Publications
Z Zhou, F Li, H Zhu, H Xie, J Abawajy, M Chowdhury
(2019), pp. 1-11, Neural computing and applications, London, Eng., C1
Fuzzy logic approach to repair coverage holes in internet of things monitoring applications
B Khalifa, A Khedr, Z Aghbari, J Abawajy
(2019), Vol. 9, pp. 227-235, IET wireless sensor systems, Stevenage, Eng., C1
S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan
(2019), Vol. 101, pp. 1247-1258, Future generation computer systems, Amsterdam, The Netherlands, C1
Analysis of energy consumption model in cloud computing environments
Z Zhou, J Abawajy, F Li
(2019), pp. 195-215, Advances on computational intelligence in energy, Cham, Switzerland, B1
M Aziz, J Abawajy, I Haq, I Nasir
(2019), Vol. 520, pp. 529-539, DaEng-2015 : Proceedings of the 2nd International Conference on Data Engineering, Kuala Lumpur, Malaysia, E1
Energy efficient multipath routing algorithm for wireless multimedia sensor network
A Genta, D K Lobiyal, J Abawajy
(2019), Vol. 19, Sensors, Basel, Switzerland, C1
S Sharmeen, S Huda, J Abawajy
(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25?27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1
Predicting breast cancer risk using subset of genes
T Al-Quraishi, J Abawajy, N Al-Quraishi, A Abdalrada, L Al-Omairi
(2019), pp. 1379-1384, CoDIT 2019 : Proceedings of the 6th International Conference on Control, Decision and Information Technologies, Paris, France, E1
High-dimensionality graph data reduction based on proposing a new algorithm
Lamyaa Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi
(2019), Vol. 63, Proceedings of 32nd International Conference on Computer Applications in Industry and Engineering, San Diego, California, E1
Workflow scheduling in distributed systems under fuzzy environment
F Xiao, Z Zhang, J Abawajy
(2019), Vol. 37, pp. 5323-5333, Journal of Intelligent and Fuzzy Systems, Amsterdam, The Netherlands, C1
Universal and secure object ownership transfer protocol for the internet of things
B Ray, J Abawajy, M Chowdhury, A Alelaiwi
(2018), Vol. 78, pp. 838-849, Future generation computer systems, Amsterdam, The Netherlands, C1
A trajectory privacy-preserving scheme based on query exchange in mobile social networks
S Zhang, G Wang, Q Liu, J Abawajy
(2018), Vol. 22, pp. 6121-6133, Soft computing, Berlin, Germany, C1
Fine-grained energy consumption model of servers based on task characteristics in cloud data center
Z Zhou, J Abawajy, F Li, Z Hu, M Chowdhury, A Alelaiwi, K Li
(2018), Vol. 6, pp. 27080-27090, IEEE access, Piscataway, N.J., C1
P Sarkar, M Chowdhury, J Abawajy
(2018), Vol. 580, pp. 315-328, ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, A Alelaiwi, F Li
(2018), Vol. 86, pp. 836-850, Future generation computer systems, Amsterdam, The Netherlands, C1
Breast cancer recurrence prediction using random forest model
T Al-Quraishi, J Abawajy, M Chowdhury, S Rajasegarar, A Abdalrada
(2018), Vol. 700, pp. 318-329, SCDM 2018 : Concise and informative : Proceedings of the 3rd International Conference on Soft Computing and Data Mining, Johor, Malaysia, E1
A Abdalrada, J Abawajy, M Chowdhury, S Rajasegarar, T Al-Quraishi, H Jelinek
(2018), Vol. 700, pp. 135-146, SCDM 2018 : Proceedings of the 3rd International Conference on Soft Computing and Data Mining 2018, Johor, Malaysia, E1
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino
(2018), Vol. 83, pp. 193-207, Future generation computer systems, Amsterdam, The Netherlands, C1
Malware threats and detection for industrial mobile-IoT networks
S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan
(2018), Vol. 6, pp. 15941-15957, IEEE access, Piscataway, N.J., C1
Clone tag detection in distributed RFID systems
H Kamaludin, H Mahdin, J Abawajy
(2018), Vol. 13, pp. 1-22, PLoS One, San Francisco, Calif., C1
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN
J Abawajy, A Kelarev, X Yi, H Jelinek
(2018), Vol. 160, pp. 85-94, Compututer methods and programs in biomedicine, Amsterdam, The Netherlands, C1
Secure multi-attribute one-to-many bilateral negotiation framework for e-commerce
R Al-Jaljouli, J Abawajy, M Hassan, A Alelaiwi
(2018), Vol. 11, pp. 415-429, IEEE transactions on services computing, Piscataway, N.J., C1
Privacy threat analysis of mobile social network data publishing
J Abawajy, M Ninggal, Z Aghbari, A Darem, A Alhashmi
(2018), Vol. 239, pp. 60-68, SecureComm 2017: Proceedings of the 13th International Conference on Security and Privacy in Communication Networks, Niagara Falls, Ont., E1
Securing websites against homograph attacks
J Abawajy, A Richard, Z Aghbari
(2018), Vol. 239, pp. 47-59, SecureComm 2017 : Proceedings of the 13th EAI International Conference on Security and Privacy Communication Networks, Niagara Falls, Ont., E1
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
jemal Abawajy, M Huda, Shaila Sharmeen, Mohammad Hassan, Ahmad Almogren
(2018), Vol. 89, pp. 525-538, Future generation computer systems, Amsterdam, The Netherlands, C1
Z Pooranian, J Abawajy, P Vinod, M Conti
(2018), Vol. 11, pp. 1-17, Energies, Basel, Switzerland, C1
Learning automaton based topology control protocol for extending wireless sensor networks lifetime
M Javadi, H Mostafaei, M Chowdhurry, J Abawajy
(2018), Vol. 122, pp. 128-136, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Foundation of healthcare cybersecurity
J Abawajy
(2018), Vol. 1, pp. 93-120, Information security: foundations, technologies and applications, B1
SDN enabled BDSP in public cloud for resource optimization
A Al-Mansoori, J Abawajy, M Chowdhury
(2018), Wireless networks, New York, N.Y., C1
Data-centric task scheduling algorithm for hybrid tasks in cloud data centers
X Li, L Wang, J Abawajy, X Qin
(2018), Vol. 11335, pp. 630-644, ICA3PP 2018 : Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou, China, E1
Delay-aware resource allocation for data analysis in cloud-edge system
X Li, Z Lian, X Qin, J Abawajy
(2018), pp. 816-823, ISPA 2018 : Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications 2018, Melbourne, Vic., E1
N Sabar, J Abawajy, J Yearwood
(2017), Vol. 21, pp. 315-327, IEEE transactions on evolutionary computation, Piscataway, N.J., C1
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
E Luo, Q Liu, J Abawajy, G Wang
(2017), Vol. 68, pp. 222-233, Future generation computer systems, Amsterdam, The Netherlands, C1
Multilayer hybrid strategy for phishing email zero-day filtering
M Chowdhury, J Abawajy, A Kelarev, T Hochin
(2017), Vol. 29, pp. 1-12, Concurrency and computation: practice and experience, Chichester, Eng., C1
S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood
(2017), Vol. 29, pp. 1-18, Concurrency Computation, Chichester, Eng., C1
Federated internet of things and cloud computing pervasive patient health monitoring system
J Abawajy, M Hassan
(2017), Vol. 55, pp. 48-53, IEEE communications magazine, Piscataway, N.J., C1
Text detection in low resolution scene images using convolutional neural network
A Risnumawan, I Sulistijono, J Abawajy
(2017), Vol. 549, pp. 366-375, Recent Advances on Soft Computing and Data Mining : the Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016 Proceedings, Bandung, Indonesia, E1
Virtual networks dependability assessment framework
B Al-Rubaiey, J Abawajy
(2017), Vol. 10, pp. 3-12, International journal of high performance computing and networking, Olney, Eng., C1
Cloud-assisted IoT-based health status monitoring framework
S Ghanavati, J Abawajy, D Izadi, A Alelaiwi
(2017), Vol. 20, pp. 1843-1853, Cluster computing, New York, N.Y., C1
W Nik, B Zhou, J Abawajy, A Zomaya
(2017), Vol. 7, pp. 723-735, International journal on advanced science, engineering and information technology, [Indonesia], C1
Advances in teaching and learning on Facebook in higher institutions
H Chiroma, N Mohd Shuib, A Abubakar, A Zeki, A Gital, T Herawan, J Abawajy
(2017), Vol. 5, pp. 480-500, IEEE access, Piscataway, N.J., C1
A parallel framework for software defect detection and metric selection on cloud computing
M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood
(2017), Vol. 20, pp. 2267-2281, Cluster computing, New York, N.Y., C1
A multi-protocol security framework to support internet of things
B Ray, M Chowdhury, J Abawajy
(2017), Vol. 198, pp. 257-270, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Guangzhou, China, E1
E Baccarelli, P Naranjo, M Scarpiniti, M Shojafar, J Abawajy
(2017), Vol. 5, pp. 9882-9910, IEEE access, Piscataway, N.J., C1
Coverage hole repair in WSNs using cascaded neighbor intervention
B Khalifa, Z Aghbari, A Khedr, J Abawajy
(2017), Vol. 17, pp. 7209-7216, IEEE sensors journal, Piscataway, N.J., C1
An analysis quality of experience and energy consumption for video streaming via mobile devices
M Jofri, M Fudzee, M Ismail, J Abawajy
(2017), Vol. 9, pp. 15-20, Journal of telecommunication, electronic and computer engineering, Melaka, Malaysia, C1
Energy-efficient virtual machine consolidation algorithm in cloud data centers
Z Zhou, Z Hu, J Yu, J Abawajy, M Chowdhury
(2017), Vol. 24, pp. 2331-2341, Journal of Central South University, Hunan Sheng, China, C1-1
Fog over virtualized IoT: new opportunity for context-aware networked applications and a case study
P Naranjo, Z Pooranian, S Shamshirband, J Abawajy, M Conti
(2017), Vol. 7, pp. 1-13, Applied sciences, Basel, Switzerland, C1
A framework for software defect prediction and metric selection
S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood
(2017), Vol. 6, pp. 2844-2858, IEEE access, Piscataway, N.J., C1
Integration of cloud computing and IoT: opportunities and challenges
S Ghanavati, J Abawajy, D Izadi
(2017), pp. 99-117, The internet of things : foundation for smart cities, eHealth and ubiquitous computing, Abingdon, Eng., B1
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
(2016), Vol. 55, pp. 376-390, Future generation computer systems, Amsterdam, The Netherlands, C1
Rees semigroups of digraphs for classification of data
J Abawajy, A Kelarev, M Miller, J Ryan
(2016), Vol. 92, pp. 121-134, Semigroup forum, New York, N.Y., C1
Evolutionary optimization: a big data perspective
M Bhattacharya, R Islam, J Abawajy
(2016), Vol. 59, pp. 416-426, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Vertex re-identification attack using neighbourhood-pair properties
J Abawajy, M Ninggal, T Herawan
(2016), Vol. 28, pp. 2906-2919, Concurrency computation: practice and experience, London, Eng., C1
Filtering redundant data from RFID data streams
H Kamaludin, H Mahdin, J Abawajy
(2016), Vol. 2016, pp. 1-7, Journal of sensors, Cairo, Egypt, C1
An alternative data collection scheduling scheme in wireless sensor networks
D Izadi, S Ghanavati, J Abawajy, T Herawan
(2016), Vol. 98, pp. 1287-1304, Computing, Berlin, Germany, C1
Security considerations for wireless carrier agonistic bio-monitoring systems
B Townsend, J Abawajy
(2016), Vol. 164, pp. 725-737, Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers, Berlin, Germany, B1
J Abawajy, A Kelarev, M Chowdhury, H Jelinek
(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1
A clustering-based multi-layer distributed ensemble for neurological diagnostics in cloud services
M Chowdhury, J Abawajy, A Kelarev, H Jelinek
(2016), pp. 1-12, IEEE transactions on cloud computing, Piscataway, N.J., C1
Matrix constructions of centroid sets for classification systems
M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan
(2016), Vol. 30, pp. 2397-2403, Filomat, Nios, Serbia, C1
Secure object tracking protocol for the internet of things
B Ray, M Chowdhury, J Abawajy
(2016), Vol. 3, pp. 544-553, IEEE journal of internet of things, Piscataway, N.J., C1
IncSPADE: an incremental sequential pattern mining algorithm based on SPADE property
O Adam, Z Abdullah, A Ngah, K Mokhtar, W Wan Ahmad, T Herawan, N Ahmad, M Mat Deris, A Hamdan, J Abawajy
(2016), Vol. 387, pp. 81-92, Advances in machine learning and signal processing, Berlin, Germany, B1
IncSPADE: an incremental sequential pattern mining algorithm based on SPADE property
O Adam, Z Abdullah, A Ngah, K Mokhtar, W Ahmad, T Herawan, N Ahmad, M Deris, A Hamdan, J Abawajy
(2016), Vol. 387, pp. 81-92, 2015 International Conference on Machine Learning and Signal Processing, Ho Chi Minh City, Vietnam, E1
Privacy preserving social network data publication
J Abawajy, Ninggal, T Herawan
(2016), Vol. 18, pp. 1974-1997, IEEE communications surveys & tutorials, Piscataway, N.J., C1
Prediction of virtual networks substrata failures
B Alrubaiey, J Abawajy
(2016), Vol. LNCS 10065, pp. 423-434, APSCC 2016 : Advances in services computing : Proceedings of the 10th Asia-Pacific Services Computing Conference, Zhangjiajie, China, E1
ECG rate control scheme in pervasive health care monitoring system
S Ghanavati, J Abawajy, D Izadi
(2016), pp. 2265-2270, FUZZ-IEEE 2016 : Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, Vancouver, B.C., E1
An alternative sensor cloud architecture for vital signs monitoring
S Ghanavati, J Abawajy, D Izadi
(2016), pp. 2827-2833, IJCNN 2016: Proceedings of the IEEE International Joint Conference on Neural Networks, Vancouver, Canada, E1
A framework to analyze quality of service (QoS) for text-to-speech (TTS) services
M Md Fudzee, M Hassan, H Mahdin, S Kasim, J Abawajy
(2016), Vol. 549, pp. 589-597, SCDM 2016 : Proceedings of the Second International Conference on Soft Computing and Data Mining, Bandung, Indonesia, E1
Z Pooranian, N Nikmehr, S Najafi-Ravadanegh, H Mahdin, J Abawajy
(2016), pp. 1-6, SoftCOM 2016 : Proceedings of the 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, E1
Failure detection in virtual network environment
B Al-Rubaiey, Jemal Abawajy
(2016), pp. 1-4, ITNAC 2016 : Proceedings of the 2016 26th International Telecommunication Networks and Applications Conference, Dunedin, N.Z., E1
Energy efficient approach in RFID network
H Mahdin, J Abawajy, S Yaacob
(2016), Vol. 160, pp. 1-7, IRIS 2016 : Innovating technology for a sustainable future : Proceedings of the International Engineering Research and Innovation Symposium 2016, Melaka, Malaysia, E1-1
An approximation approach to discovering web services for uncertain client's qos preference
M Fudzee, J Abawajy, S Kasim, H Mahdin, A Ramli, M Salamat
(2016), Vol. 11, pp. 14085-14088, ARPN journal of engineering and applied sciences, Islamabad, Pakistan, C1
An efficient meta-heuristic algorithm for grid computing
Z Pooranian, M Shojafar, J Abawajy, A Abraham
(2015), Vol. 30, pp. 413-434, Journal of combinatorial optimization, Berlin, Germany, C1
Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions
S Bansal, J Abawajy
(2015), Vol. 15, pp. 649-665, Wireless communications and mobile computing, London, Eng., C1
Dynamic path determination policy for distributed multimedia content adaptation
J Abawajy, F Fudzee
(2015), Vol. 74, pp. 8325-8341, Multimedia tools and applications, Berlin, Germany, C1
Multimedia content adaptation service discovery mechanism
J Abawajy, F Fudzee, M Deris
(2015), Vol. 74, pp. 8365-8378, Multimedia tools and applications, Berlin, Germany, C1
An efficient and distributed file search in unstructured peer-to-peer networks
M Shojafar, J Abawajy, Z Delkhah, A Ahmadi, Z Pooranian, A Abraham
(2015), Vol. 8, pp. 120-136, Peer-to-peer networking and applications, New York, N.Y., C1
An alternative node deployment scheme for WSNs
D Izadi, J Abawajy, S Ghanavati
(2015), Vol. 15, pp. 667-675, IEEE Sensors journal, Champaign, III., C1
Policy-based SQLIA detection and prevention approach for RFID systems
J Abawajy, H Fernando
(2015), Vol. 38, pp. 64-71, Computer standards and interfaces, Amsterdam, The Netherlands, C1
Comprehensive analysis of big data variety landscape
J Abawajy
(2015), Vol. 30, pp. 5-14, International journal of parallel, emergent and distributed systems, Bingley, U. K., C1
A data fusion method in wireless sensor networks
D Izadi, J Abawajy, S Ghanavati, T Herawan
(2015), Vol. 15, pp. 2964-2979, Sensors, Basel, Switzerland, C1
An alternative clustering scheme in WSN
D Izadi, J Abawajy, S Ghanavati
(2015), Vol. 15, pp. 4148-4155, IEEE sensors journal, Champaign, Ill., C1
Utility-aware social network graph anonymization
M Ninggal, J Abawajy
(2015), Vol. 56, pp. 137-148, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Distances of centroid sets in a graph-based construction for information security applications
J Abawajy, A Kelarev, M Miller, J Ryan
(2015), Vol. 9, pp. 127-137, Mathematics in computer science, Berlin, Germany, C1
Service level agreement management framework for utility-oriented computing platforms
J Abawajy, M Fudzee, M Hassan, M Alrubaian
(2015), Vol. 71, pp. 4287-4303, Journal of supercomputing, Berlin, Germany, C1
Secure object tracking protocol for networked RFID systems
B Ray, M Chowdhury, J Abawajy, M Jesmin
(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1
Workflow scheduling on distributed systems
M Abdul Aziz, J Abawajy, R Islam, T Herawan,
(2015), pp. 683-689, ICIEA 2015: Proceedings of the 10th IEEE conference on Industrial Electronics and Applications, Auckland, New Zealand, E1
Reliability-aware distributed computing scheduling policy
J Abawajy, M Hassan
(2015), Vol. 9532, pp. 627-632, Algorithms and architectures for parallel processing : ICA3PP international workshops and symposiums, Zhangjiajie, China, November 18-20, 2015, proceedings, Cham, Switzerland, B1
Layered Workflow Scheduling Algorithm
M Abdul Aziz, J Abawajy, T Herawan
(2015), FUZZ-IEEE 2015: Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, TURKEY, E1
A congestion control scheme based on fuzzy logic in wireless body area networks
S Ghanavati, J Abawajy, D Izadi
(2015), pp. 235-242, NCA 2015: Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, Cambridge, Ma., E1
A framework for implementing asynchronous replication scheme in utility-based computing environment
W Nik, B Zhou, A Zomaya, J Abawajy
(2015), pp. 183-190, CCBD 2015: Proceedings of the Cloud Computing and Big Data 2015 International Conference, Shanghai, China, E1
Mitigating malicious feedback attacks in trust management systems
S Chong, J Abawajy
(2015), Vol. 3, pp. 1-18, International journal of trust management in computing and communications, Milton Keynes, Eng., C1
Adaptive energy-efficient qos-aware scheduling algorithm for TCP/IP mobile cloud
M Shojafar, N Cordeschi, J Abawajy, E Baccarelli
(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications 2015 Conference, San Diego, Calif., E1
Ideal bases in constructions defined by directed graphs
J Abawajy, A Kelarev, J Ryan
(2015), Vol. 3, pp. 35-49, Electronic journal of graph theory and applications, Jawa Barat, Indonesia, C1
H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev
(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1
Hybrid consensus pruning of ensemble classifiers for big data malware detection
J Abawajy, M Chowdhury, A Kelarev
(2015), Vol. 3, pp. 1-11, IEEE transactions on cloud computing, Piscataway, N.J., C1-1
User preference of cyber security awareness delivery methods
J Abawajy
(2014), Vol. 33, pp. 236-247, Behaviour and Information Technology, C1
The parameter reduction of the interval-valued fuzzy soft sets and its related algorithms
X Ma, H Qin, N Sulaiman, T Herawan, J Abawajy
(2014), Vol. 22, pp. 57-71, IEEE Transactions on Fuzzy Systems, C1
Iterative construction of hierarchical classifiers for phishing website detection
J Abawajy, G Beliakov, A Kelarev, M Chowdhury
(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1
Scalable RFID security framework and protocol supporting Internet of Things
B Ray, J Abawajy, M Chowdhury
(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1
An SLA evaluator for multimedia content adaptation services
M Fudzee, J Mohamed, J Abawajy, S Kasim, M Ismail
(2014), pp. 1-4, ICISA 2014 : Proceedings of the 5th International Conference on Information Science and Applications, Seoul, Korea, E1
S Javanmardi, M Shojafar, S Shariatmadari, J Abawajy, M Singhal
(2014), Vol. 69, pp. 955-975, The journal of supercomputing, New York, NY, C1
Incidence semirings of graphs and visible bases
J Abawajy, A Kelarev, M Miller, J Ryan
(2014), Vol. 89, pp. 451-459, Bulletin of the Australian Mathematical Society, Cambridge, England, C1
An approach for profiling phishing activities
I Hamid, J Abawajy
(2014), Vol. 45, pp. 27-41, Computers and security, Kidlington, England, C1
Sensor grid middleware metamodeling and analysis
S Chandrasekaran, E Choi, J Abawajy, R Natarajan
(2014), Vol. 2014, pp. 1-12, International Journal of Distributed Sensor Networks, New York, NY, C1
Large iterative multitier ensemble classifiers for security of big data
J Abawajy, A Kelarev, M Chowdhury
(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1
A competitive three-level pruning technique for information security
M Chowdhury, J Abawajy, A Kelarev, K Sakurai
(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1
Neighbourhood-pair attack in social network data publishing
M Ninggal, J Abawajy
(2014), Vol. 131, pp. 726-731, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Heidelberg, Germany, B1
Data replication approach with consistency guarantee for data grid
J Abawajy, M Deris
(2014), Vol. 63, pp. 2975-2987, IEEE Transactions on Computers, Piscataway, NJ, C1
An accelerated particle swarm optimization based levenberg marquardt back propagation algorithm
N Nawi, A Khan, M Rehman, M Aziz, T Herawan, J Abawajy
(2014), Vol. 8835, pp. 245-253, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1
Neural network training by hybrid accelerated cuckoo particle swarm optimization algorithm
N Nawi, A Khan, M Rehman, M Aziz, J Abawajy, T Herawan
(2014), Vol. 8835, pp. 237-244, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1
A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab, A Al Azab
(2014), Vol. 22, pp. 431-449, Information Management and Computer Security, Bingley, Eng., C1
Taxonomy of contention management in interconnected distributed systems
M Salehi, J Abawajy, R Buyya
(2014), Computing Handbook: Computer Science and Software Engineering, New York, USA, B1
H Shah, T Herawan, R Ghazali, R Naseem, M Abdul Aziz, J Abawajy
(2014), Vol. 8834, pp. 559-569, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst
(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1
Securing a smart anti-counterfeit web application
B Chowdhury, M Chowdhury, J Abawajy
(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1
Automatic generation of meta classifiers with large levels for distributed computing and networking
Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury
(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1
Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics
H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri
(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1
PUF-based secure checker protocol for Networked RFID Systems
B Ray, M Chowdhury, J Abawajy
(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1
A framework for scalable distributed provenance storage system
J Abawajy, S Jami, Z Shaikh, S Hammad
(2013), Vol. 35, pp. 179-186, Computer Standards and Interfaces, C1
Steno cipher to provide data confidentiality and tampered data recovery for RFID tag
B Ray, B Ray, M Chowdhury, M Chowdhury, J Abawajy, J Abawajy
(2013), Vol. 443, pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1
Classification systems based on combinatorial semigroups
J Abawajy, A Kelarev
(2013), Vol. 86, pp. 603-612, Semigroup Forum, C1
SQLIA detection and prevention approach for RFID systems
J Abawajy
(2013), Vol. 86, pp. 751-758, Journal of Systems and Software, C1
Critical analysis and comparative study of security for networked RFID systems
B Ray, M Chowdhury, J Abawajy
(2013), pp. 197-202, SNPD 2013 - 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, E1
A Stranieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek
(2013), Vol. 58, pp. 185-193, Artificial Intelligence in Medicine, C1
Malware detection and prevention in RFID systems
H Fernando, J Abawajy
(2013), pp. 143-166, Internet of things and inter-cooperative computational technologies for collective intelligence, Heidelberg, Germany, B1
IPMA: Indirect patterns mining algorithm
T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy
(2013), Vol. 457, pp. 187-196, Studies in Computational Intelligence, B1
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
(2013), Vol. 36, pp. 324-335, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Fuzzy logic optimized wireless sensor network routing protocol
D Izadi, J Abawajy, S Ghanavati
(2013), Vol. 19, pp. 115-128, Journal of High Speed Networks, C1
A fuzzy technique to control congestion in WSN
S Ghanavati, J Abawajy, D Izadi
(2013), Proceedings of the International Joint Conference on Neural Networks, E1
A new energy efficient cluster-head and backup selection scheme in WSN
D Izadi, J Abawajy, S Ghanavati
(2013), pp. 408-415, Proceedings of the 2013 IEEE 14th International Conference on Information Reuse and Integration, IEEE IRI 2013, E1
Web malware that targets web applications
A Alazab, J Abawajy, M Hobbs
(2013), pp. 248-264, Social Network Engineering for Secure Web Data and Services, B1
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware
A Alazab, M Hobbs, J Abawajy, A Khraisat
(2013), Vol. 381 CCIS, pp. 177-184, Communications in Computer and Information Science, B1
Intelligent battery energy management and control for vehicle-to-grid via cloud computing network
H Khayyam, J Abawajy, B Javadi, A Goscinski, A Stojcevski, A Bab-Hadiashar
(2013), Vol. 111, pp. 971-981, Applied Energy, C1
Using feature selection and classification scheme for automating phishing email detection
I Ahamid, J Abawajy, T Kim
(2013), Vol. 22, pp. 61-70, Studies in Informatics and Control, C1
Malware detection and prevention system based on multi-stage rules
A Alazab, M Hobbs, J Abawajy, A Khraisat
(2013), Vol. 7, pp. 29-43, International Journal of Information Security and Privacy, C1
A data mining application of the incidence semirings
J Abawajy, A Kelarev, J Yearwood, C Turville
(2013), Vol. 39, pp. 1083-1093, Houston Journal of Mathematics, C1
An efficient scheduling method for grid systems based on a hierarchical stochastic petri net
M Shojafar, Z Pooranian, J Abawajy, M Meybodi
(2013), Vol. 7, pp. 44-52, Journal of Computing Science and Engineering, C1
Securing a web-based anti-counterfeit RFID system
B Chowdhury, M Chowdhury, J Abawajy
(2013), Vol. 127 LNICST, pp. 342-355, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, B1
Security concerns and remedy in a cloud based e-learning system
M Masud, M Islam, J Abawajy
(2013), pp. 356-366, Security and privacy in communication networks, Berlin, Germany, B1
Profiling phishing email based on clustering approach
I Hamid, J Abawajy
(2013), pp. 628-635, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, E1
Preserving utility in social network graph anonymization
M Ninggal, J Abawajy
(2013), pp. 226-232, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, E1
Centroid sets with largest weight in Munn semirings for data mining applications
J Abawajy, A Kelarev, J Zeleznikow
(2013), Vol. 87, pp. 617-626, Semigroup Forum, C1
Multistage approach for clustering and classification of ECG data
J Abawajy, A Kelarev, M Chowdhury
(2013), Vol. 112, pp. 720-730, Computer Methods and Programs in Biomedicine, C1
J Abawajy, A Kelarev, M Chowdhury
(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1
Empirical investigation of decision tree ensembles for monitoring cardiac complications of diabetes
A Kelarev, J Abawajy, A Stranieri, H Jelinek
(2013), Vol. 9, pp. 1-18, International Journal of Data Warehousing and Mining, C1
Predicting cardiac autonomic neuropathy category for diabetic data with missing values
J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek
(2013), Vol. 43, pp. 1328-1333, Computers in Biology and Medicine, C1
The challenges of cloud technology adoption in E-government
M Aziz, J Abawajy, M Chowdhury
(2013), pp. 470-474, 2013 International Conference on Advanced Computer Science Applications and Technologies, Kuching, Malaysia, E1
Trends in crime toolkit development
A Khraisat, A Alazab, M Hobbs, J Abawajy, A Azab
(2013), pp. 28-43, Network Security Technologies: Design and Applications, B1
Negotiation strategy for mobile agent-based e-Negotiation
R Al-Jaljouli, J Abawajy
(2012), Vol. 7057 LNAI, pp. 137-151, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), E1
An efficient approach based on trust and reputation for secured selection of grid resources
V Vijayakumar, B Wahida, J Abawajy
(2012), Vol. 27, pp. 1-17, International journal of parallel, emergent and distributed systems, Essex, England, C1
A Beloglazov, J Abawajy, R Buyya
(2012), Vol. 28, pp. 755-768, Future Generation Computer Systems, C1
An approach to faulty reader detection in RFID reader network
H Mahdin, J Abawajy
(2012), pp. 70-84, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1
A security framework for networked RFID
H Fernando, J Abawajy
(2012), pp. 85-114, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1
Security framework for mobile agents-based applications
R Al-jaljouli, J Abawajy
(2012), pp. 242-269, Mobile computing techniques in emerging markets : systems, applications and services, Hershey Pa., B1
E Bellucci, S Venkatraman, N Muecke, A Stranieri, J Abawajy
(2012), pp. 3-12, HIKM 2012 : Proceedings of the Fifth Australasian Workshop on Health Informatics and Knowledge Management, Melbourne, Vic., E1
Multi-input-multi-output antennas for radio frequency identification systems
S Bansal, J Abawajy
(2012), pp. 96-127, Chipless and Conventional Radio Frequency Identification: Systems for Ubiquitous Tagging, B1
N Patterson, M Hobbs, J Abawajy
(2012), pp. 177-184, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, E1
Intelligent energy management control of vehicle air conditioning system coupled with engine
H Khayyam, J Abawajy, R Jazar
(2012), Vol. 48, pp. 211-224, Applied Thermal Engineering, C1
Failure-aware resource provisioning for hybrid Cloud infrastructure
B Javadi, J Abawajy, R Buyya
(2012), Vol. 72, pp. 1318-1331, Journal of Parallel and Distributed Computing, C1
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
(2012), pp. 296-301, 2012 International Symposium on Communications and Information Technologies, ISCIT 2012, E1
Detecting and mitigating HX-DoS attacks against cloud web services
A Chonka, J Abawajy
(2012), pp. 429-434, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012, E1
Management of service level agreement for service-oriented content adaptation platform
M Md Fudzee, J Abawajy
(2012), pp. 21-42, Network and Traffic Engineering in Emerging Distributed Computing Applications, B1
Strategies for agent-based negotiation in e-Trade
R Al-Jaljouli, J Abawajy
(2012), pp. 43-65, Network and Traffic Engineering in Emerging Distributed Computing Applications, B1
Analysis of asynchronous online discussion forums for collaborative learning
J Abawajy
(2012), Vol. 1, pp. 11-21, International journal of education and learning, Sandy Bay, Tas., C1
Performance evaluation of multi-tier ensemble classifiers for phishing websites
J Abawajy, G Beliakov, A Kelarev, J Yearwood
(2012), pp. 11-16, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1
J Abawajy, A Kelarev, A Stranieri, H Jelinek
(2012), Vol. 944, pp. 1-11, CEUR Workshop Proceedings, E1
Secure mobile RFID ownership transfer protocol to cover all transfer scenarios
B Ray, M Chowdhury, J Abawajy
(2012), pp. 1185-1192, Proceedings - 2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012, E1
E-Commerce trust management system reliability
S Chong, J Abawajy
(2012), pp. 13-18, Proceedings - 2012 6th International Conference on New Trends in Information Science, Service Science and Data Mining (NISS, ICMIA and NASNIT), ISSDM 2012, E1
EFP-M2 : efficient model for mining frequent patterns in transactional database
T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy
(2012), pp. 29-38, ICCCI 2012 : Technologies and applications : Proceedings of the 4th International Conference on Computational Collective Intelligence, Ho Chi Minh City, Vietnam, November 28-30, 2012 : proceedings, Ho Chi Minh City, Vietnam, E1
A multi-tier ensemble construction of classifiers for phishing email detection and filtering
J Abawajy, A Kelarev
(2012), pp. 48-56, CSS 2012 : Cyberspace safety and security : 4th International Symposium, Melbourne, Australia, December 12-13, 2012 Proceedings, Melbourne, Victoria, E1
Hybrid Cloud resource provisioning policy in the presence of resource failures
B Javadi, J Abawajy, R Sinnott
(2012), pp. 10-17, CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, E1
A Kelarev, A Stranieri, J Yearwood, J Abawajy, H Jelinek
(2012), Vol. 134, pp. 93-101, Conferences in Research and Practice in Information Technology Series, E1
QoS-based adaptation service selection broker
M Md Fudzee, J Abawajy
(2011), Vol. 27, pp. 256-264, Future Generation Computer Systems, C1
SMS-based medical diagnostic telemetry data transmission protocol for medical sensors
B Townsend, J Abawajy, T Kim
(2011), Vol. 11, pp. 4231-4243, Sensors, C1
Intelligent energy management control of vehicle air conditioning via look-ahead system
H Khayyam, S Nahavandi, E Hu, A Kouzani, A Chonka, J Abawajy, V Marano, S Davis
(2011), Vol. 31, pp. 3147-3160, Applied Thermal Engineering, C1
Efficient resource selection algorithm for enterprise grid systems
W Wan Nik, B Zhou, A Zomaya, J Abawajy
(2011), pp. 57-62, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011, E1
Establishing trust in hybrid cloud computing environments
J Abawajy
(2011), pp. 118-125, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, E1
Mutual authentication protocol for networked RFID systems
H Fernando, J Abawajy
(2011), pp. 417-424, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, E1
Phishing email feature selection approach
I Hamid, J Abawajy
(2011), pp. 916-921, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, E1
Prevention of information harvesting in a cloud services environment
L Batten, J Abawajy, R Doss
(2011), pp. 66-72, CLOSER 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, E1
Attack vector analysis and privacy-preserving social network data publishing
M Ninggal, J Abawajy
(2011), pp. 847-852, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, E1
Engaging and effective asynchronous online discussion forums
J Abawajy, T Kim
(2011), pp. 695-705, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1
Securing RFID systems from SQLIA
H Fernando, J Abawajy
(2011), pp. 245-254, Algorithms and architectures for parallel processing, Berlin, Germany, B1
Online learning environment : taxonomy of asynchronous online discussion forums
J Abawajy, T Kim
(2011), pp. 706-714, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1
A protocol for discovering content adaptation services
M Fudzee, J Abawajy
(2011), pp. 235-244, Algorithms and architectures for parallel processing, Berlin, Germany, B1
Hybrid feature selection for phishing email detection
I Hamid, J Abawajy
(2011), pp. 266-275, Algorithms and architectures for parallel processing, Berlin, Germany, B1
Service quality assessment in provision of library services
M Ahmad, J Abawajy, T Kim
(2011), pp. 83-92, UNESST 2011 : Proceedings of the 2011 International Conference on U- and E-service, Science and Technology, Jeju Island, Korea, E1
Privacy threat analysis of social network data
M Ninggal, J Abawajy
(2011), pp. 165-174, ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference, Melbourne, Victoria, E1
Quality control of sensor network data
D Izadi, J Abawajy, S Ghanavati
(2011), Vol. 122 LNEE, pp. 467-480, Lecture Notes in Electrical Engineering, B1
Optimization and matrix constructions for classification of data
A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury
(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1
An approach for removing redundant data from RFID data streams
H Mahdin, J Abawajy
(2011), Vol. 11, pp. 9863-9877, Sensors, C1
Wi-Fi security : wireless with confidence
L Jacob, D Hutchinson, J Abawajy
(2011), pp. 88-96, ASIC 2011 : Proceedings of the 4th Australian Security and Intelligence Conference, Perth, W. A., E1
Web application protection against SQL injection attack
A Alazab, M Alazab, J Abawajy, M Hobbs
(2011), pp. 1-7, 7th International Conference on Information Technology and Application, ICITA 2011, E1
A Grobner-Shirshov algorithm for applications in internet security
A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan
(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1
A rough set approach for selecting clustering attribute
T Herawan, M Deris, J Abawajy
(2010), Vol. 23, pp. 220-231, Knowledge-Based Systems, C1
Risk-based trust management for e-commerce
S Chong, J Abawajy
(2010), pp. 332-351, Trust modeling and management in digital environments : from social concept to system development, Hershey, Pa., USA, B1
Matrices representation of multi soft-sets and its application
T Herawan, M Deris, J Abawajy
(2010), pp. 201-214, Computational science and its applications - ICCSA 2010, Berlin, Germany, B1
Request-driven cross-media content adaptation technique
M Fudzee, J Abawajy
(2010), pp. 91-113, Developing advanced web services through P2P computing and autonomous agents : trends and innovations, Hershey, Pa., USA, B1
Internet security applications of the Munn rings
A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan
(2010), Vol. 81, pp. 162-171, Semigroup Forum, C1
Multi-criteria content adaptation service selection broker
M Fudzee, J Abawajy, M Deris
(2010), pp. 721-726, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing : proceedings : Melbourne, Australia, 17-20 May, 2010, Melbourne, Vic., E1
Performance analysis of receive diversity in wireless sensor networks over GBSBE models
S Goel, J Abawajy, T Kim
(2010), Vol. 10, pp. 11021-11037, Sensors, C1
Performance analysis of cyber security awareness delivery methods
J Abawajy, T Kim
(2010), Vol. 122 CCIS, pp. 142-148, Communications in Computer and Information Science, B1
An approach to filtering duplicate RFID data streams
H Mahdin, J Abawajy
(2010), pp. 125-133, U- and E-service, science and technology, Berlin, Germany, B1
A privacy preserving service broker architecture for data sharing
F Al-Neyadi, J Abawajy
(2010), pp. 450-458, Future generation information technology, Berlin, Germany, B1
An optimal transportation routing approach using GIS-based dynamic traffic flows
A Alazab, S Venkatraman, J Abawajy, M Alazab
(2010), pp. 172-178, ICMTA 2010 : Proceedings of the International Conference on Management Technology and Applications, Singapore, E1
R Buyya, A Beloglazov, J Abawajy
(2010), pp. 6-17, PDPTA 2010 : Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nev., E1
Novel mechanism for evaluating feedback in the grid environment on resource allocation
V Vijayakumar, R Wahida Banu, J Abawajy
(2010), pp. 11-17, GCA 2010 : Proceedings of the 2010 International Conference on Grid Computing and Applications, Las Vegas, Nev., E1
A hybrid mutual authentication protocol for RFID
H Fernando, J Abawajy
(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Sydney, NSW, E1
Service discovery for service-oriented content adaptation
M Fudzee, J Abawajy, M Deris
(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services, Sydney, NSW, E1
A layered security approach for cloud computing infrastructure
M Yildiz, J Abawajy, T Ercan, A Bernoth
(2009), pp. 763-767, I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, E1
Adaptive hierarchical scheduling policy for enterprise grid computing systems
J Abawajy
(2009), Vol. 32, pp. 770-779, Journal of network and computer applications, London, England, C1
Agents based e-commerce and securing exchanged information
R Al-Jaljouli, J Abawajy
(2009), pp. 383-404, Pervasive computing : innovations in intelligent multimedia and applications, Dordrecht, Germany, B1
An agent architecture for managing data resources in a grid environment
M Prez, A Snchez, J Abawajy, V Robles, J Pea
(2009), Vol. 25, pp. 747-755, Future generation computer systems, Amsterdam, The Netherlands, C1
An approach to filtering RFID data streams
H Mahdin, J Abawajy
(2009), pp. 742-746, I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, E1
An efficient adaptive scheduling policy for high-performance computing
J Abawajy
(2009), Vol. 25, pp. 364-370, Future generation computer systems, Amsterdam, The Netherlands, C1
Design and delivery of undergraduate IT security management course
J Abawajy
(2009), Vol. 5576, pp. 402-411, Lecture notes in computer science, Heidelberg, Germany, C1
Determining service trustworthiness in intercloud computing environments
J Abawajy
(2009), pp. 784-788, I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, E1
Enhancing RFID tag resistance against cloning attack
J Abawajy
(2009), pp. 18-23, NSS 2009 - Network and System Security, E1
Information provenance for open distributed collaborative system
S Jami, J Abawajy, Z Shaikh
(2009), pp. 737-741, I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, E1
Managing data using neighbour replication on a triangular-grid structure
M Deris, J Abawajy, D Taniar, A Mamat
(2009), Vol. 6, pp. 56-65, International journal of high performance computing and networking, Olney, England, C1
Multi-cluster computing interconnection network performance modeling and analysis
B Javadi, M Akbari, J Abawajy
(2009), Vol. 25, pp. 737-746, Future generation computer systems, Amsterdam, The Netherlands, C1
Multi-tier phishing email classification with an impact of classifier rescheduling
M Islam, J Abawajy, M Warren
(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1
Human-computer interaction in ubiquitous computing environments
J Abawajy
(2009), Vol. 5, pp. 31-77, International journal of pervasive computing and communications, Bingley, England, C1
Context-based e-health system access control mechanism
F Al-Neyadi, J Abawajy
(2009), pp. 68-77, Advances in information security and its application, Berlin, Germany, B1
A RFID architecture framework for global supply chain applications
H Fernando, J Abawajy
(2009), pp. 313-320, iiWAS 2009 : Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, Kuala Lumpur, Malaysia, E1-1
An efficient replicated data access approach for large-scale distributed systems
M Deris, J Abawajy, A Mamat
(2008), Vol. 24, pp. 1-9, Future generation computer systems, Amsterdam, Netherlands, C1
Security and privacy threats to volunteer computing
J Abawajy
(2008), Vol. 4, pp. 245-255, International Journal of Critical Infrastructures, C1
Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks
B Javadi, J Abawajy, M Akbari
(2008), Vol. 34, pp. 488-502, Computers and Electrical Engineering, C1
A comprehensive analytical model of interconnection networks in large-scale cluster systems
B Javadi, J Abawajy, M Akbari
(2008), Vol. 20, pp. 75-97, Concurrency Computation Practice and Experience, C1
An online credential management service for intergrid computing
J Abawajy
(2008), pp. 101-106, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, E1
Investigation of stakeholders commitment to information security awareness programs
J Abawajy, K Thatcher, T Kim
(2008), pp. 472-476, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008, E1
Performance of smart antennas with receive diversity in wireless sensor networks
S Goel, J Abawajy
(2008), pp. 272-278, Proceedings of ICSCN 2008 : International Conference on Signal Processing Communications and Networking, Chennai, India, E1
A classification for content adaptation system
M Mohd, J Abawajy
(2008), pp. 426-429, Proceedings of the 10th International Conference on Information Integration and Web-based Applications and Services, iiWAS 2008, E1
Analytical communication networks model for enterprise grid computing
B Javadi, M Akbari, J Abawajy
(2007), Vol. 23, pp. 737-747, Future generation computer systems, Amsterdam, The Netherlands, C1
Analytical modeling of interconnection networks in heterogeneous multi-cluster systems
B Javadi, J Abawajy, M Akbari
(2007), Vol. 40, pp. 29-47, Journal of supercomputing, New York, N.Y., C1
A multilevel trust management framework
S Chong, J Abawajy, R Dew
(2007), pp. 776-781, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007), Melbourne, Australia, E1
Communication network analysis of the enterprise grid systems
B Javadi, J Abawajy, M Akbari, S Nahavandi
(2007), pp. 33-40, Proceedings of the fifth Australasian symposium on ACSW frontiers, Ballarat, Australia, E1
Electronic negotiation and security of information exchanged in e-commerce
R Al-Jaljouli, J Abawajy
(2007), pp. 1-11, Proceedings of the 2007 collecter E-commerce conference : Collecter 2007 - 10th anniversary., Melbourne, Vic., E1
Feedback credibility issues in trust management systems
S Chong, J Abawajy
(2007), pp. 387-391, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007, Seoul, Korea, E1
Sensor node activity scheduling approach
J Abawajy, S Nahavandi, F Al-Neyadi
(2007), pp. 72-77, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, E1
F Al-Naydi, J Abbawajy, M Ders
(2007), pp. 299-304, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, E1
Taxonomy and survey of location management systems
A Rahaman, J Abawajy, M Hobbs
(2007), pp. 369-374, Proceedings - 6th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2007; 1st IEEE/ACIS International Workshop on e-Activity, IWEA 2007, E1
Welcome message from the IPM/ESA/RFID 2007 workshop co-chairs
A Waluyo, J Abawajy, J Ma, H Jong, L Yang, M Deris, S Nahavandi, S Hussain, T Kim, Z Yu
(2007), Proceedings The 2007 International Conference on Intelligent Pervasive Computing, IPC 2007, E1
An authentication framework for e-health systems
F Al-Neyadi, J Abawajy
(2007), pp. 616-620, 2007 Proceedings of the 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1
Secure mobile agent-based E-negotiation for on-line trading
R Al-Jaljouli, J Abawajy
(2007), pp. 610-615, ISSPIT 2007 - 2007 IEEE International Symposium on Signal Processing and Information Technology, E1
An authentication framework for e-Health systems
Fahed Al-Nayadi, Jemal Abawajy
(2007), pp. 1159-1163, 2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, Cairo, EGYPT, E1-1
Secure mobile agent-based e-negotiation for on-line trading
Raja Al-Jaljouli, Jemal Abawajy
(2007), pp. 1148-1153, 2007 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1-3, Cairo, EGYPT, E1-1
Multi-cluster computing interconnection network performance modeling and analysis
Bahman Javadi, Mohammad Akbari, Jemal Abawajy, Sacid Nahavandi
(2007), pp. 86-+, 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, Mangalore, INDIA, E1-1
A reputation-based grid information service
J Abawajy, A Goscinski
(2006), Vol. 3994 LNCS - IV, pp. 1015-1022, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
Adaptive parallel I/O scheduling algorithm for multiprogrammed systems
J Abawajy
(2006), Vol. 22, pp. 611-619, Future generation computer systems, Netherlands, C1
A novel data replication and management protocol for mobile computing systems
J Abawajy, M Mat Deris, M Omar
(2006), Vol. 2, pp. 3-19, Mobile information systems, Amsterdam, The Netherlands, C1
Supporting disconnected operations in mobile computing
J Abawajy, M Mat Deris
(2006), pp. 911-918, 4th ACS/IEEE international conference on computer systems and applications, Sharjah, UAE, E1
Multi-cluster computing interconnection network performance modeling and analysis
B Javadi, M Akbari, J Abawajy, S Nahavandi
(2006), pp. 90-95, ADCOM 2006: automatic computing: proceedings of the 14th international conference on advanced computing and communications, Surathkal, India, E1
Managing data using neighbor replication on triangular-grid structure
A Mamat, M Mat Deris, J Abawajy, S Ismail
(2006), Vol. 3994 LNCS - IV, pp. 1071-1077, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
A performance model for analysis of heterogeneous multi-cluster systems
B Javadi, M Akbari, J Abawajy
(2006), Vol. 32, pp. 831-851, Parallel computing, Amsterdam, Netherlands, C1
Analysis of interconnection networks in heterogeneous multi-cluster systems
B Javadi, J Abawajy, M Akbari, S Nahavandi
(2006), pp. 1-8, ICCP 2006 : 2006 international conference on parallel processing workshops, Columbus, USA, E1
Economy-based data replication broker
H Lin, J Abawajy, R Buyya
(2006), pp. 1-8, Proceedings of the Second IEEE International Conference on e-science and grid computing, Amsterdam, Netherlands, E1
Analytical interconnection networks model for multi-cluster computing systems
B Javadi, J Abawajy, M Akbari
(2006), pp. 37-42, ASMTA 2006 : Proceedings of the ASMTA 2006 13th international conference on analytical and stochastic modelling techniques and applications, Bonn, Germany, E1
Analysis of multi-cluster computing systems with processor heterogeneity
B Javadi, M Akbari, J Abawajy
(2006), pp. 1-8, CSICC 2006 : Proceedings of the 11th International CSI (Computer Society of Iran) Computer Conference, Tehran, Iran, E1
Analytical network modeling of heterogeneous large-scale cluster systems
B Javadi, J Abawajy, M Akbari, S Nahavandi
(2006), pp. 1-9, 2005 IEEE International Conference on Cluster Computing, Barcelona, Spain, E1
Analytical modeling of communication latency in multi-cluster systems
B Javadi, J Abawajy, M Akbari
(2006), pp. 1-6, Proceedings of the 12th International Conference on parallel and distributed systems (ICPADS`06), Minneapolis, USA, E1
Analytical network modeling of heterogeneous large-scale cluster systems
Bahman Javadi, Jemal Abawajy, Mohammad Akbari, Saeid Nahavandi
(2006), pp. 602-+, 2006 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING, VOLS 1 AND 2, Barcelona, SPAIN, E1-1
Fault-tolerant dynamic job scheduling policy
J Abawajy
(2005), Vol. 3719, pp. 165-173, Lecture notes in computer science, Berlin, Germany, C1
Autonomic job scheduling policy for grid computing
J Abawajy
(2005), Vol. 3516, pp. 213-220, Lecture notes in computer science, Berlin, Germany, C1
Job scheduling policy for high throughput grid computing
J Abawajy
(2005), Vol. 3719 LNCS, pp. 184-192, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
An efficient replicated data management approach for peer-to-peer systems
J Abawajy
(2005), Vol. 3516, pp. 457-463, Lecture Notes in Computer Science, Computational Science ? ICCS 2005, Berlin, Germany, C1
Robust parallel job scheduling infrastructure for service-oriented grid computing systems
J Abawajy
(2005), Vol. 3483, pp. 1272-1281, Lecture notes in computer science, Berlin, Germany, C1
Grid accounting service infrastructure for service-oriented grid computing systems
J Abawajy
(2005), Vol. 3458, pp. 168-175, Lecture Notes in Computer Science, C1
A new internet meta-search engine and implementation
J Abawajy, M Hu
(2005), pp. 103-110, ACS/IEEE International Conference on Computer Systems and Applications, Cairo, Egypt, E1
Performance analysis of interconnection networks for multi-cluster systems
B Javadi, J Abawajy, M Akbari
(2005), Vol. 3516, pp. 205-212, Lecture Notes in Computer Science, C1
A new approach for efficiently achieving high availability in mobile computing
M Deris, J Abawajy, M Omar
(2005), pp. 60-68, Lecture notes in computer science, Berlin, Germany, C1
High reliability replication technique for web-server cluster systems
M Deris, J Abawajy, M Zarina, R Mamat
(2005), Vol. 3516, pp. 447-456, Lecture Notes in Computer Science, C1
Performance analysis of heterogeneous multi-cluster systems
B Javadi, M Akbari, J Abawajy
(2005), pp. 493-500, Proceedings of the 2005 international conference on parallel processing workshops, Oslo, Norway, E1
Modeling of multi-cluster systems in the presence of network heterogeneity
B Javadi, M Akbari, J Abawajy
(2005), pp. 204-211, The proceedings of the International Conference on Computational Science and Engineering, Istanbul, Turkey, E1
Analytical performance modeling of the enterprise grid computing
B Javadi, M Akbari, J Abawajy
(2005), First International Conference on e-science and grid computing, Melbourne, Australia, E1
Fault detection service architecture for grid computing systems
J Abawajy
(2004), Vol. 3044, pp. 107-115, Lecture notes in computer science, Berlin, Germany, C1
Dynamic parallel job scheduling in multi-cluster computing systems
J Abawajy
(2004), Vol. 3036, pp. 27-34, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
Preemptive job scheduling policy for distributively-owned workstation clusters
J Abawajy
(2004), Vol. 14, pp. 255-270, Parallel Processing Letters, C1
Placement of file replicas in data grid environments
J Abawajy
(2004), Vol. 3038, pp. 66-73, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), C1
File replacement algorithm for storage resource managers in data grids
J Abawajy
(2004), Vol. 3038, pp. 339-346, Lecture notes in computer science, Berlin, Germany, C1
Secure accounting and payment infrastructure for grid computing
J Abawajy
(2004), Scientific applications of grid computing, Beijing, China, E1
Design and evaluation of an agent-based communication model for a parallel file system
M Prez, A Snchez, J Abawajy, V Robles, J Pea
(2004), Vol. 3044, pp. 87-96, Lecture notes in computer science, Berlin, Germany, C1-1
Grid accounting and payment arcihtecture
J Abawajy
(2004), pp. 82-87, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, Innsbruck, AUSTRIA, E1-1
An integrated resource scheduling approach on cluster computing systems
J Abawajy
(2003), Proceedings - International Parallel and Distributed Processing Symposium, IPDPS 2003, Nice, France, E1-1
Parallel I/O scheduling in multiprogrammed cluster computing systems
J Abawajy
(2003), Vol. 2660, pp. 223-229, Computational Science ? ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2?4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1
An adaptive load balancing algorithm for large data parallel processing with communication delay
K Imasaki, J Abawajy
(2003), Vol. 2660, pp. 242-247, Computational Science ? ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2?4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1
Mobile Agents Security Protocols
Raja Al-Jaljouli, Jemal Abawajy
(), pp. 270-305, Mobile Computing Techniques in Emerging Markets, B1
Funded Projects at Deakin
Australian Competitive Grants
Effectiveness of wearable continuous blood pressure monitoring device with web platform on hypertension control: A pilot randomized controlled trial.
Dr Shariful Shariful Islam, Prof Ralph Maddison, Prof Clara Chow, Prof Jemal Abawajy
NHF Vanguard Grant - National Heart Foundation of Australia
- 2019: $73,767
Industry and Other Funding
Database and Secure Website Development
Prof Jemal Abawajy
- 2012: $5,000
Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers
Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy
- 2016: $20,000
- 2015: $40,000
Supervisions
Abdulaziz Aljunaibi
Thesis entitled: Isomorphism as a Paradigm for Strategic Change Management in AbuDhabi government
Doctor of Philosophy (Information Technology), School of Information Technology
Benjamin Jonathan Townsend
Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform
Doctor of Philosophy (Information Technology), School of Information Technology
Baker Alrubaiey
Thesis entitled: Assuring Virtual Network Reliability and Resilience
Doctor of Philosophy (Information Technology), School of Information Technology
Fahed Matar Al Neyadi
Thesis entitled: Securely Sharing Dynamic Medical Information in E-Health
Doctor of Philosophy (Information Technology), School of Information Technology
Masitah Ahmad
Thesis entitled: Service Level Agreements Framework for Digital Library Quality of Service Management
Doctor of Philosophy (Information Technology), School of Information Technology
Sara Ghanavati
Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure
Master of Science (Information Technology), School of Information Technology
Mohd Izuan Hafez Ninggal
Thesis entitled: Privacy-Preserving Mechanism for Social Network Data Publishing
Doctor of Philosophy (Information Technology), School of Information Technology
Isredza Rahmi A Hamid
Thesis entitled: Phishing Detection and Traceback Mechanism
Doctor of Philosophy (Information Technology), School of Information Technology
Davood Izadi
Thesis entitled: Enhancing Wireless Sensor Networks Functionalities
Doctor of Philosophy (Information Technology), School of Information Technology
Harinda Fernando
Thesis entitled: Enhancing RFID performance and security in networked environments
Doctor of Philosophy (Information Technology), School of Information Technology
Hairulnizam Bin Mahdin
Thesis entitled: Enhancing RFID Data Quality and Reliability
Doctor of Philosophy (Information Technology), School of Information Technology
Soon Chong
Thesis entitled: Risk and Trust Management for Online Distributed System
Doctor of Philosophy (Information Technology), School of Information Technology
Raja Al-Jaljouli
Thesis entitled: Mobile-Agent Based Multi-Constraint One-to-Many Bilateral e-Negotiation Framework
Doctor of Philosophy (Information Technology), School of Information Technology
Mohd Farhan Md Fudzee
Thesis entitled: Broker-based service-oriented content adaptation framework
Doctor of Philosophy (Information Technology), School of Information Technology
Shivali Goel
Thesis entitled: Antenna Selection and Channel Estimation for Hybrid Relay Systems
Doctor of Philosophy (Information Technology), School of Information Technology
Maslina Abdul Aziz
Thesis entitled: QoS-Aware Predictive Workflow Scheduling
Doctor of Philosophy (Information Technology), School of Information Technology
Mohammed Khalil Ibrahim Amain
Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmad Shaker Abdalrada
Thesis entitled: The Role of Various Risk Factors in the Prevalence of Cardiac Autonomic Neuropathy and Associated Diseases.
Doctor of Philosophy (Information Technology), School of Information Technology
Biplob Ray
Thesis entitled: Security framework and protocols for the internet of things
Doctor of Philosophy (Information Technology), School of Information Technology
Ammar Al Azab
Thesis entitled: Malware Detection and Prevention
Doctor of Philosophy (Information Technology), School of Information Technology
Nicholas Patterson
Thesis entitled: A Framework for Detecting Virtual Property Theft in Virtual World Environments
Doctor of Philosophy (Information Technology), School of Information Technology