Prof Jemal Abawajy

STAFF PROFILE

Position

Professor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Contact

jemal.abawajy@deakin.edu.au
+61 3 522 71376

Publications

Filter by

2017

Heterogeneous cooperative co-evolution memetic differential evolution algorithms for big data optimisation problems

N Sabar, J Abawajy, J Yearwood

(2017), Vol. 21, pp. 315-327, IEEE transactions on evolutionary computation, Piscataway, N.J., C1

journal

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks

E Luo, Q Liu, J Abawajy, G Wang

(2017), Vol. 68, pp. 222-233, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Federated internet of things and cloud computing pervasive patient health monitoring system

J Abawajy, M Hassan

(2017), Vol. 55, pp. 48-53, IEEE communications magazine, Piscataway, N.J., C1

journal

Virtual networks dependability assessment framework

B Al-Rubaiey, J Abawajy

(2017), Vol. 10, pp. 3-12, International journal of high performance computing and networking, Olney, Eng., C1

journal

Cloud-assisted IoT-based health status monitoring framework

S Ghanavati, J Abawajy, D Izadi, A Alelaiwi

(2017), Vol. 20, pp. 1843-1853, Cluster computing, New York, N.Y., C1

journal

Cost and performance-based resource selection scheme for asynchronous replicated system in utility-based computing environment

W Nik, B Zhou, J Abawajy, A Zomaya

(2017), Vol. 7, pp. 723-735, International journal on advanced science, engineering and information technology, [Indonesia], C1

journal

Advances in teaching and learning on Facebook in higher institutions

H Chiroma, N Mohd Shuib, A Abubakar, A Zeki, A Gital, T Herawan, J Abawajy

(2017), Vol. 5, pp. 480-500, IEEE access, Piscataway, N.J., C1

journal

A parallel framework for software defect detection and metric selection on cloud computing

M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood

(2017), Vol. 20, pp. 2267-2281, Cluster computing, New York, N.Y., C1

journal
2016

Hybrids of support vector machine wrapper and filter based framework for malware detection

S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood

(2016), Vol. 55, pp. 376-390, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Rees semigroups of digraphs for classification of data

J Abawajy, A Kelarev, M Miller, J Ryan

(2016), Vol. 92, pp. 121-134, Semigroup forum, New York, N.Y., C1

journal

Evolutionary optimization: a big data perspective

M Bhattacharya, R Islam, J Abawajy

(2016), Vol. 59, pp. 416-426, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Vertex re-identification attack using neighbourhood-pair properties

J Abawajy, M Ninggal, T Herawan

(2016), Vol. 28, pp. 2906-2919, Concurrency computation: practice and experience, London, Eng., C1

journal

Filtering redundant data from RFID data streams

H Kamaludin, H Mahdin, J Abawajy

(2016), Vol. 2016, pp. 1-7, Journal of sensors, Cairo, Egypt, C1

journal

An alternative data collection scheduling scheme in wireless sensor networks

D Izadi, S Ghanavati, J Abawajy, T Herawan

(2016), Vol. 98, pp. 1287-1304, Computing, Berlin, Germany, C1

journal

Security considerations for wireless carrier agonistic bio-monitoring systems

B Townsend, J Abawajy

(2016), Vol. 164, pp. 725-737, Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers, Berlin, Germany, B1

chapter

Enhancing predictive accuracy of cardiac autonomic neuropathy using blood biochemistry features and iterative multitier ensembles

J Abawajy, A Kelarev, M Chowdhury, H Jelinek

(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1

journal

A clustering-based multi-layer distributed ensemble for neurological diagnostics in cloud services

M Chowdhury, J Abawajy, A Kelarev, H Jelinek

(2016), pp. 1-12, IEEE transactions on cloud computing, Piscataway, N.J., C1

journal

Matrix constructions of centroid sets for classification systems

M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan

(2016), Vol. 30, pp. 2397-2403, Filomat, Nios, Serbia, C1

journal

Secure object tracking protocol for the internet of things

B Ray, M Chowdhury, J Abawajy

(2016), Vol. 3, pp. 544-553, IEEE journal of internet of things, Piscataway, N.J., C1

journal

IncSPADE: an incremental sequential pattern mining algorithm based on SPADE property

O Adam, Z Abdullah, A Ngah, K Mokhtar, W Wan Ahmad, T Herawan, N Ahmad, M Mat Deris, A Hamdan, J Abawajy

(2016), Vol. 387, pp. 81-92, Advances in machine learning and signal processing, Berlin, Germany, B1

chapter

Privacy preserving social network data publication

J Abawajy, Ninggal, T Herawan

(2016), Vol. 18, pp. 1974-1997, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal

Multilayer hybrid strategy for phishing email zero-day filtering

M Chowdhury, J Abawajy, A Kelarev, T Hochin

(2016), pp. 1-12, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression

S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood

(2016), pp. 1-18, Concurrency Computation, Chichester, Eng., C1

journal

Prediction of virtual networks substrata failures

B Alrubaiey, J Abawajy

(2016), Vol. LNCS 10065, pp. 423-434, APSCC 2016 : Advances in services computing : Proceedings of the 10th Asia-Pacific Services Computing Conference, Zhangjiajie, China, E1

conference

ECG rate control scheme in pervasive health care monitoring system

S Ghanavati, J Abawajy, D Izadi

(2016), pp. 2265-2270, FUZZ-IEEE 2016 : Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, Vancouver, B.C., E1

conference

An alternative sensor cloud architecture for vital signs monitoring

S Ghanavati, J Abawajy, D Izadi

(2016), pp. 2827-2833, IJCNN 2016: Proceedings of the IEEE International Joint Conference on Neural Networks, Vancouver, Canada, E1

conference

Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II

Z Pooranian, N Nikmehr, S Najafi-Ravadanegh, H Mahdin, J Abawajy

(2016), pp. 1-6, SoftCOM 2016 : Proceedings of the 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, E1

conference

Energy efficient approach in RFID network

H Mahdin, J Abawajy, S Yaacob

(2016), Vol. 160, pp. 1-7, IRIS 2016 : Innovating technology for a sustainable future : Proceedings of the International Engineering Research and Innovation Symposium 2016, Melaka, Malaysia, E1-1

conference

An approximation approach to discovering web services for uncertain client's qos preference

M Fudzee, J Abawajy, S Kasim, H Mahdin, A Ramli, M Salamat

(2016), Vol. 11, pp. 14085-14088, ARPN journal of engineering and applied sciences, Islamabad, Pakistan, C1

journal
2015

An efficient meta-heuristic algorithm for grid computing

Z Pooranian, M Shojafar, J Abawajy, A Abraham

(2015), Vol. 30, pp. 413-434, Journal of combinatorial optimization, Berlin, Germany, C1

journal

Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions

S Bansal, J Abawajy

(2015), Vol. 15, pp. 649-665, Wireless communications and mobile computing, London, Eng., C1

journal

Dynamic path determination policy for distributed multimedia content adaptation

J Abawajy, F Fudzee

(2015), Vol. 74, pp. 8325-8341, Multimedia tools and applications, Berlin, Germany, C1

journal

Multimedia content adaptation service discovery mechanism

J Abawajy, F Fudzee, M Deris

(2015), Vol. 74, pp. 8365-8378, Multimedia tools and applications, Berlin, Germany, C1

journal

An efficient and distributed file search in unstructured peer-to-peer networks

M Shojafar, J Abawajy, Z Delkhah, A Ahmadi, Z Pooranian, A Abraham

(2015), Vol. 8, pp. 120-136, Peer-to-peer networking and applications, New York, N.Y., C1

journal

An alternative node deployment scheme for WSNs

D Izadi, J Abawajy, S Ghanavati

(2015), Vol. 15, pp. 667-675, IEEE Sensors journal, Champaign, III., C1

journal

Policy-based SQLIA detection and prevention approach for RFID systems

J Abawajy, H Fernando

(2015), Vol. 38, pp. 64-71, Computer standards and interfaces, Amsterdam, The Netherlands, C1

journal

Comprehensive analysis of big data variety landscape

J Abawajy

(2015), Vol. 30, pp. 5-14, International journal of parallel, emergent and distributed systems, Bingley, U. K., C1

journal

A data fusion method in wireless sensor networks

D Izadi, J Abawajy, S Ghanavati, T Herawan

(2015), Vol. 15, pp. 2964-2979, Sensors, Basel, Switzerland, C1

journal

An alternative clustering scheme in WSN

D Izadi, J Abawajy, S Ghanavati

(2015), Vol. 15, pp. 4148-4155, IEEE sensors journal, Champaign, Ill., C1

journal

Utility-aware social network graph anonymization

M Ninggal, J Abawajy

(2015), Vol. 56, pp. 137-148, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Distances of centroid sets in a graph-based construction for information security applications

J Abawajy, A Kelarev, M Miller, J Ryan

(2015), Vol. 9, pp. 127-137, Mathematics in computer science, Berlin, Germany, C1

journal

Service level agreement management framework for utility-oriented computing platforms

J Abawajy, M Fudzee, M Hassan, M Alrubaian

(2015), Vol. 71, pp. 4287-4303, Journal of supercomputing, Berlin, Germany, C1

journal

Secure object tracking protocol for networked RFID systems

B Ray, M Chowdhury, J Abawajy, M Jesmin

(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1

conference

Workflow scheduling on distributed systems

M Abdul Aziz, J Abawajy, R Islam, T Herawan,

(2015), pp. 683-689, ICIEA 2015: Proceedings of the 10th IEEE conference on Industrial Electronics and Applications, Auckland, New Zealand, E1

conference

Reliability-aware distributed computing scheduling policy

J Abawajy, M Hassan

(2015), Vol. 9532, pp. 627-632, Algorithms and architectures for parallel processing : ICA3PP international workshops and symposiums, Zhangjiajie, China, November 18-20, 2015, proceedings, Cham, Switzerland, B1

chapter

Layered Workflow Scheduling Algorithm

M Abdul Aziz, J Abawajy, T Herawan

(2015), FUZZ-IEEE 2015: Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, TURKEY, E1

conference

A congestion control scheme based on fuzzy logic in wireless body area networks

S Ghanavati, J Abawajy, D Izadi

(2015), pp. 235-242, NCA 2015: Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, Cambridge, Ma., E1

conference

A framework for implementing asynchronous replication scheme in utility-based computing environment

W Nik, B Zhou, A Zomaya, J Abawajy

(2015), pp. 183-190, CCBD 2015: Proceedings of the Cloud Computing and Big Data 2015 International Conference, Shanghai, China, E1

conference

Mitigating malicious feedback attacks in trust management systems

S Chong, J Abawajy

(2015), Vol. 3, pp. 1-18, International journal of trust management in computing and communications, Milton Keynes, Eng., C1

journal

Adaptive energy-efficient qos-aware scheduling algorithm for TCP/IP mobile cloud

M Shojafar, N Cordeschi, J Abawajy, E Baccarelli

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications 2015 Conference, San Diego, Calif., E1

conference

Ideal bases in constructions defined by directed graphs

J Abawajy, A Kelarev, J Ryan

(2015), Vol. 3, pp. 35-49, Electronic journal of graph theory and applications, Jawa Barat, Indonesia, C1

journal

Multi-layer attribute selection and classification algorithm for the diagnosis of cardiac autonomic neuropathy based on HRV attributes

H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev

(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1

journal

Hybrid consensus pruning of ensemble classifiers for big data malware detection

J Abawajy, M Chowdhury, A Kelarev

(2015), Vol. 3, pp. 1-11, IEEE transactions on cloud computing, Piscataway, N.J., C1-1

journal
2014

User preference of cyber security awareness delivery methods

J Abawajy

(2014), Vol. 33, pp. 237-248, Behaviour and information technology, Oxford, England, C1

journal

The parameter reduction of the interval-valued fuzzy soft sets and its related algorithms

X Ma, H Qin, N Sulaiman, T Herawan, J Abawajy

(2014), Vol. 22, pp. 57-71, IEEE transactions on fuzzy systems, Piscataway, N. J., C1

journal

Iterative construction of hierarchical classifiers for phishing website detection

J Abawajy, G Beliakov, A Kelarev, M Chowdhury

(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1

journal

Scalable RFID security framework and protocol supporting Internet of Things

B Ray, J Abawajy, M Chowdhury

(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1

journal

An SLA evaluator for multimedia content adaptation services

M Fudzee, J Mohamed, J Abawajy, S Kasim, M Ismail

(2014), pp. 1-4, ICISA 2014 : Proceedings of the 5th International Conference on Information Science and Applications, Seoul, Korea, E1

conference

PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture

S Javanmardi, M Shojafar, S Shariatmadari, J Abawajy, M Singhal

(2014), Vol. 69, pp. 955-975, The journal of supercomputing, New York, NY, C1

journal

Incidence semirings of graphs and visible bases

J Abawajy, A Kelarev, M Miller, J Ryan

(2014), Vol. 89, pp. 451-459, Bulletin of the Australian mathematical society, Cambridge, England, C1

journal

An approach for profiling phishing activities

I Hamid, J Abawajy

(2014), Vol. 45, pp. 27-41, Computers and security, Kidlington, England, C1

journal

Sensor grid middleware metamodeling and analysis

S Chandrasekaran, E Choi, J Abawajy, R Natarajan

(2014), Vol. 2014, pp. 1-12, International Journal of Distributed Sensor Networks, New York, NY, C1

journal

Large iterative multitier ensemble classifiers for security of big data

J Abawajy, A Kelarev, M Chowdhury

(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1

journal

A competitive three-level pruning technique for information security

M Chowdhury, J Abawajy, A Kelarev, K Sakurai

(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1

chapter

Neighbourhood-pair attack in social network data publishing

M Ninggal, J Abawajy

(2014), Vol. 131, pp. 726-731, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Heidelberg, Germany, B1

chapter

Data replication approach with consistency guarantee for data grid

J Abawajy, M Deris

(2014), Vol. 63, pp. 2975-2987, IEEE Transactions on Computers, Piscataway, NJ, C1

journal

An accelerated particle swarm optimization based levenberg marquardt back propagation algorithm

N Nawi, A Khan, M Rehman, M Aziz, T Herawan, J Abawajy

(2014), Vol. 8835, pp. 245-253, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

Neural network training by hybrid accelerated cuckoo particle swarm optimization algorithm

N Nawi, A Khan, M Rehman, M Abdul Aziz, T Herawan, J Abawajy

(2014), Vol. 8835, pp. 237-244, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

Using response action with Intelligent Intrusion detection and prevention System against web application malware

A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab, A Al Azab

(2014), Vol. 22, pp. 431-449, Information Management and Computer Security, Bingley, Eng., C1

journal

Taxonomy of contention management in interconnected distributed systems

M Salehi, J Abawajy, R Buyya

(2014), pp. 1-48, Computing handbook, Boca Raton, FL, B1

chapter

An improved Gbest guided artificial bee colony (IGGABC) algorithm for classification and prediction tasks

H Shah, T Herawan, R Ghazali, R Naseem, M Abdul Aziz, J Abawajy

(2014), Vol. 8834, pp. 559-569, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

A hybrid wrapper-filter approach for malware detection

M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst

(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1

journal

Securing a smart anti-counterfeit web application

B Chowdhury, M Chowdhury, J Abawajy

(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1

journal

Automatic generation of meta classifiers with large levels for distributed computing and networking

Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury

(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1

journal

Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics

H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri

(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1

journal

PUF-based secure checker protocol for Networked RFID Systems

B Ray, M Chowdhury, J Abawajy

(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1

conference

Trends in crime toolkit development

A Khraisat, M Hobbs, A Alazab, J Abawajy, A Ahmad

(2014), Network security technologies: design and applications, Hershey PA, USA, B1

chapter
2013

A framework for scalable distributed provenance storage system

J Abawajy, S Jami, Z Shaikh, S Hammad

(2013), Vol. 35, pp. 179-186, Computer standards & interfaces, Amsterdam, The Netherlands, C1

journal

StenoCipher to provide data confidentiality and tampered data recovery for RFID tag

B Ray, M Chowdhury, J Abawajy

(2013), pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

chapter

SQLIA detection and prevention approach for RFID systems

J Abawajy

(2013), Vol. 86, pp. 751-758, Journal of systems and software, Amsterdam, The Netherlands, C1

journal

Critical analysis and comparative study of security for networked RFID systems

B Ray, M Chowdhury, J Abawajy

(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Honolulu, Hawaii, E1

conference

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek

(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1

journal

Malware detection and prevention in RFID systems

H Fernando, J Abawajy

(2013), pp. 143-166, Internet of things and inter-cooperative computational technologies for collective intelligence, Heidelberg, Germany, B1

chapter

IPMA : Indirect patterns mining algorithm

T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy

(2013), pp. 187-196, Advanced methods for computational collective intelligence, Berlin, Germany, B1

chapter

A multi-tier phishing detection and filtering approach

R Islam, J Abawajy

(2013), Vol. 36, pp. 324-335, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal

Fuzzy logic optimized wireless sensor network routing protocol

D Izadi, J Abawajy, S Ghanavati

(2013), Vol. 19, pp. 115-128, Journal of high speed networks, Amsterdam, The Netherlands, C1

journal

A fuzzy technique to control congestion in WSN

S Ghanavati, J Abawajy, D Izadi

(2013), pp. 1806-1810, IJCNN 2013 : Proceedings of the International Joint Conference on Neural Networks, Dallas, Texas, E1

conference

A new energy efficient cluster-head and backup selection scheme in WSN

D Izadi, J Abawajy, S Ghanavati

(2013), pp. 408-415, IRI 2013 : Proceedings of the 14th IEEE International Conference on Information Reuse and Integration, San Francisco, California, E1

conference

Web malware that targets web applications

A Alazab, J Abawajy, M Hobbs

(2013), pp. 248-264, Social network engineering for secure web data and services, Hershey, Pa., B1

chapter

Developing an intelligent intrusion detection and prevention system against web application malware

A Alazab, M Hobbs, J Abawajy, A Khraisat

(2013), pp. 177-184, Advances in security of information and communication networks. First International Conference , SecNet 2013 Cairo, Egypt, September Proceedings, Berlin, Germany, B1

chapter

Intelligent battery energy management and control for vehicle-to-grid via cloud computing network

H Khayyam, J Abawajy, B Javadi, A Goscinski, A Stojcevski, A Bab-Hadiashar

(2013), Vol. 111, pp. 971-981, Applied energy, Amsterdam, The Netherlands, C1

journal

Using feature selection and classification scheme for automating phishing email detection

I Hamid, J Abawajy, T Kim

(2013), Vol. 22, pp. 61-70, Studies in informatics and control, Bucharest, Romania, C1

journal

Malware detection and prevention system based on multi-stage rules

A Alazab, M Hobbs, J Abawajy, A Khraisat

(2013), Vol. 7, pp. 29-43, International journal of information security and privacy, Hershey, Pa., C1

journal

A data mining application of the incidence semirings

J Abawajy, A Kelarev, J Yearwood, C Turville

(2013), Vol. 39, pp. 1083-1093, Houston journal of mathematics, Houston, Tx., C1

journal

An efficient scheduling method for grid systems based on a hierarchical stochastic petri net

M Shojafar, Z Pooranian, J Abawajy, M Meybodi

(2013), Vol. 7, pp. 44-52, Journal of computing science and engineering, Seoul, Korea, C1

journal

Securing a web-based anti-counterfeit RFID system

B Chowdhury, M Chowdhury, J Abawajy

(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1

chapter

Security concerns and remedy in a cloud based e-learning system

M Masud, M Islam, J Abawajy

(2013), pp. 356-366, Security and privacy in communication networks, Berlin, Germany, B1

chapter

Profiling phishing email based on clustering approach

I Hamid, J Abawajy

(2013), pp. 628-635, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic, E1

conference

Preserving utility in social network graph anonymization

M Ninggal, J Abawajy

(2013), pp. 226-232, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Centroid sets with largest weight in Munn semirings for data mining applications

J Abawajy, A Kelarev, J Zeleznikow

(2013), Vol. 87, pp. 617-626, Semigroup forum, Berlin, Germany, C1

journal

Multistage approach for clustering and classification of ECG data

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1

journal

Power graphs : a survey

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1

journal

Empirical investigation of decision tree ensembles for monitoring cardiac complications of diabetes

A Kelarev, J Abawajy, A Stranieri, H Jelinek

(2013), Vol. 9, pp. 1-18, International journal of data warehousing and mining, Hershey, PA, C1

journal

Predicting cardiac autonomic neuropathy category for diabetic data with missing values

J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek

(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1

journal

The challenges of cloud computing technology adoption in e-government

M Abdul Aziz, J Abawajy, M Chowdhury

(2013), pp. 1-5, ACSAT 2013 : Proceedings of the Advanced Computer Science Applications and Technologies 2013 international conference, Sarawak, Malaysia, E1

conference
2012

An efficient approach based on trust and reputation for secured selection of grid resources

V Vijayakumar, B Wahida, J Abawajy

(2012), Vol. 27, pp. 1-17, International journal of parallel, emergent and distributed systems, Essex, England, C1

journal

Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing

A Beloglazov, J Abawajy, R Buyya

(2012), Vol. 28, pp. 755-768, Future generation computer systems, Amsterdam, Netherlands, C1

journal

An approach to faulty reader detection in RFID reader network

H Mahdin, J Abawajy

(2012), pp. 70-84, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1

chapter

A security framework for networked RFID

H Fernando, J Abawajy

(2012), pp. 85-114, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1

chapter

Mobile agents security protocols

R Al-jaljouli, J Abawajy

(2012), pp. 270-305, Mobile computing techniques in emerging markets : systems, applications and services, Hershey, Pa., B1

chapter

Quality control of sensor network data

D Izadi, J Abawajy, S Ghanavati

(2012), pp. 467-480, Advances in automation and robotics, vol.1, selected papers from the 2011 International Conference on Automation and Robotics (ICAR 2011), Dubai, December 1-2, 2011, Berlin, Germany, B1

chapter

Security framework for mobile agents-based applications

R Al-jaljouli, J Abawajy

(2012), pp. 242-269, Mobile computing techniques in emerging markets : systems, applications and services, Hershey Pa., B1

chapter

The role of emotional intelligence on the resolution of disputes involving the electronic health record

E Bellucci, S Venkatraman, N Muecke, A Stranieri, J Abawajy

(2012), pp. 3-12, HIKM 2012 : Proceedings of the Fifth Australasian Workshop on Health Informatics and Knowledge Management, Melbourne, Vic., E1

conference

Multi-input-multi-output antennas for radio frequency identification systems

S Bansal, J Abawajy

(2012), pp. 96-127, Chipless and conventional radio frequency identification : systems for ubiquitous tagging, United States, B1

chapter

Virtual property theft detection framework

N Patterson, M Hobbs, J Abawajy

(2012), pp. 177-184, TRUSTCOM 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Intelligent energy management control of vehicle air conditioning system coupled with engine

H Khayyam, J Abawajy, R Jazar

(2012), Vol. 48, pp. 211-224, Applied thermal engineering, Oxford, England, C1

journal

Failure-aware resource provisioning for hybrid cloud infrastructure

B Javadi, J Abawajy, R Buyya

(2012), Vol. 72, pp. 1318-1331, Journal of parallel and distributed computing, Maryland Heights, Mo., C1

journal

Using feature selection for intrusion detection system

A Alazab, M Hobbs, J Abawajy, M Alazab

(2012), pp. 296-301, ISCIT 2012 : Proceedings of the 12th IEEE International Symposium on Communications and Information Technologies, Gold Coast, Qld, E1

conference

Detecting and mitigating HX-DoS attacks against cloud web services

A Chonka, J Abawajy

(2012), pp. 429-434, NBIS 2012 : Proceedings of the 2012 International Conference on Network-Based Information Systems, Melbourne, Victoria, E1

conference

Management of service level agreement for service-oriented content adaptation platform

M Fudzee, J Abawajy

(2012), pp. 21-42, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1

chapter

Strategies for agent-based negotiation in e-trade

R Al-Jaljouli, J Abawajy

(2012), pp. 43-65, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1

chapter

Analysis of asynchronous online discussion forums for collaborative learning

J Abawajy

(2012), Vol. 1, pp. 11-21, International journal of education and learning, Sandy Bay, Tas., C1

journal

Performance evaluation of multi-tier ensemble classifiers for phishing websites

J Abawajy, G Beliakov, A Kelarev, J Yearwood

(2012), pp. 11-16, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Empirical investigation of multi-tier ensembles for the detection of cardiac autonomic neuropathy using subsets of the Ewing Features

J Abawajy, A Kelarev, A Stranieri, H Jelinek

(2012), pp. 1-11, CIHealth 2012- Proceedings of the Workshop on New Trends of Computational Intelligence in Health Applciations, Sydney, N.S.W., E1

conference

Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

B Ray, M Chowdhury, J Abawajy

(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Seoul, Korea, E1

conference

E-commerce trust management system reliability

S Chong, J Abawajy

(2012), pp. 13-18, ISSDM 2012 : Proceedings of the 6th International Conference on New Trends in Information Science, Service Science and Data Mining, Taipei, Taiwan, E1

conference

Classification systems based on combinatorial semigroups

J Abawajy, A Kelarev

(2012), Vol. 86, pp. 603-612, Semigroup forum, New York, N.Y., C1

journal

EFP-M2 : efficient model for mining frequent patterns in transactional database

T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy

(2012), pp. 29-38, ICCCI 2012 : Technologies and applications : Proceedings of the 4th International Conference on Computational Collective Intelligence, Ho Chi Minh City, Vietnam, November 28-30, 2012 : proceedings, Ho Chi Minh City, Vietnam, E1

conference

A multi-tier ensemble construction of classifiers for phishing email detection and filtering

J Abawajy, A Kelarev

(2012), pp. 48-56, CSS 2012 : Cyberspace safety and security : 4th International Symposium, Melbourne, Australia, December 12-13, 2012 Proceedings, Melbourne, Victoria, E1

conference

Hybrid cloud resource provisioning policy in the presence of resource failures

B Javadi, J Abawajy, R Sinnott

(2012), pp. 10-17, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Taipei, Taiwan, E1

conference

Improving classifications for cardiac autonomic neuropathy using multi-level ensemble classifiers and feature selection based on random forest

A Kelarev, A Stranieri, J Yearwood, J Abawajy, H Jelinek

(2012), pp. 93-101, AusDM 2012 : Proceedings of the 10th Australasian Data Mining Conference, Sydney, N.S.W., E1

conference
2011

QoS-based adaptation service selection broker

M Fudzee, J Abawajy

(2011), Vol. 27, pp. 256-264, Future generation computer systems, Amsterdam, Netherlands, C1

journal

SMS-based medical diagnostic telemetry data transmission protocol for medical sensors

B Townsend, J Abawajy, T Kim

(2011), Vol. 11, pp. 4231-4243, Sensors, Basel, Switzerland, C1

journal

Intelligent energy management control of vehicle air conditioning via look-ahead system

H Khayyam, S Nahavandi, E Hu, A Kouzani, A Chonka, J Abawajy, V Marano, S Davis

(2011), Vol. 31, pp. 3147-3160, Applied thermal engineering, Oxford, U. K., C1

journal

Efficient resource selection algorithm for enterprise grid systems

W Nik, B Zhou, A Zomaya, J Abawajy

(2011), pp. 57-62, ISPA 2011 : Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, Busan, Korea, E1

conference

Establishing trust in hybrid cloud computing environments

J Abawajy

(2011), pp. 118-125, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Mutual authentication protocol for networked RFID systems

H Fernando, J Abawajy

(2011), pp. 417-424, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Phishing email feature selection approach

I Hamid, J Abawajy

(2011), pp. 916-921, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Attack vector analysis and privacy-preserving social network data publishing

M Ninggal, J Abawajy

(2011), pp. 847-852, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Engaging and effective asynchronous online discussion forums

J Abawajy, T Kim

(2011), pp. 695-705, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1

conference

Securing RFID systems from SQLIA

H Fernando, J Abawajy

(2011), pp. 245-254, Algorithms and architectures for parallel processing, Berlin, Germany, B1

chapter

Online learning environment : taxonomy of asynchronous online discussion forums

J Abawajy, T Kim

(2011), pp. 706-714, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1

conference

A protocol for discovering content adaptation services

M Fudzee, J Abawajy

(2011), pp. 235-244, Algorithms and architectures for parallel processing, Berlin, Germany, B1

chapter

Hybrid feature selection for phishing email detection

I Hamid, J Abawajy

(2011), pp. 266-275, Algorithms and architectures for parallel processing, Berlin, Germany, B1

chapter

Service quality assessment in provision of library services

M Ahmad, J Abawajy, T Kim

(2011), pp. 83-92, UNESST 2011 : Proceedings of the 2011 International Conference on U- and E-service, Science and Technology, Jeju Island, Korea, E1

conference

Privacy threat analysis of social network data

M Ninggal, J Abawajy

(2011), pp. 165-174, ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference, Melbourne, Victoria, E1

conference

Optimization and matrix constructions for classification of data

A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury

(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1

journal

An approach for removing redundant data from RFID data streams

H Mahdin, J Abawajy

(2011), Vol. 11, pp. 9863-9877, Sensors, Lausanne, Switzerland, C1

journal

Wi-Fi security : wireless with confidence

L Jacob, D Hutchinson, J Abawajy

(2011), pp. 88-96, ASIC 2011 : Proceedings of the 4th Australian Security and Intelligence Conference, Perth, W. A., E1

conference

Web application protection against SQL injection attack

A Alazab, M Alazab, J Abawajy, M Hobbs

(2011), pp. 1-7, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications ICITA 2011, Sydney, N.S.W., E1

conference

A Grobner-Shirshov algorithm for applications in internet security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal
2010

A rough set approach for selecting clustering attribute

T Herawan, M Deris, J Abawajy

(2010), Vol. 23, pp. 220-231, Knowledge-based systems, Amsterdam, The Netherlands, C1

journal

Risk-based trust management for e-commerce

S Chong, J Abawajy

(2010), pp. 332-351, Trust modeling and management in digital environments : from social concept to system development, Hershey, Pa., USA, B1

chapter

Matrices representation of multi soft-sets and its application

T Herawan, M Deris, J Abawajy

(2010), pp. 201-214, Computational science and its applications - ICCSA 2010, Berlin, Germany, B1

chapter

Request-driven cross-media content adaptation technique

M Fudzee, J Abawajy

(2010), pp. 91-113, Developing advanced web services through P2P computing and autonomous agents : trends and innovations, Hershey, Pa., USA, B1

chapter

Internet security applications of the Munn rings

A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan

(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1

journal

Multi-criteria content adaptation service selection broker

M Fudzee, J Abawajy, M Deris

(2010), pp. 721-726, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing : proceedings : Melbourne, Australia, 17-20 May, 2010, Melbourne, Vic., E1

conference

Performance analysis of receive diversity in wireless sensor networks over GBSBE models

S Goel, J Abawajy, T Kim

(2010), Vol. 10, pp. 11021-11037, Sensors, Basel, Switzerland, C1

journal

Performance analysis of cyber security awareness delivery methods

J Abawajy, T Kim

(2010), pp. 142-148, Security technology, disaster recovery and business continuity, Berlin, Germany, B1

chapter

An approach to filtering duplicate RFID data streams

H Mahdin, J Abawajy

(2010), pp. 125-133, U- and E-service, science and technology, Berlin, Germany, B1

chapter

A privacy preserving service broker architecture for data sharing

F Al-Neyadi, J Abawajy

(2010), pp. 450-458, Future generation information technology, Berlin, Germany, B1

chapter

An optimal transportation routing approach using GIS-based dynamic traffic flows

A Alazab, S Venkatraman, J Abawajy, M Alazab

(2010), pp. 172-178, ICMTA 2010 : Proceedings of the International Conference on Management Technology and Applications, Singapore, E1

conference

Energy-efficient management of data center resources for cloud computing : a vision, architectural elements, and open challenges

R Buyya, A Beloglazov, J Abawajy

(2010), pp. 6-17, PDPTA 2010 : Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nev., E1

conference

Novel mechanism for evaluating feedback in the grid environment on resource allocation

V Vijayakumar, R Wahida Banu, J Abawajy

(2010), pp. 11-17, GCA 2010 : Proceedings of the 2010 International Conference on Grid Computing and Applications, Las Vegas, Nev., E1

conference

Negotiation strategy for mobile agent-based e-negotiation

R Al-Jaljouli, J Abawajy

(2010), pp. 128-135, PRIMA 2010 : Proceedings of the 13th International conference on principles and practice of multi-agent systems, Kolkatta, India, E1

conference

A hybrid mutual authentication protocol for RFID

H Fernando, J Abawajy

(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Sydney, NSW, E1

conference

Service discovery for service-oriented content adaptation

M Fudzee, J Abawajy, M Deris

(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services, Sydney, NSW, E1

conference
2009

A layered security approach for cloud computing infrastructure

M Yildiz, J Abawajy, T Ercan, A Bernoth

(2009), pp. 763-767, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Adaptive hierarchical scheduling policy for enterprise grid computing systems

J Abawajy

(2009), Vol. 32, pp. 770-779, Journal of network and computer applications, London, England, C1

journal

Agents based e-commerce and securing exchanged information

R Al-Jaljouli, J Abawajy

(2009), pp. 383-404, Pervasive computing : innovations in intelligent multimedia and applications, Dordrecht, Germany, B1

chapter

An agent architecture for managing data resources in a grid environment

M Pérez, A Sánchez, J Abawajy, V Robles, J Peña

(2009), Vol. 25, pp. 747-755, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

An approach to filtering RFID data streams

H Mahdin, J Abawajy

(2009), pp. 742-746, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

An efficient adaptive scheduling policy for high-performance computing

J Abawajy

(2009), Vol. 25, pp. 364-370, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Design and delivery of undergraduate IT security management course

J Abawajy

(2009), Vol. 5576, pp. 402-411, Lecture notes in computer science, Heidelberg, Germany, C1

journal

Determining service trustworthiness in inter loud computing environments

J Abawajy

(2009), pp. 784-788, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Enhancing RFID tag resistance against cloning attack

J Abawajy

(2009), pp. 18-23, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1

conference

Information provenance for open distributed collaborative system

D Jami, J Abawajy, Z Shaikh

(2009), pp. 737-741, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Managing data using neighbour replication on a triangular-grid structure

M Deris, J Abawajy, D Taniar, A Mamat

(2009), Vol. 6, pp. 56-65, International journal of high performance computing and networking, Olney, England, C1

journal

Multi-cluster computing interconnection network performance modeling and analysis

B Javadi, M Akbari, J Abawajy

(2009), Vol. 25, pp. 737-746, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Multi-tier phishing email classification with an impact of classifier rescheduling

M Islam, J Abawajy, M Warren

(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Human-computer interaction in ubiquitous computing environments

J Abawajy

(2009), Vol. 5, pp. 31-77, International journal of pervasive computing and communications, Bingley, England, C1

journal

Context-based e-health system access control mechanism

F Al-Neyadi, J Abawajy

(2009), pp. 68-77, Advances in information security and its application, Berlin, Germany, B1

chapter

A RFID architecture framework for global supply chain applications

H Fernando, J Abawajy

(2009), pp. 313-320, iiWAS 2009 : Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, Kuala Lumpur, Malaysia, E1-1

conference
2008

An efficient replicated data access approach for large-scale distributed systems

M Deris, J Abawajy, A Mamat

(2008), Vol. 24, pp. 1-9, Future generation computer systems, Amsterdam, Netherlands, C1

journal

Security and privacy threats to volunteer computing

J Abawajy

(2008), Vol. 4, pp. 245-255, International journal of critical infrastructures, Oxford, England, C1

journal

Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks

B Javadia, J Abawajy, M Akbari

(2008), Vol. 34, pp. 488-502, Computers & electrical engineering, Oxford, England, C1

journal

A comprehensive analytical model of interconnection networks in large-scale cluster systems

B Javadi, J Abawajy, M Akbari

(2008), Vol. 20, pp. 75-97, Concurrency and computation : practice & experience, Malden, Mass., C1

journal

An online credential management service for InterGrid computing

J Abawajy

(2008), pp. 101-106, APSCC 2008: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, E1

conference

Investigation of stakeholders commitment to information security awaremess programs

J Abawajy, K Thatcher, T Kim

(2008), pp. 472-476, Proceedings of the 2nd International Conference on Information Security and Assurance : ISA 2008, Hanwha Resort Haeundae, Busan, Korea, E1

conference

Performance of smart antennas with receive diversity in wireless sensor networks

S Goel, J Abawajy

(2008), pp. 272-278, Proceedings of ICSCN 2008 : International Conference on Signal Processing Communications and Networking, Chennai, India, E1

conference

A classification for content adaptation system

M Md Fudzee, J Abawajy

(2008), pp. 426-429, The 10th International Conference on Information Integration and Web-based Applications & Services : iiWAS 2008, Linz, Austria, E1

conference
2007

Analytical communication networks model for enterprise grid computing

B Javadi, M Akbari, J Abawajy

(2007), Vol. 23, pp. 737-747, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Analytical modeling of interconnection networks in heterogeneous multi-cluster systems

B Javadi, J Abawajy, M Akbari

(2007), Vol. 40, pp. 29-47, Journal of supercomputing, New York, N.Y., C1

journal

A multilevel trust management framework

S Chong, J Abawajy, R Dew

(2007), pp. 776-781, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007), Melbourne, Australia, E1

conference

Communication network analysis of the enterprise grid systems

B Javadi, J Abawajy, M Akbari, S Nahavandi

(2007), pp. 33-40, Proceedings of the fifth Australasian symposium on ACSW frontiers, Ballarat, Australia, E1

conference

Electronic negotiation and security of information exchanged in e-commerce

R Al-Jaljouli, J Abawajy

(2007), pp. 1-11, Proceedings of the 2007 collecter E-commerce conference : Collecter 2007 - 10th anniversary., Melbourne, Vic., E1

conference

Feedback credibility issues in trust management systems

S Chong, J Abawajy

(2007), pp. 387-391, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007, Seoul, Korea, E1

conference

Sensor node activity scheduling approach

J Abawajy, S Nahavandi, F Al-Neyadi

(2007), pp. 72-77, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007 : 26-28 April, 2007, Seoul, Korea, Seoul, Korea, E1

conference

A conceptual framework for ubiquitously sharing heterogeneous patient information among autonomous healthcare providers

F Al-Neyadi, J Abawajy, M Ders

(2007), pp. 299-304, Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering, Seoul, Korea, E1

conference

Taxonomy and survey of location management systems

A Rahaman, J Abawajy, M Hobbs

(2007), pp. 369-374, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Melbourne, Australia, E1

conference

An authorization policy management framework for dynamic medical data sharing

F Al-Neyadi, J Abawajy

(2007), pp. 313-318, IPC 2007 proceedings : the 2007 International Conference on Intelligent Pervasive Computing, Jeju Island, Korea, E1

conference

An authentication framework for e-health systems

F Al-Neyadi, J Abawajy

(2007), pp. 616-620, 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1

conference

Secure mobile agent-based e-negotiation for on-line trading

R Al-Jaljouli, J Abawajy

(2007), 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1

conference
2006

A reputation-based grid information service

J Abawajy, A Goscinski

(2006), Vol. 3994, pp. 1015-1022, Lecture notes in computer science, Berlin, Germany, C1

journal

Adaptive parallel I/O scheduling algorithm for multiprogrammed systems

J Abawajy

(2006), Vol. 22, pp. 611-619, Future generation computer systems, Netherlands, C1

journal

A novel data replication and management protocol for mobile computing systems

J Abawajy, M Mat Deris, M Omar

(2006), Vol. 2, pp. 3-19, Mobile information systems, Amsterdam, The Netherlands, C1

journal

Supporting disconnected operations in mobile computing

J Abawajy, M Mat Deris

(2006), pp. 911-918, 4th ACS/IEEE international conference on computer systems and applications, Sharjah, UAE, E1

conference

Parallel I/O scheduling in the presence of data duplication on multiprogrammed cluster computing systems

J Abawajy

(2006), pp. 1118-1125, 2006 IEEE International Conference on Computer Systems and Applications, Sharjah, United Arab Emirates, E1

conference

Multi-cluster computing interconnection network performance modeling and analysis

B Javadi, M Akbari, J Abawajy, S Nahavandi

(2006), pp. 90-95, ADCOM 2006: automatic computing: proceedings of the 14th international conference on advanced computing and communications, Surathkal, India, E1

conference

Managing data using neighbor replication on triangular-grid structure

A Mamat, M Mat Deris, J Abawajy, S Ismail

(2006), Vol. 3994, pp. 1071-1077, Lecture notes in computer science, Heidelberg, Germany, C1

journal

A performance model for analysis of heterogeneous multi-cluster systems

B Javadi, M Akbari, J Abawajy

(2006), Vol. 32, pp. 831-851, Parallel computing, Amsterdam, Netherlands, C1

journal

Analysis of interconnection networks in heterogeneous multi-cluster systems

B Javadi, J Abawajy, M Akbari, S Nahavandi

(2006), pp. 1-8, ICCP 2006 : 2006 international conference on parallel processing workshops, Columbus, USA, E1

conference

Economy-based data replication broker

H Lin, J Abawajy, R Buyya

(2006), pp. 1-8, Proceedings of the Second IEEE International Conference on e-science and grid computing, Amsterdam, Netherlands, E1

conference

Analytical interconnection networks model for multi-cluster computing systems

B Javadi, J Abawajy, M Akbari

(2006), pp. 37-42, ASMTA 2006 : Proceedings of the ASMTA 2006 13th international conference on analytical and stochastic modelling techniques and applications, Bonn, Germany, E1

conference

Analysis of multi-cluster computing systems with processor heterogeneity

B Javadi, M Akbari, J Abawajy

(2006), pp. 1-8, CSICC 2006 : Proceedings of the 11th International CSI (Computer Society of Iran) Computer Conference, Tehran, Iran, E1

conference

Analytical network modeling of heterogeneous large-scale cluster systems

B Javadi, J Abawajy, M Akbari, S Nahavandi

(2006), pp. 1-9, 2005 IEEE International Conference on Cluster Computing, Barcelona, Spain, E1

conference

Analytical modeling of communication latency in multi-cluster systems

B Javadi, J Abawajy, M Akbari

(2006), pp. 1-6, Proceedings of the 12th International Conference on parallel and distributed systems (ICPADS`06), Minneapolis, USA, E1

conference
2005

Fault-tolerant dynamic job scheduling policy

J Abawajy

(2005), Vol. 3719, pp. 165-173, Lecture notes in computer science, Berlin, Germany, C1

journal

Autonomic job scheduling policy for grid computing

J Abawajy

(2005), Vol. 3516, pp. 213-220, Lecture notes in computer science, Berlin, Germany, C1

journal

Job scheduling policy for high throughput grid computing

J Abawajy

(2005), Vol. LNCS 3719, pp. 184-192, Lecture notes in computer science, Berlin, Germany, C1

journal

An efficient replicated data management approach for peer-to-peer systems

J Abawajy

(2005), Vol. 3516, pp. 457-463, Lecture Notes in Computer Science, Computational Science ? ICCS 2005, Berlin, Germany, C1

journal

Robust parallel job scheduling infrastructure for service-oriented grid computing systems

J Abawajy

(2005), Vol. 3483, pp. 1272-1281, Lecture notes in computer science, Berlin, Germany, C1

journal

Grid accounting service infrastructure for service-oriented grid computing systems

J Abawajy

(2005), Vol. 3458, pp. 167-174, Lecture notes in computer science, Berlin, Germany, C1

journal

A new internet meta-search engine and implementation

J Abawajy, M Hu

(2005), pp. 103-110, ACS/IEEE International Conference on Computer Systems and Applications, Cairo, Egypt, E1

conference

Performance analysis of interconnection networks for multi-cluster systems

B Javadi, J Abawajy, M Akbari

(2005), Vol. 3516, pp. 205-212, Lecture notes in computer science, Berlin , Germany, C1

journal

A new approach for efficiently achieving high availability in mobile computing

M Deris, J Abawajy, M Omar

(2005), pp. 60-68, Lecture notes in computer science, Berlin, Germany, C1

journal

High reliability replication technique for Web-server cluster systems

M Mat Deris, J Abawajy, M Zarina, R Mamat

(2005), Vol. 3516, pp. 447-456, Lecture notes in computer science, Berlin, Germany, C1

journal

Performance analysis of heterogeneous multi-cluster systems

B Javadi, M Akbari, J Abawajy

(2005), pp. 493-500, Proceedings of the 2005 international conference on parallel processing workshops, Oslo, Norway, E1

conference

Modeling of multi-cluster systems in the presence of network heterogeneity

B Javadi, M Akbari, J Abawajy

(2005), pp. 204-211, The proceedings of the International Conference on Computational Science and Engineering, Istanbul, Turkey, E1

conference

Analytical performance modeling of the enterprise grid computing

B Javadi, M Akbari, J Abawajy

(2005), First International Conference on e-science and grid computing, Melbourne, Australia, E1

conference
2004

Fault detection service architecture for grid computing systems

J Abawajy

(2004), Vol. 3044, pp. 107-115, Lecture notes in computer science, Berlin, Germany, C1

journal

Dynamic parallel job scheduling in multi-cluster computing systems

J Abawajy

(2004), Vol. 3036, pp. 27-34, Lecture notes in computer science, Berlin, Germany, C1

journal

Preemptive job scheduling policy for distributively-owned workstation clusters

J Abawajy

(2004), Vol. 14, pp. 255-270, Parallel processing letters, Singapore, C1

journal

Placement of file replicas in data grid environments

J Abawajy

(2004), Vol. 3038, pp. 66-73, Lecture notes in computer science, Berlin, Germany, C1

journal

File replacement algorithm for storage resource managers in data grids

J Abawajy

(2004), Vol. 3038, pp. 339-346, Lecture notes in computer science, Berlin, Germany, C1

journal

Secure accounting and payment infrastructure for grid computing

J Abawajy

(2004), Scientific applications of grid computing, Beijing, China, E1

conference

Design and evaluation of an agent-based communication model for a parallel file system

M Pérez, A Sánchez, J Abawajy, V Robles, J Peña

(2004), Vol. 3044, pp. 87-96, Lecture notes in computer science, Berlin, Germany, C1-1

journal
2003

Parallel I/O scheduling in multiprogrammed cluster computing systems

J Abawajy

(2003), Vol. 2660, pp. 223-229, Computational Science ? ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2?4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1

conference

An adaptive load balancing algorithm for large data parallel processing with communication delay

K Imasaki, J Abawajy

(2003), Vol. 2660, pp. 242-247, Computational Science ? ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2?4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1

conference

Grants

Industry and Other Funding

Database and Secure Website Development

Prof Jemal Abawajy

  • 2012: $5,000

Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers

Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy

  • 2016: $20,000
  • 2015: $40,000

Supervisions

Principal Supervisor
2016

Benjamin Jonathan Townsend

Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform

Doctor of Philosophy (Information Technology), School of Information Technology

Baker Alrubaiey

Thesis entitled: Assuring Virtual Network Reliability and Resilience

Doctor of Philosophy (Information Technology), School of Information Technology

Fahed Matar Al Neyadi

Thesis entitled: Securely Sharing Dynamic Medical Information in E-Health

Doctor of Philosophy (Information Technology), School of Information Technology

Masitah Ahmad

Thesis entitled: Service Level Agreements Framework for Digital Library Quality of Service Management

Doctor of Philosophy (Information Technology), School of Information Technology

Sara Ghanavati

Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure

Master of Science (Information Technology), School of Information Technology

2015

Mohd Izuan Hafez Ninggal

Thesis entitled: Privacy-Preserving Mechanism for Social Network Data Publishing

Doctor of Philosophy (Information Technology), School of Information Technology

Isredza Rahmi A Hamid

Thesis entitled: Phishing Detection and Traceback Mechanism

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Davood Izadi

Thesis entitled: Enhancing Wireless Sensor Networks Functionalities

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Harinda Fernando

Thesis entitled: Enhancing RFID performance and security in networked environments

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Hairulnizam Bin Mahdin

Thesis entitled: Enhancing RFID Data Quality and Reliability

Doctor of Philosophy (Information Technology), School of Information Technology

Soon Chong

Thesis entitled: Risk and Trust Management for Online Distributed System

Doctor of Philosophy (Information Technology), School of Information Technology

Raja Al-Jaljouli

Thesis entitled: Mobile-Agent Based Multi-Constraint One-to-Many Bilateral e-Negotiation Framework

Doctor of Philosophy (Information Technology), School of Information Technology

Mohd Farhan Md Fudzee

Thesis entitled: Broker-based service-oriented content adaptation framework

Doctor of Philosophy (Information Technology), School of Information Technology

Shivali Goel

Thesis entitled: Antenna Selection and Channel Estimation for Hybrid Relay Systems

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2015

Biplob Ray

Thesis entitled: Security framework and protocols for the internet of things

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Ammar Al Azab

Thesis entitled: Malware Detection and Prevention

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Nicholas Patterson

Thesis entitled: A Framework for Detecting Virtual Property Theft in Virtual World Environments

Doctor of Philosophy (Information Technology), School of Information Technology