default search action
Jemal H. Abawajy
Person information
- affiliation: Deakin University, School of Information Technology, Geelong, VIC, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j184]Ali Shahidinejad, Jemal H. Abawajy:
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT. ACM Comput. Surv. 56(7): 186:1-186:38 (2024) - [j183]Rezvan Salimi, Sadoon Azizi, Jemal H. Abawajy:
A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog-cloud computing. Trans. Emerg. Telecommun. Technol. 35(5) (2024) - [j182]Ali Shahidinejad, Jemal H. Abawajy:
Efficient Provably Secure Authentication Protocol for Multidomain IIoT Using a Combined Off-Chain and On-Chain Approach. IEEE Internet Things J. 11(9): 15241-15251 (2024) - [j181]Zainab AlJabri, Jemal H. Abawajy, Shamsul Huda:
MDS-Based Cloned Device Detection in IoT-Fog Network. IEEE Internet Things J. 11(12): 22128-22139 (2024) - [j180]Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Untraceable blockchain-assisted authentication and key exchange in medical consortiums. J. Syst. Archit. 151: 103143 (2024) - [j179]Shamsul Huda, Md. Rezaul Islam, Jemal H. Abawajy, Vinay Naga Vamsi Kottala, Shafiq Ahmad:
A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System. Sensors 24(16): 5282 (2024) - [j178]Ali Shahidinejad, Jemal H. Abawajy:
Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles. IEEE Trans. Consumer Electron. 70(1): 543-553 (2024) - [j177]Hongwu Qin, Yibo Wang, Xiuqin Ma, Jemal H. Abawajy:
A Novel Choquet Integral-Based VIKOR Approach Under Q-Rung Orthopair Hesitant Fuzzy Environment. IEEE Trans. Fuzzy Syst. 32(5): 2890-2902 (2024) - [j176]Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments. IEEE Trans. Inf. Forensics Secur. 19: 6738-6750 (2024) - [j175]Ali Shahidinejad, Jemal H. Abawajy:
Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications. IEEE Trans. Netw. Sci. Eng. 11(3): 2661-2674 (2024) - [j174]Ali Shahidinejad, Jemal H. Abawajy, Shamsul Huda:
Anonymous lattice-based authentication protocol for vehicular communications. Veh. Commun. 48: 100803 (2024) - 2023
- [j173]Nomica Choudhry, Jemal H. Abawajy, Shamsul Huda, Imran Rao:
A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection. IEEE Access 11: 114680-114713 (2023) - [j172]Belal Abdullah Hezam Murshed, Suresha Mallappa, Jemal H. Abawajy, Mufeed Ahmed Naji Saif, Hasib Daowd Esmail Al-Ariki, Hudhaifa Mohammed Abdulwahab:
Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis. Artif. Intell. Rev. 56(6): 5133-5260 (2023) - [j171]Zheng Xu, Deepak Kumar Jain, S. Neelakandan, Jemal H. Abawajy:
Hunger games search optimization with deep learning model for sustainable supply chain management. Discov. Internet Things 3(1): 10 (2023) - [j170]Belal Abdullah Hezam Murshed, Suresha Mallappa, Jemal H. Abawajy, Mufeed Ahmed Naji Saif, Hudhaifa Mohammed Abdulwahab, Fahd A. Ghanem:
FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning. Multim. Tools Appl. 82(30): 46611-46650 (2023) - [j169]Yuwei Yan, Jemal H. Abawajy:
Special issue on neural computing and applications in cyber intelligence: ATCI 2022. Neural Comput. Appl. 35(35): 24563-24564 (2023) - [j168]Ali Shahidinejad, Jemal H. Abawajy:
Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT. IEEE Syst. J. 17(4): 6623-6633 (2023) - [j167]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
SDN enabled BDSP in public cloud for resource optimization. Wirel. Networks 29(3): 1031-1041 (2023) - [c130]Zhou Zhou, Yonggui Han, Mohammad Shojafar, Zhongsheng Wang, Jemal H. Abawajy:
A reliable edge server placement strategy based on DDPG in the Internet of Vehicles. TrustCom 2023: 2587-2594 - 2022
- [j166]Belal Abdullah Hezam Murshed, Jemal H. Abawajy, Suresha Mallappa, Mufeed Ahmed Naji Saif, Hasib Daowd Esmail Al-Ariki:
DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform. IEEE Access 10: 25857-25871 (2022) - [j165]Fera Tri Hartanti, Jemal H. Abawajy, Morshed U. Chowdhury:
Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being. IEEE Access 10: 69106-69124 (2022) - [j164]Belal Abdullah Hezam Murshed, Jemal H. Abawajy, Suresha Mallappa, Mufeed Ahmed Naji Saif, Sumaia Mohammed Al-Ghuribi, Fahd A. Ghanem:
Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling. IEEE Access 10: 105328-105351 (2022) - [j163]Aaisha Makkar, Uttam Ghosh, Danda B. Rawat, Jemal H. Abawajy:
FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing. IEEE Consumer Electron. Mag. 11(2): 21-27 (2022) - [j162]Simar Preet Singh, Rajesh Kumar, Anju Sharma, Jemal H. Abawajy, Ravneet Kaur:
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing. Clust. Comput. 25(5): 3325-3342 (2022) - [j161]Habib Mostafaei, Shafi Afridi, Jemal H. Abawajy:
Network-aware worker placement for wide-area streaming analytics. Future Gener. Comput. Syst. 136: 270-281 (2022) - [j160]Md. Rafiul Hassan, Shamsul Huda, Mohammad Mehedi Hassan, Jemal H. Abawajy, Ahmed Alsanad, Giancarlo Fortino:
Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion. Inf. Fusion 77: 70-80 (2022) - [j159]Shaila Sharmeen, Shamsul Huda, Jemal H. Abawajy, Chuadhry Mujeeb Ahmed, Mohammad Mehedi Hassan, Giancarlo Fortino:
An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches. IEEE Internet Things J. 9(10): 7298-7310 (2022) - [j158]Hongwu Qin, Yuntao Cheng, Xiuqin Ma, Fei Li, Jemal H. Abawajy:
Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8370-8379 (2022) - [j157]Sadoon Azizi, Mohammad Shojafar, Jemal H. Abawajy, Rajkumar Buyya:
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach. J. Netw. Comput. Appl. 201: 103333 (2022) - [j156]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing. IEEE Trans. Emerg. Top. Comput. 10(1): 488-499 (2022) - [j155]Xiuqin Ma, Hongwu Qin, Jemal H. Abawajy:
Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making and Parameter Reduction. IEEE Trans. Fuzzy Syst. 30(2): 357-369 (2022) - [j154]Zhou Zhou, Mohammad Shojafar, Jemal H. Abawajy, Hui Yin, Hongming Lu:
ECMS: An Edge Intelligent Energy Efficient Model in Mobile Edge Computing. IEEE Trans. Green Commun. Netw. 6(1): 238-247 (2022) - [j153]Mohammad Shojafar, Mithun Mukherjee, Vincenzo Piuri, Jemal H. Abawajy:
Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications. IEEE Trans. Ind. Informatics 18(5): 3519-3521 (2022) - [j152]Zhou Zhou, Jemal H. Abawajy, Mohammad Shojafar, Morshed U. Chowdhury:
DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network. IEEE Trans. Ind. Informatics 18(7): 4944-4953 (2022) - [j151]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment. IEEE Trans. Serv. Comput. 15(4): 2007-2017 (2022) - [j150]Zhou Zhou, Kenli Li, Jemal H. Abawajy, Mohammad Shojafar, Morshed Uddin Chowdhury, Fangmin Li, Keqin Li:
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters. IEEE Trans. Sustain. Comput. 7(2): 371-385 (2022) - [j149]Mohit Kumar, Avadh Kishor, Jemal H. Abawajy, Prabal Agarwal, Amritpal Singh, Albert Y. Zomaya:
ARPS: An Autonomic Resource Provisioning and Scheduling Framework for Cloud Platforms. IEEE Trans. Sustain. Comput. 7(2): 386-399 (2022) - [e11]Rozaida Ghazali, Nazri Mohd Nawi, Mustafa Mat Deris, Jemal H. Abawajy, Nureize Arbaiy:
Recent Advances in Soft Computing and Data Mining - Proceedings of the Fifth International Conference on Soft Computing and Data Mining (SCDM 2022), May 30-31, 2022, Virtual Event. Lecture Notes in Networks and Systems 457, Springer 2022, ISBN 978-3-031-00827-6 [contents] - 2021
- [j148]Gohar Zaman, Hairulnizam Mahdin, Khalid Hussain, Atta-ur-Rahman, Jemal H. Abawajy, Salama A. Mostafa:
An Ontological Framework for Information Extraction From Diverse Scientific Sources. IEEE Access 9: 42111-42124 (2021) - [j147]Abdul Basit Darem, Fuad A. Ghaleb, Asma Alhashmi, Jemal H. Abawajy, Sultan Munadi Alanazi, Afrah Y. AL-Rezami:
An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning. IEEE Access 9: 97180-97196 (2021) - [j146]Shouki A. Ebad, Abdul Basit Darem, Jemal H. Abawajy:
Measuring Software Obfuscation Quality-A Systematic Literature Review. IEEE Access 9: 99024-99038 (2021) - [j145]Akhilesh Kumar Sharma, Gaurav Aggarwal, Sachit Bhardwaj, Prasun Chakrabarti, Tulika Chakrabarti, Jemal H. Abawajy, Siddhartha Bhattacharyya, Richa Mishra, Anirban Das, Hairulnizam Mahdin:
Classification of Indian Classical Music With Time-Series Matching Deep Learning Approach. IEEE Access 9: 102041-102052 (2021) - [j144]Saiba Nazah, Md. Shamsul Huda, Jemal H. Abawajy, Mohammad Mehedi Hassan:
An Unsupervised Model for Identifying and Characterizing Dark Web Forums. IEEE Access 9: 112871-112892 (2021) - [j143]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy:
Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information. IEEE Access 9: 121686-121697 (2021) - [j142]Fera Tri Hartanti, Jemal H. Abawajy, Morshed U. Chowdhury, Wervyan Shalannanda:
Citizens' Trust Measurement in Smart Government Services. IEEE Access 9: 150663-150676 (2021) - [j141]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed U. Chowdhury, Tahsien Al-Quraishi:
An empirical analysis of graph-based linear dimensionality reduction techniques. Concurr. Comput. Pract. Exp. 33(5) (2021) - [j140]Abdul Basit Darem, Jemal H. Abawajy, Aaisha Makkar, Asma Alhashmi, Sultan Munadi Alanazi:
Visualization and deep-learning-based malware variant detection using OpCode-level features. Future Gener. Comput. Syst. 125: 314-323 (2021) - [j139]Fuyuan Xiao, Masayoshi Aritsugi, Jemal H. Abawajy, Zehong Cao, Rami Al-Hmouz, Peide Liu:
Editorial on Special Issue: "Applications of Intelligent and Fuzzy Theory in Data Science". Int. J. Fuzzy Syst. 23(2): 492-493 (2021) - [j138]Zheng Xu, Jemal H. Abawajy:
Editorial: Special issue on neural computing and applications in cyber intelligence: ATCI 2020. Neural Comput. Appl. 33(3): 805-806 (2021) - [j137]Prince, Ananda Shankar Hati, Prasun Chakrabarti, Jemal H. Abawajy, Ng Wee Keong:
Development of energy efficient drive for ventilation system using recurrent neural network. Neural Comput. Appl. 33(14): 8659-8668 (2021) - [j136]Jemal H. Abawajy, Abdul Basit Darem, Asma Alhashmi:
Feature Subset Selection for Malware Detection in Smart IoT Platforms. Sensors 21(4): 1374 (2021) - [j135]Sadoon Azizi, Mohammad Shojafar, Jemal H. Abawajy, Rajkumar Buyya:
GRVMP: A Greedy Randomized Algorithm for Virtual Machine Placement in Cloud Data Centers. IEEE Syst. J. 15(2): 2571-2582 (2021) - [j134]Zhou Zhou, Mohammad Shojafar, Mamoun Alazab, Jemal H. Abawajy, Fangmin Li:
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center. IEEE Trans. Green Commun. Netw. 5(2): 658-669 (2021) - [j133]Zhou Zhou, Mohammad Shojafar, Jemal H. Abawajy, Ali Kashif Bashir:
IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network. IEEE Trans. Green Commun. Netw. 5(4): 1747-1760 (2021) - [j132]Mohammad Mehedi Hassan, Md. Shamsul Huda, Shaila Sharmeen, Jemal H. Abawajy, Giancarlo Fortino:
An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model. IEEE Trans. Ind. Informatics 17(4): 2860-2870 (2021) - [c129]Habib Mostafaei, Shafi Afridi, Jemal H. Abawajy:
SNR: Network-aware Geo-Distributed Stream Analytics. CCGRID 2021: 820-827 - [e10]Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman:
2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence (ATCI 2020), Fuyang, China, 20-22 June, 2020. Advances in Intelligent Systems and Computing 1244, Springer 2021, ISBN 978-3-030-53979-5 [contents] - [e9]Jemal H. Abawajy, Zheng Xu, Mohammed Atiquzzaman, Xiaolu Zhang:
2021 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence (ATCI 2021) Volume 1, Fuyang, China, 9-21 June, 2021. Advances in Intelligent Systems and Computing 1398, Springer 2021, ISBN 978-3-030-79199-5 [contents] - [e8]Debasis Giri, Rajkumar Buyya, S. Ponnusamy, Debashis De, Andrew Adamatzky, Jemal H. Abawajy:
Proceedings of the Sixth International Conference on Mathematics and Computing - ICMC 2020, Gangtok, Sikkim, India, September 2020. Advances in Intelligent Systems and Computing 1262, Springer 2021, ISBN 978-981-15-8060-4 [contents] - 2020
- [j131]Shanshan Li, Fuyuan Xiao, Jemal H. Abawajy:
Conflict Management of Evidence Theory Based on Belief Entropy and Negation. IEEE Access 8: 37766-37774 (2020) - [j130]Zhou Zhou, Fangmin Li, Jemal H. Abawajy, Chaochao Gao:
Improved PSO Algorithm Integrated With Opposition-Based Learning and Tentative Perception in Networked Data Centres. IEEE Access 8: 55872-55880 (2020) - [j129]Saiba Nazah, Md. Shamsul Huda, Jemal H. Abawajy, Mohammad Mehedi Hassan:
Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach. IEEE Access 8: 171796-171819 (2020) - [j128]Shaila Sharmeen, Md. Shamsul Huda, Jemal H. Abawajy, Mohammad Mehedi Hassan:
An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches. Appl. Soft Comput. 89: 106089 (2020) - [j127]Fatsuma Jauro, Haruna Chiroma, Abdulsalam Ya'u Gital, Mubarak Almutairi, Shafii Muhammad Abdulhamid, Jemal H. Abawajy:
Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend. Appl. Soft Comput. 96: 106582 (2020) - [j126]Deden Witarsyah Jacob, Mohd Farhan Md Fudzee, Mohamad Aizi Salamat, Iwan Tri Riyadi Yanto, Jemal H. Abawajy:
Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset. Int. J. Data Warehous. Min. 16(1): 39-62 (2020) - [j125]Zhou Zhou, Fangmin Li, Huaxi Zhu, Houliang Xie, Jemal H. Abawajy, Morshed U. Chowdhury:
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments. Neural Comput. Appl. 32(6): 1531-1541 (2020) - [j124]Zheng Xu, Jemal H. Abawajy:
Special issue on Neural Computing and Applications in cyber intelligence: ATCI 2019. Neural Comput. Appl. 32(10): 5313-5314 (2020) - [j123]Jemal H. Abawajy, Morshed U. Chowdhury, Andrei Kelarev:
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection. IEEE Trans. Cloud Comput. 8(2): 398-407 (2020) - [j122]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei Kelarev, Herbert F. Jelinek:
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services. IEEE Trans. Cloud Comput. 8(2): 473-483 (2020) - [j121]Mohammad Shojafar, Claudia Canali, Riccardo Lancellotti, Jemal H. Abawajy:
Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems. IEEE Trans. Cloud Comput. 8(4): 1162-1175 (2020) - [c128]Lamyaa Al-Omairi, Jemal H. Abawajy, Morshed Uddin Chowdhury:
Utility-Aware Graph Dimensionality Reduction Approach. CATA 2020: 327-333 - [c127]Haider Kassem, Morshed U. Chowdhury, Jemal H. Abawajy, Ahmed Raad Al-Sudani:
Yawn Based Driver Fatigue Level Prediction. CATA 2020: 372-382 - [c126]Ahmed Al-Mansoori, Jemal H. Abawajy, Morshed U. Chowdhury:
BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP. CCGRID 2020: 827-835 - [e7]Rozaida Ghazali, Nazri Mohd Nawi, Mustafa Mat Deris, Jemal H. Abawajy:
Recent Advances on Soft Computing and Data Mining - Proceedings of the Fourth International Conference on Soft Computing and Data Mining (SCDM 2020), Melaka, Malaysia, January 22-23, 2020. Advances in Intelligent Systems and Computing 978, Springer 2020, ISBN 978-3-030-36055-9 [contents]
2010 – 2019
- 2019
- [j120]Khalid Haruna, Maizatul Akmar Ismail, Mohammad Suyanto, Lubna Abdel Kareim Gabralla, Abdullahi Baffa Bichi, Sani Danjuma, Habeebah Adamu Kakudi, Muhammad Sani Haruna, Saber Zerdoumi, Jemal H. Abawajy, Tutut Herawan:
A Soft Set Approach for Handling Conflict Situation on Movie Selection. IEEE Access 7: 116179-116194 (2019) - [j119]Balsam Alkouz, Zaher Al Aghbari, Jemal H. Abawajy:
Tweetluenza: Predicting flu trends from twitter data. Big Data Min. Anal. 2(4): 273-287 (2019) - [j118]Md. Shamsul Huda, Jemal H. Abawajy, Baker Al-Rubaie, Lei Pan, Mohammad Mehedi Hassan:
Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks. Future Gener. Comput. Syst. 101: 1247-1258 (2019) - [j117]Banafsj Khalifa, Ahmed Khedr, Zaher Al Aghbari, Jemal H. Abawajy:
Fuzzy logic approach to repair coverage holes in internet of things monitoring applications. IET Wirel. Sens. Syst. 9(4): 227-235 (2019) - [j116]Kim-Kwang Raymond Choo, Jemal H. Abawajy, Md. Rafiqul Islam:
Special issue on cybersecurity in the critical infrastructure: Advances and future directions. J. Comput. Syst. Sci. 102: 40-41 (2019) - [j115]Vijayakumar Varadharajan, V. Subramaniyaswamy, Jemal H. Abawajy, Longzhi Yang:
Intelligent, smart and scalable cyber-physical systems. J. Intell. Fuzzy Syst. 36(5): 3935-3943 (2019) - [j114]Fuyuan Xiao, Zili Zhang, Jemal H. Abawajy:
Workflow scheduling in distributed systems under fuzzy environment. J. Intell. Fuzzy Syst. 37(4): 5323-5333 (2019) - [j113]Mohammad Mehedi Hassan, Jemal H. Abawajy, Min Chen, Meikang Qiu, Sheng Chen:
Special Section on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends. J. Parallel Distributed Comput. 133: 170-173 (2019) - [j112]Addisalem Genta, D. K. Lobiyal, Jemal H. Abawajy:
Energy Efficient Multipath Routing Algorithm for Wireless Multimedia Sensor Network. Sensors 19(17): 3642 (2019) - [j111]Jemal H. Abawajy, Andrei Kelarev:
Iterative Classifier Fusion System for the Detection of Android Malware. IEEE Trans. Big Data 5(3): 282-292 (2019) - [c125]Tahsien Al-Quraishi, Jemal H. Abawajy, Naseer Al-Quraishi, Ahmad Abdalrada, Lamyaa Al-Omairi:
Predicting Breast Cancer Risk Using Subset of Genes. CoDIT 2019: 1379-1384 - [e6]Jemal H. Abawajy, Mohamed Othman, Rozaida Ghazali, Mustafa Mat Deris, Hairulnizam Mahdin, Tutut Herawan:
Proceedings of the Second International Conference on Advanced Data and Information Engineering, DaEng 2015, Bali, Indonesia, April 25-26, 2015. Lecture Notes in Electrical Engineering 520, Springer 2019, ISBN 978-981-13-1797-2 [contents] - 2018
- [j110]Md. Shamsul Huda, Sultan Alyahya, Md. Mohsin Ali, Shafiq Ahmad, Jemal H. Abawajy, Hmood Al-Dossari, John Yearwood:
A Framework for Software Defect Prediction and Metric Selection. IEEE Access 6: 2844-2858 (2018) - [j109]Shaila Sharmeen, Md. Shamsul Huda, Jemal H. Abawajy, Walaa N. Ismail, Mohammad Mehedi Hassan:
Malware Threats and Detection for Industrial Mobile-IoT Networks. IEEE Access 6: 15941-15957 (2018) - [j108]Zhou Zhou, Jemal H. Abawajy, Fangmin Li, Zhigang Hu, Morshed U. Chowdhury, Abdulhameed Alelaiwi, Keqin Li:
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center. IEEE Access 6: 27080-27090 (2018) - [j107]Jemal H. Abawajy, Andrei V. Kelarev, Xun Yi, Herbert F. Jelinek:
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN. Comput. Methods Programs Biomed. 160: 85-94 (2018) - [j106]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury, Abdulhameed Alelaiwi:
Universal and secure object ownership transfer protocol for the Internet of Things. Future Gener. Comput. Syst. 78: 838-849 (2018) - [j105]Md. Shamsul Huda, Md. Rafiqul Islam, Jemal H. Abawajy, John Yearwood, Mohammad Mehedi Hassan, Giancarlo Fortino:
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener. Comput. Syst. 83: 193-207 (2018) - [j104]Zhou Zhou, Jemal H. Abawajy, Morshed U. Chowdhury, Zhigang Hu, Keqin Li, Hongbing Cheng, Abdulhameed A. Al Elaiwi, Fangmin Li:
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms. Future Gener. Comput. Syst. 86: 836-850 (2018) - [j103]Jemal H. Abawajy, Md. Shamsul Huda, Shaila Sharmeen, Mohammad Mehedi Hassan, Ahmad Almogren:
Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Gener. Comput. Syst. 89: 525-538 (2018) - [j102]Mahmood Javadi, Habib Mostafaei, Morshed U. Chowdhury, Jemal H. Abawajy:
Learning automaton based topology control protocol for extending wireless sensor networks lifetime. J. Netw. Comput. Appl. 122: 128-136 (2018) - [j101]Shaobo Zhang, Guojun Wang, Qin Liu, Jemal H. Abawajy:
A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18): 6121-6133 (2018) - [j100]Raja Al-Jaljouli, Jemal H. Abawajy, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce. IEEE Trans. Serv. Comput. 11(2): 415-429 (2018) - [c124]Xin Li, Liangyuan Wang, Jemal H. Abawajy, Xiaolin Qin:
Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers. ICA3PP (2) 2018: 630-644 - [c123]Xin Li, Zhen Lian, Xiaolin Qin, Jemal H. Abawajy:
Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 816-823 - [c122]Ahmad Shaker Abdalrada, Jemal H. Abawajy, Morshed U. Chowdhury, Sutharshan Rajasegarar, Tahsien Al-Quraishi, Herbert F. Jelinek:
Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population. SCDM 2018: 135-146 - [c121]Tahsien Al-Quraishi, Jemal H. Abawajy, Morshed U. Chowdhury, Sutharshan Rajasegarar, Ahmad Shaker Abdalrada:
Breast Cancer Recurrence Prediction Using Random Forest Model. SCDM 2018: 318-329 - [e5]Rozaida Ghazali, Mustafa Mat Deris, Nazri Mohd Nawi, Jemal H. Abawajy:
Recent Advances on Soft Computing and Data Mining - Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, February 06-07, 2018. Advances in Intelligent Systems and Computing 700, Springer 2018, ISBN 978-3-319-72549-9 [contents] - 2017
- [j99]Haruna Chiroma, Nor Liyana Mohd Shuib, Adamu I. Abubakar, Akram M. Zeki, Abdulsalam Ya'u Gital, Tutut Herawan, Jemal H. Abawajy:
Advances in Teaching and Learning on Facebook in Higher Institutions. IEEE Access 5: 480-500 (2017) - [j98]Enzo Baccarelli, Paola Gabriela Vinueza Naranjo, Michele Scarpiniti, Mohammad Shojafar, Jemal H. Abawajy:
Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study. IEEE Access 5: 9882-9910 (2017) - [j97]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi, Abdulhameed Alelaiwi:
Cloud-assisted IoT-based health status monitoring framework. Clust. Comput. 20(2): 1843-1853 (2017) - [j96]Md. Mohsin Ali, Md. Shamsul Huda, Jemal H. Abawajy, Sultan Alyahya, Hmood Al-Dossari, John Yearwood:
A parallel framework for software defect detection and metric selection on cloud computing. Clust. Comput. 20(3): 2267-2281 (2017) - [j95]Jemal H. Abawajy, Mohammad Mehedi Hassan:
Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System. IEEE Commun. Mag. 55(1): 48-53 (2017) - [j94]Jemal H. Abawajy, Md. Rafiqul Islam:
Applications and techniques in information and network security. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j93]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei V. Kelarev, Teruhisa Hochin:
Multilayer hybrid strategy for phishing email zero-day filtering. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j92]Md. Shamsul Huda, Jemal H. Abawajy, Mali Abdollahian, Md. Rafiqul Islam, John Yearwood:
A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j91]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [j90]Baker Alrubaiey, Jemal H. Abawajy:
Virtual networks dependability assessment framework. Int. J. High Perform. Comput. Netw. 10(1/2): 3-12 (2017) - [j89]Kim-Kwang Raymond Choo, Jemal H. Abawajy, Md. Rafiqul Islam:
Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions. J. Comput. Syst. Sci. 83(1): 1-2 (2017) - [j88]Nasser R. Sabar, Jemal H. Abawajy, John Yearwood:
Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution Algorithm for Big Data Optimization Problems. IEEE Trans. Evol. Comput. 21(2): 315-327 (2017) - [c120]Jie Wang, Lili Yang, Jie Wu, Jemal H. Abawajy:
Clustering analysis for malicious network traffic. ICC 2017: 1-6 - [c119]Jemal H. Abawajy, A. Richard, Zaher Al Aghbari:
Securing Websites Against Homograph Attacks. ATCS/SePrIoT@SecureComm 2017: 47-59 - [c118]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem, Asma Alhashmi:
Privacy Threat Analysis of Mobile Social Network Data Publishing. ATCS/SePrIoT@SecureComm 2017: 60-68 - 2016
- [j87]Davood Izadi, Sara Ghanavati, Jemal H. Abawajy, Tutut Herawan:
An alternative data collection scheduling scheme in wireless sensor networks. Computing 98(12): 1287-1304 (2016) - [j86]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan:
Privacy Preserving Social Network Data Publication. IEEE Commun. Surv. Tutorials 18(3): 1974-1997 (2016) - [j85]Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Tutut Herawan:
Vertex re-identification attack using neighbourhood-pair properties. Concurr. Comput. Pract. Exp. 28(10): 2906-2919 (2016) - [j84]Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. Future Gener. Comput. Syst. 55: 224-226 (2016) - [j83]Md. Shamsul Huda, Jemal H. Abawajy, Mamoun Alazab, Mali Abdollahian, Md. Rafiqul Islam, John Yearwood:
Hybrids of support vector machine wrapper and filter based framework for malware detection. Future Gener. Comput. Syst. 55: 376-390 (2016) - [j82]Nancy Victor, Daphne Lopez, Jemal H. Abawajy:
Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1): 61-75 (2016) - [j81]M. Anwar Hossain, Jemal H. Abawajy, Raúl García-Castro, Wen-Huang Cheng, Dewan Tanvir Ahmed:
Sensor-Web Systems, Applications, and Services. Int. J. Distributed Sens. Networks 12(4): 5349568:1-5349568:2 (2016) - [j80]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Secure Object Tracking Protocol for the Internet of Things. IEEE Internet Things J. 3(4): 544-553 (2016) - [j79]Jemal H. Abawajy, Albert Y. Zomaya, Ivan Stojmenovic:
Network computing and applications for Big Data analytics. J. Netw. Comput. Appl. 59: 361 (2016) - [j78]Maumita Bhattacharya, Md. Rafiqul Islam, Jemal H. Abawajy:
Evolutionary optimization: A big data perspective. J. Netw. Comput. Appl. 59: 416-426 (2016) - [j77]Hazalila Kamaludin, Hairulnizam Mahdin, Jemal H. Abawajy:
Filtering Redundant Data from RFID Data Streams. J. Sensors 2016: 7107914:1-7107914:7 (2016) - [j76]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Herbert F. Jelinek:
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles. IEEE J. Biomed. Health Informatics 20(1): 408-415 (2016) - [c117]Baker Alrubaiey, Jemal H. Abawajy:
Prediction of Virtual Networks Substrata Failures. APSCC 2016: 423-434 - [c116]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
ECG rate control scheme in pervasive health care monitoring system. FUZZ-IEEE 2016: 2265-2270 - [c115]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
An alternative sensor Cloud architecture for vital signs monitoring. IJCNN 2016: 2827-2833 - [c114]Baker Al-Rubaiey, Jemal H. Abawajy:
Failure detection in virtual network environment. ITNAC 2016: 149-152 - [c113]Anhar Risnumawan, Indra Adji Sulistijono, Jemal H. Abawajy, Younes Saadi:
Text Detection in Low Resolution Scene Images Using Convolutional Neural Network. SCDM 2016: 366-375 - [c112]Mohd Farhan Md Fudzee, Mohamud Hassan, Hairulnizam Mahdin, Shahreen Kasim, Jemal H. Abawajy:
A Framework to Analyze Quality of Service (QoS) for Text-To-Speech (TTS) Services. SCDM 2016: 589-597 - [c111]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
A Multi-protocol Security Framework to Support Internet of Things. SecureComm 2016: 257-270 - [c110]Zahra Pooranian, Nima Nikmehr, Sajad Najafi Ravadanegh, Hairulnizam Mahdin, Jemal H. Abawajy:
Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II. SoftCOM 2016: 1-6 - 2015
- [j75]Jemal H. Abawajy, Harinda Fernando:
Policy-based SQLIA detection and prevention approach for RFID systems. Comput. Stand. Interfaces 38: 64-71 (2015) - [j74]Jemal H. Abawajy, Andrei V. Kelarev, Joe Ryan:
Ideal basis in constructions defined by directed graphs. Electron. J. Graph Theory Appl. 3(1): 35-49 (2015) - [j73]Soon-Keow Chong, Jemal H. Abawajy:
Mitigating malicious feedback attacks in trust management systems. Int. J. Trust. Manag. Comput. Commun. 3(1): 1-18 (2015) - [j72]Zahra Pooranian, Mohammad Shojafar, Jemal H. Abawajy, Ajith Abraham:
An efficient meta-heuristic algorithm for grid computing. J. Comb. Optim. 30(3): 413-434 (2015) - [j71]Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Utility-aware social network graph anonymization. J. Netw. Comput. Appl. 56: 137-148 (2015) - [j70]Jemal H. Abawajy, Andrei V. Kelarev, Mirka Miller, Joseph F. Ryan:
Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications. Math. Comput. Sci. 9(2): 127-137 (2015) - [j69]Jemal H. Abawajy, Mohd Farhan Md Fudzee:
Dynamic path determination policy for distributed multimedia content adaptation. Multim. Tools Appl. 74(19): 8325-8341 (2015) - [j68]Jemal H. Abawajy, Mohd Farhan Md Fudzee, Mustafa Mat Deris:
Multimedia content adaptation service discovery mechanism. Multim. Tools Appl. 74(19): 8365-8378 (2015) - [j67]Jemal H. Abawajy:
Comprehensive analysis of big data variety landscape. Int. J. Parallel Emergent Distributed Syst. 30(1): 5-14 (2015) - [j66]Mohammad Shojafar, Jemal H. Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian, Ajith Abraham:
An efficient and distributed file search in unstructured peer-to-peer networks. Peer-to-Peer Netw. Appl. 8(1): 120-136 (2015) - [j65]Davood Izadi, Jemal H. Abawajy, Sara Ghanavati, Tutut Herawan:
A Data Fusion Method in Wireless Sensor Networks. Sensors 15(2): 2964-2979 (2015) - [j64]Jemal H. Abawajy, Mohd Farhan Md Fudzee, Mohammad Mehedi Hassan, Majed A. AlRubaian:
Service level agreement management framework for utility-oriented computing platforms. J. Supercomput. 71(11): 4287-4303 (2015) - [j63]Shivali G. Bansal, Jemal H. Abawajy:
Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions. Wirel. Commun. Mob. Comput. 15(4): 649-665 (2015) - [c109]Wan Nor Shuhadah Wan Nik, Bing Bing Zhou, Albert Y. Zomaya, Jemal H. Abawajy:
A Framework for Implementing Asynchronous Replication Scheme in Utility-Based Computing Environment. CCBD 2015: 183-190 - [c108]Maslina Abdul Aziz, Jemal H. Abawajy, Ikram Ul Haq, Ida Normaya Mohd Nasir:
A Survey of Big Workflow. DaEng 2015: 529-539 - [c107]Maslina Abdul Aziz, Jemal H. Abawajy, Tutut Herawan:
Layered workflow scheduling algorithm. FUZZ-IEEE 2015: 1-7 - [c106]Mohammad Shojafar, Nicola Cordeschi, Jemal H. Abawajy, Enzo Baccarelli:
Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for TCP/IP Mobile Cloud. GLOBECOM Workshops 2015: 1-6 - [c105]Jemal H. Abawajy, Mohammad Mehedi Hassan:
Reliability-Aware Distributed Computing Scheduling Policy. ICA3PP (Workshops and Symposiums) 2015: 627-632 - [c104]Ben Townsend, Jemal H. Abawajy:
Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. SecureComm 2015: 725-737 - [c103]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy, Monika Jesmin:
Secure object tracking protocol for Networked RFID Systems. SNPD 2015: 135-141 - [e4]Jemal H. Abawajy, Sougata Mukherjea, Sabu M. Thampi, Antonio Ruiz-Martínez:
Security in Computing and Communications - Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings. Communications in Computer and Information Science 536, Springer 2015, ISBN 978-3-319-22914-0 [contents] - 2014
- [j62]Jemal H. Abawajy:
User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3): 236-247 (2014) - [j61]Biplob R. Ray, Jemal H. Abawajy, Morshed U. Chowdhury:
Scalable RFID security framework and protocol supporting Internet of Things. Comput. Networks 67: 89-103 (2014) - [j60]Isredza Rahmi A. Hamid, Jemal H. Abawajy:
An approach for profiling phishing activities. Comput. Secur. 45: 27-41 (2014) - [j59]Srimathi Chandrasekaran, Eunmi Choi, Jemal H. Abawajy, Rajesh Natarajan:
Sensor Grid Middleware Metamodeling and Analysis. Int. J. Distributed Sens. Networks 10 (2014) - [j58]Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-Nam Huh, Jemal H. Abawajy:
Emerging Sensor-Cloud Technology for Pervasive Services and Applications. Int. J. Distributed Sens. Networks 10 (2014) - [j57]Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat, Mamoun Alazab:
Using response action with intelligent intrusion detection and prevention system against web application malware. Inf. Manag. Comput. Secur. 22(5): 431-449 (2014) - [j56]Jemal H. Abawajy, Gleb Beliakov, Andrei V. Kelarev, Morshed U. Chowdhury:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. J. Networks 9(8): 2089-2098 (2014) - [j55]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. J. Networks 9(9): 2259-2268 (2014) - [j54]Jemal H. Abawajy, Md. Rafiqul Islam:
Guest Editorial. J. Networks 9(11): 2875-2877 (2014) - [j53]Mamoun Alazab, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. J. Networks 9(11): 2878-2891 (2014) - [j52]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Smart Anti-counterfeit Web Application. J. Networks 9(11): 2925-2933 (2014) - [j51]Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad A. Karim, Nurul I. Sarkar:
Guest Editorial. J. Networks 9(12): 3189-3191 (2014) - [j50]Jemal H. Abawajy, Mustafa Mat Deris:
Data Replication Approach with Consistency Guarantee for Data Grid. IEEE Trans. Computers 63(12): 2975-2987 (2014) - [j49]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Large Iterative Multitier Ensemble Classifiers for Security of Big Data. IEEE Trans. Emerg. Top. Comput. 2(3): 352-363 (2014) - [j48]Xiuqin Ma, Hongwu Qin, Norrozila Sulaiman, Tutut Herawan, Jemal H. Abawajy:
The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and Its Related Algorithms. IEEE Trans. Fuzzy Syst. 22(1): 57-71 (2014) - [j47]Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Jemal H. Abawajy, Mukesh Singhal:
PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture. J. Supercomput. 69(2): 955-975 (2014) - [c102]Nazri Mohd Nawi, Abdullah Khan, M. Z. Rehman, Maslina Abdul Aziz, Tutut Herawan, Jemal H. Abawajy:
Neural Network Training by Hybrid Accelerated Cuckoo Particle Swarm Optimization Algorithm. ICONIP (2) 2014: 237-244 - [c101]Nazri Mohd Nawi, Abdullah Khan, M. Z. Rehman, Maslina Abdul Aziz, Tutut Herawan, Jemal H. Abawajy:
An Accelerated Particle Swarm Optimization Based Levenberg Marquardt Back Propagation Algorithm. ICONIP (2) 2014: 245-253 - [c100]Habib Shah, Tutut Herawan, Rozaida Ghazali, Rashid Naseem, Maslina Abdul Aziz, Jemal H. Abawajy:
An Improved Gbest Guided Artificial Bee Colony (IGGABC) Algorithm for Classification and Prediction Tasks. ICONIP (1) 2014: 559-569 - [p4]Mohsen Amini Salehi, Jemal H. Abawajy, Rajkumar Buyya:
Taxonomy of Contention Management in Interconnected Distributed Systems. Computing Handbook, 3rd ed. (1) 2014: 57: 1-33 - [e3]Tutut Herawan, Mustafa Mat Deris, Jemal H. Abawajy:
Proceedings of the First International Conference on Advanced Data and Information Engineering, DaEng 2013, Kuala Lumpur, Malaysia, December 16-18, 2013. Lecture Notes in Electrical Engineering 285, Springer 2014, ISBN 978-981-4585-17-0 [contents] - 2013
- [j46]Andrew Stranieri, Jemal H. Abawajy, Andrei V. Kelarev, Md. Shamsul Huda, Morshed U. Chowdhury, Herbert F. Jelinek:
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy. Artif. Intell. Medicine 58(3): 185-193 (2013) - [j45]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Andrew Stranieri, Herbert F. Jelinek:
Predicting cardiac autonomic neuropathy category for diabetic data with missing values. Comput. Biol. Medicine 43(10): 1328-1333 (2013) - [j44]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Multistage approach for clustering and classification of ECG data. Comput. Methods Programs Biomed. 112(3): 720-730 (2013) - [j43]Jemal H. Abawajy, Syed Imran Jami, Zubair Ahmed Shaikh, Syed A. Hammad:
A framework for scalable distributed provenance storage system. Comput. Stand. Interfaces 35(1): 179-186 (2013) - [j42]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Power graphs: A survey. Electron. J. Graph Theory Appl. 1(2): 125-147 (2013) - [j41]Zahra Pooranian, Mohammad Shojafar, Jemal H. Abawajy, Mukesh Singhal:
GLOA: A New Job Scheduling Algorithm for Grid Computing. Int. J. Interact. Multim. Artif. Intell. 2(1): 59-64 (2013) - [j40]Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat:
Malware Detection and Prevention System Based on Multi-Stage Rules. Int. J. Inf. Secur. Priv. 7(2): 29-43 (2013) - [j39]Biplob Rakshit Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag. Int. J. Networked Distributed Comput. 1(2): 79-88 (2013) - [j38]Mohammad Shojafar, Zahra Pooranian, Jemal H. Abawajy, Mohammad Reza Meybodi:
An Efficient Scheduling Method for Grid Systems Based on a Hierarchical Stochastic Petri Net. J. Comput. Sci. Eng. 7(1): 44-52 (2013) - [j37]Andrei V. Kelarev, Jemal H. Abawajy, Andrew Stranieri, Herbert F. Jelinek:
Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes. Int. J. Data Warehous. Min. 9(4): 1-18 (2013) - [j36]Davood Izadi, Jemal H. Abawajy, Sara Ghanavati:
Fuzzy logic optimized wireless sensor network routing protocol. J. High Speed Networks 19(2): 115-128 (2013) - [j35]Md. Rafiqul Islam, Jemal H. Abawajy:
A multi-tier phishing detection and filtering approach. J. Netw. Comput. Appl. 36(1): 324-335 (2013) - [j34]Jemal H. Abawajy:
SQLIA detection and prevention approach for RFID systems. J. Syst. Softw. 86(3): 751-758 (2013) - [c99]Sara Ghanavati, Jemal H. Abawajy, Davood Izadi:
A fuzzy technique to control congestion in WSN. IJCNN 2013: 1-5 - [c98]Davood Izadi, Jemal H. Abawajy, Sara Ghanavati:
A new energy efficient cluster-head and backup selection scheme in WSN. IRI 2013: 408-415 - [c97]Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Neighbourhood-Pair Attack in Social Network Data Publishing. MobiQuitous 2013: 726-731 - [c96]Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ansam Khraisat:
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware. SecNet 2013: 177-184 - [c95]Belal Chowdhury, Morshed U. Chowdhury, Jemal H. Abawajy:
Securing a Web-Based Anti-counterfeit RFID System. SecureComm 2013: 342-355 - [c94]Md. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal H. Abawajy:
Security Concerns and Remedy in a Cloud Based E-learning System. SecureComm 2013: 356-366 - [c93]Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy:
Critical Analysis and Comparative Study of Security for Networked RFID Systems. SNPD 2013: 197-202 - [c92]Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Preserving Utility in Social Network Graph Anonymization. TrustCom/ISPA/IUCC 2013: 226-232 - [c91]Isredza Rahmi A. Hamid, Jemal H. Abawajy:
Profiling Phishing Email Based on Clustering Approach. TrustCom/ISPA/IUCC 2013: 628-635 - [c90]Ammar Alazab, Jemal H. Abawajy, Michael Hobbs, Robert Layton, Ansam Khraisat:
Crime Toolkits: The Productisation of Cybercrime. TrustCom/ISPA/IUCC 2013: 1626-1632 - [p3]Harinda Fernando, Jemal H. Abawajy:
Malware Detection and Prevention in RFID Systems. Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence 2013: 143-166 - [p2]Tutut Herawan, Ahmad Noraziah, Zailani Abdullah, Mustafa Mat Deris, Jemal H. Abawajy:
IPMA: Indirect Patterns Mining Algorithm. Advanced Methods for Computational Collective Intelligence 2013: 187-196 - 2012
- [j33]Anton Beloglazov, Jemal H. Abawajy, Rajkumar Buyya:
Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing. Future Gener. Comput. Syst. 28(5): 755-768 (2012) - [j32]Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad A. Karim, Nurul I. Sarkar:
Guest Editorial. J. Networks 7(3): 409-411 (2012) - [j31]Salahuddin Muhammad Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad Ataul Karim, Nurul I. Sarkar:
Guest Editorial. J. Networks 7(12): 1909-1911 (2012) - [j30]Bahman Javadi, Jemal H. Abawajy, Rajkumar Buyya:
Failure-aware resource provisioning for hybrid Cloud infrastructure. J. Parallel Distributed Comput. 72(10): 1318-1331 (2012) - [j29]Vijayakumar Varadharajan, R. S. D. Wahida Banu, Jemal H. Abawajy:
An efficient approach based on trust and reputation for secured selection of grid resources. Int. J. Parallel Emergent Distributed Syst. 27(1): 1-17 (2012) - [c89]Andrei V. Kelarev, Andrew Stranieri, John Yearwood, Jemal H. Abawajy, Herbert F. Jelinek:
Improving Classi cations for Cardiac Autonomic Neuropathy Using Multi-level Ensemble Classi ers and Feature Selection Based. AusDM 2012: 93-102 - [c88]Bahman Javadi, Jemal H. Abawajy, Richard O. Sinnott:
Hybrid Cloud resource provisioning policy in the presence of resource failures. CloudCom 2012: 10-17 - [c87]Jemal H. Abawajy, Andrei V. Kelarev:
A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering. CSS 2012: 48-56 - [c86]Tutut Herawan, Ahmad Noraziah, Zailani Abdullah, Mustafa Mat Deris, Jemal H. Abawajy:
EFP-M2: Efficient Model for Mining Frequent Patterns in Transactional Database. ICCCI (2) 2012: 29-38 - [c85]Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Moutaz Alazab:
Using feature selection for intrusion detection system. ISCIT 2012: 296-301 - [c84]Ashley Chonka, Jemal H. Abawajy:
Detecting and Mitigating HX-DoS Attacks against Cloud Web Services. NBiS 2012: 429-434 - [c83]Nicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy:
Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments. TrustCom 2012: 177-184 - [e2]Tai-Hoon Kim, Dae-Sik Ko, Thanos Vasilakos, Adrian Stoica, Jemal H. Abawajy:
Computer Applications for Communication, Networking, and Digital Contents - International Conferences, FGCN and DCA 2012, Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 350, Springer 2012, ISBN 978-3-642-35593-6 [contents] - 2011
- [j28]Mohd Farhan Md Fudzee, Jemal H. Abawajy:
QoS-based adaptation service selection broker. Future Gener. Comput. Syst. 27(3): 256-264 (2011) - [j27]Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Joarder Kamruzzaman, Mohammad Ataul Karim:
Guest Editorial. J. Networks 6(1): 1-3 (2011) - [j26]Ben Townsend, Jemal H. Abawajy, Tai-Hoon Kim:
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors. Sensors 11(4): 4231-4243 (2011) - [j25]Hairulnizam Mahdin, Jemal H. Abawajy:
An Approach for Removing Redundant Data from RFID Data Streams. Sensors 11(10): 9863-9877 (2011) - [c82]Lynn Margaret Batten, Jemal H. Abawajy, Robin Doss:
Prevention of Information Harvesting in a Cloud Services Environment. CLOSER 2011: 66-72 - [c81]Masitah Ahmad, Jemal H. Abawajy, Tai-Hoon Kim:
Service Quality Assessment in Provision of Library Services. FGIT-UNESST 2011: 83-92 - [c80]Jemal H. Abawajy, Tai-Hoon Kim:
Engaging and Effective Asynchronous Online Discussion Forums. FGIT-ASEA/DRBC/EL 2011: 695-705 - [c79]Jemal H. Abawajy, Tai-Hoon Kim:
Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums. FGIT-ASEA/DRBC/EL 2011: 706-714 - [c78]Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Privacy Threat Analysis of Social Network Data. ICA3PP (2) 2011: 165-174 - [c77]Mohd Farhan Md Fudzee, Jemal H. Abawajy:
A Protocol for Discovering Content Adaptation Services. ICA3PP (2) 2011: 235-244 - [c76]Harinda Fernando, Jemal H. Abawajy:
Securing RFID Systems from SQLIA. ICA3PP (2) 2011: 245-254 - [c75]Isredza Rahmi A. Hamid, Jemal H. Abawajy:
Hybrid Feature Selection for Phishing Email Detection. ICA3PP (2) 2011: 266-275 - [c74]Wan Nor Shuhadah Wan Nik, Bing Bing Zhou, Albert Y. Zomaya, Jemal H. Abawajy:
Efficient Resource Selection Algorithm for Enterprise Grid Systems. ISPA 2011: 57-62 - [c73]Jemal H. Abawajy:
Establishing Trust in Hybrid Cloud Computing Environments. TrustCom 2011: 118-125 - [c72]Harinda Fernando, Jemal H. Abawajy:
Mutual Authentication Protocol for Networked RFID Systems. TrustCom 2011: 417-424 - [c71]Mohd Izuan Hafez Ninggal, Jemal H. Abawajy:
Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing. TrustCom 2011: 847-852 - [c70]Isredza Rahmi A. Hamid, Jemal H. Abawajy:
Phishing Email Feature Selection Approach. TrustCom 2011: 916-921 - 2010
- [j24]Tutut Herawan, Mustafa Mat Deris, Jemal H. Abawajy:
A rough set approach for selecting clustering attribute. Knowl. Based Syst. 23(3): 220-231 (2010) - [j23]Jemal H. Abawajy, Mukaddim Pathan, Al-Sakib Khan Pathan, Mustafizur Rahman:
Network Management in Distributed Systems. Scalable Comput. Pract. Exp. 11(4) (2010) - [j22]Shivali Goel, Jemal H. Abawajy, Tai-Hoon Kim:
Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models. Sensors 10(12): 11021-11037 (2010) - [c69]Mohd Farhan Md Fudzee, Jemal H. Abawajy, Mustafa Mat Deris:
Multi-criteria Content Adaptation Service Selection Broker. CCGRID 2010: 721-726 - [c68]Hairulnizam Mahdin, Jemal H. Abawajy:
An Approach to Filtering Duplicate RFID Data Streams. FGIT-UNESST 2010: 125-133 - [c67]Jemal H. Abawajy, Tai-Hoon Kim:
Performance Analysis of Cyber Security Awareness Delivery Methods. FGIT-SecTech/DRBC 2010: 142-148 - [c66]Fahed Al-Neyadi, Jemal H. Abawajy:
A Privacy Preserving Service Broker Architecture for Data Sharing. FGIT 2010: 450-458 - [c65]Vijayakumar Varadharajan, R. S. D. Wahida Banu, Jemal H. Abawajy:
Novel Mechanism for Evaluating Feedback in the Grid Environment on Resource Allocation. GCA 2010: 11-17 - [c64]Tutut Herawan, Mustafa Mat Deris, Jemal H. Abawajy:
Matrices Representation of Multi Soft-Sets and Its Application. ICCSA (3) 2010: 201-214 - [c63]Mohd Farhan Md Fudzee, Jemal H. Abawajy, Mustafa Mat Deris:
Service Discovery for Service-Oriented Content Adaptation. MobiQuitous 2010: 308-309 - [c62]Harinda Fernando, Jemal H. Abawajy:
A Hybrid Mutual Authentication Protocol for RFID. MobiQuitous 2010: 310-311 - [c61]Rajkumar Buyya, Anton Beloglazov, Jemal H. Abawajy:
Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges. PDPTA 2010: 6-20 - [c60]Raja Al-Jaljouli, Jemal H. Abawajy:
Negotiation Strategy for Mobile Agent-Based e-Negotiation. PRIMA 2010: 137-151 - [p1]Raja Al-Jaljouli, Jemal H. Abawajy:
Agents Based e-Commerce and Securing Exchanged Information. Pervasive Computing, Innovations in Intelligent Multimedia and Applications 2010: 383-404 - [e1]Aboul Ella Hassanien, Jemal H. Abawajy, Ajith Abraham, Hani Hagras:
Pervasive Computing, Innovations in Intelligent Multimedia and Applications. Computer Communications and Networks, Springer 2010, ISBN 978-1-84882-598-7 [contents] - [i1]Rajkumar Buyya, Anton Beloglazov, Jemal H. Abawajy:
Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges. CoRR abs/1006.0308 (2010)
2000 – 2009
- 2009
- [j21]Jemal H. Abawajy:
An efficient adaptive scheduling policy for high-performance computing. Future Gener. Comput. Syst. 25(3): 364-370 (2009) - [j20]Bahman Javadi, Mohammad K. Akbari, Jemal H. Abawajy:
Multi-cluster computing interconnection network performance modeling and analysis. Future Gener. Comput. Syst. 25(7): 737-746 (2009) - [j19]María S. Pérez, Alberto Sánchez, Jemal H. Abawajy, Víctor Robles, José M. Peña:
An agent architecture for managing data resources in a grid environment. Future Gener. Comput. Syst. 25(7): 747-755 (2009) - [j18]Mustafa Mat Deris, Jemal H. Abawajy, David Taniar, Ali Mamat:
Managing data using neighbour replication on a triangular-grid structure. Int. J. High Perform. Comput. Netw. 6(1): 56-65 (2009) - [j17]Jemal H. Abawajy:
Advances in pervasive computing: GUEST EDITORIAL. Int. J. Pervasive Comput. Commun. 5(1): 4-8 (2009) - [j16]Jemal H. Abawajy:
Human-computer interaction in ubiquitous computing environments. Int. J. Pervasive Comput. Commun. 5(1): 61-77 (2009) - [j15]Jemal H. Abawajy:
Adaptive hierarchical scheduling policy for enterprise grid computing systems. J. Netw. Comput. Appl. 32(3): 770-779 (2009) - [j14]Salim Zabir, Jemal H. Abawajy, Farid Ahmed, Mohammad A. Karim:
Guest Editorial. J. Networks 4(10): 929-930 (2009) - [c59]Harinda Fernando, Jemal H. Abawajy:
A RFID architecture framework for global supply chain applications. iiWAS 2009: 313-320 - [c58]Syed Imran Jami, Jemal H. Abawajy, Zubair Ahmed Shaikh:
Information Provenance for Open Distributed Collaborative System. ISPAN 2009: 737-741 - [c57]Hairulnizam Mahdin, Jemal H. Abawajy:
An Approach to Filtering RFID Data Streams. ISPAN 2009: 742-746 - [c56]Mehmet Yildiz, Jemal H. Abawajy, Tuncay Ercan, Andrew Bernoth:
A Layered Security Approach for Cloud Computing Infrastructure. ISPAN 2009: 763-767 - [c55]Jemal H. Abawajy:
Determining Service Trustworthiness in Intercloud Computing Environments. ISPAN 2009: 784-788 - [c54]Md. Rafiqul Islam, Jemal H. Abawajy, Matthew J. Warren:
Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling. ISPAN 2009: 789-793 - [c53]Jemal H. Abawajy:
Enhancing RFID Tag Resistance against Cloning Attack. NSS 2009: 18-23 - [c52]Jemal H. Abawajy:
Design and Delivery of Undergraduate IT Security Management Course. ISA 2009: 402-411 - 2008
- [j13]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari:
Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks. Comput. Electr. Eng. 34(6): 488-502 (2008) - [j12]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari:
A comprehensive analytical model of interconnection networks in large-scale cluster systems. Concurr. Comput. Pract. Exp. 20(1): 75-97 (2008) - [j11]Mustafa Mat Deris, Jemal H. Abawajy, Ali Mamat:
An efficient replicated data access approach for large-scale distributed systems. Future Gener. Comput. Syst. 24(1): 1-9 (2008) - [j10]Jemal H. Abawajy:
Security and privacy threats to volunteer computing. Int. J. Crit. Infrastructures 4(3): 245-255 (2008) - [c51]Jemal H. Abawajy:
An Online Credential Management Service for InterGrid Computing. APSCC 2008: 101-106 - [c50]Mohd Farhan Md Fudzee, Jemal H. Abawajy:
A classification for content adaptation system. iiWAS 2008: 426-429 - 2007
- [j9]Bahman Javadi, Mohammad K. Akbari, Jemal H. Abawajy:
Analytical communication networks model for enterprise Grid computing. Future Gener. Comput. Syst. 23(6): 737-747 (2007) - [j8]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari:
Analytical modeling of interconnection networks in heterogeneous multi-cluster systems. J. Supercomput. 40(1): 29-47 (2007) - [c49]Ahadur Rahaman, Jemal H. Abawajy, Michael Hobbs:
Taxonomy and Survey of Location Management Systems. ACIS-ICIS 2007: 369-374 - [c48]Soon-Keow Chong, Jemal H. Abawajy, Robert A. Dew:
A Multilevel Trust Management Framework. ACIS-ICIS 2007: 776-781 - [c47]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari:
Communication Network Analysis of the Enterprise Grid Systems. ACSW 2007: 33-40 - [c46]Fahed Al-Nayadi, Jemal H. Abawajy:
An Authorization Policy Management Framework for Dynamic Medical Data Sharing. IPC 2007: 313-318 - [c45]Jemal H. Abawajy, Saeid Nahavandi, Fahed Al-Nayadi:
Sensor Node Activity Scheduling Approach. MUE 2007: 72-77 - [c44]Fahed Al-Nayadi, Jemal H. Abawajy, Mustafa Mat Deris:
A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient Information among Autonomous Healthcare Providers. MUE 2007: 299-306 - [c43]Soon-Keow Chong, Jemal H. Abawajy:
Feedback Credibility Issues In Trust Management Systems. MUE 2007: 387-394 - 2006
- [j7]Jemal H. Abawajy:
Special section: Parallel input/output management techniques (PIOMT) in cluster and grid computing. Future Gener. Comput. Syst. 22(5): 600 (2006) - [j6]Jemal H. Abawajy:
Adaptive parallel I/O scheduling algorithm for multiprogrammed systems. Future Gener. Comput. Syst. 22(5): 611-619 (2006) - [j5]Jemal H. Abawajy, Mustafa Mat Deris, M. Omar:
A novel data replication and management protocol for mobile computing systems. Mob. Inf. Syst. 2(1): 3-19 (2006) - [j4]Bahman Javadi, Mohammad K. Akbari, Jemal H. Abawajy:
A performance model for analysis of heterogeneous multi-cluster systems. Parallel Comput. 32(11-12): 831-851 (2006) - [c42]Jemal H. Abawajy, Mustafa Mat Deris:
Supporting Disconnected Operations in Mobile Computing. AICCSA 2006: 911-918 - [c41]Jemal H. Abawajy:
Parallel I/O Scheduling in the Presence of Data Duplication on Multiprogrammed Cluster Computing Systems. AICCSA 2006: 1118-1125 - [c40]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari, Saeid Nahavandi:
Analytical Network Modeling of Heterogeneous Large-Scale Cluster Systems. CLUSTER 2006 - [c39]Henry Lin, Jemal H. Abawajy, Rajkumar Buyya:
Economy-Based Data Replication Broker. e-Science 2006: 90 - [c38]Jemal H. Abawajy, Andrzej M. Goscinski:
A Reputation-Based Grid Information Service. International Conference on Computational Science (4) 2006: 1015-1022 - [c37]Ali Mamat, Mustafa Mat Deris, Jemal H. Abawajy, Suhaila Ismail:
Managing Data Using Neighbor Replication on Triangular-Grid Structure. International Conference on Computational Science (4) 2006: 1071-1077 - [c36]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari:
Analytical Modeling of Communication Latency in Multi-Cluster Systems. ICPADS (2) 2006: 9-14 - [c35]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari, Saeid Nahavandi:
Analysis of Interconnection Networks in Heterogeneous Multi-Cluster Systems. ICPP Workshops 2006: 115-122 - 2005
- [c34]Jemal H. Abawajy, Meng-Jye Hu:
A new Internet meta-search engine and implementation. AICCSA 2005: 103 - [c33]Jemal H. Abawajy:
Fault-Tolerant Dynamic Job Scheduling Policy. ICA3PP 2005: 165-173 - [c32]Jemal H. Abawajy:
Job Scheduling Policy for High Throughput Grid Computing. ICA3PP 2005: 184-192 - [c31]Bahman Javadi, Jemal H. Abawajy, Mohammad K. Akbari:
Performance Analysis of Interconnection Networks for Multi-cluster Systems. International Conference on Computational Science (3) 2005: 205-212 - [c30]Jemal H. Abawajy:
Autonomic Job Scheduling Policy for Grid Computing. International Conference on Computational Science (3) 2005: 213-220 - [c29]Mustafa Mat Deris, Jemal H. Abawajy, M. Zarina, Rabiei Mamat:
High Reliability Replication Technique for Web-Server Cluster Systems. International Conference on Computational Science (3) 2005: 447-456 - [c28]Jemal H. Abawajy:
An Efficient Replicated Data Management Approach for Peer-to-Peer Systems. International Conference on Computational Science (3) 2005: 457-463 - [c27]Mustafa Mat Deris, Jemal H. Abawajy, M. Omar:
A New Approach For Efficiently Achieving High Availability in Mobile Computing. ICCSA (3) 2005: 60-68 - [c26]Jemal H. Abawajy:
Robust Parallel Job Scheduling Infrastructure for Service-Oriented Grid Computing Systems. ICCSA (4) 2005: 1272-1281 - [c25]Bahman Javadi, Mohammad K. Akbari, Jemal H. Abawajy:
Performance Analysis of Heterogeneous Multi-Cluster Systems. ICPP Workshops 2005: 493-500 - 2004
- [j3]Jemal H. Abawajy, Sivarama P. Dandamudi:
Fault-tolerant Grid Resource Management Infrastructure. Neural Parallel Sci. Comput. 12(3): 289-306 (2004) - [j2]Jemal H. Abawajy:
Preemptive Job Scheduling Policy For Distributively-Owned Workstation Clusters. Parallel Process. Lett. 14(2): 255-270 (2004) - [c24]Mustafa Mat Deris, Jemal H. Abawajy, H. M. Suzuri:
An efficient replicated data access approach for large-scale distributed systems. CCGRID 2004: 588-594 - [c23]María S. Pérez, Alberto Sánchez, Víctor Robles, José M. Peña, Jemal H. Abawajy:
Cooperation model of a multiagent parallel file system for clusters. CCGRID 2004: 595-601 - [c22]Jemal H. Abawajy:
Dynamic Parallel Job Scheduling in Multi-cluster Computing Systems. International Conference on Computational Science 2004: 27-34 - [c21]Jemal H. Abawajy:
Placement of File Replicas in Data Grid Environments. International Conference on Computational Science 2004: 66-73 - [c20]Jemal H. Abawajy:
File Replacement Algorithm for Storage Resource Managers in Data Grids. International Conference on Computational Science 2004: 339-346 - [c19]María S. Pérez, Alberto Sánchez, Jemal H. Abawajy, Víctor Robles, José M. Peña:
Design and Evaluation of an Agent-Based Communication Model for a Parallel File System. ICCSA (2) 2004: 87-96 - [c18]Jemal H. Abawajy:
Fault Detection Service Architecture for Grid Computing Systems. ICCSA (2) 2004: 107-115 - [c17]Jemal H. Abawajy:
Fault-Tolerant Scheduling Policy for Grid Computing Systems. IPDPS 2004 - [c16]Jemal H. Abawajy:
Grid accounting and payment architecture. Parallel and Distributed Computing and Networks 2004: 82-87 - [c15]Jemal H. Abawajy:
Grid Accounting Service Infrastructure for Service-Oriented Grid Computing Systems. SAG 2004: 168-175 - 2003
- [c14]Jemal H. Abawajy, Sivarama P. Dandamudi:
A Unified Resource Scheduling Approach on Cluster Computing Systems. PDCS 2003: 43-48 - [c13]Jemal H. Abawajy:
Performance Analysis of Parallel I/O Scheduling Approaches on Cluster Computing Systems. CCGRID 2003: 724-729 - [c12]Jemal H. Abawajy, Sivarama P. Dandamudi:
Parallel Job Scheduling on Multicluster Computing Systems. CLUSTER 2003: 11-18 - [c11]Jemal H. Abawajy:
Parallel I/O Scheduling in Multiprogrammed Cluster Computing Systems. International Conference on Computational Science 2003: 223-229 - [c10]Kenji Imasaki, Jemal H. Abawajy:
An Adaptive Load Balancing Algorithm for Large Data Parallel Processing with Communication Delay. International Conference on Computational Science 2003: 242-247 - [c9]Jemal H. Abawajy, Sivarama P. Dandamudi:
Scheduling Parallel Jobs with CPU and I/O Resource Requirements in Cluster Computing Systems. MASCOTS 2003: 336-343 - [c8]Jemal H. Abawajy, Sivarama P. Dandamudi:
A Reconfigurable Multi-Layered Grid Scheduling Infrastructure. PDPTA 2003: 138-144 - 2002
- [c7]Jemal H. Abawajy:
Job Scheduling Policy for High Throughput Computing Environments. ICPADS 2002: 605-610 - 2000
- [c6]Jemal H. Abawajy, Sivarama P. Dandamudi:
Parallel Job Scheduling Policy for Workstation Cluster Environments. CLUSTER 2000: 351-352 - [c5]Jemal H. Abawajy:
An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment. PARELEC 2000: 59-63 - [c4]Jemal H. Abawajy, Sivarama P. Dandamudi:
Distributed Hierarchical Workstation Cluster Co-Ordination Scheme. PARELEC 2000: 111-115 - [c3]Jemal H. Abawajy, Sivarama P. Dandamudi:
Time/Space Sharing Distributed Job Scheduling Policy in a Workstation Cluster Environment. PARELEC 2000: 116-120
1990 – 1999
- 1999
- [c2]Jemal H. Abawajy, Sivarama P. Dandamudi:
An Approach to Scheduling Parallel Applications on Networks of Workstations. PDPTA 1999: 2580-2586 - 1994
- [c1]Jemal H. Abawajy, Michael Shepherd:
Framework for the design of coupled knowledge/data base medical information systems. CBMS 1994: 1-5 - 1993
- [j1]Djemal H. Abawajy:
Orphan Problems and Remedies In Distributed Systems. ACM SIGOPS Oper. Syst. Rev. 27(1): 27-32 (1993)
Coauthor Index
aka: Mohammad K. Akbari
aka: Morshed Uddin Chowdhury
aka: Shamsul Huda
aka: Andrei Kelarev
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint