Prof Jemal Abawajy

STAFF PROFILE

Position

Professor

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Geelong Waurn Ponds Campus

Contact

jemal.abawajy@deakin.edu.au
+61 3 522 71376

Career highlights

Academic promotion / hiring: Served on promotion & hiring committee at  Lecturer, Senior Lecturer, Asoociate and Professor levels as well as the Head of School in Australia (e.g., Deakin and SCU) and internationally (e.g., New Zealand, Saudi Arabia, Malaysia, and Pakistan).

Keynote/Invited Speaker:  Delivered more than 75 keynote addresses, numerous invited seminars, and media briefings (e.g., Voice of America's English Radio).

Distinguished Faculty: Appointed record 4 times under the GIAN (Global Initiative of Academic Networks), a prestigious programme of the Ministry of Human Resource Development of the Government of India.

Academic program Advisor, Serving as an advisor of undergraduate / postgraduate degree offering institutions within Australia and internationally. Some examples:

  • International Academic Advisor, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 2021-2024.
  • Field expert, Universiti Tun Hussein Onn Malaysia, Malaysia, Faculty of Computer Science & Information Technology, Period: on-going.
  • Course Advisory Committee, Box Hill Institute, Melbourne, Victoria, Australia, Period: 2012-2020.

Faculty Development Program (FDP): Regularly provide FDP at many academic institutions. The latest example is a 5-day FDP on "Quantum Computing", Department of Information Technology, Meerut Institute of Engineering and Technology, India.

Curriculum development, At Deakin University, I initiated and played a lead role in the conceptualisation and formulation of new undergraduate level degree programs (e.g., IT Security degree program, the IT Security major program and the Bachelor of Health Informatics degree program) and contributed to the development of new degree programs (e.g., Web and Mobile courses).

Research Grant assessor: I have assessed all types of research grants run by Australian Research council (ARC) as well as many countries including Natural Sciences and Engineering Research Council of Canada, South Africa’s National Research Foundation (NRF), Netherlands Organisation for Scientific Research (NWO), Swiss National Science Foundation, and many more.

Academic program assessment: Experienced undergraduate and postgraduate academic program assessor with a sound understanding of various accreditation practices, standards, evidence guide and rules. I have assessed many undergraduate and postgraduate programs for many universities locally in Australia and internationally including:.

  • Melbourne Institute of Technology, Melbourne, Australia
  • Imam Abdulrahman Bin Faisal University, Dammam, KSA,
  • Universiti Kebangsaan Malaysia (UKM), Malaysia
  • Auckland University of Technology, Auckland, New Zealand
  • Universiti Putra Malaysia (UPM), .Malaysia.
  • Universiti Tun Hussein Onn Malaysia (UTHM), Johor, Malaysia.
     

PhD Thesis Assessor: I have assessed over 100 theses for many reputable institutions all over the world including 

  • United Kingdom (e.g., University of Leeds)
  • Australia (e.g., University of Sydney)
  • Canada (e.g., University of Manitoba)
  • India (e.g., Indian Institute of Technology-Roorkee)
  • South Africa (e.g., University of KwaZulu-Natal, Durban)
  • New Zealand (e.g., Auckland University of Technology)
  • Mauritius (University of Mauritius)
  • Malaysia (e.g., University Malaya, University Putra Malaya)
  • Germany (e.g., Friedrich-Schiller-Universität Jena)
  • Pakistan (e.g., University of Sargodha, Sargodha).

Affiliations

BOARD AND EXECUTIVE MEMBER

  • External advisory Board for Cyber Security, Department of Computer Science, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University (IAU), Dammam, KSA, Period: 2019-2023
  • Executive Advisory Board for Cyber Security (EBAC), Cyber Security Research and Innovation Centre, Period: 2018-2021
  • Executive Member, Strategic Centre for Cyber Resilience and Trust (CREST), Period: 2023-now
  • Board of International Experts, International Center for AI and Cyber Security Research and Innovations Asia University, Taiwan, Period: 2022-now.
  • Executive Member, Cyber Security Research and Innovation (CSRI) Center, Period: 2015-2023
  • Academic Board, Deakin University, Australia, Period: 2011–2014
  • Faculty Board, Deakin University, Australia, Period: 2011–2012.

Professional activities

Sample Editorial Board

  1. Editorial Board, Journal of Reliable Intelligent Environments, Springer, 2023 - Now
  2. Editorial Board, Journal of Cloud Computing, Springer, 2021 - Now
  3. Associate Editor, IEEE Access, IEEE Computer Society, 2020 – Now,
  4. Associate Editor, Electronic Commerce Research, Springer, 2019 - Now
  5. Editorial Board, Discover Internet of Things, Springer, 2020 - Now
  6. Editorial Board, Journal of Theoretical and Applied Electronic Commerce Research, 2021 – Now.

Conference Leadership
I have served on more than 300 conferences in various capacities including Steering Committee, International Liaison Chairs, General Chair, Program Chair, Publication Chair, Workshop Chair, Best paper Award Chair, Tutorial Chair, and Publicity Chair.

Awards

Vice-Chancellor’s Award: Recipient of the Vice-Chancellor’s Award for outstanding research, Deakin University, Australia.

Excellence in Research Award: Received several School of Information Technology best researcher awards including the 2018 Excellence in Research Award, 2012 Excellence in Research Award, and 2010 Excellence in Research Award. Recipient of the 2011 excellence in research and innovation competition first place award, UTHM, Malaysia.

Best Paper Award: Received several best paper awards including the 2013 IEEE Proceedings of the International Joint Conference on Neural Networks, Dallas, Texas, USA Nominated best paper award, 2012 IEEE International Conference on Cloud Computing Technology and Science, Taiwan, and 201 Conference in Future Generation Information Technology, Korea.

Excellence in Research Training Award: Received several excellences in research training awards including the 2010 outstanding Performance in Research Training Award

Excellence in Teaching & Student Engagement Award: Received several awards in teaching and student engagement award from the School of Information Technology, Deakin University, Australia including the 2020 Excellence in International Student Engagement, the 2006 and the 2007 commendation for excellent lecturer.

Service Excellence Award: Received several service excellence awards including outstanding services to international conference on computational science and its applications (ICCSA).

Projects

Sample of completed and on-going projects and funds

  1. InterGrid: Peering Architecture and Policies for Internetworking Disparate Grids, Australian Research Council Discovery Project (ARC DP), Grant number: DP0880501 | Funding period: 2008 – 2012.
  2. The Utility Grid Project: Autonomic and Utility-oriented Global Grids for Powering Emerging E-Research Applications, International Science Linkages, Department of Education, Science & Training, Australia, $592,875, | Funding period: 2006 – 2009.
  3. International cooperation initiative for research and development, Obfuscation-resilient Algorithm for Accurate and Early Detection of Malware, Research and Innovation Agency, Ministry of Education, Saudi Arabia, SAR. 1567000, | Funding period:2020-2023.
  4. Smart and Secure Services for Internet of Things, funded by the Brazilian Federal Agency for Support and Evaluation of Graduate Education (CAPES-Print Cal) | Funding period: 2019-2022.
  5. Scalable and Energy-Efficient Consensus Algorithm Using Deterministic Approach for Blockchain, FRGS grant (issued by the Ministry of Higher Education, Malaysia (MOHE)),  Ref: FRGS/1/2020/ICT04/UPM/02/1 | Funding period: 2020-2023.

Publications

Filter by

2024

A Novel Choquet Integral-based VIKOR Approach under Q-rung Orthopair Hesitant Fuzzy Environment

H Qin, Y Wang, X Ma, J Abawajy

(2024), pp. 1-12, IEEE Transactions on Fuzzy Systems, Piscataway, NJ., C1

journal article

MDS-Based Cloned Device Detection in IoT-Fog Network

Z AlJabri, J Abawajy, S Huda

(2024), pp. 1-12, IEEE Internet of Things Journal, Piscataway, NJ., C1

journal article
2023

Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis

B Murshed, S Mallappa, J Abawajy, M Saif, H Al-ariki, H Abdulwahab

(2023), Vol. 56, pp. 5133-5260, Artificial Intelligence Review, England, C1

journal article

Analysis of Consumer IoT Device Vulnerability Quantification Frameworks

S Baho, J Abawajy

(2023), Vol. 12, pp. 1-31, Electronics (Switzerland), Basel, Switzerland, C1

journal article

A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices

Z Aljabri, J Abawajy, S Huda

(2023), Vol. 2023, pp. 1-31, Wireless Communications and Mobile Computing, London, Eng., C1

journal article

Design and development of a smartphone app for hypertension management: An intervention mapping approach

Elton Lobo, Chandan Karmakar, Mohamed Abdelrazek, Jemal Abawajy, Clara Chow, Yuxin Zhang, Muhammad Kabir, Reza Daryabeygi, Ralph Maddison, Sheikh Islam

(2023), Vol. 11, pp. 01-15, Frontiers in Public Health, Lausanne, Switzerland, C1

journal article

FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning

B Murshed, Suresha, J Abawajy, M Saif, H Abdulwahab, F Ghanem

(2023), Multimedia Tools and Applications, Berlin, Germany, C1

journal article

Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT

A Shahidinejad, J Abawajy

(2023), pp. 1-11, IEEE Systems Journal, Piscataway, N.J., C1

journal article

A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection

N Choudhry, J Abawajy, S Huda, I Rao

(2023), Vol. 11, pp. 114680-114713, IEEE Access, Piscataway, N.J., C1

journal article

Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications

A Shahidinejad, J Abawajy

(2023), pp. 1-13, IEEE Transactions on Network Science and Engineering, Piscataway, N.J., C1

journal article

Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles

A Shahidinejad, J Abawajy

(2023), pp. 1-11, IEEE Transactions on Consumer Electronics, Piscataway, N.J., C1

journal article

Efficient Provably-Secure Authentication Protocol for Multi-Domain IIoT Using a Combined Off-Chain and On-Chain Approach

A Shahidinejad, J Abawajy

(2023), pp. 1-10, IEEE Internet of Things Journal, Piscataway, N.J., C1

journal article

Deep Learning based Multilabel Hateful Speech Text Comments Recognition and Classification Model for Resource Scarce Ethiopian Language: The case of Afaan Oromo

N Defersha, J Abawajy, K Kekeba

(2023), pp. 1-11, CCET 2022 : Proceedings of 2022 IEEE International Conference on Current Development in Engineering and Technology, Bhopal, India, E1

conference
2022

Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making and Parameter Reduction

X Ma, H Qin, J Abawajy

(2022), Vol. 30, pp. 357-369, IEEE Transactions on Fuzzy Systems, C1

journal article

Early detection of cardiovascular autonomic neuropathy: A multi-class classification model based on feature selection and deep learning feature fusion

M Hassan, S Huda, M Hassan, J Abawajy, A Alsanad, G Fortino

(2022), Vol. 77, pp. 70-80, Information Fusion, Amsterdam, The Netherlands, C1

journal article

An Advanced Boundary Protection Control for the Smart Water Network Using Semisupervised and Deep Learning Approaches

S Sharmeen, S Huda, J Abawajy, C Ahmed, M Hassan, G Fortino

(2022), Vol. 9, pp. 7298-7310, IEEE Internet of Things Journal, C1

journal article

ARPS: An Autonomic Resource Provisioning and Scheduling Framework for Cloud Platforms

M Kumar, A Kishor, J Abawajy, P Agarwal, A Singh, A Zomaya

(2022), Vol. 7, pp. 386-399, IEEE Transactions on Sustainable Computing, C1

journal article

An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters

Z Zhou, K Li, J Abawajy, M Shojafar, M Chowdhury, F Li, K Li

(2022), Vol. 7, pp. 371-385, IEEE Transactions on Sustainable Computing, C1

journal article

ECMS: An Edge Intelligent Energy Efficient Model in Mobile Edge Computing

Z Zhou, M Shojafar, J Abawajy, H Yin, H Lu

(2022), Vol. 6, pp. 238-247, IEEE Transactions on Green Communications and Networking, C1

journal article

Machine learning models for prediction of co-occurrence of diabetes and cardiovascular diseases: a retrospective cohort study

A Abdalrada, J Abawajy, T Al-Quraishi, S Islam

(2022), pp. 1-11, Journal of Diabetes and Metabolic Disorders, Berlin, Germany, C1

journal article

DEHM: An Improved Differential Evolution Algorithm using Hierarchical Multi-strategy in a Cybertwin 6G Network

Z Zhou, J Abawajy, M Shojafar, M Chowdhury

(2022), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, NJ, C1

journal article

Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach

S Azizi, M Shojafar, J Abawajy, R Buyya

(2022), Vol. 201, pp. 1-13, Journal of Network and Computer Applications, Amsterdam, The Netherlands, C1

journal article

Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing

S Singh, R Kumar, A Sharma, J Abawajy, R Kaur

(2022), pp. 1-18, Cluster Computing, Berlin, Germany, C1

journal article

DEA-RNN: A Hybrid Deep Learning Approach for Cyberbullying Detection in Twitter Social Media Platform

B Murshed, J Abawajy, S Mallappa, M Saif, H Al-ariki

(2022), Vol. 10, pp. 25857-25871, IEEE Access, Piscataway, NJ, C1

journal article

Prediction of cardiac autonomic neuropathy using a machine learning model in patients with diabetes

A Abdalrada, J Abawajy, T Al-Quraishi, S Islam

(2022), Vol. 13, pp. 1-10, Therapeutic Advances in Endocrinology and Metabolism, London, Eng., C1

journal article

Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing

S Ghanavati, J Abawajy, D Izadi

(2022), Vol. 10, pp. 488-499, IEEE Transactions on Emerging Topics in Computing, Piscataway, N.J., C1

journal article

Machine Learning Approaches for Predicting Hypertension and Its Associated Factors Using Population-Level Data From Three South Asian Countries

Sheikh Islam, Ashis Talukder, Md Awal, Md Siddiqui, Md Ahamad, Benojir Ahammed, Lal Rawal, Roohallah Alizadehsani, Jemal Abawajy, Liliana Laranjo, Clara Chow, Ralph Maddison

(2022), Vol. 9, pp. 1-9, Frontiers in Cardiovascular Medicine, Lausanne, Switzerland, C1

journal article

Detection of False Income Level Claims Using Machine Learning

K Anil Kumar, S Bhargava, R Apoorva, J Abawajy

(2022), Vol. 14, pp. 65-77, International Journal of Modern Education and Computer Science (IJMECS), Tsim Sha Tsui, HK, C1

journal article

Network-aware worker placement for wide-area streaming analytics

H Mostafaei, S Afridi, J Abawajy

(2022), Vol. 136, pp. 270-281, Future Generation Computer Systems, C1

journal article

Rough set based information theoretic approach for clustering uncertain categorical data

J Uddin, R Ghazali, J Abawajy, H Shah, N Husaini, A Zeb

(2022), Vol. 17, pp. e0265190-e0265190, PLoS ONE, United States, C1

journal article

Evaluating Public Service Delivery Smartness and Impact on Citizens’ Well-being

F Hartanti, J Abawajy, M Chowdhury

(2022), Vol. 10, pp. 69106-69124, IEEE Access, C1

journal article

Weighted Byzantine Fault Tolerance consensus algorithm for enhancing consortium blockchain efficiency and security

H Qin, Y Cheng, X Ma, F Li, J Abawajy

(2022), Vol. 34, pp. 8370-8379, Journal of King Saud University - Computer and Information Sciences, C1

journal article

Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: scientometric mapping of research frontiers

A Ghosh, J Abawajy, M Chowdhury

(2022), Construction Innovation, C1

journal article

Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling

B Murshed, J Abawajy, S Mallappa, M Saif, S Al-Ghuribi, F Ghanem

(2022), Vol. 10, pp. 105328-105351, IEEE Access, C1

journal article

Cryptocurrency Sentiment Analysis on the Twitter Platform Using Support Vector Machine (SVM) Algorithm

R Satrya, O Pratiwi, R Farifah, J Abawajy

(2022), ICADEIS 2022 : Proceedings of the International Conference Advancement in Data Science, E-Learning and Information Systems 2022, Bandung, Indonesia, E1

conference
2021

Real-time structural health monitoring for concrete beams: a cost-effective 'Industry 4.0' solution using piezo sensors

A Ghosh, D Edwards, M Hosseini, R Al-Ameri, J Abawajy, W Thwala

(2021), Vol. 39, pp. 283-311, International Journal of Building Pathology and Adaptation, C1

journal article

An Adaptive Trust Boundary Protection for IIoT Networks Using Deep-Learning Feature-Extraction-Based Semisupervised Model

M Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino

(2021), Vol. 17, pp. 2860-2870, IEEE Transactions on Industrial Informatics, C1

journal article

An empirical analysis of graph-based linear dimensionality reduction techniques

L Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi

(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1

journal article

Development of energy efficient drive for ventilation system using recurrent neural network

Prince, A Hati, P Chakrabarti, J Abawajy, N Keong

(2021), pp. 1-10, Neural Computing and Applications, Berlin, Germany, C1

journal article

FedLearnSP: Preserving Privacy and Security using Federated Learning and Edge Computing

A Makkar, U Ghosh, D Rawat, J Abawajy

(2021), Vol. 11, pp. 21-27, IEEE Consumer Electronics Magazine, C1

journal article

Feature subset selection for malware detection in smart iot platforms

J Abawajy, A Darem, A Alhashmi

(2021), Vol. 21, pp. 1-19, Sensors (Switzerland), Switzerland, C1

journal article

An Ontological Framework for Information Extraction from Diverse Scientific Sources

G Zaman, H Mahdin, K Hussain, Atta-Ur-Rahman, J Abawajy, S Mostafa

(2021), Vol. 9, pp. 42111-42124, IEEE Access, C1

journal article

AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center

Z Zhou, M Shojafar, M Alazab, J Abawajy, F Li

(2021), Vol. 5, pp. 658-669, IEEE Transactions on Green Communications and Networking, C1

journal article

GRVMP: A Greedy Randomized Algorithm for Virtual Machine Placement in Cloud Data Centers

S Azizi, M Shojafar, J Abawajy, R Buyya

(2021), Vol. 15, pp. 2571-2582, IEEE Systems Journal, Piscataway, N.J., C1

journal article

Visualization and deep-learning-based malware variant detection using OpCode-level features

A Darem, J Abawajy, A Makkar, A Alhashmi, S Alanazi

(2021), Vol. 125, pp. 314-323, Future Generation Computer Systems, C1

journal article

Measuring Software Obfuscation Quality-A Systematic Literature Review

S Ebad, A Darem, J Abawajy

(2021), Vol. 9, pp. 99024-99038, IEEE Access, Piscataway, N.J., C1

journal article

An Adaptive Behavioral-Based Incremental Batch Learning Malware Variants Detection Model Using Concept Drift Detection and Sequential Deep Learning

A Darem, F Ghaleb, A Al-Hashmi, J Abawajy, S Alanazi, A Al-Rezami

(2021), Vol. 9, pp. 97180-97196, IEEE Access, Piscataway, N.J., C1

journal article

Classification of Indian Classical Music with Time-Series Matching Deep Learning Approach

A Sharma, G Aggarwal, S Bhardwaj, P Chakrabarti, T Chakrabarti, J Abawajy, S Bhattacharyya, R Mishra, A Das, H Mahdin

(2021), Vol. 9, pp. 102041-102052, IEEE Access, Piscataway, N.J., C1

journal article

An Unsupervised Model for Identifying and Characterizing Dark Web Forums

S Nazah, S Huda, J Abawajy, M Hassan

(2021), Vol. 9, pp. 112871-112892, IEEE Access, Piscataway, N.J., C1

journal article

Drivers Fatigue Level Prediction using Facial, and Head Behavior Information

H Kassem, M Chowdhury, J Abawajy

(2021), Vol. 9, pp. 121686-121697, IEEE Access, Piscataway, N.J., C1

journal article

IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network

Z Zhou, M Shojafar, J Abawajy, A Bashir

(2021), Vol. 5, pp. 1747-1760, IEEE Transactions on Green Communications and Networking, Piscataway, N.J., C1

journal article

Citizens' Trust Measurement in Smart Government Services

F Hartanti, J Abawajy, M Chowdhury, W Shalannanda

(2021), Vol. 9, pp. 150663-150676, IEEE Access, Piscataway, N.J., C1

journal article

Taxonomy of Cybersecurity Awareness Delivery Methods: A Countermeasure for Phishing Threats

A Alhashmi, A Darem, J Abawajy

(2021), Vol. 12, pp. 29-35, International Journal of Advanced Computer Science and Applications, New York, N.Y., C1

journal article

Security and privacy in the Internet of things: Architectures, techniques, and applications

A Awad, J Abawajy

(2021), A7

edited book

Cost-Aware Big Data Stream Processing in Cloud Environment

A Al-Mansoori, J Abawajy, M Chowdhury

(2021), Vol. 363, pp. 120-136, CloudComp 2020 : Proceedings of the 10th EAI International Conference on Cloud Computing, Qufu, China, E1

conference

Lightweight authenticated encryption for cloud-assisted IoT applications

Z AlJabri, J Abawajy, S Huda

(2021), Vol. 740, pp. 295-299, EWCIS 2020 : Trends in wireless communication and information security : proceedings of EWCIS 2020, Ranchi, India, E1

conference

Analysis of Factors Affecting Successful Adoption and Acceptance of Electronic Health Records at Hospitals

A Jamaluddin, J Abawajy

(2021), Vol. 254, pp. 282-293, EATI 2020 : International Conference on Emerging Applications and Technologies for Industry 4.0, Uyo, Nigeria, E1

conference

SNR: Network-aware geo-distributed stream analytics

H Mostafaei, S Afridi, J Abawajy

(2021), pp. 820-827, CCGrid 2021 : Proceedings of the 21st IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Victoria, E1

conference

Chili Ripeness Grading Simulation Using Machine Learning Approach

M Aziz, W Arif Mohamad Nazir, A Ali, J Abawajy

(2021), pp. 253-258, ICOCO 2021: Proceedings of the IEEE Computing 2021 International Conference, Kuala Lumpur, Malaysia, E1

conference
2020

A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services

M Chowdhury, J Abawajy, A Kelarev, H Jelinek

(2020), Vol. 8, pp. 473-483, IEEE Transactions on Cloud Computing, C1

journal article

Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection

J Abawajy, M Chowdhury, A Kelarev

(2020), Vol. 8, pp. 398-407, IEEE Transactions on Cloud Computing, C1

journal article

An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments

Z Zhou, F Li, H Zhu, H Xie, J Abawajy, M Chowdhury

(2020), Vol. 32, pp. 1531-1541, Neural Computing and Applications, C1

journal article

An adaptive framework against android privilege escalation threats using deep learning and semi-supervised approaches

S Sharmeen, S Huda, J Abawajy, M Hassan

(2020), Vol. 89, Applied Soft Computing Journal, C1

journal article

Soft set theory based decision support system for mining electronic government dataset

Deden Witarsyah, Mohd Fudzee, Mohamad Salamat, Iwan Yanto, Jemal Abawajy

(2020), Vol. 16, pp. 39-62, International journal of data warehousing and mining, C1

journal article

Conflict management of evidence theory based on belief entropy and negation

S Li, F Xiao, J Abawajy

(2020), Vol. 8, pp. 37766-37774, IEEE Access, Piscataway, N.J., C1

journal article

Improved PSO algorithm integrated with opposition-based learning and tentative perception in networked data centres

Z Zhou, F Li, J Abawajy, C Gao

(2020), Vol. 8, pp. 55872-55880, IEEE Access, Piscataway, N.J., C1

journal article

Deep learning architectures in emerging cloud computing architectures: Recent development, challenges and next research trend

F Jauro, H Chiroma, A Gital, M Almutairi, S Abdulhamid, J Abawajy

(2020), Vol. 96, pp. 1-28, Applied Soft Computing Journal, Amsterdam, The Netherlands, C1

journal article

Data-intensive task scheduling for heterogeneous big data analytics in IoT system

X Li, L Wang, J Abawajy, X Qin, G Pau, I You

(2020), Vol. 13, Energies, C1

journal article

Evolution of dark web threat analysis and detection: A systematic approach

S Nazah, S Huda, J Abawajy, M Hassan

(2020), Vol. 8, pp. 171796-171819, IEEE Access, C1

journal article

Adaptive computing-plus-communication optimization framework for multimedia processing in cloud systems

Mohammad Shojafar, Claudia Canali, Riccardo Lancellotti, Jemal Abawajy

(2020), Vol. 8, pp. 1162-1175, IEEE transactions on cloud computing, Piscataway, N.J., C1

journal article

An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment

Sara Ghanavati, Jemal Abawajy, Davood Izadi

(2020), pp. 1-10, IEEE Transactions on Services Computing, Piscataway, N.J., C1

journal article

BDSP in the cloud: scheduling and load balancing utlizing SDN and CEP

A Al-Mansoori, J Abawajy, M Chowdhury

(2020), pp. 827-835, CCGRID 2020 : Proceedings of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Vic., E1

conference

Yawn based driver fatigue level prediction

H Kassem, M Chowdhury, J Abawajy, A Al-Sudani

(2020), pp. 372-382, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1

conference

Utility-aware graph dimensionality reduction approach

L Al Omairi, J Abawajy, M Chowdhury

(2020), pp. 327-333, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1

conference

Accuracy analysis transliteration Balinese script-to-Latin text using hexadecimal labeling method

A Aranta, D Witarsyah, S Murpratiwi, J Abawajy

(2020), pp. 1-6, ICADEIS 2020 : Proceedings of the 2020 International Conference on Advancement in Data Science, E-Learning and Information Systems, Online from Bandung, Indonesia, E1

conference
2019

Analysis of energy consumption model in cloud computing environments

Z Zhou, J Abawajy, F Li

(2019), pp. 195-215, Advances on computational intelligence in energy, Cham, Switzerland, B1

book chapter

Fuzzy logic approach to repair coverage holes in internet of things monitoring applications

B Khalifa, A Khedr, Z Aghbari, J Abawajy

(2019), Vol. 9, pp. 227-235, IET Wireless Sensor Systems, C1

journal article

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks

S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan

(2019), Vol. 101, pp. 1247-1258, Future Generation Computer Systems, C1

journal article

Energy efficient multipath routing algorithm for wireless multimedia sensor network

A Genta, D K Lobiyal, J Abawajy

(2019), Vol. 19, Sensors, Basel, Switzerland, C1

journal article

Workflow scheduling in distributed systems under fuzzy environment

F Xiao, Z Zhang, J Abawajy

(2019), Vol. 37, pp. 5323-5333, Journal of Intelligent and Fuzzy Systems, Amsterdam, The Netherlands, C1

journal article

Iterative classifier fusion system for the detection of Android malware

Jemal Abawajy, Andrei Kelarev

(2019), Vol. 5, pp. 600-610, IEEE transactions on big data, Piscataway, N.J., C1

journal article

A soft set approach for handling conflict situation on movie selection

Khalid Haruna, Maizatul Ismail, Mohammad Suyanto, Lubna Gabralla, Abdullahi Bichi, Sani Danjuma, Habeebah Adamu Kakudi, Muhammad Haruna, Saber Zerdoumi, Jemal Abawajy, Tutut Herawan

(2019), Vol. 7, pp. 116179-116194, IEEE access, Piscataway, N.J., C1

journal article

Tweetluenza: predicting flu trends from twitter data

Balsam Alkouz, Zaher Aghbari, Jemal Abawajy

(2019), Vol. 2, pp. 273-287, Big data mining and analytics, Piscataway, N.J., C1

journal article

Advances on Computational Intelligence in Energy: The Applications of Nature-Inspired Metaheuristic Algorithms in Energy

T Herawan, H Chiroma, J Abawajy

(2019), Cham, Switzerland, A7

edited book

A survey of big workflow

M Aziz, J Abawajy, I Haq, I Nasir

(2019), Vol. 520, pp. 529-539, DaEng-2015 : Proceedings of the 2nd International Conference on Data Engineering, Kuala Lumpur, Malaysia, E1

conference

Identifying malware on cyber physical systems by incorporating semi-supervised approach and deep learning

S Sharmeen, S Huda, J Abawajy

(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25–27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1

conference

Predicting breast cancer risk using subset of genes

T Al-Quraishi, J Abawajy, N Al-Quraishi, A Abdalrada, L Al-Omairi

(2019), pp. 1379-1384, CoDIT 2019 : Proceedings of the 6th International Conference on Control, Decision and Information Technologies, Paris, France, E1

conference

High-dimensionality graph data reduction based on proposing a new algorithm

Lamyaa Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi

(2019), Vol. 63, Proceedings of 32nd International Conference on Computer Applications in Industry and Engineering, San Diego, California, E1

conference
2018

Foundation of healthcare cybersecurity

J Abawajy

(2018), Vol. 1, pp. 93-120, Information security: foundations, technologies and applications, London, Eng., B1

book chapter

Universal and secure object ownership transfer protocol for the Internet of Things

B Ray, J Abawajy, M Chowdhury, A Alelaiwi

(2018), Vol. 78, pp. 838-849, Future Generation Computer Systems, C1

journal article

A trajectory privacy-preserving scheme based on query exchange in mobile social networks

S Zhang, G Wang, Q Liu, J Abawajy

(2018), Vol. 22, pp. 6121-6133, Soft computing, Berlin, Germany, C1

journal article

Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center

Z Zhou, J Abawajy, F Li, Z Hu, M Chowdhury, A Alelaiwi, K Li

(2018), Vol. 6, pp. 27080-27090, IEEE Access, C1

journal article

Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms

Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, A Alelaiwi, F Li

(2018), Vol. 86, pp. 836-850, Future Generation Computer Systems, C1

journal article

A Framework for Software Defect Prediction and Metric Selection

S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood

(2018), Vol. 6, pp. 2844-2858, IEEE Access, C1

journal article

A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection

S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino

(2018), Vol. 83, pp. 193-207, Future Generation Computer Systems, C1

journal article

Malware Threats and Detection for Industrial Mobile-IoT Networks

S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan

(2018), Vol. 6, pp. 15941-15957, IEEE Access, C1

journal article

Clone tag detection in distributed RFID systems

H Kamaludin, H Mahdin, J Abawajy

(2018), Vol. 13, pp. 1-22, PLoS One, San Francisco, Calif., C1

journal article

Minimal ensemble based on subset selection using ECG to diagnose categories of CAN

J Abawajy, A Kelarev, X Yi, H Jelinek

(2018), Vol. 160, pp. 85-94, Computer Methods and Programs in Biomedicine, Ireland, C1

journal article

Secure multi-attribute one-to-many bilateral negotiation framework for e-commerce

R Al-Jaljouli, J Abawajy, M Hassan, A Alelaiwi

(2018), Vol. 11, pp. 415-429, IEEE transactions on services computing, Piscataway, N.J., C1

journal article

Identifying cyber threats to mobile-IoT applications in edge computing paradigm

J Abawajy, S Huda, S Sharmeen, M Hassan, A Almogren

(2018), Vol. 89, pp. 525-538, Future Generation Computer Systems, C1

journal article

Scheduling distributed energy resource operation and daily power consumption for a smart building to optimize economic and environmental parameters

Z Pooranian, J Abawajy, P Vinod, M Conti

(2018), Vol. 11, Energies, C1

journal article

Learning automaton based topology control protocol for extending wireless sensor networks lifetime

M Javadi, H Mostafaei, M Chowdhurry, J Abawajy

(2018), Vol. 122, pp. 128-136, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal article

SDN enabled BDSP in public cloud for resource optimization

A Al-Mansoori, J Abawajy, M Chowdhury

(2018), Wireless networks, New York, N.Y., C1

journal article

Frequency switch, secret sharing and recursive use of hash functions secure (low cost) ad hoc networks

P Sarkar, M Chowdhury, J Abawajy

(2018), Vol. 580, pp. 315-328, ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1

conference

Breast cancer recurrence prediction using random forest model

T Al-Quraishi, J Abawajy, M Chowdhury, S Rajasegarar, A Abdalrada

(2018), Vol. 700, pp. 318-329, SCDM 2018 : Concise and informative : Proceedings of the 3rd International Conference on Soft Computing and Data Mining, Johor, Malaysia, E1

conference

Relationship between Angiotensin Converting Enzyme gene and Cardiac Autonomic Neuropathy among Australian population

A Abdalrada, J Abawajy, M Chowdhury, S Rajasegarar, T Al-Quraishi, H Jelinek

(2018), Vol. 700, pp. 135-146, SCDM 2018 : Proceedings of the 3rd International Conference on Soft Computing and Data Mining 2018, Johor, Malaysia, E1

conference

Privacy threat analysis of mobile social network data publishing

J Abawajy, M Ninggal, Z Aghbari, A Darem, A Alhashmi

(2018), Vol. 239, pp. 60-68, SecureComm 2017: Proceedings of the 13th International Conference on Security and Privacy in Communication Networks, Niagara Falls, Ont., E1

conference

Securing websites against homograph attacks

J Abawajy, A Richard, Z Aghbari

(2018), Vol. 239, pp. 47-59, SecureComm 2017 : Proceedings of the 13th EAI International Conference on Security and Privacy Communication Networks, Niagara Falls, Ont., E1

conference

Data-centric task scheduling algorithm for hybrid tasks in cloud data centers

X Li, L Wang, J Abawajy, X Qin

(2018), Vol. 11335, pp. 630-644, ICA3PP 2018 : Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou, China, E1

conference

Delay-aware resource allocation for data analysis in cloud-edge system

X Li, Z Lian, X Qin, J Abawajy

(2018), pp. 816-823, ISPA 2018 : Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications 2018, Melbourne, Vic., E1

conference
2017

Integration of cloud computing and IoT: opportunities and challenges

S Ghanavati, J Abawajy, D Izadi

(2017), pp. 99-117, The internet of things : foundation for smart cities, eHealth and ubiquitous computing, Abingdon, Eng., B1

book chapter

Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems

N Sabar, J Abawajy, J Yearwood

(2017), Vol. 21, pp. 315-327, IEEE Transactions on Evolutionary Computation, C1

journal article

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks

E Luo, Q Liu, J Abawajy, G Wang

(2017), Vol. 68, pp. 222-233, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Multilayer hybrid strategy for phishing email zero-day filtering

M Chowdhury, J Abawajy, A Kelarev, T Hochin

(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1

journal article

A fast malware feature selection approach using a hybrid of multi-linear and stepwise binary logistic regression

S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood

(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1

journal article

Federated internet of things and cloud computing pervasive patient health monitoring system

J Abawajy, M Hassan

(2017), Vol. 55, pp. 48-53, IEEE communications magazine, Piscataway, N.J., C1

journal article

Virtual networks dependability assessment framework

B Al-Rubaiey, J Abawajy

(2017), Vol. 10, pp. 3-12, International journal of high performance computing and networking, Olney, Eng., C1

journal article

Cloud-assisted IoT-based health status monitoring framework

S Ghanavati, J Abawajy, D Izadi, A Alelaiwi

(2017), Vol. 20, pp. 1843-1853, Cluster computing, New York, N.Y., C1

journal article

Cost and performance-based resource selection scheme for asynchronous replicated system in utility-based computing environment

W Nik, B Zhou, J Abawajy, A Zomaya

(2017), Vol. 7, pp. 723-735, International journal on advanced science, engineering and information technology, [Indonesia], C1

journal article

Advances in teaching and learning on Facebook in higher institutions

H Chiroma, N Mohd Shuib, A Abubakar, A Zeki, A Gital, T Herawan, J Abawajy

(2017), Vol. 5, pp. 480-500, IEEE access, Piscataway, N.J., C1

journal article

A parallel framework for software defect detection and metric selection on cloud computing

M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood

(2017), Vol. 20, pp. 2267-2281, Cluster Computing, C1

journal article

Fog of everything: energy-efficient networked computing architectures, research challenges, and a case study

E Baccarelli, P Naranjo, M Scarpiniti, M Shojafar, J Abawajy

(2017), Vol. 5, pp. 9882-9910, IEEE access, Piscataway, N.J., C1

journal article

Coverage hole repair in WSNs using cascaded neighbor intervention

B Khalifa, Z Aghbari, A Khedr, J Abawajy

(2017), Vol. 17, pp. 7209-7216, IEEE sensors journal, Piscataway, N.J., C1

journal article

An analysis quality of experience and energy consumption for video streaming via mobile devices

M Jofri, M Fudzee, M Ismail, J Abawajy

(2017), Vol. 9, pp. 15-20, Journal of telecommunication, electronic and computer engineering, Melaka, Malaysia, C1

journal article

Energy-efficient virtual machine consolidation algorithm in cloud data centers

Z Zhou, Z Hu, J Yu, J Abawajy, M Chowdhury

(2017), Vol. 24, pp. 2331-2341, Journal of Central South University, Hunan Sheng, China, C1-1

journal article

Fog over virtualized IoT: new opportunity for context-aware networked applications and a case study

P Naranjo, Z Pooranian, S Shamshirband, J Abawajy, M Conti

(2017), Vol. 7, pp. 1-13, Applied sciences, Basel, Switzerland, C1

journal article

A framework to analyze quality of service (QoS) for text-to-speech (TTS) services

M Md Fudzee, M Hassan, H Mahdin, S Kasim, J Abawajy

(2017), Vol. 549, pp. 589-597, SCDM 2016 : Proceedings of the Second International Conference on Soft Computing and Data Mining, Bandung, Indonesia, E1

conference

Text detection in low resolution scene images using convolutional neural network

A Risnumawan, I Sulistijono, J Abawajy

(2017), Vol. 549, pp. 366-375, Recent Advances on Soft Computing and Data Mining : the Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016 Proceedings, Bandung, Indonesia, E1

conference

A multi-protocol security framework to support internet of things

B Ray, M Chowdhury, J Abawajy

(2017), Vol. 198, pp. 257-270, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Guangzhou, China, E1

conference
2016

Security considerations for wireless carrier agonistic bio-monitoring systems

B Townsend, J Abawajy

(2016), Vol. 164, pp. 725-737, Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers, Berlin, Germany, B1

book chapter

Hybrids of support vector machine wrapper and filter based framework for malware detection

S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood

(2016), Vol. 55, pp. 376-390, Future Generation Computer Systems, C1

journal article

Rees semigroups of digraphs for classification of data

J Abawajy, A Kelarev, M Miller, J Ryan

(2016), Vol. 92, pp. 121-134, Semigroup forum, New York, N.Y., C1

journal article

Evolutionary optimization: A big data perspective

M Bhattacharya, R Islam, J Abawajy

(2016), Vol. 59, pp. 416-426, Journal of Network and Computer Applications, C1

journal article

Vertex re-identification attack using neighbourhood-pair properties

J Abawajy, M Ninggal, T Herawan

(2016), Vol. 28, pp. 2906-2919, Concurrency computation: practice and experience, London, Eng., C1

journal article

Filtering redundant data from RFID data streams

H Kamaludin, H Mahdin, J Abawajy

(2016), Vol. 2016, pp. 1-7, Journal of sensors, Cairo, Egypt, C1

journal article

An alternative data collection scheduling scheme in wireless sensor networks

D Izadi, S Ghanavati, J Abawajy, T Herawan

(2016), Vol. 98, pp. 1287-1304, Computing, Berlin, Germany, C1

journal article

Enhancing predictive accuracy of cardiac autonomic neuropathy using blood biochemistry features and iterative multitier ensembles

J Abawajy, A Kelarev, M Chowdhury, H Jelinek

(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1

journal article

Matrix constructions of centroid sets for classification systems

M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan

(2016), Vol. 30, pp. 2397-2403, Filomat, C1

journal article

Secure Object Tracking Protocol for the Internet of Things

B Ray, M Chowdhury, J Abawajy

(2016), Vol. 3, pp. 544-553, IEEE Internet of Things Journal, C1

journal article

Privacy preserving social network data publication

J Abawajy, Ninggal, T Herawan

(2016), Vol. 18, pp. 1974-1997, IEEE communications surveys & tutorials, Piscataway, N.J., C1

journal article

An approximation approach to discovering web services for uncertain client's qos preference

M Fudzee, J Abawajy, S Kasim, H Mahdin, A Ramli, M Salamat

(2016), Vol. 11, pp. 14085-14088, ARPN journal of engineering and applied sciences, Islamabad, Pakistan, C1

journal article

IncSPADE: an incremental sequential pattern mining algorithm based on SPADE property

O Adam, Z Abdullah, A Ngah, K Mokhtar, W Ahmad, T Herawan, N Ahmad, M Deris, A Hamdan, J Abawajy

(2016), Vol. 387, pp. 81-92, 2015 International Conference on Machine Learning and Signal Processing, Ho Chi Minh City, Vietnam, E1

conference

Prediction of virtual networks substrata failures

B Alrubaiey, J Abawajy

(2016), Vol. LNCS 10065, pp. 423-434, APSCC 2016 : Advances in services computing : Proceedings of the 10th Asia-Pacific Services Computing Conference, Zhangjiajie, China, E1

conference

ECG rate control scheme in pervasive health care monitoring system

S Ghanavati, J Abawajy, D Izadi

(2016), pp. 2265-2270, FUZZ-IEEE 2016 : Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, Vancouver, B.C., E1

conference

An alternative sensor cloud architecture for vital signs monitoring

S Ghanavati, J Abawajy, D Izadi

(2016), pp. 2827-2833, IJCNN 2016: Proceedings of the IEEE International Joint Conference on Neural Networks, Vancouver, Canada, E1

conference

Economical and environmental operation of smart networked microgrids under uncertainties using NSGA-II

Z Pooranian, N Nikmehr, S Najafi-Ravadanegh, H Mahdin, J Abawajy

(2016), pp. 1-6, SoftCOM 2016 : Proceedings of the 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, E1

conference

Failure detection in virtual network environment

B Al-Rubaiey, Jemal Abawajy

(2016), pp. 1-4, ITNAC 2016 : Proceedings of the 2016 26th International Telecommunication Networks and Applications Conference, Dunedin, N.Z., E1

conference

Energy efficient approach in RFID network

H Mahdin, J Abawajy, S Yaacob

(2016), Vol. 160, pp. 1-7, IRIS 2016 : Innovating technology for a sustainable future : Proceedings of the International Engineering Research and Innovation Symposium 2016, Melaka, Malaysia, E1-1

conference
2015

Reliability-aware distributed computing scheduling policy

J Abawajy, M Hassan

(2015), Vol. 9532, pp. 627-632, Algorithms and architectures for parallel processing : ICA3PP international workshops and symposiums, Zhangjiajie, China, November 18-20, 2015, proceedings, Cham, Switzerland, B1

book chapter

An efficient meta-heuristic algorithm for grid computing

Z Pooranian, M Shojafar, J Abawajy, A Abraham

(2015), Vol. 30, pp. 413-434, Journal of combinatorial optimization, Berlin, Germany, C1

journal article

Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions

S Bansal, J Abawajy

(2015), Vol. 15, pp. 649-665, Wireless communications and mobile computing, London, Eng., C1

journal article

Dynamic path determination policy for distributed multimedia content adaptation

J Abawajy, F Fudzee

(2015), Vol. 74, pp. 8325-8341, Multimedia tools and applications, Berlin, Germany, C1

journal article

Multimedia content adaptation service discovery mechanism

J Abawajy, F Fudzee, M Deris

(2015), Vol. 74, pp. 8365-8378, Multimedia tools and applications, Berlin, Germany, C1

journal article

An efficient and distributed file search in unstructured peer-to-peer networks

M Shojafar, J Abawajy, Z Delkhah, A Ahmadi, Z Pooranian, A Abraham

(2015), Vol. 8, pp. 120-136, Peer-to-peer networking and applications, New York, N.Y., C1

journal article

An alternative node deployment scheme for WSNs

D Izadi, J Abawajy, S Ghanavati

(2015), Vol. 15, pp. 667-675, IEEE Sensors journal, Champaign, III., C1

journal article

Policy-based SQLIA detection and prevention approach for RFID systems

J Abawajy, H Fernando

(2015), Vol. 38, pp. 64-71, Computer standards and interfaces, Amsterdam, The Netherlands, C1

journal article

Comprehensive analysis of big data variety landscape

J Abawajy

(2015), Vol. 30, pp. 5-14, International journal of parallel, emergent and distributed systems, Bingley, U. K., C1

journal article

A data fusion method in wireless sensor networks

D Izadi, J Abawajy, S Ghanavati, T Herawan

(2015), Vol. 15, pp. 2964-2979, Sensors, Basel, Switzerland, C1

journal article

An alternative clustering scheme in WSN

D Izadi, J Abawajy, S Ghanavati

(2015), Vol. 15, pp. 4148-4155, IEEE sensors journal, Champaign, Ill., C1

journal article

Utility-aware social network graph anonymization

M Ninggal, J Abawajy

(2015), Vol. 56, pp. 137-148, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal article

Distances of centroid sets in a graph-based construction for information security applications

J Abawajy, A Kelarev, M Miller, J Ryan

(2015), Vol. 9, pp. 127-137, Mathematics in computer science, Berlin, Germany, C1

journal article

Service level agreement management framework for utility-oriented computing platforms

J Abawajy, M Fudzee, M Hassan, M Alrubaian

(2015), Vol. 71, pp. 4287-4303, Journal of supercomputing, Berlin, Germany, C1

journal article

Mitigating malicious feedback attacks in trust management systems

S Chong, J Abawajy

(2015), Vol. 3, pp. 1-18, International journal of trust management in computing and communications, Milton Keynes, Eng., C1

journal article

Ideal bases in constructions defined by directed graphs

J Abawajy, A Kelarev, J Ryan

(2015), Vol. 3, pp. 35-49, Electronic journal of graph theory and applications, Jawa Barat, Indonesia, C1

journal article

Multi-layer attribute selection and classification algorithm for the diagnosis of cardiac autonomic neuropathy based on HRV attributes

H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev

(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1

journal article

Security in computing and communications third international symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

J Abawajy, S Mukherjea, S Thampi, A Ruiz-Martínez

(2015), Cham, Switzerland, A7-1

edited book

Big data in complex systems : challenges and opportunities

A-E Hassanien, A Azar, V Snasel, J Kacprzyk, J Abawajy

(2015), Cham, Switzerland, A7-1

edited book

Secure object tracking protocol for networked RFID systems

B Ray, M Chowdhury, J Abawajy, M Jesmin

(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1

conference

Workflow scheduling on distributed systems

M Abdul Aziz, J Abawajy, R Islam, T Herawan,

(2015), pp. 683-689, ICIEA 2015: Proceedings of the 10th IEEE conference on Industrial Electronics and Applications, Auckland, New Zealand, E1

conference

Layered Workflow Scheduling Algorithm

M Abdul Aziz, J Abawajy, T Herawan

(2015), FUZZ-IEEE 2015: Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, TURKEY, E1

conference

A congestion control scheme based on fuzzy logic in wireless body area networks

S Ghanavati, J Abawajy, D Izadi

(2015), pp. 235-242, NCA 2015: Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, Cambridge, Ma., E1

conference

A framework for implementing asynchronous replication scheme in utility-based computing environment

W Nik, B Zhou, A Zomaya, J Abawajy

(2015), pp. 183-190, CCBD 2015: Proceedings of the Cloud Computing and Big Data 2015 International Conference, Shanghai, China, E1

conference

Adaptive energy-efficient qos-aware scheduling algorithm for TCP/IP mobile cloud

M Shojafar, N Cordeschi, J Abawajy, E Baccarelli

(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications 2015 Conference, San Diego, Calif., E1

conference
2014

A competitive three-level pruning technique for information security

M Chowdhury, J Abawajy, A Kelarev, K Sakurai

(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1

book chapter

Neighbourhood-pair attack in social network data publishing

M Ninggal, J Abawajy

(2014), Vol. 131, pp. 726-731, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Heidelberg, Germany, B1

book chapter

An accelerated particle swarm optimization based levenberg marquardt back propagation algorithm

N Nawi, A Khan, M Rehman, M Aziz, T Herawan, J Abawajy

(2014), Vol. 8835, pp. 245-253, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

book chapter

Neural network training by hybrid accelerated cuckoo particle swarm optimization algorithm

N Nawi, A Khan, M Rehman, M Aziz, J Abawajy, T Herawan

(2014), Vol. 8835, pp. 237-244, Neural Information Processing, B1

book chapter

Taxonomy of contention management in interconnected distributed systems

M Salehi, J Abawajy, R Buyya

(2014), Computing Handbook: Computer Science and Software Engineering, New York, USA, B1

book chapter

An improved Gbest guided artificial bee colony (IGGABC) algorithm for classification and prediction tasks

H Shah, T Herawan, R Ghazali, R Naseem, M Abdul Aziz, J Abawajy

(2014), Vol. 8834, pp. 559-569, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

book chapter

Trends in crime toolkit development

A Khraisat, M Hobbs, A Alazab, J Abawajy, A Ahmad

(2014), Network security technologies: design and applications, Hershey PA, USA, B1

book chapter

User preference of cyber security awareness delivery methods

J Abawajy

(2014), Vol. 33, pp. 237-248, Behaviour and information technology, Oxford, England, C1

journal article

The parameter reduction of the interval-valued fuzzy soft sets and its related algorithms

X Ma, H Qin, N Sulaiman, T Herawan, J Abawajy

(2014), Vol. 22, pp. 57-71, IEEE transactions on fuzzy systems, Piscataway, N. J., C1

journal article

Iterative construction of hierarchical classifiers for phishing website detection

J Abawajy, G Beliakov, A Kelarev, M Chowdhury

(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1

journal article

Scalable RFID security framework and protocol supporting Internet of Things

B Ray, J Abawajy, M Chowdhury

(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1

journal article

PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture

S Javanmardi, M Shojafar, S Shariatmadari, J Abawajy, M Singhal

(2014), Vol. 69, pp. 955-975, The journal of supercomputing, New York, NY, C1

journal article

Incidence semirings of graphs and visible bases

J Abawajy, A Kelarev, M Miller, J Ryan

(2014), Vol. 89, pp. 451-459, Bulletin of the Australian Mathematical Society, Cambridge, England, C1

journal article

An approach for profiling phishing activities

I Hamid, J Abawajy

(2014), Vol. 45, pp. 27-41, Computers and security, Kidlington, England, C1

journal article

Sensor grid middleware metamodeling and analysis

S Chandrasekaran, E Choi, J Abawajy, R Natarajan

(2014), Vol. 2014, pp. 1-12, International Journal of Distributed Sensor Networks, New York, NY, C1

journal article

An adaptive path hiding technique for participatory sensing networks

R Rahman, R Islam, I Altas, A Mahmood, J Abawajy

(2014), Future Generation Computer Systems, C1-1

journal article

Large iterative multitier ensemble classifiers for security of big data

J Abawajy, A Kelarev, M Chowdhury

(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1

journal article

Data replication approach with consistency guarantee for data grid

J Abawajy, M Deris

(2014), Vol. 63, pp. 2975-2987, IEEE Transactions on Computers, Piscataway, NJ, C1

journal article

Using response action with Intelligent Intrusion detection and prevention System against web application malware

A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab, A Al Azab

(2014), Vol. 22, pp. 431-449, Information Management and Computer Security, Bingley, Eng., C1

journal article

A hybrid wrapper-filter approach for malware detection

M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst

(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1

journal article

Securing a smart anti-counterfeit web application

B Chowdhury, M Chowdhury, J Abawajy

(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1

journal article

Automatic generation of meta classifiers with large levels for distributed computing and networking

Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury

(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1

journal article

Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics

H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri

(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1

journal article

An SLA evaluator for multimedia content adaptation services

M Fudzee, J Mohamed, J Abawajy, S Kasim, M Ismail

(2014), pp. 1-4, ICISA 2014 : Proceedings of the 5th International Conference on Information Science and Applications, Seoul, Korea, E1

conference

PUF-based secure checker protocol for Networked RFID Systems

B Ray, M Chowdhury, J Abawajy

(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1

conference

Analysis of Insiders Attack Mitigation Strategies

Zulkefli Yusop, Jemal Abawajy

(2014), Vol. 129, pp. 581-591, 2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, MALAYSIA, E1-1

conference
2013

Steno cipher to provide data confidentiality and tampered data recovery for RFID tag

B Ray, M Chowdhury, J Abawajy

(2013), Vol. 443, pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1

book chapter

Malware detection and prevention in RFID systems

H Fernando, J Abawajy

(2013), pp. 143-166, Internet of things and inter-cooperative computational technologies for collective intelligence, Heidelberg, Germany, B1

book chapter

IPMA : Indirect patterns mining algorithm

T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy

(2013), pp. 187-196, Advanced methods for computational collective intelligence, Berlin, Germany, B1

book chapter

Web malware that targets web applications

A Alazab, J Abawajy, M Hobbs

(2013), pp. 248-264, Social network engineering for secure web data and services, Hershey, Pa., B1

book chapter

Developing an intelligent intrusion detection and prevention system against web application malware

A Alazab, M Hobbs, J Abawajy, A Khraisat

(2013), pp. 177-184, Advances in security of information and communication networks. First International Conference , SecNet 2013 Cairo, Egypt, September Proceedings, Berlin, Germany, B1

book chapter

Securing a web-based anti-counterfeit RFID system

B Chowdhury, M Chowdhury, J Abawajy

(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1

book chapter

Security concerns and remedy in a cloud based e-learning system

M Masud, M Islam, J Abawajy

(2013), pp. 356-366, Security and privacy in communication networks, Berlin, Germany, B1

book chapter

A framework for scalable distributed provenance storage system

J Abawajy, S Jami, Z Shaikh, S Hammad

(2013), Vol. 35, pp. 179-186, Computer standards & interfaces, Amsterdam, The Netherlands, C1

journal article

SQLIA detection and prevention approach for RFID systems

J Abawajy

(2013), Vol. 86, pp. 751-758, Journal of systems and software, Amsterdam, The Netherlands, C1

journal article

An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy

A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek

(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1

journal article

A multi-tier phishing detection and filtering approach

R Islam, J Abawajy

(2013), Vol. 36, pp. 324-335, Journal of network and computer applications, Amsterdam, The Netherlands, C1

journal article

Fuzzy logic optimized wireless sensor network routing protocol

D Izadi, J Abawajy, S Ghanavati

(2013), Vol. 19, pp. 115-128, Journal of high speed networks, Amsterdam, The Netherlands, C1

journal article

Intelligent battery energy management and control for vehicle-to-grid via cloud computing network

H Khayyam, J Abawajy, B Javadi, A Goscinski, A Stojcevski, A Bab-Hadiashar

(2013), Vol. 111, pp. 971-981, Applied energy, Amsterdam, The Netherlands, C1

journal article

Using feature selection and classification scheme for automating phishing email detection

I Hamid, J Abawajy, T Kim

(2013), Vol. 22, pp. 61-70, Studies in informatics and control, Bucharest, Romania, C1

journal article

Malware detection and prevention system based on multi-stage rules

A Alazab, M Hobbs, J Abawajy, A Khraisat

(2013), Vol. 7, pp. 29-43, International journal of information security and privacy, Hershey, Pa., C1

journal article

A data mining application of the incidence semirings

J Abawajy, A Kelarev, J Yearwood, C Turville

(2013), Vol. 39, pp. 1083-1093, Houston journal of mathematics, Houston, Tx., C1

journal article

An efficient scheduling method for grid systems based on a hierarchical stochastic petri net

M Shojafar, Z Pooranian, J Abawajy, M Meybodi

(2013), Vol. 7, pp. 44-52, Journal of computing science and engineering, Seoul, Korea, C1

journal article

Centroid sets with largest weight in Munn semirings for data mining applications

J Abawajy, A Kelarev, J Zeleznikow

(2013), Vol. 87, pp. 617-626, Semigroup forum, Berlin, Germany, C1

journal article

Multistage approach for clustering and classification of ECG data

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1

journal article

Power graphs : a survey

J Abawajy, A Kelarev, M Chowdhury

(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1

journal article

Empirical investigation of decision tree ensembles for monitoring cardiac complications of diabetes

A Kelarev, J Abawajy, A Stranieri, H Jelinek

(2013), Vol. 9, pp. 1-18, International journal of data warehousing and mining, Hershey, PA, C1

journal article

Predicting cardiac autonomic neuropathy category for diabetic data with missing values

J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek

(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1

journal article

Critical analysis and comparative study of security for networked RFID systems

B Ray, M Chowdhury, J Abawajy

(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Honolulu, Hawaii, E1

conference

A fuzzy technique to control congestion in WSN

S Ghanavati, J Abawajy, D Izadi

(2013), pp. 1806-1810, IJCNN 2013 : Proceedings of the International Joint Conference on Neural Networks, Dallas, Texas, E1

conference

A new energy efficient cluster-head and backup selection scheme in WSN

D Izadi, J Abawajy, S Ghanavati

(2013), pp. 408-415, IRI 2013 : Proceedings of the 14th IEEE International Conference on Information Reuse and Integration, San Francisco, California, E1

conference

Profiling phishing email based on clustering approach

I Hamid, J Abawajy

(2013), pp. 628-635, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic, E1

conference

Preserving utility in social network graph anonymization

M Ninggal, J Abawajy

(2013), pp. 226-232, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

The challenges of cloud technology adoption in E-government

M Aziz, J Abawajy, M Chowdhury

(2013), pp. 470-474, 2013 International Conference on Advanced Computer Science Applications and Technologies, Kuching, Malaysia, E1

conference
2012

An approach to faulty reader detection in RFID reader network

H Mahdin, J Abawajy

(2012), pp. 70-84, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1

book chapter

A security framework for networked RFID

H Fernando, J Abawajy

(2012), pp. 85-114, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1

book chapter

Mobile agents security protocols

R Al-jaljouli, J Abawajy

(2012), pp. 270-305, Mobile computing techniques in emerging markets : systems, applications and services, Hershey, Pa., B1

book chapter

Quality control of sensor network data

D Izadi, J Abawajy, S Ghanavati

(2012), pp. 467-480, Advances in automation and robotics, vol.1, selected papers from the 2011 International Conference on Automation and Robotics (ICAR 2011), Dubai, December 1-2, 2011, Berlin, Germany, B1

book chapter

Security framework for mobile agents-based applications

R Al-jaljouli, J Abawajy

(2012), pp. 242-269, Mobile computing techniques in emerging markets : systems, applications and services, Hershey Pa., B1

book chapter

Multi-input-multi-output antennas for radio frequency identification systems

S Bansal, J Abawajy

(2012), pp. 96-127, Chipless and conventional radio frequency identification : systems for ubiquitous tagging, United States, B1

book chapter

Management of service level agreement for service-oriented content adaptation platform

M Fudzee, J Abawajy

(2012), pp. 21-42, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1

book chapter

Strategies for agent-based negotiation in e-trade

R Al-Jaljouli, J Abawajy

(2012), pp. 43-65, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1

book chapter

An efficient approach based on trust and reputation for secured selection of grid resources

V Vijayakumar, B Wahida, J Abawajy

(2012), Vol. 27, pp. 1-17, International journal of parallel, emergent and distributed systems, Essex, England, C1

journal article

Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing

A Beloglazov, J Abawajy, R Buyya

(2012), Vol. 28, pp. 755-768, Future generation computer systems, Amsterdam, Netherlands, C1

journal article

Intelligent energy management control of vehicle air conditioning system coupled with engine

H Khayyam, J Abawajy, R Jazar

(2012), Vol. 48, pp. 211-224, Applied thermal engineering, Oxford, England, C1

journal article

Failure-aware resource provisioning for hybrid cloud infrastructure

B Javadi, J Abawajy, R Buyya

(2012), Vol. 72, pp. 1318-1331, Journal of parallel and distributed computing, Maryland Heights, Mo., C1

journal article

Analysis of asynchronous online discussion forums for collaborative learning

J Abawajy

(2012), Vol. 1, pp. 11-21, International journal of education and learning, Sandy Bay, Tas., C1

journal article

Classification systems based on combinatorial semigroups

J Abawajy, A Kelarev

(2012), Vol. 86, pp. 603-612, Semigroup forum, New York, N.Y., C1

journal article

A Grobner-Shirshov Algorithm for Applications in Internet Security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2012), Vol. 36, pp. 87-100, SOUTHEAST ASIAN BULLETIN OF MATHEMATICS, C1-1

journal article

Preface

J Abawajy, M Pathan, M Rahman, A-S Pathan, M Deris

(2012), A7

edited book

The role of emotional intelligence on the resolution of disputes involving the electronic health record

E Bellucci, S Venkatraman, N Muecke, A Stranieri, J Abawajy

(2012), pp. 3-12, HIKM 2012 : Proceedings of the Fifth Australasian Workshop on Health Informatics and Knowledge Management, Melbourne, Vic., E1

conference

Virtual property theft detection framework

N Patterson, M Hobbs, J Abawajy

(2012), pp. 177-184, TRUSTCOM 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Using feature selection for intrusion detection system

A Alazab, M Hobbs, J Abawajy, M Alazab

(2012), pp. 296-301, ISCIT 2012 : Proceedings of the 12th IEEE International Symposium on Communications and Information Technologies, Gold Coast, Qld, E1

conference

Detecting and mitigating HX-DoS attacks against cloud web services

A Chonka, J Abawajy

(2012), pp. 429-434, NBIS 2012 : Proceedings of the 2012 International Conference on Network-Based Information Systems, Melbourne, Victoria, E1

conference

Performance evaluation of multi-tier ensemble classifiers for phishing websites

J Abawajy, G Beliakov, A Kelarev, J Yearwood

(2012), pp. 11-16, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Empirical investigation of multi-tier ensembles for the detection of cardiac autonomic neuropathy using subsets of the Ewing Features

J Abawajy, A Kelarev, A Stranieri, H Jelinek

(2012), pp. 1-11, CIHealth 2012- Proceedings of the Workshop on New Trends of Computational Intelligence in Health Applciations, Sydney, N.S.W., E1

conference

Secure mobile RFID ownership transfer protocol to cover all transfer scenarios

B Ray, M Chowdhury, J Abawajy

(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Seoul, Korea, E1

conference

E-commerce trust management system reliability

S Chong, J Abawajy

(2012), pp. 13-18, ISSDM 2012 : Proceedings of the 6th International Conference on New Trends in Information Science, Service Science and Data Mining, Taipei, Taiwan, E1

conference

EFP-M2 : efficient model for mining frequent patterns in transactional database

T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy

(2012), pp. 29-38, ICCCI 2012 : Technologies and applications : Proceedings of the 4th International Conference on Computational Collective Intelligence, Ho Chi Minh City, Vietnam, November 28-30, 2012 : proceedings, Ho Chi Minh City, Vietnam, E1

conference

A multi-tier ensemble construction of classifiers for phishing email detection and filtering

J Abawajy, A Kelarev

(2012), pp. 48-56, CSS 2012 : Cyberspace safety and security : 4th International Symposium, Melbourne, Australia, December 12-13, 2012 Proceedings, Melbourne, Victoria, E1

conference

Hybrid cloud resource provisioning policy in the presence of resource failures

B Javadi, J Abawajy, R Sinnott

(2012), pp. 10-17, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Taipei, Taiwan, E1

conference

Improving classifications for cardiac autonomic neuropathy using multi-level ensemble classifiers and feature selection based on random forest

A Kelarev, A Stranieri, J Yearwood, J Abawajy, H Jelinek

(2012), pp. 93-101, AusDM 2012 : Proceedings of the 10th Australasian Data Mining Conference, Sydney, N.S.W., E1

conference
2011

Securing RFID systems from SQLIA

H Fernando, J Abawajy

(2011), pp. 245-254, Algorithms and architectures for parallel processing, Berlin, Germany, B1

book chapter

A protocol for discovering content adaptation services

M Fudzee, J Abawajy

(2011), pp. 235-244, Algorithms and architectures for parallel processing, Berlin, Germany, B1

book chapter

Hybrid feature selection for phishing email detection

I Hamid, J Abawajy

(2011), pp. 266-275, Algorithms and architectures for parallel processing, Berlin, Germany, B1

book chapter

QoS-based adaptation service selection broker

M Fudzee, J Abawajy

(2011), Vol. 27, pp. 256-264, Future generation computer systems, Amsterdam, Netherlands, C1

journal article

SMS-based medical diagnostic telemetry data transmission protocol for medical sensors

B Townsend, J Abawajy, T Kim

(2011), Vol. 11, pp. 4231-4243, Sensors, Basel, Switzerland, C1

journal article

Intelligent energy management control of vehicle air conditioning via look-ahead system

H Khayyam, S Nahavandi, E Hu, A Kouzani, A Chonka, J Abawajy, V Marano, S Davis

(2011), Vol. 31, pp. 3147-3160, Applied thermal engineering, Oxford, U. K., C1

journal article

Optimization and matrix constructions for classification of data

A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury

(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1

journal article

An approach for removing redundant data from RFID data streams

H Mahdin, J Abawajy

(2011), Vol. 11, pp. 9863-9877, Sensors, Lausanne, Switzerland, C1

journal article

A Grobner-Shirshov algorithm for applications in internet security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal article

Efficient resource selection algorithm for enterprise grid systems

W Nik, B Zhou, A Zomaya, J Abawajy

(2011), pp. 57-62, ISPA 2011 : Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, Busan, Korea, E1

conference

Establishing trust in hybrid cloud computing environments

J Abawajy

(2011), pp. 118-125, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Mutual authentication protocol for networked RFID systems

H Fernando, J Abawajy

(2011), pp. 417-424, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Phishing email feature selection approach

I Hamid, J Abawajy

(2011), pp. 916-921, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Prevention of information harvesting in a cloud services environment

L Batten, J Abawajy, R Doss

(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1

conference

Attack vector analysis and privacy-preserving social network data publishing

M Ninggal, J Abawajy

(2011), pp. 847-852, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1

conference

Engaging and effective asynchronous online discussion forums

J Abawajy, T Kim

(2011), pp. 695-705, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1

conference

Online learning environment : taxonomy of asynchronous online discussion forums

J Abawajy, T Kim

(2011), pp. 706-714, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1

conference

Service quality assessment in provision of library services

M Ahmad, J Abawajy, T Kim

(2011), pp. 83-92, UNESST 2011 : Proceedings of the 2011 International Conference on U- and E-service, Science and Technology, Jeju Island, Korea, E1

conference

Privacy threat analysis of social network data

M Ninggal, J Abawajy

(2011), pp. 165-174, ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference, Melbourne, Victoria, E1

conference

Wi-Fi security : wireless with confidence

L Jacob, D Hutchinson, J Abawajy

(2011), pp. 88-96, ASIC 2011 : Proceedings of the 4th Australian Security and Intelligence Conference, Perth, W. A., E1

conference

Web application protection against SQL injection attack

A Alazab, M Alazab, J Abawajy, M Hobbs

(2011), pp. 1-7, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications ICITA 2011, Sydney, N.S.W., E1

conference
2010

Risk-based trust management for e-commerce

S Chong, J Abawajy

(2010), pp. 332-351, Trust modeling and management in digital environments : from social concept to system development, Hershey, Pa., USA, B1

book chapter

Matrices representation of multi soft-sets and its application

T Herawan, M Deris, J Abawajy

(2010), pp. 201-214, Computational science and its applications - ICCSA 2010, Berlin, Germany, B1

book chapter

Request-driven cross-media content adaptation technique

M Fudzee, J Abawajy

(2010), pp. 91-113, Developing advanced web services through P2P computing and autonomous agents : trends and innovations, Hershey, Pa., USA, B1

book chapter

Performance analysis of cyber security awareness delivery methods

J Abawajy, T Kim

(2010), pp. 142-148, Security technology, disaster recovery and business continuity, Berlin, Germany, B1

book chapter

An approach to filtering duplicate RFID data streams

H Mahdin, J Abawajy

(2010), pp. 125-133, U- and E-service, science and technology, Berlin, Germany, B1

book chapter

A privacy preserving service broker architecture for data sharing

F Al-Neyadi, J Abawajy

(2010), pp. 450-458, Future generation information technology, Berlin, Germany, B1

book chapter

A rough set approach for selecting clustering attribute

T Herawan, M Deris, J Abawajy

(2010), Vol. 23, pp. 220-231, Knowledge-based systems, Amsterdam, The Netherlands, C1

journal article

Internet security applications of the Munn rings

A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan

(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1

journal article

Performance analysis of receive diversity in wireless sensor networks over GBSBE models

S Goel, J Abawajy, T Kim

(2010), Vol. 10, pp. 11021-11037, Sensors, Basel, Switzerland, C1

journal article

Multi-criteria content adaptation service selection broker

M Fudzee, J Abawajy, M Deris

(2010), pp. 721-726, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing : proceedings : Melbourne, Australia, 17-20 May, 2010, Melbourne, Vic., E1

conference

An optimal transportation routing approach using GIS-based dynamic traffic flows

A Alazab, S Venkatraman, J Abawajy, M Alazab

(2010), pp. 172-178, ICMTA 2010 : Proceedings of the International Conference on Management Technology and Applications, Singapore, E1

conference

Energy-efficient management of data center resources for cloud computing : a vision, architectural elements, and open challenges

R Buyya, A Beloglazov, J Abawajy

(2010), pp. 6-17, PDPTA 2010 : Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nev., E1

conference

Novel mechanism for evaluating feedback in the grid environment on resource allocation

V Vijayakumar, R Wahida Banu, J Abawajy

(2010), pp. 11-17, GCA 2010 : Proceedings of the 2010 International Conference on Grid Computing and Applications, Las Vegas, Nev., E1

conference

Negotiation strategy for mobile agent-based e-negotiation

R Al-Jaljouli, J Abawajy

(2010), pp. 128-135, PRIMA 2010 : Proceedings of the 13th International conference on principles and practice of multi-agent systems, Kolkatta, India, E1

conference

A hybrid mutual authentication protocol for RFID

H Fernando, J Abawajy

(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Sydney, NSW, E1

conference

Service discovery for service-oriented content adaptation

M Fudzee, J Abawajy, M Deris

(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services, Sydney, NSW, E1

conference
2009

Agents based e-commerce and securing exchanged information

R Al-Jaljouli, J Abawajy

(2009), pp. 383-404, Pervasive computing : innovations in intelligent multimedia and applications, Dordrecht, Germany, B1

book chapter

Context-based e-health system access control mechanism

F Al-Neyadi, J Abawajy

(2009), pp. 68-77, Advances in information security and its application, Berlin, Germany, B1

book chapter

Adaptive hierarchical scheduling policy for enterprise grid computing systems

J Abawajy

(2009), Vol. 32, pp. 770-779, Journal of network and computer applications, London, England, C1

journal article

An agent architecture for managing data resources in a grid environment

M Pérez, A Sánchez, J Abawajy, V Robles, J Peña

(2009), Vol. 25, pp. 747-755, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

An efficient adaptive scheduling policy for high-performance computing

J Abawajy

(2009), Vol. 25, pp. 364-370, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Design and delivery of undergraduate IT security management course

J Abawajy

(2009), Vol. 5576, pp. 402-411, Lecture notes in computer science, Heidelberg, Germany, C1

journal article

Managing data using neighbour replication on a triangular-grid structure

M Deris, J Abawajy, D Taniar, A Mamat

(2009), Vol. 6, pp. 56-65, International journal of high performance computing and networking, Olney, England, C1

journal article

Multi-cluster computing interconnection network performance modeling and analysis

B Javadi, M Akbari, J Abawajy

(2009), Vol. 25, pp. 737-746, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Human-computer interaction in ubiquitous computing environments

J Abawajy

(2009), Vol. 5, pp. 31-77, International journal of pervasive computing and communications, Bingley, England, C1

journal article

A layered security approach for cloud computing infrastructure

M Yildiz, J Abawajy, T Ercan, A Bernoth

(2009), pp. 763-767, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

An approach to filtering RFID data streams

H Mahdin, J Abawajy

(2009), pp. 742-746, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Determining service trustworthiness in inter loud computing environments

J Abawajy

(2009), pp. 784-788, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Enhancing RFID tag resistance against cloning attack

J Abawajy

(2009), pp. 18-23, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1

conference

Information provenance for open distributed collaborative system

D Jami, J Abawajy, Z Shaikh

(2009), pp. 737-741, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

Multi-tier phishing email classification with an impact of classifier rescheduling

M Islam, J Abawajy, M Warren

(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1

conference

A RFID architecture framework for global supply chain applications

H Fernando, J Abawajy

(2009), pp. 313-320, iiWAS 2009 : Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, Kuala Lumpur, Malaysia, E1-1

conference
2008

An efficient replicated data access approach for large-scale distributed systems

M Deris, J Abawajy, A Mamat

(2008), Vol. 24, pp. 1-9, Future generation computer systems, Amsterdam, Netherlands, C1

journal article

Security and privacy threats to volunteer computing

J Abawajy

(2008), Vol. 4, pp. 245-255, International journal of critical infrastructures, Oxford, England, C1

journal article

Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks

B Javadia, J Abawajy, M Akbari

(2008), Vol. 34, pp. 488-502, Computers & electrical engineering, Oxford, England, C1

journal article

A comprehensive analytical model of interconnection networks in large-scale cluster systems

B Javadi, J Abawajy, M Akbari

(2008), Vol. 20, pp. 75-97, Concurrency and computation : practice & experience, Malden, Mass., C1

journal article

An online credential management service for InterGrid computing

J Abawajy

(2008), pp. 101-106, APSCC 2008: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, E1

conference

Investigation of stakeholders commitment to information security awaremess programs

J Abawajy, K Thatcher, T Kim

(2008), pp. 472-476, Proceedings of the 2nd International Conference on Information Security and Assurance : ISA 2008, Hanwha Resort Haeundae, Busan, Korea, E1

conference

Performance of smart antennas with receive diversity in wireless sensor networks

S Goel, J Abawajy

(2008), pp. 272-278, Proceedings of ICSCN 2008 : International Conference on Signal Processing Communications and Networking, Chennai, India, E1

conference

A classification for content adaptation system

M Md Fudzee, J Abawajy

(2008), pp. 426-429, The 10th International Conference on Information Integration and Web-based Applications & Services : iiWAS 2008, Linz, Austria, E1

conference
2007

Analytical communication networks model for enterprise grid computing

B Javadi, M Akbari, J Abawajy

(2007), Vol. 23, pp. 737-747, Future generation computer systems, Amsterdam, The Netherlands, C1

journal article

Analytical modeling of interconnection networks in heterogeneous multi-cluster systems

B Javadi, J Abawajy, M Akbari

(2007), Vol. 40, pp. 29-47, Journal of supercomputing, New York, N.Y., C1

journal article

A multilevel trust management framework

S Chong, J Abawajy, R Dew

(2007), pp. 776-781, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007), Melbourne, Australia, E1

conference

Communication network analysis of the enterprise grid systems

B Javadi, J Abawajy, M Akbari, S Nahavandi

(2007), pp. 33-40, Proceedings of the fifth Australasian symposium on ACSW frontiers, Ballarat, Australia, E1

conference

Electronic negotiation and security of information exchanged in e-commerce

R Al-Jaljouli, J Abawajy

(2007), pp. 1-11, Proceedings of the 2007 collecter E-commerce conference : Collecter 2007 - 10th anniversary., Melbourne, Vic., E1

conference

Feedback credibility issues in trust management systems

S Chong, J Abawajy

(2007), pp. 387-391, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007, Seoul, Korea, E1

conference

Sensor node activity scheduling approach

J Abawajy, S Nahavandi, F Al-Neyadi

(2007), pp. 72-77, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007 : 26-28 April, 2007, Seoul, Korea, Seoul, Korea, E1

conference

A conceptual framework for ubiquitously sharing heterogeneous patient information among autonomous healthcare providers

F Al-Neyadi, J Abawajy, M Ders

(2007), pp. 299-304, Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering, Seoul, Korea, E1

conference

Taxonomy and survey of location management systems

A Rahaman, J Abawajy, M Hobbs

(2007), pp. 369-374, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Melbourne, Australia, E1

conference

An authorization policy management framework for dynamic medical data sharing

F Al-Neyadi, J Abawajy

(2007), pp. 313-318, IPC 2007 proceedings : the 2007 International Conference on Intelligent Pervasive Computing, Jeju Island, Korea, E1

conference

An authentication framework for e-health systems

F Al-Nayadi, J Abawajy

(2007), pp. 616-620, ISSPIT 2007 : Proceedings of the 2007 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1

conference

Secure mobile agent-based E-negotiation for on-line trading

R Al-Jaljouli, J Abawajy

(2007), pp. 610-615, ISSPIT 2007 : Proceedings of the 2007 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1

conference

Multi-cluster computing interconnection network performance modeling and analysis

Bahman Javadi, Mohammad Akbari, Jemal Abawajy, Sacid Nahavandi

(2007), pp. 86-+, 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, Mangalore, INDIA, E1-1

conference
2006

A reputation-based grid information service

J Abawajy, A Goscinski

(2006), Vol. 3994, pp. 1015-1022, Lecture notes in computer science, Berlin, Germany, C1

journal article

Adaptive parallel I/O scheduling algorithm for multiprogrammed systems

J Abawajy

(2006), Vol. 22, pp. 611-619, Future generation computer systems, Netherlands, C1

journal article

A novel data replication and management protocol for mobile computing systems

J Abawajy, M Mat Deris, M Omar

(2006), Vol. 2, pp. 3-19, Mobile information systems, Amsterdam, The Netherlands, C1

journal article

Managing data using neighbor replication on triangular-grid structure

A Mamat, M Mat Deris, J Abawajy, S Ismail

(2006), Vol. 3994, pp. 1071-1077, Lecture notes in computer science, Heidelberg, Germany, C1

journal article

A performance model for analysis of heterogeneous multi-cluster systems

B Javadi, M Akbari, J Abawajy

(2006), Vol. 32, pp. 831-851, Parallel computing, Amsterdam, Netherlands, C1

journal article

Supporting disconnected operations in mobile computing

J Abawajy, M Mat Deris

(2006), pp. 911-918, 4th ACS/IEEE international conference on computer systems and applications, Sharjah, UAE, E1

conference

Multi-cluster computing interconnection network performance modeling and analysis

B Javadi, M Akbari, J Abawajy, S Nahavandi

(2006), pp. 90-95, ADCOM 2006: automatic computing: proceedings of the 14th international conference on advanced computing and communications, Surathkal, India, E1

conference

Analysis of interconnection networks in heterogeneous multi-cluster systems

B Javadi, J Abawajy, M Akbari, S Nahavandi

(2006), pp. 1-8, ICCP 2006 : 2006 international conference on parallel processing workshops, Columbus, USA, E1

conference

Economy-based data replication broker

H Lin, J Abawajy, R Buyya

(2006), pp. 1-8, Proceedings of the Second IEEE International Conference on e-science and grid computing, Amsterdam, Netherlands, E1

conference

Analytical interconnection networks model for multi-cluster computing systems

B Javadi, J Abawajy, M Akbari

(2006), pp. 37-42, ASMTA 2006 : Proceedings of the ASMTA 2006 13th international conference on analytical and stochastic modelling techniques and applications, Bonn, Germany, E1

conference

Analysis of multi-cluster computing systems with processor heterogeneity

B Javadi, M Akbari, J Abawajy

(2006), pp. 1-8, CSICC 2006 : Proceedings of the 11th International CSI (Computer Society of Iran) Computer Conference, Tehran, Iran, E1

conference

Analytical network modeling of heterogeneous large-scale cluster systems

B Javadi, J Abawajy, M Akbari, S Nahavandi

(2006), pp. 1-9, ICCC 2006 : Proceedings of the IEEE International Conference on Cluster Computing, Barcelona, Spain, E1

conference

Analytical modeling of communication latency in multi-cluster systems

B Javadi, J Abawajy, M Akbari

(2006), pp. 1-6, Proceedings of the 12th International Conference on parallel and distributed systems (ICPADS`06), Minneapolis, USA, E1

conference
2005

Fault-tolerant dynamic job scheduling policy

J Abawajy

(2005), Vol. 3719, pp. 165-173, Lecture notes in computer science, Berlin, Germany, C1

journal article

Autonomic job scheduling policy for grid computing

J Abawajy

(2005), Vol. 3516, pp. 213-220, Lecture notes in computer science, Berlin, Germany, C1

journal article

Job scheduling policy for high throughput grid computing

J Abawajy

(2005), Vol. LNCS 3719, pp. 184-192, Lecture notes in computer science, Berlin, Germany, C1

journal article

An efficient replicated data management approach for peer-to-peer systems

J Abawajy

(2005), Vol. 3516, pp. 457-463, Lecture Notes in Computer Science, Computational Science – ICCS 2005, Berlin, Germany, C1

journal article

Robust parallel job scheduling infrastructure for service-oriented grid computing systems

J Abawajy

(2005), Vol. 3483, pp. 1272-1281, Lecture notes in computer science, Berlin, Germany, C1

journal article

Grid accounting service infrastructure for service-oriented grid computing systems

J Abawajy

(2005), Vol. 3458, pp. 167-174, Lecture notes in computer science, Berlin, Germany, C1

journal article

Performance analysis of interconnection networks for multi-cluster systems

B Javadi, J Abawajy, M Akbari

(2005), Vol. 3516, pp. 205-212, Lecture notes in computer science, Berlin , Germany, C1

journal article

A new approach for efficiently achieving high availability in mobile computing

M Deris, J Abawajy, M Omar

(2005), pp. 60-68, Lecture notes in computer science, Berlin, Germany, C1

journal article

High reliability replication technique for Web-server cluster systems

M Mat Deris, J Abawajy, M Zarina, R Mamat

(2005), Vol. 3516, pp. 447-456, Lecture notes in computer science, Berlin, Germany, C1

journal article

A new internet meta-search engine and implementation

J Abawajy, M Hu

(2005), pp. 103-110, ACS/IEEE International Conference on Computer Systems and Applications, Cairo, Egypt, E1

conference

Performance analysis of heterogeneous multi-cluster systems

B Javadi, M Akbari, J Abawajy

(2005), pp. 493-500, Proceedings of the 2005 international conference on parallel processing workshops, Oslo, Norway, E1

conference

Modeling of multi-cluster systems in the presence of network heterogeneity

B Javadi, M Akbari, J Abawajy

(2005), pp. 204-211, The proceedings of the International Conference on Computational Science and Engineering, Istanbul, Turkey, E1

conference

Analytical performance modeling of the enterprise grid computing

B Javadi, M Akbari, J Abawajy

(2005), First International Conference on e-science and grid computing, Melbourne, Australia, E1

conference
2004

Fault detection service architecture for grid computing systems

J Abawajy

(2004), Vol. 3044, pp. 107-115, Lecture notes in computer science, Berlin, Germany, C1

journal article

Dynamic parallel job scheduling in multi-cluster computing systems

J Abawajy

(2004), Vol. 3036, pp. 27-34, Lecture notes in computer science, Berlin, Germany, C1

journal article

Preemptive job scheduling policy for distributively-owned workstation clusters

J Abawajy

(2004), Vol. 14, pp. 255-270, Parallel processing letters, Singapore, C1

journal article

Placement of file replicas in data grid environments

J Abawajy

(2004), Vol. 3038, pp. 66-73, Lecture notes in computer science, Berlin, Germany, C1

journal article

File replacement algorithm for storage resource managers in data grids

J Abawajy

(2004), Vol. 3038, pp. 339-346, Lecture notes in computer science, Berlin, Germany, C1

journal article

Design and evaluation of an agent-based communication model for a parallel file system

M Pérez, A Sánchez, J Abawajy, V Robles, J Peña

(2004), Vol. 3044, pp. 87-96, Lecture notes in computer science, Berlin, Germany, C1-1

journal article

Secure accounting and payment infrastructure for grid computing

J Abawajy

(2004), Scientific applications of grid computing, Beijing, China, E1

conference

Grid accounting and payment arcihtecture

J Abawajy

(2004), pp. 82-87, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, Innsbruck, AUSTRIA, E1-1

conference
2003

An integrated resource scheduling approach on cluster computing systems

J Abawajy

(2003), Proceedings - International Parallel and Distributed Processing Symposium, IPDPS 2003, Nice, France, E1-1

conference

Parallel I/O scheduling in multiprogrammed cluster computing systems

J Abawajy

(2003), Vol. 2660, pp. 223-229, Computational Science — ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2–4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1

conference

An adaptive load balancing algorithm for large data parallel processing with communication delay

K Imasaki, J Abawajy

(2003), Vol. 2660, pp. 242-247, Computational Science — ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2–4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1

conference

Funded Projects at Deakin

Australian Competitive Grants

Effectiveness of wearable continuous blood pressure monitoring device with web platform on hypertension control: A pilot randomized controlled trial.

A/Prof Shariful Islam, Prof Ralph Maddison, Prof Clara Chow, Prof Jemal Abawajy

NHF Vanguard Grant - National Heart Foundation of Australia

  • 2019: $73,767

Other Public Sector Funding

Big data small estimation

Prof Jemal Abawajy, Ms Shaila Sharmeen

Australian Bureau of Statistics

  • 2021: $6,000
  • 2020: $17,500

Industry and Other Funding

Database and Secure Website Development

Prof Jemal Abawajy

Aust Oromo Community Assoc in Victoria

  • 2012: $5,000

Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers

Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy

King Saud University, Sparx Systems

  • 2016: $20,000
  • 2015: $40,000

Obfuscation-resilient Algorithm for Early Detection of Malicious Software

Prof Jemal Abawajy, Dr Shamsul Huda

Research and and Innovation Agency, Ministry of Education, Saudi Arabia

  • 2021: $30,000

Other Funding Sources

Sharing Cybersecurity Data for Australian Research (SCReeD).

Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li

Cyber Security Research Centre Limited

  • 2024: $25,000
  • 2023: $12,500
  • 2022: $10,320

Socrates: Software Security with a focus on critical technologies.

A/Prof Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, A/Prof Lennon Chang, Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang

Cyber Security Research Centre Limited

  • 2024: $60,488
  • 2023: $120,976

Supervisions

Principal Supervisor
2022

Shaila Sharmeen

Thesis entitled: Semi-Supervised Models for Android Malware Detection

Doctor of Philosophy (Information Technology), School of Information Technology

2021

Saiba Nazah

Thesis entitled: Understanding the Characteristics of Dark Web Forum Using Machine Learning Techniques

Master of Science (Information Technology), School of Information Technology

Lamyaa Jebur Yousif Al-Omairi

Thesis entitled: Linear Dimensionality Reduction Method for Graph Data

Doctor of Philosophy (Information Technology), School of Information Technology

Sara Ghanavati

Thesis entitled: Learning-based Internet of Things Resource Management

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Abdulaziz Aljunaibi

Thesis entitled: Isomorphism as a Paradigm for Strategic Change Management in AbuDhabi government

Doctor of Philosophy (Information Technology), School of Information Technology

2016

Benjamin Jonathan Townsend

Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform

Doctor of Philosophy (Information Technology), School of Information Technology

Baker Alrubaiey

Thesis entitled: Assuring Virtual Network Reliability and Resilience

Doctor of Philosophy (Information Technology), School of Information Technology

Fahed Matar Al Neyadi

Thesis entitled: Securely Sharing Dynamic Medical Information in E-Health

Doctor of Philosophy (Information Technology), School of Information Technology

Masitah Ahmad

Thesis entitled: Service Level Agreements Framework for Digital Library Quality of Service Management

Doctor of Philosophy (Information Technology), School of Information Technology

Sara Ghanavati

Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure

Master of Science (Information Technology), School of Information Technology

2015

Mohd Izuan Hafez Ninggal

Thesis entitled: Privacy-Preserving Mechanism for Social Network Data Publishing

Doctor of Philosophy (Information Technology), School of Information Technology

Isredza Rahmi A Hamid

Thesis entitled: Phishing Detection and Traceback Mechanism

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Davood Izadi

Thesis entitled: Enhancing Wireless Sensor Networks Functionalities

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Harinda Fernando

Thesis entitled: Enhancing RFID performance and security in networked environments

Doctor of Philosophy (Information Technology), School of Information Technology

2012

Hairulnizam Bin Mahdin

Thesis entitled: Enhancing RFID Data Quality and Reliability

Doctor of Philosophy (Information Technology), School of Information Technology

Raja Al-Jaljouli

Thesis entitled: Mobile-Agent Based Multi-Constraint One-to-Many Bilateral e-Negotiation Framework

Doctor of Philosophy (Information Technology), School of Information Technology

Soon Chong

Thesis entitled: Risk and Trust Management for Online Distributed System

Doctor of Philosophy (Information Technology), School of Information Technology

Mohd Farhan Md Fudzee

Thesis entitled: Broker-based service-oriented content adaptation framework

Doctor of Philosophy (Information Technology), School of Information Technology

Shivali Goel

Thesis entitled: Antenna Selection and Channel Estimation for Hybrid Relay Systems

Doctor of Philosophy (Information Technology), School of Information Technology

Executive Supervisor
2023

Fera Tri Hartanti

Thesis entitled: Framework for Trusted Smart Government

Doctor of Philosophy (Information Technology), School of Information Technology

2022

Haider Adeeb Kassem Kassem

Thesis entitled: Vision-Based Driver Fatigue Prediction

Doctor of Philosophy (Information Technology), School of Information Technology

2019

Maslina Abdul Aziz

Thesis entitled: QoS-Aware Predictive Workflow Scheduling

Doctor of Philosophy (Information Technology), School of Information Technology

Co-supervisor
2020

Tahsien Ali Hussein Al-Quraishi

Thesis entitled: Predicting breast cancer risk, recurrence and survivability

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2021

Ahmed Jaber Hussein Al-Mansoori

Thesis entitled: Big Data Stream Processing in the Cloud

Doctor of Philosophy (Information Technology), School of Information Technology

2020

Md Samsul Haque

Thesis entitled: On-Demand Framework for Unmanned Aerial Vehicle Network Security

Master of Science (Information Technology), School of Information Technology

2019

Mohammed Khalil Ibrahim Amain

Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems

Doctor of Philosophy (Information Technology), School of Information Technology

2018

Ahmad Shaker Abdalrada

Thesis entitled: The Role of Various Risk Factors in the Prevalence of Cardiac Autonomic Neuropathy and Associated Diseases.

Doctor of Philosophy (Information Technology), School of Information Technology

2015

Biplob Ray

Thesis entitled: Security framework and protocols for the internet of things

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Ammar Al Azab

Thesis entitled: Malware Detection and Prevention

Doctor of Philosophy (Information Technology), School of Information Technology

2013

Nicholas Patterson

Thesis entitled: A Framework for Detecting Virtual Property Theft in Virtual World Environments

Doctor of Philosophy (Information Technology), School of Information Technology