Prof Jemal Abawajy

STAFF PROFILE

Position

Professor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Contact

jemal.abawajy@deakin.edu.au
+61 3 522 71376

Publications

Filter by

2016

Evolutionary optimization: a big data perspective

Madhumita Bhattacharya, Rafiqul Islam, Prof Jemal Abawajy

(2016), Vol. 59, pp. 416-426, Journal of Network and Computer Applications, Amsterdam, The Netherlands, C1

journal

Enhancing predictive accuracy of cardiac autonomic neuropathy using blood biochemistry features and iterative multitier ensembles

Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury, Herbert Jelinek

(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1

journal

Security considerations for wireless carrier agonistic bio-monitoring systems

Mr Benjamin Jonathan Townsend, Prof Jemal Abawajy

(2016), pp. 725-737, Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers, Berlin, Germany, B1

chapter

Vertex re-identification attack using neighbourhood-pair properties

Prof Jemal Abawajy, Mr Mohd Izuan Hafez Ninggal, Tutut Herawan

(2016), Vol. 28, pp. 2906-2919, Concurrency computation: practice and experience, London, Eng., C1

journal

Rees semigroups of digraphs for classification of data

Prof Jemal Abawajy, Dr Andrei Kelarev, Mirka Miller, Joe Ryan

(2016), Vol. 92, pp. 121-134, Semigroup forum, New York, N.Y., C1

journal
2015

An efficient and distributed file search in unstructured peer-to-peer networks

Mohammad Shojafar, Prof Jemal Abawajy, Zia Delkhah, Ali Ahmadi, Zahra Pooranian, Ajith Abraham

(2015), Vol. 8, pp. 120-136, Peer-to-peer networking and applications, New York, N.Y., C1

journal

An alternative clustering scheme in WSN

Mr David Izadi, Prof Jemal Abawajy, Mrs Sara Ghanavati

(2015), Vol. 15, pp. 4148-4155, IEEE sensors journal, Champaign, Ill., C1

journal

Dynamic path determination policy for distributed multimedia content adaptation

Prof Jemal Abawajy, F Fudzee

(2015), Vol. 74, pp. 8325-8341, Multimedia tools and applications, Berlin, Germany, C1

journal

A data fusion method in wireless sensor networks

Mr David Izadi, Prof Jemal Abawajy, Mrs Sara Ghanavati, Tutut Herawan

(2015), Vol. 15, pp. 2964-2979, Sensors, Basel, Switzerland, C1

journal

An alternative node deployment scheme for WSNs

Mr David Izadi, Prof Jemal Abawajy, Mrs Sara Ghanavati

(2015), Vol. 15, pp. 667-675, IEEE Sensors journal, Champaign, III., C1

journal

Secure object tracking protocol for networked RFID systems

Mr Biplob Ray, Dr Morshed Chowdhury, Prof Jemal Abawajy, Monika Jesmin

(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Piscataway, N.J., E1

conference

Distances of centroid sets in a graph-based construction for information security applications

Prof Jemal Abawajy, Dr Andrei Kelarev, M. D. Miller, J Ryan

(2015), Vol. 9, pp. 127-137, Mathematics in computer science, Berlin, Germany, C1

journal

Policy-based SQLIA detection and prevention approach for RFID systems

Prof Jemal Abawajy, Dr Harinda Fernando

(2015), Vol. 38, pp. 64-71, Computer standards and interfaces, Amsterdam, The Netherlands, C1

journal

Workflow scheduling on distributed systems

Ms Maslina Abdul Aziz, Prof Jemal Abawajy, Rafiqul Islam, Tutut Herawan

(2015), pp. 683-689, ICIEA 2015: Proceedings of the 10th IEEE conference on Industrial Electronics and Applications, Piscataway, N.J., E1

conference

Layered workflow scheduling algorithm

Ms Maslina Abdul Aziz, Prof Jemal Abawajy, Tutut Herawan

(2015), pp. 1-7, FUZZ-IEEE 2015 : Proceedings of the IEEE International Conference on Fuzzy Systems, Piscataway, N.J., E1

conference

A congestion control scheme based on fuzzy logic in wireless body area networks

Mrs Sara Ghanavati, Prof Jemal Abawajy, Mr David Izadi

(2015), pp. 235-242, NCA 2015: Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, Piscataway, N.J., E1

conference

Mitigating malicious feedback attacks in trust management systems

Dr Soon Chong, Prof Jemal Abawajy

(2015), Vol. 3, pp. 1-18, International journal of trust management in computing and communications, Milton Keynes, Eng., C1

journal

Utility-aware social network graph anonymization

Mr Mohd Izuan Hafez Ninggal, Prof Jemal Abawajy

(2015), Vol. 56, pp. 137-148, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Multimedia content adaptation service discovery mechanism

Prof Jemal Abawajy, F Fudzee, Mustafa Mat Deris

(2015), Vol. 74, pp. 8365-8378, Multimedia tools and applications, Berlin, Germany, C1

journal

Ideal bases in constructions defined by directed graphs

Prof Jemal Abawajy, Dr Andrei Kelarev, Joe Ryan

(2015), Vol. 3, pp. 35-49, Electronic journal of graph theory and applications, Jawa Barat, Indonesia, C1

journal

An efficient meta-heuristic algorithm for grid computing

Zahra Pooranian, Mohammad Shojafar, Prof Jemal Abawajy, Ajith Abraham

(2015), Vol. 30, pp. 413-434, Journal of combinatorial optimization, Berlin, Germany, C1

journal

Reliability-aware distributed computing scheduling policy

Prof Jemal Abawajy, Mohammad Mehedi Hassan

(2015), pp. 627-632, Algorithms and architectures for parallel processing : ICA3PP international workshops and symposiums, Zhangjiajie, China, November 18-20, 2015, proceedings, Cham, Switzerland, B1

chapter

Adaptive energy-efficient qos-aware scheduling algorithm for TCP/IP mobile cloud

Mohammad Shojafar, Nicola Cordeschi, Prof Jemal Abawajy, Enzo Baccarelli

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications 2015 Conference, Piscataway, N.J., E1

conference

A framework for implementing asynchronous replication scheme in utility-based computing environment

Wan Nor Shuhadah Wan Nik, Dr Bing Bing Zhou, Albert Y. Zomaya, Prof Jemal Abawajy

(2015), pp. 183-190, CCBD 2015: Proceedings of the Cloud Computing and Big Data 2015 International Conference, Piscataway, N. J., E1

conference

Multi-layer attribute selection and classification algorithm for the diagnosis of cardiac autonomic neuropathy based on HRV attributes

Herbert Jelinek, Prof Jemal Abawajy, David Cornforth, Adam Kowalczyk, Michael Negnevitsky, Dr Morshed Chowdhury, Robert Krones, Dr Andrei Kelarev

(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1

journal

Service level agreement management framework for utility-oriented computing platforms

Prof Jemal Abawajy, Mohd Farhan Fudzee, Mohammad Mehedi Hassan, Majed Alrubaian

(2015), Vol. 71, pp. 4287-4303, Journal of supercomputing, Berlin, Germany, C1

journal

Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions

Shivali Bansal, Prof Jemal Abawajy

(2015), Vol. 15, pp. 649-665, Wireless communications and mobile computing, London, Eng., C1

journal
2014

User preference of cyber security awareness delivery methods

Prof Jemal Abawajy

(2014), Vol. 33, pp. 237-248, Behaviour and information technology, Oxford, England, C1

journal

The parameter reduction of the interval-valued fuzzy soft sets and its related algorithms

Xiuqin Ma, Hongwu Qin, Norrozila Sulaiman, Tutut Herawan, Prof Jemal Abawajy

(2014), Vol. 22, pp. 57-71, IEEE transactions on fuzzy systems, Piscataway, N. J., C1

journal

Scalable RFID security framework and protocol supporting Internet of Things

Mr Biplob Ray, Prof Jemal Abawajy, Dr Morshed Chowdhury

(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1

journal

An approach for profiling phishing activities

Isredza Rahmi A. Hamid, Prof Jemal Abawajy

(2014), Vol. 45, pp. 27-41, Computers and security, Kidlington, England, C1

journal

Large iterative multitier ensemble classifiers for security of big data

Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury

(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1

journal

Incidence semirings of graphs and visible bases

Prof Jemal Abawajy, Dr Andrei Kelarev, Mirka Miller, Joe Ryan

(2014), Vol. 89, pp. 451-459, Bulletin of the Australian mathematical society, Cambridge, England, C1

journal

An SLA evaluator for multimedia content adaptation services

Mr Mohd Farhan Md Fudzee, Juliana Mohamed, Prof Jemal Abawajy, Shahreen Kasim, Mohd Norasri Ismail

(2014), pp. 1-4, Proceedings of the 5th International Conference on Information Science and Applications; ICISA 2014, Red Hook, NY, E1

conference

Iterative construction of hierarchical classifiers for phishing website detection

Prof Jemal Abawajy, Prof Gleb Beliakov, Dr Andrei Kelarev, Dr Morshed Chowdhury

(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1

journal

Comprehensive analysis of big data variety landscape

Prof Jemal Abawajy

(2014), Vol. 30, pp. 5-14, International journal of parallel, emergent and distributed systems, Bingley, U. K., C1

journal

Taxonomy of contention management in interconnected distributed systems

Mohsen Amini Salehi, Prof Jemal Abawajy, Prof Rajkumar Buyya

(2014), pp. 1-48, Computing handbook, Boca Raton, FL, B1

chapter

PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture

Saeed Javanmardi, Mohammad Shojafar, Shahdad Shariatmadari, Prof Jemal Abawajy, Mukesh Singhal

(2014), Vol. 69, pp. 955-975, The journal of supercomputing, New York, NY, C1

journal

Data replication approach with consistency guarantee for data grid

Prof Jemal Abawajy, Mustafa Mat Deris

(2014), Vol. 63, pp. 2975-2987, IEEE Transactions on Computers, Piscataway, NJ, C1

journal

Trends in crime toolkit development

Ansam Khraisat, Dr Michael Hobbs, Ammar Alazab, Prof Jemal Abawajy, Ahmad Azab

(2014), pp. -, Network security technologies: design and applications, Hershey PA, USA, B1

chapter

An improved Gbest guided artificial bee colony (IGGABC) algorithm for classification and prediction tasks

Habib Shah, Tutut Herawan, Rozaida Ghazali, Rashid Naseem, Maslina Aziz, Prof Jemal Abawajy

(2014), pp. 559-569, Neural Information Processing, Heidelberg, Germany, B1

chapter

Neural network training by hybrid accelerated cuckoo particle swarm optimization algorithm

Nazri Nawi, Abdullah Khan, Mohammad Rehman, Maslina Aziz, Tutut Herawan, Prof Jemal Abawajy

(2014), pp. 237-244, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

Using response action with Intelligent Intrusion detection and prevention System against web application malware

Ammar Alazab, Dr Michael Hobbs, Prof Jemal Abawajy, Ansam Khraisat, Mamoun Alazab

(2014), Vol. 22, pp. 431-449, Information Management and Computer Security, Bingley, Eng., C1

journal

Decision trees and multi-level ensemble classifiers for neurological diagnostics

Herbert Jelinek, Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury, A/Prof Andrew Stranieri

(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1

journal

Automatic generation of meta classifiers with large levels for distributed computing and networking

Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury

(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1

journal

Neighbourhood-pair attack in social network data publishing

Mr Mohd Izuan Hafez Ninggal, Prof Jemal Abawajy

(2014), pp. 726-731, Mobile and Ubiquitous Systems : Computing, Networking, and Services, Heidelberg, Germany, B1

chapter

An accelerated particle swarm optimization based levenberg marquardt back propagation algorithm

Nazri Nawi, Abdullah Khan, Mohammad Rehman, Maslina Aziz, Tutut Herawan, Prof Jemal Abawajy

(2014), pp. 245-253, Lecture notes in computer science, Heidelberg, Germany, B1

chapter

A competitive three-level pruning technique for information security

Dr Morshed Chowdhury, Prof Jemal Abawajy, Dr Andrei Kelarev, Kouichi Sakurai

(2014), pp. 25-32, Applications and Techniques in Information Security, Berlin, Germany, B1

chapter

Sensor grid middleware metamodeling and analysis

Dr Siva Chandrasekaran, Eunmi Choi, Prof Jemal Abawajy, Rajesh Natarajan

(2014), Vol. 2014, pp. 1-12, International Journal of Distributed Sensor Networks, New York, NY, C1

journal

PUF-based secure checker protocol for Networked RFID Systems

Mr Biplob Ray, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Piscataway, NJ, E1

conference

Securing a smart anti-counterfeit web application

Mr Belal Chowdhury, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1

journal

A hybrid wrapper-filter approach for malware detection

Mamoun Alazab, Dr Shamsul Huda, Prof Jemal Abawajy, Rafiqul Islam, Prof John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst

(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1

journal
2013

SQLIA detection and prevention approach for RFID systems

Prof Jemal Abawajy

(2013), Vol. 86, pp. 751-758, Journal of systems and software, Amsterdam, The Netherlands, C1

journal

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A/Prof Andrew Stranieri, Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Shamsul Huda, Dr Morshed Chowdhury, Herbert Jelinek

(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1

journal

Critical analysis and comparative study of security for networked RFID systems

Mr Biplob Ray, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Piscataway, N. J, E1

conference

A framework for scalable distributed provenance storage system

Prof Jemal Abawajy, Syed I. Jami, Zubair A. Shaikh, Syed A. Hammad

(2013), Vol. 35, pp. 179-186, Computer standards & interfaces, Amsterdam, The Netherlands, C1

journal

StenoCipher to provide data confidentiality and tampered data recovery for RFID tag

Mr Biplob Ray, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2013), pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

chapter

IPMA : Indirect patterns mining algorithm

Tutut Herawan, A. Noraziah, Zailani Abdullah, Mustafa Mat Deris, Prof Jemal Abawajy

(2013), pp. 187-196, Studies in computational intelligence, Berlin, Germany, B1

chapter

Fuzzy logic optimized wireless sensor network routing protocol

Mr David Izadi, Prof Jemal Abawajy, Mrs Sara Ghanavati

(2013), Vol. 19, pp. 115-128, Journal of high speed networks, Amsterdam, The Netherlands, C1

journal

Malware detection and prevention in RFID systems

Dr Harinda Fernando, Prof Jemal Abawajy

(2013), pp. 143-166, Internet of things and inter-cooperative computational technologies for collective intelligence, Heidelberg, Germany, B1

chapter

A multi-tier phishing detection and filtering approach

Dr Rafiq Islam, Prof Jemal Abawajy

(2013), Vol. 36, pp. 324-335, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

A new energy efficient cluster-head and backup selection scheme in WSN

Mr David Izadi, Prof Jemal Abawajy, Mrs Sara Ghanavati

(2013), pp. 408-415, IRI 2013 : Proceedings of the 14th IEEE International Conference on Information Reuse and Integration, Piscataway, N.J., E1

conference

Web malware that targets web applications

Mr Ammar Al Azab, Prof Jemal Abawajy, Dr Michael Hobbs

(2013), pp. 248-264, Social network engineering for secure web data and services, Hershey, Pa., B1

chapter

Developing an intelligent intrusion detection and prevention system against web application malware

Mr Ammar Al Azab, Dr Michael Hobbs, Prof Jemal Abawajy, Ansam Khraisat

(2013), pp. 177-184, Advances in security of information and communication networks. First International Conference , SecNet 2013 Cairo, Egypt, September Proceedings, Berlin, Germany, B1

chapter

A fuzzy technique to control congestion in WSN

Mrs Sara Ghanavati, Prof Jemal Abawajy, Mr David Izadi

(2013), pp. 1806-1810, IJCNN 2013 : Proceedings of the International Joint Conference on Neural Networks, Piscataway, N.J., E1

conference

Intelligent battery energy management and control for vehicle-to-grid via cloud computing network

Dr Hamid Khayyam, Prof Jemal Abawajy, Bahman Javadi, Prof Andrzej Goscinski, Prof Alex Stojcevski, Alireza Bab-Hadiashar

(2013), Vol. 111, pp. 971-981, Applied energy, Amsterdam, The Netherlands, C1

journal

Using feature selection and classification scheme for automating phishing email detection

Isredza Rahmi A. Hamid, Prof Jemal Abawajy, Tai-hoon Kim

(2013), Vol. 22, pp. 61-70, Studies in informatics and control, Bucharest, Romania, C1

journal

Malware detection and prevention system based on multi-stage rules

Mr Ammar Al Azab, Dr Michael Hobbs, Prof Jemal Abawajy, Ansam Khraisat

(2013), Vol. 7, pp. 29-43, International journal of information security and privacy, Hershey, Pa., C1

journal

An efficient scheduling method for grid systems based on a hierarchical stochastic petri net

Mohammad Shojafar, Zahra Pooranian, Prof Jemal Abawajy, Mohammad Reza Meybodi

(2013), Vol. 7, pp. 44-52, Journal of computing science and engineering, Seoul, Korea, C1

journal

A data mining application of the incidence semirings

Prof Jemal Abawajy, Dr Andrei Kelarev, J. L. Yearwood, C Turville

(2013), Vol. 39, pp. 1083-1093, Houston journal of mathematics, Houston, Tx., C1

journal

Securing a web-based anti-counterfeit RFID system

Mr Belal Chowdhury, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1

chapter

Security concerns and remedy in a cloud based e-learning system

Md. Anwar Hossain Masud, Md. Rafiqul Islam, Prof Jemal Abawajy

(2013), pp. 356-366, Security and privacy in communication networks, Berlin, Germany, B1

chapter

Profiling phishing email based on clustering approach

Isredza Rahmi A. Hamid, Prof Jemal Abawajy

(2013), pp. 628-635, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, N.J., E1

conference

Preserving utility in social network graph anonymization

Mr Mohd Izuan Hafez Ninggal, Prof Jemal Abawajy

(2013), pp. 226-232, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, N.J., E1

conference

Power graphs : a survey

Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury

(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, Indonesia, C1

journal

Centroid sets with largest weight in Munn semirings for data mining applications

Prof Jemal Abawajy, Dr Andrei Kelarev, John Zeleznikow

(2013), Vol. 87, pp. 617-626, Semigroup forum, Berlin, Germany, C1

journal

Multistage approach for clustering and classification of ECG data

Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury

(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1

journal

Empirical investigation of decision tree ensembles for monitoring cardiac complications of diabetes

Dr Andrei Kelarev, Prof Jemal Abawajy, A/Prof Andrew Stranieri, Herbert Jelinek

(2013), Vol. 9, pp. 1-18, International journal of data warehousing and mining, Hershey, PA, C1

journal

Predicting cardiac autonomic neuropathy category for diabetic data with missing values

Prof Jemal Abawajy, Dr Andrei Kelarev, Dr Morshed Chowdhury, A/Prof Andrew Stranieri, Herbert Jelinek

(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1

journal

The challenges of cloud computing technology adoption in e-government

Ms Maslina Abdul Aziz, Prof Jemal Abawajy, Dr Morshed Chowdhury

(2013), pp. 1-5, ACSAT 2013 : Proceedings of the Advanced Computer Science Applications and Technologies 2013 international conference, Sarawak, Malaysia, E1

conference

Steno cipher to provide data confidentiality and tampered data recovery for RFID tag

Mr Biplob Ray, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2013), pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1-1

chapter
2012

An efficient approach based on trust and reputation for secured selection of grid resources

V. Vijayakumar, R. S. D. Wahida Banu, Prof Jemal Abawajy

(2012), Vol. 27, pp. 1-17, International journal of parallel, emergent and distributed systems, Essex, England, C1

journal

Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing

Anton Beloglazov, Prof Jemal Abawajy, Prof Rajkumar Buyya

(2012), Vol. 28, pp. 755-768, Future generation computer systems, Amsterdam, Netherlands, C1

journal

A security framework for networked RFID

Dr Harinda Fernando, Prof Jemal Abawajy

(2012), pp. 85-114, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1

chapter

Security framework for mobile agents-based applications

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2012), pp. 242-269, Mobile computing techniques in emerging markets : systems, applications and services, Hershey Pa., B1

chapter

Mobile agents security protocols

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2012), pp. 270-305, Mobile computing techniques in emerging markets : systems, applications and services, Hershey, Pa., B1

chapter

Service quality assessment in provision of library services

Mrs Masitah Ahmad, Prof Jemal Abawajy, Tai-hoon Kim

(2012), pp. 83-92, U- and e-service, science and technology : international conference, UNESST 2011, held as part of the future generation information technology Conference, FGIT 2011 in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Berlin, Germany, E1

conference

Quality control of sensor network data

Mr David Izadi, Prof Jemal Abawajy, Sarah Ghanavati

(2012), pp. 467-480, Advances in automation and robotics, vol.1, selected papers from the 2011 International Conference on Automation and Robotics (ICAR 2011), Dubai, December 1-2, 2011, Berlin, Germany, B1

chapter

An approach to faulty reader detection in RFID reader network

Hairulnizam Mahdin, Prof Jemal Abawajy

(2012), pp. 70-84, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1

chapter

Virtual property theft detection framework

Dr Nick Patterson, Dr Michael Hobbs, Prof Jemal Abawajy

(2012), pp. 177-184, TRUSTCOM 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, N. J., E1

conference

Multi-input-multi-output antennas for radio frequency identification systems

Ms Shivali Goel, Prof Jemal Abawajy

(2012), pp. 96-127, Chipless and conventional radio frequency identification : systems for ubiquitous tagging, United States, B1

chapter

Intelligent energy management control of vehicle air conditioning system coupled with engine

Dr Hamid Khayyam, Prof Jemal Abawajy, Reza N. Jazar

(2012), Vol. 48, pp. 211-224, Applied thermal engineering, Oxford, England, C1

journal

Failure-aware resource provisioning for hybrid cloud infrastructure

Bahman Javadi, Prof Jemal Abawajy, Prof Rajkumar Buyya

(2012), Vol. 72, pp. 1318-1331, Journal of parallel and distributed computing, Maryland Heights, Mo., C1

journal

Using feature selection for intrusion detection system

Mr Ammar Al Azab, Dr Michael Hobbs, Prof Jemal Abawajy, Mr Moutaz Alazab

(2012), pp. 296-301, ISCIT 2012 : Proceedings of the 12th IEEE International Symposium on Communications and Information Technologies, Piscataway, N. J., E1

conference

Detecting and mitigating HX-DoS attacks against cloud web services

Mr Ashley Chonka, Prof Jemal Abawajy

(2012), pp. 429-434, NBIS 2012 : Proceedings of the 2012 International Conference on Network-Based Information Systems, Los Alamitos, Calif., E1

conference

EFP-M2 : efficient model for mining frequent patterns in transactional database

Tutut Herawan, A. Noraziah, Zailani Abdullah, Mustafa Mat Deris, Prof Jemal Abawajy

(2012), pp. 29-38, Computational collective intelligence : technologies and applications : 4th international conference, ICCCI 2012, Ho Chi Minh City, Vietnam, November 28-30, 2012 : proceedings, Berlin, Germany, E1

conference

Classification systems based on combinatorial semigroups

Prof Jemal Abawajy, Dr Andrei Kelarev

(2012), Vol. 86, pp. 603-612, Semigroup forum, New York, N.Y., C1

journal

Hybrid cloud resource provisioning policy in the presence of resource failures

Bahman Javadi, Prof Jemal Abawajy, Richard O. Sinnott

(2012), pp. 10-17, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Piscataway, N.J., E1

conference

A multi-tier ensemble construction of classifiers for phishing email detection and filtering

Prof Jemal Abawajy, Dr Andrei Kelarev

(2012), pp. 48-56, Cyberspace safety and security : 4th International Symposium, CSS 2012 Melbourne, Australia, December 12-13, 2012 Proceedings, Berlin, Germany, E1

conference

Improving classifications for cardiac autonomic neuropathy using multi-level ensemble classifiers and feature selection based on random forest

Dr Andrei Kelarev, A/Prof Andrew Stranieri, J. L. Yearwood, Prof Jemal Abawajy, Herbert Jelinek

(2012), pp. 93-101, AusDM 2012 : Proceedings of the 10th Australasian Data Mining Conference, Sydney, N.S.W., E1

conference

Strategies for agent-based negotiation in e-trade

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2012), pp. 43-65, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1

chapter

Management of service level agreement for service-oriented content adaptation platform

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy

(2012), pp. 21-42, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1

chapter

Analysis of asynchronous online discussion forums for collaborative learning

Prof Jemal Abawajy

(2012), Vol. 1, pp. 11-21, International journal of education and learning, Sandy Bay, Tas., C1

journal

Performance evaluation of multi-tier ensemble classifiers for phishing websites

Prof Jemal Abawajy, Prof Gleb Beliakov, Dr Andrei Kelarev, J. L. Yearwood

(2012), pp. 11-16, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

Mr Biplob Ray, Dr Morshed Chowdhury, Prof Jemal Abawajy

(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Piscataway, N.J., E1

conference

Empirical investigation of multi-tier ensembles for the detection of cardiac autonomic neuropathy using subsets of the Ewing Features

Prof Jemal Abawajy, Dr Andrei Kelarev, A/Prof Andrew Stranieri, Herbert Jelinek

(2012), pp. 1-11, CIHealth 2012- Proceedings of the Workshop on New Trends of Computational Intelligence in Health Applciations, Sydney, N.S.W., E1

conference

E-commerce trust management system reliability

Dr Soon Chong, Prof Jemal Abawajy

(2012), pp. 13-18, ISSDM 2012 : Proceedings of the 6th International Conference on New Trends in Information Science, Service Science and Data Mining, Piscataway, N.J., E1

conference

The role of emotional intelligence on the resolution of disputes involving the electronic health record

Dr Emilia Bellucci, Sitalakshmi Venkatraman, Nial Muecke, A/Prof Andrew Stranieri, Prof Jemal Abawajy

(2012), pp. 3-12, HIKM 2012 : Proceedings of the Fifth Australasian Workshop on Health Informatics and Knowledge Management, Melbourne, Vic., E1

conference
2011

Mutual authentication protocol for networked RFID systems

Dr Harinda Fernando, Prof Jemal Abawajy

(2011), pp. 417-424, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Prevention of information harvesting in a cloud services environment

Prof Lynn Batten, Prof Jemal Abawajy, Dr Robin Ram Mohan Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Efficient resource selection algorithm for enterprise grid systems

Wan Nor Shuhadah Wan Nik, Dr Bing Bing Zhou, Albert Y. Zomaya, Prof Jemal Abawajy

(2011), pp. 57-62, ISPA 2011 : Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, Busan, Korea, E1

conference

Phishing email feature selection approach

Miss Isredza Rahmi A Hamid, Prof Jemal Abawajy

(2011), pp. 916-921, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, N. J., E1

conference

Optimization and matrix constructions for classification of data

Dr Andrei Kelarev, J. L. Yearwood, Peter Vamplew, Prof Jemal Abawajy, Dr Morshed Chowdhury

(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1

journal

Attack vector analysis and privacy-preserving social network data publishing

Mr Mohd Izuan Hafez Ninggal, Prof Jemal Abawajy

(2011), pp. 847-852, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

SMS-based medical diagnostic telemetry data transmission protocol for medical sensors

Mr Benjamin Jonathan Townsend, Prof Jemal Abawajy, Tai-hoon Kim

(2011), Vol. 11, pp. 4231-4243, Sensors, Basel, Switzerland, C1

journal

Engaging and effective asynchronous online discussion forums

Prof Jemal Abawajy, Tai-hoon Kim

(2011), pp. 695-705, Software engineering, business continuity, and education : international conferences, ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, Decemb, Berlin, Germany, E1

conference

Online learning environment : taxonomy of asynchronous online discussion forums

Prof Jemal Abawajy, Tai-hoon Kim

(2011), pp. 706-714, Software engineering, business continuity, and education : international conferences, ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, Decemb, Berlin, Germany, E1

conference

Privacy threat analysis of social network data

Mr Mohd Izuan Hafez Ninggal, Prof Jemal Abawajy

(2011), pp. 165-174, Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part II, Berlin, Germany, E1

conference

Securing RFID systems from SQLIA

Dr Harinda Fernando, Prof Jemal Abawajy

(2011), pp. 245-254, Algorithms and architectures for parallel processing, Berlin, Germany, B1

chapter

A protocol for discovering content adaptation services

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy

(2011), pp. 235-244, Algorithms and architectures for parallel processing, Berlin, Germany, B1

chapter

Hybrid feature selection for phishing email detection

Miss Isredza Rahmi A Hamid, Prof Jemal Abawajy

(2011), pp. 266-275, Algorithms and architectures for parallel processing, Berlin, Germany, B1

chapter

QoS-based adaptation service selection broker

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy

(2011), Vol. 27, pp. 256-264, Future generation computer systems, Amsterdam, Netherlands, C1

journal

A Grobner-Shirshov algorithm for applications in internet security

Dr Andrei Kelarev, J. L. Yearwood, A/Prof Paul Watters, Xinwen Wu, L. Ma, Prof Jemal Abawajy, Dr Lei Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal

An approach for removing redundant data from RFID data streams

Hairulnizam Mahdin, Prof Jemal Abawajy

(2011), Vol. 11, pp. 9863-9877, Sensors, Lausanne, Switzerland, C1

journal

Wi-Fi security : wireless with confidence

Lucas Jacob, Dr Damien Hutchinson, Prof Jemal Abawajy

(2011), pp. 88-96, ASIC 2011 : Proceedings of the 4th Australian Security and Intelligence Conference, Perth, W. A., E1

conference

Web application protection against SQL injection attack

Mr Ammar Al Azab, Mr Moutaz Alazab, Prof Jemal Abawajy, Dr Michael Hobbs

(2011), pp. 1-7, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications ICITA 2011, Sydney, N.S.W, E1

conference

Establishing trust in hybrid cloud computing environments

Prof Jemal Abawajy

(2011), pp. 118-125, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference
2010

Multi-criteria content adaptation service selection broker

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy, Mustafa Mat Deris

(2010), pp. 721-726, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing : proceedings : Melbourne, Australia, 17-20 May, 2010, Los Alamitos, Calif., E1

conference

Internet security applications of the Munn rings

Dr Andrei Kelarev, J. L. Yearwood, A/Prof Paul Watters, Xinwen Wu, Prof Jemal Abawajy, Dr Lei Pan

(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1

journal

A privacy preserving service broker architecture for data sharing

Mr Fahed Al Neyadi, Prof Jemal Abawajy

(2010), pp. 450-458, Future generation information technology, Berlin, Germany, B1

chapter

An approach to filtering duplicate RFID data streams

Hairulnizam Mahdin, Prof Jemal Abawajy

(2010), pp. 125-133, U- and E-service, science and technology, Berlin, Germany, B1

chapter

An optimal transportation routing approach using GIS-based dynamic traffic flows

Mr Ammar Al Azab, Sitalakshmi Venkatraman, Prof Jemal Abawajy, Mamoun Alazab

(2010), pp. 172-178, ICMTA 2010 : Proceedings of the International Conference on Management Technology and Applications, Singapore, E1

conference

Performance analysis of cyber security awareness delivery methods

Prof Jemal Abawajy, Tai-hoon Kim

(2010), pp. 142-148, Security technology, disaster recovery and business continuity, Berlin, Germany, B1

chapter

Performance analysis of receive diversity in wireless sensor networks over GBSBE models

Ms Shivali Goel, Prof Jemal Abawajy, Tai-hoon Kim

(2010), Vol. 10, pp. 11021-11037, Sensors, Basel, Switzerland, C1

journal

Request-driven cross-media content adaptation technique

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy

(2010), pp. 91-113, Developing advanced web services through P2P computing and autonomous agents : trends and innovations, Hershey, Pa., USA, B1

chapter

Risk-based trust management for e-commerce

Dr Soon Chong, Prof Jemal Abawajy

(2010), pp. 332-351, Trust modeling and management in digital environments : from social concept to system development, Hershey, Pa., USA, B1

chapter

Matrices representation of multi soft-sets and its application

Tutut Herawan, Mustafa Mat Deris, Prof Jemal Abawajy

(2010), pp. 201-214, Computational science and its applications - ICCSA 2010, Berlin, Germany, B1

chapter

Negotiation strategy for mobile agent-based e-negotiation

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2010), pp. 128-135, PRIMA 2010 : Proceedings of the 13th International conference on principles and practice of multi-agent systems, Berlin , Germany, E1

conference

Service discovery for service-oriented content adaptation

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy, Mustafa Mat Deris

(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services, Gent, Belgium, E1

conference

A hybrid mutual authentication protocol for RFID

Dr Harinda Fernando, Prof Jemal Abawajy

(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Gent, Belgium, E1

conference

Novel mechanism for evaluating feedback in the grid environment on resource allocation

V. Vijayakumar, R. S. D. Wahida Banu, Prof Jemal Abawajy

(2010), pp. 11-17, GCA 2010 : Proceedings of the 2010 International Conference on Grid Computing and Applications, Las Vegas, Nevada, E1

conference

Energy-efficient management of data center resources for cloud computing : a vision, architectural elements, and open challenges

Prof Rajkumar Buyya, Anton Beloglazov, Prof Jemal Abawajy

(2010), pp. 6-17, PDPTA 2010 : Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications, United States of America, E1

conference

A rough set approach for selecting clustering attribute

Tutut Herawan, Mustafa Mat Deris, Prof Jemal Abawajy

(2010), Vol. 23, pp. 220-231, Knowledge-based systems, Amsterdam, The Netherlands, C1

journal
2009

A RFID architecture framework for global supply chain applications

Dr Harinda Fernando, Prof Jemal Abawajy

(2009), pp. 313-320, iiWAS 2009 : Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, New York, United States, E1-1

conference

Agents based e-commerce and securing exchanged information

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2009), pp. 383-404, Pervasive computing : innovations in intelligent multimedia and applications, Dordrecht, Germany, B1

chapter

Design and delivery of undergraduate IT security management course

Prof Jemal Abawajy

(2009), Vol. 5576, pp. 402-411, Lecture notes in computer science, Heidelberg, Germany, C1

journal

An approach to filtering RFID data streams

Hairulnizam Mahdin, Prof Jemal Abawajy

(2009), pp. 742-746, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Information provenance for open distributed collaborative system

Dyed Imran Jami, Prof Jemal Abawajy, Zubair A. Shaikh

(2009), pp. 737-741, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Enhancing RFID tag resistance against cloning attack

Prof Jemal Abawajy

(2009), pp. 18-23, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Piscataway, N. J., E1

conference

Adaptive hierarchical scheduling policy for enterprise grid computing systems

Prof Jemal Abawajy

(2009), Vol. 32, pp. 770-779, Journal of network and computer applications, London, England, C1

journal

Determining service trustworthiness in inter loud computing environments

Prof Jemal Abawajy

(2009), pp. 784-788, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

An agent architecture for managing data resources in a grid environment

Maria S Perez, Alberto Sanchez, Prof Jemal Abawajy, V¿¿ctor Robles, Jose M Pena

(2009), Vol. 25, pp. 747-755, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

An efficient adaptive scheduling policy for high-performance computing

Prof Jemal Abawajy

(2009), Vol. 25, pp. 364-370, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

A layered security approach for cloud computing infrastructure

Mehmet Yildiz, Prof Jemal Abawajy, Tuncay Ercan, Andrew Bernoth

(2009), pp. 763-767, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Multi-cluster computing interconnection network performance modeling and analysis

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2009), Vol. 25, pp. 737-746, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Multi-tier phishing email classification with an impact of classifier rescheduling

Dr Rafiq Islam, Prof Jemal Abawajy, Prof Matthew Warren

(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Managing data using neighbour replication on a triangular-grid structure

Mustafa Mat Deris, Prof Jemal Abawajy, David Taniar, Ali Mamat

(2009), Vol. 6, pp. 56-65, International journal of high performance computing and networking, Olney, England, C1

journal

Human-computer interaction in ubiquitous computing environments

Prof Jemal Abawajy

(2009), Vol. 5, pp. 31-77, International journal of pervasive computing and communications, Bingley, England, C1

journal

Context-based e-health system access control mechanism

Mr Fahed Al Neyadi, Prof Jemal Abawajy

(2009), pp. 68-77, Advances in information security and its application, Berlin, Germany, B1

chapter
2008

Security and privacy threats to volunteer computing

Prof Jemal Abawajy

(2008), Vol. 4, pp. 245-255, International journal of critical infrastructures, Oxford, England, C1

journal

Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari

(2008), Vol. 34, pp. 488-502, Computers & electrical engineering, Oxford, England, C1

journal

A comprehensive analytical model of interconnection networks in large-scale cluster systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari

(2008), Vol. 20, pp. 75-97, Concurrency and computation : practice & experience, Malden, Mass., C1

journal

Performance of smart antennas with receive diversity in wireless sensor networks

Ms Shivali Goel, Prof Jemal Abawajy

(2008), pp. 272-278, Proceedings of ICSCN 2008 : International Conference on Signal Processing Communications and Networking, Los Alamitos, Calif., E1

conference

A classification for content adaptation system

Mr Mohd Farhan Md Fudzee, Prof Jemal Abawajy

(2008), pp. 426-429, The 10th International Conference on Information Integration and Web-based Applications & Services : iiWAS 2008, New York, N.Y., E1

conference

An online credential management service for InterGrid computing

Prof Jemal Abawajy

(2008), pp. 101-106, APSCC 2008: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, Los Alamitos, Calif., E1

conference

Investigation of stakeholders commitment to information security awaremess programs

Prof Jemal Abawajy, Kathy Thatcher, Tai-hoon Kim

(2008), pp. 472-476, Proceedings of the 2nd International Conference on Information Security and Assurance : ISA 2008, Los Alamitos, Calif., E1

conference

An efficient replicated data access approach for large-scale distributed systems

Mustafa Mat Deris, Prof Jemal Abawajy, Ali Mamat

(2008), Vol. 24, pp. 1-9, Future generation computer systems, Amsterdam, Netherlands, C1

journal
2007

Analytical modeling of interconnection networks in heterogeneous multi-cluster systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari

(2007), Vol. 40, pp. 29-47, Journal of supercomputing, New York, N.Y., C1

journal

Taxonomy and survey of location management systems

Mr Ahadur Rahaman, Prof Jemal Abawajy, Dr Michael Hobbs

(2007), pp. 369-374, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Los Alamitos, Calif., E1

conference

Electronic negotiation and security of information exchanged in e-commerce

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2007), pp. 1-11, Proceedings of the 2007 collecter E-commerce conference : Collecter 2007 - 10th anniversary., Adelaide, S. Aust., E1

conference

Sensor node activity scheduling approach

Prof Jemal Abawajy, Prof Saeid Nahavandi, Mr Fahed Al Neyadi

(2007), pp. 72-77, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007 : 26-28 April, 2007, Seoul, Korea, Los Alamitos, Calif., E1

conference

Communication network analysis of the enterprise grid systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari, Prof Saeid Nahavandi

(2007), pp. 33-40, Proceedings of the fifth Australasian symposium on ACSW frontiers, Sydney, N.S.W., E1

conference

Analytical communication networks model for enterprise grid computing

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2007), Vol. 23, pp. 737-747, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

A conceptual framework for ubiquitously sharing heterogeneous patient information among autonomous healthcare providers

Mr Fahed Al Neyadi, Prof Jemal Abawajy, Mustafa Matt Ders

(2007), pp. 299-304, Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering, Los Alamitos, Calif., E1

conference

An authorization policy management framework for dynamic medical data sharing

Mr Fahed Al Neyadi, Prof Jemal Abawajy

(2007), pp. 313-318, IPC 2007 proceedings : the 2007 International Conference on Intelligent Pervasive Computing, Los Alamitos, Calif., E1

conference

A multilevel trust management framework

Dr Soon Chong, Prof Jemal Abawajy, Dr Robert Dew

(2007), pp. 776-781, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007), Los Alamitos, Calif., E1

conference

Feedback credibility issues in trust management systems

Dr Soon Chong, Prof Jemal Abawajy

(2007), pp. 387-391, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007, Los Alamitos, Calif., E1

conference

An authentication framework for e-health systems

Mr Fahed Al Neyadi, Prof Jemal Abawajy

(2007), pp. 616-620, 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology, Piscataway, N.J., E1

conference

Secure mobile agent-based e-negotiation for on-line trading

Ms Raja Al-Jaljouli, Prof Jemal Abawajy

(2007), pp. -, 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology, Piscataway, N. J., E1

conference
2006

Managing data using neighbor replication on triangular-grid structure

Ali Mamat, Mustafa Mat Deris, Prof Jemal Abawajy, Suhaila Ismail

(2006), Vol. 3994, pp. 1071-1077, Lecture notes in computer science, Heidelberg, Germany, C1

journal

A performance model for analysis of heterogeneous multi-cluster systems

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2006), Vol. 32, pp. 831-851, Parallel computing, Amsterdam, Netherlands, C1

journal

Parallel I/O scheduling in the presence of data duplication on multiprogrammed cluster computing systems

Prof Jemal Abawajy

(2006), pp. 1118-1125, 2006 IEEE International Conference on Computer Systems and Applications, Piscataway, N.J., E1

conference

Supporting disconnected operations in mobile computing

Prof Jemal Abawajy, Mustafa Mat Deris

(2006), pp. 911-918, 4th ACS/IEEE international conference on computer systems and applications, Piscataway, N.J., E1

conference

Multi-cluster computing interconnection network performance modeling and analysis

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy, Prof Saeid Nahavandi

(2006), pp. 90-95, ADCOM 2006: automatic computing: proceedings of the 14th international conference on advanced computing and communications, Piscataway, N.J., E1

conference

Economy-based data replication broker

Henry Lin, Prof Jemal Abawajy, Prof Rajkumar Buyya

(2006), pp. 1-8, Proceedings of the Second IEEE International Conference on e-science and grid computing, Los Alamitos, Calif., E1

conference

Analysis of multi-cluster computing systems with processor heterogeneity

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2006), pp. 1-8, CSICC 2006 : Proceedings of the 11th International CSI (Computer Society of Iran) Computer Conference, Tehran, Iran, E1

conference

Analytical interconnection networks model for multi-cluster computing systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari

(2006), pp. 37-42, ASMTA 2006 : Proceedings of the ASMTA 2006 13th international conference on analytical and stochastic modelling techniques and applications, Bonn, Germany, E1

conference

Analytical modeling of communication latency in multi-cluster systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari

(2006), pp. 1-6, Proceedings of the 12th International Conference on parallel and distributed systems (ICPADS`06), Los Alamitos, Calif., E1

conference

Analysis of interconnection networks in heterogeneous multi-cluster systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari, Prof Saeid Nahavandi

(2006), pp. 1-8, ICCP 2006 : 2006 international conference on parallel processing workshops, Piscataway, N.J., E1

conference

Analytical network modeling of heterogeneous large-scale cluster systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari, Prof Saeid Nahavandi

(2006), pp. 1-9, 2005 IEEE International Conference on Cluster Computing, Piscataway, N.J., E1

conference

A reputation-based grid information service

Prof Jemal Abawajy, Prof Andrzej Goscinski

(2006), Vol. 3994, pp. 1015-1022, Lecture notes in computer science, Berlin, Germany, C1

journal

Adaptive parallel I/O scheduling algorithm for multiprogrammed systems

Prof Jemal Abawajy

(2006), Vol. 22, pp. 611-619, Future generation computer systems, Netherlands, C1

journal

A novel data replication and management protocol for mobile computing systems

Prof Jemal Abawajy, Mustafa Mat Deris, M Omar

(2006), Vol. 2, pp. 3-19, Mobile information systems, Amsterdam, The Netherlands, C1

journal
2005

Robust parallel job scheduling infrastructure for service-oriented grid computing systems

Prof Jemal Abawajy

(2005), Vol. 3483, pp. 1272-1281, Lecture notes in computer science, Berlin, Germany, C1

journal

Job scheduling policy for high throughput grid computing

Prof Jemal Abawajy

(2005), Vol. LNCS 3719, pp. 184-192, Lecture notes in computer science, Berlin, Germany, C1

journal

An efficient replicated data management approach for peer-to-peer systems

Prof Jemal Abawajy

(2005), Vol. 3516, pp. 457-463, Lecture Notes in Computer Science, Computational Science ¿ ICCS 2005, Berlin, Germany, C1

journal

Fault-tolerant dynamic job scheduling policy

Prof Jemal Abawajy

(2005), Vol. 3719, pp. 165-173, Lecture notes in computer science, Berlin, Germany, C1

journal

Autonomic job scheduling policy for grid computing

Prof Jemal Abawajy

(2005), Vol. 3516, pp. 213-220, Lecture notes in computer science, Berlin, Germany, C1

journal

Performance analysis of heterogeneous multi-cluster systems

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2005), pp. 493-500, Proceedings of the 2005 international conference on parallel processing workshops, Los Alamitos, Calif., E1

conference

Modeling of multi-cluster systems in the presence of network heterogeneity

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2005), pp. 204-211, The proceedings of the International Conference on Computational Science and Engineering, Istanbul, Turkey, E1

conference

Analytical performance modeling of the enterprise grid computing

Bahman Javadi, Mohammad K Akbari, Prof Jemal Abawajy

(2005), pp. -, First International Conference on e-science and grid computing, Los Alamitos, Calif., E1

conference

Grid accounting service infrastructure for service-oriented grid computing systems

Prof Jemal Abawajy

(2005), Vol. 3458, pp. 167-174, Lecture notes in computer science, Berlin, Germany, C1

journal

Performance analysis of interconnection networks for multi-cluster systems

Bahman Javadi, Prof Jemal Abawajy, Mohammad K Akbari

(2005), Vol. 3516, pp. 205-212, Lecture notes in computer science, Berlin , Germany, C1

journal

A new approach for efficiently achieving high availability in mobile computing

Mustafa Mat Deris, Prof Jemal Abawajy, M Omar

(2005), pp. 60-68, Lecture notes in computer science, Berlin, Germany, C1

journal

High reliability replication technique for Web-server cluster systems

Mustafa Mat Deris, Prof Jemal Abawajy, M Zarina, R Mamat

(2005), Vol. 3516, pp. 447-456, Lecture notes in computer science, Berlin, Germany, C1

journal
2004

Secure accounting and payment infrastructure for grid computing

Prof Jemal Abawajy

(2004), pp. -, Scientific applications of grid computing, Berlin, Germany, E1

conference

Fault detection service architecture for grid computing systems

Prof Jemal Abawajy

(2004), Vol. 3044, pp. 107-115, Lecture notes in computer science, Berlin, Germany, C1

journal

File replacement algorithm for storage resource managers in data grids

Prof Jemal Abawajy

(2004), Vol. 3038, pp. 339-346, Lecture notes in computer science, Berlin, Germany, C1

journal

Placement of file replicas in data grid environments

Prof Jemal Abawajy

(2004), Vol. 3038, pp. 66-73, Lecture notes in computer science, Berlin, Germany, C1

journal

Preemptive job scheduling policy for distributively-owned workstation clusters

Prof Jemal Abawajy

(2004), Vol. 14, pp. 255-270, Parallel processing letters, Singapore, C1

journal

Dynamic parallel job scheduling in multi-cluster computing systems

Prof Jemal Abawajy

(2004), Vol. 3036, pp. 27-34, Lecture notes in computer science, Berlin, Germany, C1

journal