICA3PP (2) 2018: 630-644 - [c121]Xin Li, Zhen Lian, Xiaolin Qin, Jemal H. Abawajy:
Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 816-823 - [c120]Ahmad Shaker Abdalrada, Jemal H. Abawajy, Morshed U. Chowdhury
, Sutharshan Rajasegarar
, Tahsien Al-Quraishi, Herbert F. Jelinek
:
Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population. SCDM 2018: 135-146 - [c119]Tahsien Al-Quraishi, Jemal H. Abawajy, Morshed U. Chowdhury
, Sutharshan Rajasegarar, Ahmad Shaker Abdalrada:
Breast Cancer Recurrence Prediction Using Random Forest Model. SCDM 2018: 318-329 - [e5]Rozaida Ghazali, Mustafa Mat Deris, Nazri Mohd Nawi, Jemal H. Abawajy:
Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, February 06-07, 2018. Advances in Intelligent Systems and Computing 700, Springer 2018, ISBN 978-3-319-72549-9 [contents] - 2017
- [j98]Haruna Chiroma
, Nor Liyana Mohd Shuib
, Adamu I. Abubakar, Akram M. Zeki, Abdulsalam Ya'u Gital, Tutut Herawan
, Jemal H. Abawajy:
Advances in Teaching and Learning on Facebook in Higher Institutions. IEEE Access 5: 480-500 (2017) - [j97]Enzo Baccarelli, Paola Gabriela Vinueza Naranjo
, Michele Scarpiniti, Mohammad Shojafar
, Jemal H. Abawajy:
Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study. IEEE Access 5: 9882-9910 (2017) - [j96]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi, Abdulhameed Alelaiwi:
Cloud-assisted IoT-based health status monitoring framework. Clust. Comput. 20(2): 1843-1853 (2017) - [j95]Md. Mohsin Ali
, Md. Shamsul Huda, Jemal H. Abawajy, Sultan Alyahya
, Hmood Al-Dossari, John Yearwood:
A parallel framework for software defect detection and metric selection on cloud computing. Clust. Comput. 20(3): 2267-2281 (2017) - [j94]Jemal H. Abawajy, Mohammad Mehedi Hassan:
Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System. IEEE Commun. Mag. 55(1): 48-53 (2017) - [j93]Jemal H. Abawajy
, Md. Rafiqul Islam:
Applications and techniques in information and network security. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j92]Morshed U. Chowdhury
, Jemal H. Abawajy, Andrei V. Kelarev, T. Hochin:
Multilayer hybrid strategy for phishing email zero-day filtering. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j91]Md. Shamsul Huda
, Jemal H. Abawajy, Mali Abdollahian
, Md. Rafiqul Islam, John Yearwood:
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j90]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [j89]Baker Alrubaiey, Jemal H. Abawajy:
Virtual networks dependability assessment framework. Int. J. High Perform. Comput. Netw. 10(1/2): 3-12 (2017) - [j88]Kim-Kwang Raymond Choo
, Jemal H. Abawajy, Md. Rafiqul Islam:
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. J. Comput. Syst. Sci. 83(1): 1-2 (2017) - [j87]Nasser R. Sabar
, Jemal H. Abawajy, John Yearwood:
Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution Algorithm for Big Data Optimization Problems. IEEE Trans. Evol. Comput. 21(2): 315-327 (2017) - [c118]Jie Wang, Lili Yang, Jie Wu, Jemal H. Abawajy:
Clustering analysis for malicious network traffic. ICC 2017: 1-6 - [c117]Jemal H. Abawajy, A. Richard, Zaher Al Aghbari:
Securing Websites Against Homograph Attacks. ATCS/SePrIoT@SecureComm 2017: 47-59 - [c116]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem, Asma Alhashmi:
Privacy Threat Analysis of Mobile Social Network Data Publishing. ATCS/SePrIoT@SecureComm 2017: 60-68 - 2016
- [j86]Davood Izadi, Sara Ghanavati, Jemal H. Abawajy, Tutut Herawan:
An alternative data collection scheduling scheme in wireless sensor networks. Computing 98(12): 1287-1304 (2016) - [j85]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan:
Privacy Preserving Social Network Data Publication. IEEE Commun. Surv. Tutorials 18(3): 1974-1997 (2016) - [j84]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan:
Vertex re-identification attack using neighbourhood-pair properties. Concurr. Comput. Pract. Exp. 28(10): 2906-2919 (2016) - [j83]Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. Future Gener. Comput. Syst. 55: 224-226 (2016) - [j82]Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab
, Mali Abdollahian
, Md. Rafiqul Islam, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55: 376-390 (2016) - [j81]Nancy Victor, Daphne Lopez, Jemal H. Abawajy:
Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1): 61-75 (2016) - [j80]M. Anwar Hossain
, Jemal H. Abawajy, Raúl García-Castro, Wen-Huang Cheng, Dewan Tanvir Ahmed:
Sensor-Web Systems, Applications, and Services. Int. J. Distributed Sens. Networks 12(4): 5349568:1-5349568:2 (2016) - [j79]Biplob R. Ray
, Morshed U. Chowdhury
, Jemal H. Abawajy:
Secure Object Tracking Protocol for the Internet of Things. IEEE Internet Things J. 3(4): 544-553 (2016) - [j78]Jemal H. Abawajy, Albert Y. Zomaya
, Ivan Stojmenovic:
Network computing and applications for Big Data analytics. J. Netw. Comput. Appl. 59: 361 (2016) - [j77]Maumita Bhattacharya
, Md. Rafiqul Islam, Jemal H. Abawajy:
Evolutionary optimization: A big data perspective. J. Netw. Comput. Appl. 59: 416-426 (2016) - [j76]Hazalila Kamaludin, Hairulnizam Mahdin, Jemal H. Abawajy:
Filtering Redundant Data from RFID Data Streams. J. Sensors 2016: 7107914:1-7107914:7 (2016) - [j75]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury
, Herbert F. Jelinek:
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles. IEEE J. Biomed. Health Informatics 20(1): 408-415 (2016) - [c115]Baker Alrubaiey, Jemal H. Abawajy:
Prediction of Virtual Networks Substrata Failures. APSCC 2016: 423-434 - [c114]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
ECG rate control scheme in pervasive health care monitoring system. FUZZ-IEEE 2016: 2265-2270 - [c113]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
An alternative sensor Cloud architecture for vital signs monitoring. IJCNN 2016: 2827-2833 - [c112]Baker Al-Rubaiey, Jemal H. Abawajy:
Failure detection in virtual network environment. ITNAC 2016: 149-152 - [c111]Anhar Risnumawan, Indra Adji Sulistijono
, Jemal H. Abawajy, Younes Saadi:
Text Detection in Low Resolution Scene Images Using Convolutional Neural Network. SCDM 2016: 366-375 - [c110]Mohd Farhan Md Fudzee, Mohamud Hassan, Hairulnizam Mahdin, Shahreen Kasim, Jemal H. Abawajy:
A Framework to Analyze Quality of Service (QoS) for Text-To-Speech (TTS) Services. SCDM 2016: 589-597 - [c109]Biplob R. Ray, Morshed U. Chowdhury
, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. SecureComm 2016: 257-270 - [c108]Zahra Pooranian
, Nima Nikmehr
, Sajad Najafi Ravadanegh, Hairulnizam Mahdin, Jemal H. Abawajy:
Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II. SoftCOM 2016: 1-6 - 2015
- [j74]Jemal H. Abawajy, Harinda Fernando:
Policy-based SQLIA detection and prevention approach for RFID systems. Comput. Stand. Interfaces 38: 64-71 (2015) - [j73]Jemal H. Abawajy, Andrei V. Kelarev, Joe Ryan:
Ideal basis in constructions defined by directed graphs. Electron. J. Graph Theory Appl. 3(1): 35-49 (2015) - [j72]Soon-Keow Chong, Jemal H. Abawajy:
Mitigating malicious feedback attacks in trust management systems. Int. J. Trust. Manag. Comput. Commun. 3(1): 1-18 (2015) - [j71]Zahra Pooranian
, Mohammad Shojafar
, Jemal H. Abawajy, Ajith Abraham:
An efficient meta-heuristic algorithm for grid computing. J. Comb. Optim. 30(3): 413-434 (2015) - [j70]Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Utility-aware social network graph anonymization. J. Netw. Comput. Appl. 56: 137-148 (2015) - [j69]Jemal H. Abawajy, Andrei V. Kelarev, Mirka Miller, Joseph F. Ryan:
Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications. Math. Comput. Sci. 9(2): 127-137 (2015) - [j68]Jemal H. Abawajy, Mohd Farhan Md Fudzee:
Dynamic path determination policy for distributed multimedia content adaptation. Multim. Tools Appl. 74(19): 8325-8341 (2015) - [j67]Jemal H. Abawajy, Mohd Farhan Md Fudzee, Mustafa Mat Deris:
Multimedia content adaptation service discovery mechanism. Multim. Tools Appl. 74(19): 8365-8378 (2015) - [j66]Jemal H. Abawajy:
Comprehensive analysis of big data variety landscape. Int. J. Parallel Emergent Distributed Syst. 30(1): 5-14 (2015) - [j65]Mohammad Shojafar
, Jemal H. Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian
, Ajith Abraham:
An efficient and distributed file search in unstructured peer-to-peer networks. Peer Peer Netw. Appl. 8(1): 120-136 (2015) - [j64]Davood Izadi, Jemal H. Abawajy, Sara Ghanavati, Tutut Herawan:
A Data Fusion Method in Wireless Sensor Networks. Sensors 15(2): 2964-2979 (2015) - [j63]Jemal H. Abawajy, Mohd Farhan Md Fudzee, Mohammad Mehedi Hassan, Majed A. AlRubaian:
Service level agreement management framework for utility-oriented computing platforms. J. Supercomput. 71(11): 4287-4303 (2015) - [j62]Shivali G. Bansal, Jemal H. Abawajy:
Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions. Wirel. Commun. Mob. Comput. 15(4): 649-665 (2015) - [c107]Wan Nor Shuhadah Wan Nik, Bing Bing Zhou
, Albert Y. Zomaya
, Jemal H. Abawajy:
A Framework for Implementing Asynchronous Replication Scheme in Utility-Based Computing Environment. CCBD 2015: 183-190 - [c106]Maslina Abdul Aziz, Jemal H. Abawajy, Ikram Ul Haq, Ida Normaya Mohd Nasir:
A Survey of Big Workflow. DaEng 2015: 529-539 - [c105]Maslina Abdul Aziz
, Jemal H. Abawajy, Tutut Herawan:
Layered workflow scheduling algorithm. FUZZ-IEEE 2015: 1-7 - [c104]Mohammad Shojafar
, Nicola Cordeschi, Jemal H. Abawajy, Enzo Baccarelli:
Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for TCP/IP Mobile Cloud. GLOBECOM Workshops 2015: 1-6 - [c103]Jemal H. Abawajy, Mohammad Mehedi Hassan:
Reliability-Aware Distributed Computing Scheduling Policy. ICA3PP (Workshops and Symposiums) 2015: 627-632 - [c102]Ben Townsend
, Jemal H. Abawajy:
Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. SecureComm 2015: 725-737 - [c101]Biplob R. Ray
, Morshed U. Chowdhury, Jemal H. Abawajy, Monika Jesmin:
Secure object tracking protocol for Networked RFID Systems. SNPD 2015: 135-141 - [e4]Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi
, Antonio Ruiz-Martínez
:
Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings. Communications in Computer and Information Science 536, Springer 2015, ISBN 978-3-319-22914-0 [contents] - 2014
- [j61]Jemal H. Abawajy:
User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3): 236-247 (2014) - [j60]Biplob R. Ray
, Jemal H. Abawajy, Morshed U. Chowdhury
:
Scalable RFID security framework and protocol supporting Internet of Things. Comput. Networks 67: 89-103 (2014) - [j59]Isredza Rahmi A. Hamid, Jemal H. Abawajy:
An approach for profiling phishing activities. Comput. Secur. 45: 27-41 (2014) - [j58]Srimathi Chandrasekaran, Eunmi Choi, Jemal H. Abawajy, Rajesh Natarajan:
Sensor Grid Middleware Metamodeling and Analysis. Int. J. Distributed Sens. Networks 10 (2014) - [j57]Mohammad Mehedi Hassan, Al-Sakib Khan Pathan
, Eui-Nam Huh, Jemal H. Abawajy:
Emerging Sensor-Cloud Technology for Pervasive Services and Applications. Int. J. Distributed Sens. Networks 10 (2014) - [j56]Ammar Alazab
, Michael Hobbs
, Jemal H. Abawajy, Ansam Khraisat, Mamoun Alazab
:
Using response action with intelligent intrusion detection and prevention system against web application malware. Inf. Manag. Comput. Secur. 22(5): 431-449 (2014) - [j55]Jemal H. Abawajy, Gleb Beliakov
, Andrei V. Kelarev, Morshed U. Chowdhury
:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. J. Networks 9(8): 2089-2098 (2014) - [j54]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. J. Networks 9(9): 2259-2268 (2014) - [j53]Jemal H. Abawajy, Md. Rafiqul Islam:
Guest Editorial. J. Networks 9(11): 2875-2877 (2014) - [j52]Mamoun Alazab
, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. J. Networks 9(11): 2878-2891 (2014) - [j51]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Smart Anti-counterfeit Web Application. J. Networks 9(11): 2925-2933 (2014) - [j50]Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad A. Karim, Nurul I. Sarkar:
Guest Editorial. J. Networks 9(12): 3189-3191 (2014) - [j49]Jemal H. Abawajy, Mustafa Mat Deris:
Data Replication Approach with Consistency Guarantee for Data Grid. IEEE Trans. Computers 63(12): 2975-2987 (2014) - [j48]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury
:
Large Iterative Multitier Ensemble Classifiers for Security of Big Data. IEEE Trans. Emerg. Top. Comput. 2(3): 352-363 (2014) - [j47]Xiuqin Ma, Hongwu Qin, Norrozila Sulaiman, Tutut Herawan
, Jemal H. Abawajy:
The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and Its Related Algorithms. IEEE Trans. Fuzzy Syst. 22(1): 57-71 (2014) - [j46]Saeed Javanmardi, Mohammad Shojafar
, Shahdad Shariatmadari, Jemal H. Abawajy, Mukesh Singhal:
PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture. J. Supercomput. 69(2): 955-975 (2014) - [c100]Nazri Mohd Nawi, Abdullah Khan, M. Z. Rehman, Maslina Abdul Aziz, Tutut Herawan, Jemal H. Abawajy:
Neural Network Training by Hybrid Accelerated Cuckoo Particle Swarm Optimization Algorithm. ICONIP (2) 2014: 237-244 - [c99]Nazri Mohd Nawi, Abdullah Khan, M. Z. Rehman, Maslina Abdul Aziz, Tutut Herawan, Jemal H. Abawajy:
An Accelerated Particle Swarm Optimization Based Levenberg Marquardt Back Propagation Algorithm. ICONIP (2) 2014: 245-253 - [c98]Habib Shah, Tutut Herawan, Rozaida Ghazali
, Rashid Naseem, Maslina Abdul Aziz, Jemal H. Abawajy:
An Improved Gbest Guided Artificial Bee Colony (IGGABC) Algorithm for Classification and Prediction Tasks. ICONIP (1) 2014: 559-569 - [p4]Mohsen Amini Salehi, Jemal H. Abawajy, Rajkumar Buyya:
Taxonomy of Contention Management in Interconnected Distributed Systems. Computing Handbook, 3rd ed. (1) 2014: 57: 1-33 - [e3]Tutut Herawan
, Mustafa Mat Deris, Jemal H. Abawajy:
Proceedings of the First International Conference on Advanced Data and Information Engineering, DaEng 2013, Kuala Lumpur, Malaysia, December 16-18, 2013. Lecture Notes in Electrical Engineering 285, Springer 2014, ISBN 978-981-4585-17-0 [contents] - 2013
- [j45]Andrew Stranieri
, Jemal H. Abawajy, Andrei V. Kelarev, Md. Shamsul Huda, Morshed U. Chowdhury
, Herbert F. Jelinek
:
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy. Artif. Intell. Medicine 58(3): 185-193 (2013) - [j44]