Jemal H. Abawajy

Orcid: 0000-0001-8962-1222

Affiliations:
  • Deakin University, School of Information Technology, Geelong, VIC, Australia


According to our database1, Jemal H. Abawajy authored at least 316 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Cyber Risk Assessment Approach to Federated Identity Management Framework-Based Digital Healthcare System.
Sensors, August, 2024

An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT.
ACM Comput. Surv., July, 2024

MDS-Based Cloned Device Detection in IoT-Fog Network.
IEEE Internet Things J., June, 2024

A Novel Choquet Integral-Based VIKOR Approach Under Q-Rung Orthopair Hesitant Fuzzy Environment.
IEEE Trans. Fuzzy Syst., May, 2024

Efficient Provably Secure Authentication Protocol for Multidomain IIoT Using a Combined Off-Chain and On-Chain Approach.
IEEE Internet Things J., May, 2024

A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog-cloud computing.
Trans. Emerg. Telecommun. Technol., May, 2024

Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles.
IEEE Trans. Consumer Electron., February, 2024

Anonymous lattice-based authentication protocol for vehicular communications.
Veh. Commun., 2024

Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications.
IEEE Trans. Netw. Sci. Eng., 2024

Highly-Secure Yet Efficient Blockchain-Based CRL-Free Key Management Protocol for IoT-Enabled Smart Grid Environments.
IEEE Trans. Inf. Forensics Secur., 2024

Untraceable blockchain-assisted authentication and key exchange in medical consortiums.
J. Syst. Archit., 2024

2023
Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT.
IEEE Syst. J., December, 2023

Special issue on neural computing and applications in cyber intelligence: ATCI 2022.
Neural Comput. Appl., December, 2023

FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning.
Multim. Tools Appl., December, 2023

Hunger games search optimization with deep learning model for sustainable supply chain management.
Discov. Internet Things, December, 2023

Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis.
Artif. Intell. Rev., June, 2023

SDN enabled BDSP in public cloud for resource optimization.
Wirel. Networks, April, 2023

A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection.
IEEE Access, 2023

A reliable edge server placement strategy based on DDPG in the Internet of Vehicles.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters.
IEEE Trans. Sustain. Comput., 2022

ARPS: An Autonomic Resource Provisioning and Scheduling Framework for Cloud Platforms.
IEEE Trans. Sustain. Comput., 2022

An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2022

DEHM: An Improved Differential Evolution Algorithm Using Hierarchical Multistrategy in a Cybertwin 6G Network.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: Security and Privacy of Federated Learning Solutions for Industrial IoT Applications.
IEEE Trans. Ind. Informatics, 2022

ECMS: An Edge Intelligent Energy Efficient Model in Mobile Edge Computing.
IEEE Trans. Green Commun. Netw., 2022

Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making and Parameter Reduction.
IEEE Trans. Fuzzy Syst., 2022

Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing.
IEEE Trans. Emerg. Top. Comput., 2022

Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach.
J. Netw. Comput. Appl., 2022

Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security.
J. King Saud Univ. Comput. Inf. Sci., 2022

An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches.
IEEE Internet Things J., 2022

Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion.
Inf. Fusion, 2022

Network-aware worker placement for wide-area streaming analytics.
Future Gener. Comput. Syst., 2022

Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing.
Clust. Comput., 2022

FedLearnSP: Preserving Privacy and Security Using Federated Learning and Edge Computing.
IEEE Consumer Electron. Mag., 2022

Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling.
IEEE Access, 2022

DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform.
IEEE Access, 2022

Evaluating Public Service Delivery Smartness and Impact on Citizens' Well-Being.
IEEE Access, 2022

2021
An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model.
IEEE Trans. Ind. Informatics, 2021

IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network.
IEEE Trans. Green Commun. Netw., 2021

AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center.
IEEE Trans. Green Commun. Netw., 2021

GRVMP: A Greedy Randomized Algorithm for Virtual Machine Placement in Cloud Data Centers.
IEEE Syst. J., 2021

Feature Subset Selection for Malware Detection in Smart IoT Platforms.
Sensors, 2021

Editorial: Special issue on neural computing and applications in cyber intelligence: ATCI 2020.
Neural Comput. Appl., 2021

Development of energy efficient drive for ventilation system using recurrent neural network.
Neural Comput. Appl., 2021

Editorial on Special Issue: "Applications of Intelligent and Fuzzy Theory in Data Science".
Int. J. Fuzzy Syst., 2021

Visualization and deep-learning-based malware variant detection using OpCode-level features.
Future Gener. Comput. Syst., 2021

An empirical analysis of graph-based linear dimensionality reduction techniques.
Concurr. Comput. Pract. Exp., 2021

An Ontological Framework for Information Extraction From Diverse Scientific Sources.
IEEE Access, 2021

Classification of Indian Classical Music With Time-Series Matching Deep Learning Approach.
IEEE Access, 2021

An Unsupervised Model for Identifying and Characterizing Dark Web Forums.
IEEE Access, 2021

Drivers Fatigue Level Prediction Using Facial, and Head Behavior Information.
IEEE Access, 2021

Citizens' Trust Measurement in Smart Government Services.
IEEE Access, 2021

Measuring Software Obfuscation Quality-A Systematic Literature Review.
IEEE Access, 2021

An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning.
IEEE Access, 2021

SNR: Network-aware Geo-Distributed Stream Analytics.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
Adaptive Computing-Plus-Communication Optimization Framework for Multimedia Processing in Cloud Systems.
IEEE Trans. Cloud Comput., 2020

A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services.
IEEE Trans. Cloud Comput., 2020

Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection.
IEEE Trans. Cloud Comput., 2020

An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments.
Neural Comput. Appl., 2020

Special issue on Neural Computing and Applications in cyber intelligence: ATCI 2019.
Neural Comput. Appl., 2020

Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset.
Int. J. Data Warehous. Min., 2020

An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches.
Appl. Soft Comput., 2020

Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend.
Appl. Soft Comput., 2020

Improved PSO Algorithm Integrated With Opposition-Based Learning and Tentative Perception in Networked Data Centres.
IEEE Access, 2020

Evolution of Dark Web Threat Analysis and Detection: A Systematic Approach.
IEEE Access, 2020

Conflict Management of Evidence Theory Based on Belief Entropy and Negation.
IEEE Access, 2020

BDSP in the cloud: Scheduling and Load Balancing utlizing SDN and CEP.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

Yawn Based Driver Fatigue Level Prediction.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

Utility-Aware Graph Dimensionality Reduction Approach.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

2019
Iterative Classifier Fusion System for the Detection of Android Malware.
IEEE Trans. Big Data, 2019

Energy Efficient Multipath Routing Algorithm for Wireless Multimedia Sensor Network.
Sensors, 2019

Special Section on Cloud-of-Things and Edge Computing: Recent Advances and Future Trends.
J. Parallel Distributed Comput., 2019

Workflow scheduling in distributed systems under fuzzy environment.
J. Intell. Fuzzy Syst., 2019

Intelligent, smart and scalable cyber-physical systems.
J. Intell. Fuzzy Syst., 2019

Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019

Fuzzy logic approach to repair coverage holes in internet of things monitoring applications.
IET Wirel. Sens. Syst., 2019

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks.
Future Gener. Comput. Syst., 2019

Tweetluenza: Predicting flu trends from twitter data.
Big Data Min. Anal., 2019

A Soft Set Approach for Handling Conflict Situation on Movie Selection.
IEEE Access, 2019

Predicting Breast Cancer Risk Using Subset of Genes.
Proceedings of the 6th International Conference on Control, 2019

2018
Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce.
IEEE Trans. Serv. Comput., 2018

A trajectory privacy-preserving scheme based on query exchange in mobile social networks.
Soft Comput., 2018

Learning automaton based topology control protocol for extending wireless sensor networks lifetime.
J. Netw. Comput. Appl., 2018

Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms.
Future Gener. Comput. Syst., 2018

Universal and secure object ownership transfer protocol for the Internet of Things.
Future Gener. Comput. Syst., 2018

A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection.
Future Gener. Comput. Syst., 2018

Identifying cyber threats to mobile-IoT applications in edge computing paradigm.
Future Gener. Comput. Syst., 2018

Minimal ensemble based on subset selection using ECG to diagnose categories of CAN.
Comput. Methods Programs Biomed., 2018

Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center.
IEEE Access, 2018

Malware Threats and Detection for Industrial Mobile-IoT Networks.
IEEE Access, 2018

A Framework for Software Defect Prediction and Metric Selection.
IEEE Access, 2018

Breast Cancer Recurrence Prediction Using Random Forest Model.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Relationship Between Angiotensin Converting Enzyme Gene and Cardiac Autonomic Neuropathy Among Australian Population.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2018

Delay-Aware Resource Allocation for Data Analysis in Cloud-Edge System.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Data-Centric Task Scheduling Algorithm for Hybrid Tasks in Cloud Data Centers.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Heterogeneous Cooperative Co-Evolution Memetic Differential Evolution Algorithm for Big Data Optimization Problems.
IEEE Trans. Evol. Comput., 2017

Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

Virtual networks dependability assessment framework.
Int. J. High Perform. Comput. Netw., 2017

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression.
Concurr. Comput. Pract. Exp., 2017

Multilayer hybrid strategy for phishing email zero-day filtering.
Concurr. Comput. Pract. Exp., 2017

Applications and techniques in information and network security.
Concurr. Comput. Pract. Exp., 2017

Federated Internet of Things and Cloud Computing Pervasive Patient Health Monitoring System.
IEEE Commun. Mag., 2017

Cloud-assisted IoT-based health status monitoring framework.
Clust. Comput., 2017

A parallel framework for software defect detection and metric selection on cloud computing.
Clust. Comput., 2017

Advances in Teaching and Learning on Facebook in Higher Institutions.
IEEE Access, 2017

Fog of Everything: Energy-Efficient Networked Computing Architectures, Research Challenges, and a Case Study.
IEEE Access, 2017

Securing Websites Against Homograph Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2017

Privacy Threat Analysis of Mobile Social Network Data Publishing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Clustering analysis for malicious network traffic.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles.
IEEE J. Biomed. Health Informatics, 2016

Filtering Redundant Data from RFID Data Streams.
J. Sensors, 2016

Evolutionary optimization: A big data perspective.
J. Netw. Comput. Appl., 2016

Network computing and applications for Big Data analytics.
J. Netw. Comput. Appl., 2016

Secure Object Tracking Protocol for the Internet of Things.
IEEE Internet Things J., 2016

Sensor-Web Systems, Applications, and Services.
Int. J. Distributed Sens. Networks, 2016

Privacy models for big data: a survey.
Int. J. Big Data Intell., 2016

Hybrids of support vector machine wrapper and filter based framework for malware detection.
Future Gener. Comput. Syst., 2016

Trust, Security and Privacy in Emerging Distributed Systems.
Future Gener. Comput. Syst., 2016

Vertex re-identification attack using neighbourhood-pair properties.
Concurr. Comput. Pract. Exp., 2016

Privacy Preserving Social Network Data Publication.
IEEE Commun. Surv. Tutorials, 2016

An alternative data collection scheduling scheme in wireless sensor networks.
Computing, 2016

Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II.
Proceedings of the 24th International Conference on Software, 2016

A Multi-protocol Security Framework to Support Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2016

Text Detection in Low Resolution Scene Images Using Convolutional Neural Network.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

A Framework to Analyze Quality of Service (QoS) for Text-To-Speech (TTS) Services.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2016

Failure detection in virtual network environment.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

An alternative sensor Cloud architecture for vital signs monitoring.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

ECG rate control scheme in pervasive health care monitoring system.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

Prediction of Virtual Networks Substrata Failures.
Proceedings of the Advances in Services Computing, 2016

2015
Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions.
Wirel. Commun. Mob. Comput., 2015

Service level agreement management framework for utility-oriented computing platforms.
J. Supercomput., 2015

A Data Fusion Method in Wireless Sensor Networks.
Sensors, 2015

An efficient and distributed file search in unstructured peer-to-peer networks.
Peer-to-Peer Netw. Appl., 2015

Comprehensive analysis of big data variety landscape.
Int. J. Parallel Emergent Distributed Syst., 2015

Multimedia content adaptation service discovery mechanism.
Multim. Tools Appl., 2015

Dynamic path determination policy for distributed multimedia content adaptation.
Multim. Tools Appl., 2015

Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications.
Math. Comput. Sci., 2015

Utility-aware social network graph anonymization.
J. Netw. Comput. Appl., 2015

An efficient meta-heuristic algorithm for grid computing.
J. Comb. Optim., 2015

Mitigating malicious feedback attacks in trust management systems.
Int. J. Trust. Manag. Comput. Commun., 2015

Ideal basis in constructions defined by directed graphs.
Electron. J. Graph Theory Appl., 2015

Policy-based SQLIA detection and prevention approach for RFID systems.
Comput. Stand. Interfaces, 2015

Secure object tracking protocol for Networked RFID Systems.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems.
Proceedings of the Security and Privacy in Communication Networks, 2015

Reliability-Aware Distributed Computing Scheduling Policy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Adaptive Energy-Efficient QoS-Aware Scheduling Algorithm for TCP/IP Mobile Cloud.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Layered workflow scheduling algorithm.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

A Survey of Big Workflow.
Proceedings of the Second International Conference on Advanced Data and Information Engineering, 2015

A Framework for Implementing Asynchronous Replication Scheme in Utility-Based Computing Environment.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture.
J. Supercomput., 2014

The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and Its Related Algorithms.
IEEE Trans. Fuzzy Syst., 2014

Large Iterative Multitier Ensemble Classifiers for Security of Big Data.
IEEE Trans. Emerg. Top. Comput., 2014

Data Replication Approach with Consistency Guarantee for Data Grid.
IEEE Trans. Computers, 2014

Securing a Smart Anti-counterfeit Web Application.
J. Networks, 2014

A Hybrid Wrapper-Filter Approach for Malware Detection.
J. Networks, 2014

Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking.
J. Networks, 2014

Guest Editorial.
J. Networks, 2014

Iterative Construction of Hierarchical Classifiers for Phishing Website Detection.
J. Networks, 2014

Using response action with intelligent intrusion detection and prevention system against web application malware.
Inf. Manag. Comput. Secur., 2014

Emerging Sensor-Cloud Technology for Pervasive Services and Applications.
Int. J. Distributed Sens. Networks, 2014

Sensor Grid Middleware Metamodeling and Analysis.
Int. J. Distributed Sens. Networks, 2014

An approach for profiling phishing activities.
Comput. Secur., 2014

Scalable RFID security framework and protocol supporting Internet of Things.
Comput. Networks, 2014

User preference of cyber security awareness delivery methods.
Behav. Inf. Technol., 2014

An Improved Gbest Guided Artificial Bee Colony (IGGABC) Algorithm for Classification and Prediction Tasks.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

An Accelerated Particle Swarm Optimization Based Levenberg Marquardt Back Propagation Algorithm.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Neural Network Training by Hybrid Accelerated Cuckoo Particle Swarm Optimization Algorithm.
Proceedings of the Neural Information Processing - 21st International Conference, 2014

Taxonomy of Contention Management in Interconnected Distributed Systems.
Proceedings of the Computing Handbook, 2014

2013
IPMA: Indirect Patterns Mining Algorithm.
Proceedings of the Advanced Methods for Computational Collective Intelligence, 2013

Malware Detection and Prevention in RFID Systems.
Proceedings of the Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence, 2013

SQLIA detection and prevention approach for RFID systems.
J. Syst. Softw., 2013

A multi-tier phishing detection and filtering approach.
J. Netw. Comput. Appl., 2013

Fuzzy logic optimized wireless sensor network routing protocol.
J. High Speed Networks, 2013

Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes.
Int. J. Data Warehous. Min., 2013

An Efficient Scheduling Method for Grid Systems Based on a Hierarchical Stochastic Petri Net.
J. Comput. Sci. Eng., 2013

Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag.
Int. J. Networked Distributed Comput., 2013

Malware Detection and Prevention System Based on Multi-Stage Rules.
Int. J. Inf. Secur. Priv., 2013

GLOA: A New Job Scheduling Algorithm for Grid Computing.
Int. J. Interact. Multim. Artif. Intell., 2013

Power graphs: A survey.
Electron. J. Graph Theory Appl., 2013

A framework for scalable distributed provenance storage system.
Comput. Stand. Interfaces, 2013

Multistage approach for clustering and classification of ECG data.
Comput. Methods Programs Biomed., 2013

Predicting cardiac autonomic neuropathy category for diabetic data with missing values.
Comput. Biol. Medicine, 2013

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy.
Artif. Intell. Medicine, 2013

Preserving Utility in Social Network Graph Anonymization.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Profiling Phishing Email Based on Clustering Approach.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Crime Toolkits: The Productisation of Cybercrime.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Critical Analysis and Comparative Study of Security for Networked RFID Systems.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

Security Concerns and Remedy in a Cloud Based E-learning System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Securing a Web-Based Anti-counterfeit RFID System.
Proceedings of the Security and Privacy in Communication Networks, 2013

Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware.
Proceedings of the Advances in Security of Information and Communication Networks, 2013

Neighbourhood-Pair Attack in Social Network Data Publishing.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

A new energy efficient cluster-head and backup selection scheme in WSN.
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013

A fuzzy technique to control congestion in WSN.
Proceedings of the 2013 International Joint Conference on Neural Networks, 2013

2012
An efficient approach based on trust and reputation for secured selection of grid resources.
Int. J. Parallel Emergent Distributed Syst., 2012

Failure-aware resource provisioning for hybrid Cloud infrastructure.
J. Parallel Distributed Comput., 2012

Guest Editorial.
J. Networks, 2012

Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing.
Future Gener. Comput. Syst., 2012

Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Detecting and Mitigating HX-DoS Attacks against Cloud Web Services.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Using feature selection for intrusion detection system.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

EFP-M2: Efficient Model for Mining Frequent Patterns in Transactional Database.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2012

A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Hybrid Cloud resource provisioning policy in the presence of resource failures.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Improving Classi cations for Cardiac Autonomic Neuropathy Using Multi-level Ensemble Classi ers and Feature Selection Based.
Proceedings of the Tenth Australasian Data Mining Conference, AusDM 2012, Sydney, 2012

2011
SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors.
Sensors, 2011

An Approach for Removing Redundant Data from RFID Data Streams.
Sensors, 2011

Guest Editorial.
J. Networks, 2011

QoS-based adaptation service selection broker.
Future Gener. Comput. Syst., 2011

Attack Vector Analysis and Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Phishing Email Feature Selection Approach.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Mutual Authentication Protocol for Networked RFID Systems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Establishing Trust in Hybrid Cloud Computing Environments.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Efficient Resource Selection Algorithm for Enterprise Grid Systems.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

Privacy Threat Analysis of Social Network Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Hybrid Feature Selection for Phishing Email Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

A Protocol for Discovering Content Adaptation Services.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Securing RFID Systems from SQLIA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Service Quality Assessment in Provision of Library Services.
Proceedings of the U- and E-Service, Science and Technology, 2011

Online Learning Environment: Taxonomy of Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

Engaging and Effective Asynchronous Online Discussion Forums.
Proceedings of the Software Engineering, Business Continuity, and Education, 2011

Prevention of Information Harvesting in a Cloud Services Environment.
Proceedings of the CLOSER 2011, 2011

2010
Agents Based e-Commerce and Securing Exchanged Information.
Proceedings of the Pervasive Computing, 2010

Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models.
Sensors, 2010

Network Management in Distributed Systems.
Scalable Comput. Pract. Exp., 2010

A rough set approach for selecting clustering attribute.
Knowl. Based Syst., 2010

Negotiation Strategy for Mobile Agent-Based e-Negotiation.
Proceedings of the Principles and Practice of Multi-Agent Systems, 2010

Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Service Discovery for Service-Oriented Content Adaptation.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A Hybrid Mutual Authentication Protocol for RFID.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Matrices Representation of Multi Soft-Sets and Its Application.
Proceedings of the Computational Science and Its Applications, 2010

Novel Mechanism for Evaluating Feedback in the Grid Environment on Resource Allocation.
Proceedings of the 2010 International Conference on Grid Computing & Applications, 2010

An Approach to Filtering Duplicate RFID Data Streams.
Proceedings of the U- and E-Service, Science and Technology, 2010

A Privacy Preserving Service Broker Architecture for Data Sharing.
Proceedings of the Future Generation Information Technology, 2010

Performance Analysis of Cyber Security Awareness Delivery Methods.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

Multi-criteria Content Adaptation Service Selection Broker.
Proceedings of the 10th IEEE/ACM International Conference on Cluster, 2010

2009
Guest Editorial.
J. Networks, 2009

Adaptive hierarchical scheduling policy for enterprise grid computing systems.
J. Netw. Comput. Appl., 2009

Human-computer interaction in ubiquitous computing environments.
Int. J. Pervasive Comput. Commun., 2009

Advances in pervasive computing: GUEST EDITORIAL.
Int. J. Pervasive Comput. Commun., 2009

Managing data using neighbour replication on a triangular-grid structure.
Int. J. High Perform. Comput. Netw., 2009

An agent architecture for managing data resources in a grid environment.
Future Gener. Comput. Syst., 2009

Multi-cluster computing interconnection network performance modeling and analysis.
Future Gener. Comput. Syst., 2009

An efficient adaptive scheduling policy for high-performance computing.
Future Gener. Comput. Syst., 2009

Design and Delivery of Undergraduate IT Security Management Course.
Proceedings of the Advances in Information Security and Assurance, 2009

Enhancing RFID Tag Resistance against Cloning Attack.
Proceedings of the Third International Conference on Network and System Security, 2009

A Layered Security Approach for Cloud Computing Infrastructure.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

An Approach to Filtering RFID Data Streams.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Information Provenance for Open Distributed Collaborative System.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Multi-tier Phishing Email Classification with an Impact of Classifier Rescheduling.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Determining Service Trustworthiness in Intercloud Computing Environments.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A RFID architecture framework for global supply chain applications.
Proceedings of the iiWAS'2009, 2009

2008
Security and privacy threats to volunteer computing.
Int. J. Crit. Infrastructures, 2008

An efficient replicated data access approach for large-scale distributed systems.
Future Gener. Comput. Syst., 2008

A comprehensive analytical model of interconnection networks in large-scale cluster systems.
Concurr. Comput. Pract. Exp., 2008

Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks.
Comput. Electr. Eng., 2008

A classification for content adaptation system.
Proceedings of the iiWAS'2008, 2008

An Online Credential Management Service for InterGrid Computing.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Analytical modeling of interconnection networks in heterogeneous multi-cluster systems.
J. Supercomput., 2007

Analytical communication networks model for enterprise Grid computing.
Future Gener. Comput. Syst., 2007

Feedback Credibility Issues In Trust Management Systems.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient Information among Autonomous Healthcare Providers.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Sensor Node Activity Scheduling Approach.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Authorization Policy Management Framework for Dynamic Medical Data Sharing.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Communication Network Analysis of the Enterprise Grid Systems.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

Taxonomy and Survey of Location Management Systems.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Multilevel Trust Management Framework.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
A performance model for analysis of heterogeneous multi-cluster systems.
Parallel Comput., 2006

A novel data replication and management protocol for mobile computing systems.
Mob. Inf. Syst., 2006

Adaptive parallel I/O scheduling algorithm for multiprogrammed systems.
Future Gener. Comput. Syst., 2006

Special section: Parallel input/output management techniques (PIOMT) in cluster and grid computing.
Future Gener. Comput. Syst., 2006

Analysis of Interconnection Networks in Heterogeneous Multi-Cluster Systems.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Analytical Modeling of Communication Latency in Multi-Cluster Systems.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Managing Data Using Neighbor Replication on Triangular-Grid Structure.
Proceedings of the Computational Science, 2006

A Reputation-Based Grid Information Service.
Proceedings of the Computational Science, 2006

Economy-Based Data Replication Broker.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

Analytical Network Modeling of Heterogeneous Large-Scale Cluster Systems.
Proceedings of the 2006 IEEE International Conference on Cluster Computing, 2006

Supporting Disconnected Operations in Mobile Computing.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

Parallel I/O Scheduling in the Presence of Data Duplication on Multiprogrammed Cluster Computing Systems.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Performance Analysis of Heterogeneous Multi-Cluster Systems.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

A New Approach For Efficiently Achieving High Availability in Mobile Computing.
Proceedings of the Computational Science and Its Applications, 2005

Robust Parallel Job Scheduling Infrastructure for Service-Oriented Grid Computing Systems.
Proceedings of the Computational Science and Its Applications, 2005

Performance Analysis of Interconnection Networks for Multi-cluster Systems.
Proceedings of the Computational Science, 2005

High Reliability Replication Technique for Web-Server Cluster Systems.
Proceedings of the Computational Science, 2005

An Efficient Replicated Data Management Approach for Peer-to-Peer Systems.
Proceedings of the Computational Science, 2005

Autonomic Job Scheduling Policy for Grid Computing.
Proceedings of the Computational Science, 2005

Job Scheduling Policy for High Throughput Grid Computing.
Proceedings of the Distributed and Parallel Computing, 2005

Fault-Tolerant Dynamic Job Scheduling Policy.
Proceedings of the Distributed and Parallel Computing, 2005

A new Internet meta-search engine and implementation.
Proceedings of the 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), 2005

2004
Preemptive Job Scheduling Policy For Distributively-Owned Workstation Clusters.
Parallel Process. Lett., 2004

Fault-tolerant Grid Resource Management Infrastructure.
Neural Parallel Sci. Comput., 2004

Grid Accounting Service Infrastructure for Service-Oriented Grid Computing Systems.
Proceedings of the Scientific Applications of Grid Computing, First International Workshop, 2004

Grid accounting and payment architecture.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

Fault-Tolerant Scheduling Policy for Grid Computing Systems.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Design and Evaluation of an Agent-Based Communication Model for a Parallel File System.
Proceedings of the Computational Science and Its Applications, 2004

Fault Detection Service Architecture for Grid Computing Systems.
Proceedings of the Computational Science and Its Applications, 2004

File Replacement Algorithm for Storage Resource Managers in Data Grids.
Proceedings of the Computational Science, 2004

Placement of File Replicas in Data Grid Environments.
Proceedings of the Computational Science, 2004

Dynamic Parallel Job Scheduling in Multi-cluster Computing Systems.
Proceedings of the Computational Science, 2004

Cooperation model of a multiagent parallel file system for clusters.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

An efficient replicated data access approach for large-scale distributed systems.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
A Reconfigurable Multi-Layered Grid Scheduling Infrastructure.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

Scheduling Parallel Jobs with CPU and I/O Resource Requirements in Cluster Computing Systems.
Proceedings of the 11th International Workshop on Modeling, 2003

An Adaptive Load Balancing Algorithm for Large Data Parallel Processing with Communication Delay.
Proceedings of the Computational Science - ICCS 2003, 2003

Parallel I/O Scheduling in Multiprogrammed Cluster Computing Systems.
Proceedings of the Computational Science - ICCS 2003, 2003

Parallel Job Scheduling on Multicluster Computing Systems.
Proceedings of the 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 2003

Performance Analysis of Parallel I/O Scheduling Approaches on Cluster Computing Systems.
Proceedings of the 3rd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2003), 2003

A Unified Resource Scheduling Approach on Cluster Computing Systems.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Job Scheduling Policy for High Throughput Computing Environments.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

2000
Time/Space Sharing Distributed Job Scheduling Policy in a Workstation Cluster Environment.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

Distributed Hierarchical Workstation Cluster Co-Ordination Scheme.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment.
Proceedings of the 2000 International Conference on Parallel Computing in Electrical Engineering (PARELEC 2000), 2000

Parallel Job Scheduling Policy for Workstation Cluster Environments.
Proceedings of the 2000 IEEE International Conference on Cluster Computing (CLUSTER 2000), November 28th, 2000

1999
An Approach to Scheduling Parallel Applications on Networks of Workstations.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

1994
Framework for the design of coupled knowledge/data base medical information systems.
Proceedings of the Seventh Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'94), 1994

1993
Orphan Problems and Remedies In Distributed Systems.
ACM SIGOPS Oper. Syst. Rev., 1993


  Loading...