2025
Enhanced NSCLC subtyping and staging through attention-augmented multi-task deep learning: A novel diagnostic tool.
Int. J. Medical Informatics, 2025
2024
Message from the Program Chairs; IDS 2024.
Proceedings of the 10th IEEE International Conference on Intelligent Data and Security, 2024
2019
Improving Prediction Accuracy for Logistic Regression on Imbalanced Datasets.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
2018
Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry.
Future Gener. Comput. Syst., 2018
Parallelize Simulated Annealing Heuristics with GPUs.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering, 2018
A Knowledge-Based Approach to Reducing Complexity of Maintaining Semantic Constraints in Data Exchange and Integration.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018
Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
A novel social network access control model using logical authorization language in cloud computing.
Concurr. Comput. Pract. Exp., 2017
Extending OWL with Custom Relations for Knowledge-Driven Intelligent Agents.
Proceedings of the Multiagent System Technologies - 15th German Conference, 2017
Labware for Secure Mobile Software Development (SMSD) Education.
Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017
Hands-On Learning for Computer Network Security with Mobile Devices.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
A Knowledge-Driven Web Tutoring System Framework for Adaptive and Assessment-Driven Open-Source Learning.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Towards Analyzing MongoDB NoSQL Security and Designing Injection Defense Solution.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2016
Intrusion detection techniques for mobile cloud computing in heterogeneous 5G.
Secur. Commun. Networks, 2016
Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing.
J. Netw. Comput. Appl., 2016
Static Mining and Dynamic Taint for Mobile Security Threats Analysis.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Connectivity, Traffic Flow and Applied Statistics in Cyber Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
A Semantic Approach to Intelligent and Personal Tutoring System.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Drug Side Effects Data Representation and Full Spectrum Inferencing Using Knowledge Graphs in Intelligent Telehealth.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
MongoDB NoSQL Injection Analysis and Detection.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Improving Data Governance in Large Organizations through Ontology and Linked Data.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Powering Filtration Process of Cyber Security Ecosystem Using Knowledge Graph.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Reducing Complexity of Diagnostic Message Pattern Specification and Recognition on In-Bound Data Using Semantic Techniques.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Improve the Prediction Accuracy of Naïve Bayes Classifier with Association Rule Mining.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
RuleSN: Research and Application of Social Network Access Control Model.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
Word embeddings for Arabic sentiment analysis.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
2015
Security enhancement of cloud servers with a redundancy-based fault-tolerant cache structure.
Future Gener. Comput. Syst., 2015
A hybrid approach for mobile security threat analysis.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
A Reusable Software Component for Integrated Syntax and Semantic Validation for Services Computing.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015
A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC).
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Automated Detection and Analysis for Android Ransomware.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Mitigating HTTP Flooding Attacks with Meta-data Analysis.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Simplified Approach for Representing Part-Whole Relations in OWL-DL Ontologies.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Extending OWL to Support Custom Relations.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Understanding Model Risk Management - Model Rationalization in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Model Risk Management Systems-Back-End, Middleware, Front-End and Analytics.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Meta Meta-Analytics for Risk Forecast Using Big Data Meta-Regression in Financial Industry.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Ontology-Based Knowledge Representation for Secure Self-Diagnosis in Patient-Centered Teleheath with Cloud Systems.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2013
Mobile device based authentic learning for computer network and security.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013
Integrated Syntax and Semantic Validation for Services Computing.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
Teaching Web Security using Portable Virtual Labs.
J. Educ. Technol. Soc., 2012
2011
Criteria for omnibearing imbalance of macroeconomic system structures and their strategic optimization.
Kybernetes, 2011
A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.
Proceedings of the ICALT 2011, 2011
A Collaborative Interactive Cyber-learning Platform for Anywhere Anytime Java Programming Learning.
Proceedings of the ICALT 2011, 2011
Work in progress - An innovative design of a Master in Computer Science program.
Proceedings of the 2011 Frontiers in Education Conference, 2011
Work in progress - Live programming learning objects repository.
Proceedings of the 2011 Frontiers in Education Conference, 2011
2009
Teach real-time embedded system online with real hands-on labs.
Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2009
2008
APOGEE: automated project grading and instant feedback system for web based computing.
Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, 2008
2007
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
2006
Asynchronous Callback in Web Services.
Proceedings of the Seventh International Conference on Software Engineering, 2006
Visual Modeling of XML Constraints Based on a New Extensible Constraint Markup Language.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
2002
Parallel Programming through Application Service Providers.
Proceedings of the Internet and Multimedia Systems and Applications, 2002
2001
Shifting Paradigms with the Application Service Provider Model.
Computer, 2001
1999
Delayed Program Mapping in Concordia Parallel Programming Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
1996
Coarse Grain Automatic Data Redistribution in Multiphase Parallel Programs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996
A Visual Performance Debugger for Virtual Architecture Programs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996
1995
Topological Feature Maps on Parallel Computers.
Int. J. High Speed Comput., 1995
Contention Minimization in Wormhole-Routed Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995
A Performance Debugger for Parallel Programs Running on Wormhole-Routed Multicomputers.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995
Contracting Processes in Virtual Architecture Programs.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1995
1993
Parallel regional projection transformation (RPT) and VLSI implementation.
Pattern Recognit., 1993
Embeddings among Meshes and Tori.
J. Parallel Distributed Comput., 1993
Multi-way graph partition by stochastic probe.
Comput. Oper. Res., 1993
1992
Simulated Annealing and Tabu Search Algorithms for Multiway Graph Partition.
J. Circuits Syst. Comput., 1992
Optimal Embedding of 2-D Torus Into Ring.
Inf. Process. Lett., 1992
VLSI architecture for parallel concentration-contour approach.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992
1991
Simulating parallel neighboring communications among square meshes and square toruses.
J. Supercomput., 1991
An efficient tabu search algorithm for graph bisectioning.
Proceedings of the First Great Lakes Symposium on VLSI, 1991
1990
Simulating parallel neighbouring communications among square meshes and square toruses.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990
1987
Embeddings Among Toruses and Meshes.
Proceedings of the International Conference on Parallel Processing, 1987