Career highlights
Academic promotion / hiring: Served on promotion & hiring committee at Lecturer, Senior Lecturer, Asoociate and Professor levels as well as the Head of School in Australia (e.g., Deakin and SCU) and internationally (e.g., New Zealand, Saudi Arabia, Malaysia, and Pakistan).
Keynote/Invited Speaker: Delivered more than 75 keynote addresses, numerous invited seminars, and media briefings (e.g., Voice of America's English Radio).
Distinguished Faculty: Appointed record 4 times under the GIAN (Global Initiative of Academic Networks), a prestigious programme of the Ministry of Human Resource Development of the Government of India.
Academic program Advisor, Serving as an advisor of undergraduate / postgraduate degree offering institutions within Australia and internationally. Some examples:
- International Academic Advisor, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 2021-2024.
- Field expert, Universiti Tun Hussein Onn Malaysia, Malaysia, Faculty of Computer Science & Information Technology, Period: on-going.
- Course Advisory Committee, Box Hill Institute, Melbourne, Victoria, Australia, Period: 2012-2020.
Faculty Development Program (FDP): Regularly provide FDP at many academic institutions. The latest example is a 5-day FDP on "Quantum Computing", Department of Information Technology, Meerut Institute of Engineering and Technology, India.
Curriculum development, At Deakin University, I initiated and played a lead role in the conceptualisation and formulation of new undergraduate level degree programs (e.g., IT Security degree program, the IT Security major program and the Bachelor of Health Informatics degree program) and contributed to the development of new degree programs (e.g., Web and Mobile courses).
Research Grant assessor: I have assessed all types of research grants run by Australian Research council (ARC) as well as many countries including Natural Sciences and Engineering Research Council of Canada, South Africa’s National Research Foundation (NRF), Netherlands Organisation for Scientific Research (NWO), Swiss National Science Foundation, and many more.
Academic program assessment: Experienced undergraduate and postgraduate academic program assessor with a sound understanding of various accreditation practices, standards, evidence guide and rules. I have assessed many undergraduate and postgraduate programs for many universities locally in Australia and internationally including:.
- Melbourne Institute of Technology, Melbourne, Australia
- Imam Abdulrahman Bin Faisal University, Dammam, KSA,
- Universiti Kebangsaan Malaysia (UKM), Malaysia
- Auckland University of Technology, Auckland, New Zealand
- Universiti Putra Malaysia (UPM), .Malaysia.
-
Universiti Tun Hussein Onn Malaysia (UTHM), Johor, Malaysia.
PhD Thesis Assessor: I have assessed over 100 theses for many reputable institutions all over the world including
- United Kingdom (e.g., University of Leeds)
- Australia (e.g., University of Sydney)
- Canada (e.g., University of Manitoba)
- India (e.g., Indian Institute of Technology-Roorkee)
- South Africa (e.g., University of KwaZulu-Natal, Durban)
- New Zealand (e.g., Auckland University of Technology)
- Mauritius (University of Mauritius)
- Malaysia (e.g., University Malaya, University Putra Malaya)
- Germany (e.g., Friedrich-Schiller-Universität Jena)
- Pakistan (e.g., University of Sargodha, Sargodha).
Affiliations
BOARD AND EXECUTIVE MEMBER
- External advisory Board for Cyber Security, Department of Computer Science, College of Computer Science and Information Technology (CCSIT), Imam Abdulrahman Bin Faisal University (IAU), Dammam, KSA, Period: 2019-2023
- Executive Advisory Board for Cyber Security (EBAC), Cyber Security Research and Innovation Centre, Period: 2018-2021
- Executive Member, Strategic Centre for Cyber Resilience and Trust (CREST), Period: 2023-now
- Board of International Experts, International Center for AI and Cyber Security Research and Innovations Asia University, Taiwan, Period: 2022-now.
- Executive Member, Cyber Security Research and Innovation (CSRI) Center, Period: 2015-2023
- Academic Board, Deakin University, Australia, Period: 2011–2014
- Faculty Board, Deakin University, Australia, Period: 2011–2012.
Professional activities
Sample Editorial Board
- Editorial Board, Journal of Reliable Intelligent Environments, Springer, 2023 - Now
- Editorial Board, Journal of Cloud Computing, Springer, 2021 - Now
- Associate Editor, IEEE Access, IEEE Computer Society, 2020 – Now,
- Associate Editor, Electronic Commerce Research, Springer, 2019 - Now
- Editorial Board, Discover Internet of Things, Springer, 2020 - Now
- Editorial Board, Journal of Theoretical and Applied Electronic Commerce Research, 2021 – Now.
Conference Leadership
I have served on more than 300 conferences in various capacities including Steering Committee, International Liaison Chairs, General Chair, Program Chair, Publication Chair, Workshop Chair, Best paper Award Chair, Tutorial Chair, and Publicity Chair.
Awards
Vice-Chancellor’s Award: Recipient of the Vice-Chancellor’s Award for outstanding research, Deakin University, Australia.
Excellence in Research Award: Received several School of Information Technology best researcher awards including the 2018 Excellence in Research Award, 2012 Excellence in Research Award, and 2010 Excellence in Research Award. Recipient of the 2011 excellence in research and innovation competition first place award, UTHM, Malaysia.
Best Paper Award: Received several best paper awards including the 2013 IEEE Proceedings of the International Joint Conference on Neural Networks, Dallas, Texas, USA Nominated best paper award, 2012 IEEE International Conference on Cloud Computing Technology and Science, Taiwan, and 201 Conference in Future Generation Information Technology, Korea.
Excellence in Research Training Award: Received several excellences in research training awards including the 2010 outstanding Performance in Research Training Award
Excellence in Teaching & Student Engagement Award: Received several awards in teaching and student engagement award from the School of Information Technology, Deakin University, Australia including the 2020 Excellence in International Student Engagement, the 2006 and the 2007 commendation for excellent lecturer.
Service Excellence Award: Received several service excellence awards including outstanding services to international conference on computational science and its applications (ICCSA).
Projects
Sample of completed and on-going projects and funds
- InterGrid: Peering Architecture and Policies for Internetworking Disparate Grids, Australian Research Council Discovery Project (ARC DP), Grant number: DP0880501 | Funding period: 2008 – 2012.
- The Utility Grid Project: Autonomic and Utility-oriented Global Grids for Powering Emerging E-Research Applications, International Science Linkages, Department of Education, Science & Training, Australia, $592,875, | Funding period: 2006 – 2009.
- International cooperation initiative for research and development, Obfuscation-resilient Algorithm for Accurate and Early Detection of Malware, Research and Innovation Agency, Ministry of Education, Saudi Arabia, SAR. 1567000, | Funding period:2020-2023.
- Smart and Secure Services for Internet of Things, funded by the Brazilian Federal Agency for Support and Evaluation of Graduate Education (CAPES-Print Cal) | Funding period: 2019-2022.
- Scalable and Energy-Efficient Consensus Algorithm Using Deterministic Approach for Blockchain, FRGS grant (issued by the Ministry of Higher Education, Malaysia (MOHE)), Ref: FRGS/1/2020/ICT04/UPM/02/1 | Funding period: 2020-2023.
Publications
Analysis of Consumer IoT Device Vulnerability Quantification Frameworks
S Baho, J Abawajy
(2023), Vol. 12, pp. 1-31, Electronics (Switzerland), Basel, Switzerland, C1
A Comprehensive Review of Lightweight Authenticated Encryption for IoT Devices
Z Aljabri, J Abawajy, S Huda
(2023), Vol. 2023, pp. 1-31, Wireless Communications and Mobile Computing, London, Eng., C1
Elton Lobo, Chandan Karmakar, Mohamed Abdelrazek, Jemal Abawajy, Clara Chow, Yuxin Zhang, Muhammad Kabir, Reza Daryabeygi, Ralph Maddison, Sheikh Islam
(2023), Vol. 11, pp. 01-15, Frontiers in Public Health, Lausanne, Switzerland, C1
FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning
B Murshed, Suresha, J Abawajy, M Saif, H Abdulwahab, F Ghanem
(2023), Multimedia Tools and Applications, Berlin, Germany, C1
Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT
A Shahidinejad, J Abawajy
(2023), pp. 1-11, IEEE Systems Journal, Piscataway, N.J., C1
A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection
N Choudhry, J Abawajy, S Huda, I Rao
(2023), Vol. 11, pp. 114680-114713, IEEE Access, Piscataway, N.J., C1
N Defersha, J Abawajy, K Kekeba
(2023), pp. 1-11, CCET 2022 : Proceedings of 2022 IEEE International Conference on Current Development in Engineering and Technology, Bhopal, India, E1
Interval-Valued Intuitionistic Fuzzy Soft Sets Based Decision-Making and Parameter Reduction
X Ma, H Qin, J Abawajy
(2022), Vol. 30, pp. 357-369, IEEE Transactions on Fuzzy Systems, C1
M Hassan, S Huda, M Hassan, J Abawajy, A Alsanad, G Fortino
(2022), Vol. 77, pp. 70-80, Information Fusion, Amsterdam, The Netherlands, C1
S Sharmeen, S Huda, J Abawajy, C Ahmed, M Hassan, G Fortino
(2022), Vol. 9, pp. 7298-7310, IEEE Internet of Things Journal, C1
ARPS: An Autonomic Resource Provisioning and Scheduling Framework for Cloud Platforms
M Kumar, A Kishor, J Abawajy, P Agarwal, A Singh, A Zomaya
(2022), Vol. 7, pp. 386-399, IEEE Transactions on Sustainable Computing, C1
An Adaptive Energy-Aware Stochastic Task Execution Algorithm in Virtualized Networked Datacenters
Z Zhou, K Li, J Abawajy, M Shojafar, M Chowdhury, F Li, K Li
(2022), Vol. 7, pp. 371-385, IEEE Transactions on Sustainable Computing, C1
ECMS: An Edge Intelligent Energy Efficient Model in Mobile Edge Computing
Z Zhou, M Shojafar, J Abawajy, H Yin, H Lu
(2022), Vol. 6, pp. 238-247, IEEE Transactions on Green Communications and Networking, C1
A Abdalrada, J Abawajy, T Al-Quraishi, S Islam
(2022), pp. 1-11, Journal of Diabetes and Metabolic Disorders, Berlin, Germany, C1
Z Zhou, J Abawajy, M Shojafar, M Chowdhury
(2022), pp. 1-10, IEEE Transactions on Industrial Informatics, Piscataway, NJ, C1
S Azizi, M Shojafar, J Abawajy, R Buyya
(2022), Vol. 201, pp. 1-13, Journal of Network and Computer Applications, Amsterdam, The Netherlands, C1
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
S Singh, R Kumar, A Sharma, J Abawajy, R Kaur
(2022), pp. 1-18, Cluster Computing, Berlin, Germany, C1
B Murshed, J Abawajy, S Mallappa, M Saif, H Al-ariki
(2022), Vol. 10, pp. 25857-25871, IEEE Access, Piscataway, NJ, C1
Prediction of cardiac autonomic neuropathy using a machine learning model in patients with diabetes
A Abdalrada, J Abawajy, T Al-Quraishi, S Islam
(2022), Vol. 13, pp. 1-10, Therapeutic Advances in Endocrinology and Metabolism, London, Eng., C1
Automata-Based Dynamic Fault Tolerant Task Scheduling Approach in Fog Computing
S Ghanavati, J Abawajy, D Izadi
(2022), Vol. 10, pp. 488-499, IEEE Transactions on Emerging Topics in Computing, Piscataway, N.J., C1
Sheikh Islam, Ashis Talukder, Md Awal, Md Siddiqui, Md Ahamad, Benojir Ahammed, Lal Rawal, Roohallah Alizadehsani, Jemal Abawajy, Liliana Laranjo, Clara Chow, Ralph Maddison
(2022), Vol. 9, pp. 1-9, Frontiers in Cardiovascular Medicine, Lausanne, Switzerland, C1
Detection of False Income Level Claims Using Machine Learning
K Anil Kumar, S Bhargava, R Apoorva, J Abawajy
(2022), Vol. 14, pp. 65-77, International Journal of Modern Education and Computer Science (IJMECS), Tsim Sha Tsui, HK, C1
Network-aware worker placement for wide-area streaming analytics
H Mostafaei, S Afridi, J Abawajy
(2022), Vol. 136, pp. 270-281, Future Generation Computer Systems, C1
Rough set based information theoretic approach for clustering uncertain categorical data
J Uddin, R Ghazali, J Abawajy, H Shah, N Husaini, A Zeb
(2022), Vol. 17, pp. e0265190-e0265190, PLoS ONE, United States, C1
Evaluating Public Service Delivery Smartness and Impact on Citizens’ Well-being
F Hartanti, J Abawajy, M Chowdhury
(2022), Vol. 10, pp. 69106-69124, IEEE Access, C1
H Qin, Y Cheng, X Ma, F Li, J Abawajy
(2022), Vol. 34, pp. 8370-8379, Journal of King Saud University - Computer and Information Sciences, C1
A Ghosh, J Abawajy, M Chowdhury
(2022), Construction Innovation, C1
Enhancing Big Social Media Data Quality for Use in Short-Text Topic Modeling
B Murshed, J Abawajy, S Mallappa, M Saif, S Al-Ghuribi, F Ghanem
(2022), Vol. 10, pp. 105328-105351, IEEE Access, C1
Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis
B Murshed, S Mallappa, J Abawajy, M Saif, H Al-ariki, H Abdulwahab
(2022), Artificial Intelligence Review, England, C1
R Satrya, O Pratiwi, R Farifah, J Abawajy
(2022), ICADEIS 2022 : Proceedings of the International Conference Advancement in Data Science, E-Learning and Information Systems 2022, Bandung, Indonesia, E1
A Ghosh, D Edwards, M Hosseini, R Al-Ameri, J Abawajy, W Thwala
(2021), Vol. 39, pp. 283-311, International Journal of Building Pathology and Adaptation, C1
M Hassan, S Huda, S Sharmeen, J Abawajy, G Fortino
(2021), Vol. 17, pp. 2860-2870, IEEE Transactions on Industrial Informatics, C1
An empirical analysis of graph-based linear dimensionality reduction techniques
L Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi
(2021), Vol. 33, Concurrency and Computation: Practice and Experience, C1
Development of energy efficient drive for ventilation system using recurrent neural network
Prince, A Hati, P Chakrabarti, J Abawajy, N Keong
(2021), pp. 1-10, Neural Computing and Applications, Berlin, Germany, C1
FedLearnSP: Preserving Privacy and Security using Federated Learning and Edge Computing
A Makkar, U Ghosh, D Rawat, J Abawajy
(2021), Vol. 11, pp. 21-27, IEEE Consumer Electronics Magazine, C1
Feature subset selection for malware detection in smart iot platforms
J Abawajy, A Darem, A Alhashmi
(2021), Vol. 21, pp. 1-19, Sensors (Switzerland), Switzerland, C1
An Ontological Framework for Information Extraction from Diverse Scientific Sources
G Zaman, H Mahdin, K Hussain, Atta-Ur-Rahman, J Abawajy, S Mostafa
(2021), Vol. 9, pp. 42111-42124, IEEE Access, C1
AFED-EF: An Energy-Efficient VM Allocation Algorithm for IoT Applications in a Cloud Data Center
Z Zhou, M Shojafar, M Alazab, J Abawajy, F Li
(2021), Vol. 5, pp. 658-669, IEEE Transactions on Green Communications and Networking, C1
GRVMP: A Greedy Randomized Algorithm for Virtual Machine Placement in Cloud Data Centers
S Azizi, M Shojafar, J Abawajy, R Buyya
(2021), Vol. 15, pp. 2571-2582, IEEE Systems Journal, Piscataway, N.J., C1
Visualization and deep-learning-based malware variant detection using OpCode-level features
A Darem, J Abawajy, A Makkar, A Alhashmi, S Alanazi
(2021), Vol. 125, pp. 314-323, Future Generation Computer Systems, C1
Measuring Software Obfuscation Quality-A Systematic Literature Review
S Ebad, A Darem, J Abawajy
(2021), Vol. 9, pp. 99024-99038, IEEE Access, Piscataway, N.J., C1
A Darem, F Ghaleb, A Al-Hashmi, J Abawajy, S Alanazi, A Al-Rezami
(2021), Vol. 9, pp. 97180-97196, IEEE Access, Piscataway, N.J., C1
Classification of Indian Classical Music with Time-Series Matching Deep Learning Approach
A Sharma, G Aggarwal, S Bhardwaj, P Chakrabarti, T Chakrabarti, J Abawajy, S Bhattacharyya, R Mishra, A Das, H Mahdin
(2021), Vol. 9, pp. 102041-102052, IEEE Access, Piscataway, N.J., C1
An Unsupervised Model for Identifying and Characterizing Dark Web Forums
S Nazah, S Huda, J Abawajy, M Hassan
(2021), Vol. 9, pp. 112871-112892, IEEE Access, Piscataway, N.J., C1
Drivers Fatigue Level Prediction using Facial, and Head Behavior Information
H Kassem, M Chowdhury, J Abawajy
(2021), Vol. 9, pp. 121686-121697, IEEE Access, Piscataway, N.J., C1
IADE: An Improved Differential Evolution Algorithm to Preserve Sustainability in a 6G Network
Z Zhou, M Shojafar, J Abawajy, A Bashir
(2021), Vol. 5, pp. 1747-1760, IEEE Transactions on Green Communications and Networking, Piscataway, N.J., C1
Citizens' Trust Measurement in Smart Government Services
F Hartanti, J Abawajy, M Chowdhury, W Shalannanda
(2021), Vol. 9, pp. 150663-150676, IEEE Access, Piscataway, N.J., C1
Taxonomy of Cybersecurity Awareness Delivery Methods: A Countermeasure for Phishing Threats
A Alhashmi, A Darem, J Abawajy
(2021), Vol. 12, pp. 29-35, International Journal of Advanced Computer Science and Applications, New York, N.Y., C1
Security and privacy in the Internet of things: Architectures, techniques, and applications
A Awad, J Abawajy
(2021), A7
Cost-Aware Big Data Stream Processing in Cloud Environment
A Al-Mansoori, J Abawajy, M Chowdhury
(2021), Vol. 363, pp. 120-136, CloudComp 2020 : Proceedings of the 10th EAI International Conference on Cloud Computing, Qufu, China, E1
Lightweight authenticated encryption for cloud-assisted IoT applications
Z AlJabri, J Abawajy, S Huda
(2021), Vol. 740, pp. 295-299, EWCIS 2020 : Trends in wireless communication and information security : proceedings of EWCIS 2020, Ranchi, India, E1
A Jamaluddin, J Abawajy
(2021), Vol. 254, pp. 282-293, EATI 2020 : International Conference on Emerging Applications and Technologies for Industry 4.0, Uyo, Nigeria, E1
SNR: Network-aware geo-distributed stream analytics
H Mostafaei, S Afridi, J Abawajy
(2021), pp. 820-827, CCGrid 2021 : Proceedings of the 21st IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Victoria, E1
Chili Ripeness Grading Simulation Using Machine Learning Approach
M Aziz, W Arif Mohamad Nazir, A Ali, J Abawajy
(2021), pp. 253-258, ICOCO 2021: Proceedings of the IEEE Computing 2021 International Conference, Kuala Lumpur, Malaysia, E1
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services
M Chowdhury, J Abawajy, A Kelarev, H Jelinek
(2020), Vol. 8, pp. 473-483, IEEE Transactions on Cloud Computing, C1
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection
J Abawajy, M Chowdhury, A Kelarev
(2020), Vol. 8, pp. 398-407, IEEE Transactions on Cloud Computing, C1
Z Zhou, F Li, H Zhu, H Xie, J Abawajy, M Chowdhury
(2020), Vol. 32, pp. 1531-1541, Neural Computing and Applications, C1
S Sharmeen, S Huda, J Abawajy, M Hassan
(2020), Vol. 89, Applied Soft Computing Journal, C1
Soft set theory based decision support system for mining electronic government dataset
Deden Witarsyah, Mohd Fudzee, Mohamad Salamat, Iwan Yanto, Jemal Abawajy
(2020), Vol. 16, pp. 39-62, International journal of data warehousing and mining, C1
Conflict management of evidence theory based on belief entropy and negation
S Li, F Xiao, J Abawajy
(2020), Vol. 8, pp. 37766-37774, IEEE Access, Piscataway, N.J., C1
Z Zhou, F Li, J Abawajy, C Gao
(2020), Vol. 8, pp. 55872-55880, IEEE Access, Piscataway, N.J., C1
F Jauro, H Chiroma, A Gital, M Almutairi, S Abdulhamid, J Abawajy
(2020), Vol. 96, pp. 1-28, Applied Soft Computing Journal, Amsterdam, The Netherlands, C1
Data-intensive task scheduling for heterogeneous big data analytics in IoT system
X Li, L Wang, J Abawajy, X Qin, G Pau, I You
(2020), Vol. 13, Energies, C1
Evolution of dark web threat analysis and detection: A systematic approach
S Nazah, S Huda, J Abawajy, M Hassan
(2020), Vol. 8, pp. 171796-171819, IEEE Access, C1
Mohammad Shojafar, Claudia Canali, Riccardo Lancellotti, Jemal Abawajy
(2020), Vol. 8, pp. 1162-1175, IEEE transactions on cloud computing, Piscataway, N.J., C1
An Energy Aware Task Scheduling Model Using Ant-Mating Optimization in Fog Computing Environment
Sara Ghanavati, Jemal Abawajy, Davood Izadi
(2020), pp. 1-10, IEEE Transactions on Services Computing, Piscataway, N.J., C1
BDSP in the cloud: scheduling and load balancing utlizing SDN and CEP
A Al-Mansoori, J Abawajy, M Chowdhury
(2020), pp. 827-835, CCGRID 2020 : Proceedings of the 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, Melbourne, Vic., E1
Yawn based driver fatigue level prediction
H Kassem, M Chowdhury, J Abawajy, A Al-Sudani
(2020), pp. 372-382, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1
Utility-aware graph dimensionality reduction approach
L Al Omairi, J Abawajy, M Chowdhury
(2020), pp. 327-333, CATA 2020 : Proceedings of 35th International Conference on Computers and Their Applications, Online, E1
Accuracy analysis transliteration Balinese script-to-Latin text using hexadecimal labeling method
A Aranta, D Witarsyah, S Murpratiwi, J Abawajy
(2020), pp. 1-6, ICADEIS 2020 : Proceedings of the 2020 International Conference on Advancement in Data Science, E-Learning and Information Systems, Online from Bandung, Indonesia, E1
Analysis of energy consumption model in cloud computing environments
Z Zhou, J Abawajy, F Li
(2019), pp. 195-215, Advances on computational intelligence in energy, Cham, Switzerland, B1
Fuzzy logic approach to repair coverage holes in internet of things monitoring applications
B Khalifa, A Khedr, Z Aghbari, J Abawajy
(2019), Vol. 9, pp. 227-235, IET Wireless Sensor Systems, C1
S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan
(2019), Vol. 101, pp. 1247-1258, Future Generation Computer Systems, C1
Energy efficient multipath routing algorithm for wireless multimedia sensor network
A Genta, D K Lobiyal, J Abawajy
(2019), Vol. 19, Sensors, Basel, Switzerland, C1
Workflow scheduling in distributed systems under fuzzy environment
F Xiao, Z Zhang, J Abawajy
(2019), Vol. 37, pp. 5323-5333, Journal of Intelligent and Fuzzy Systems, Amsterdam, The Netherlands, C1
Iterative classifier fusion system for the detection of Android malware
Jemal Abawajy, Andrei Kelarev
(2019), Vol. 5, pp. 600-610, IEEE transactions on big data, Piscataway, N.J., C1
A soft set approach for handling conflict situation on movie selection
Khalid Haruna, Maizatul Ismail, Mohammad Suyanto, Lubna Gabralla, Abdullahi Bichi, Sani Danjuma, Habeebah Adamu Kakudi, Muhammad Haruna, Saber Zerdoumi, Jemal Abawajy, Tutut Herawan
(2019), Vol. 7, pp. 116179-116194, IEEE access, Piscataway, N.J., C1
Tweetluenza: predicting flu trends from twitter data
Balsam Alkouz, Zaher Aghbari, Jemal Abawajy
(2019), Vol. 2, pp. 273-287, Big data mining and analytics, Piscataway, N.J., C1
T Herawan, H Chiroma, J Abawajy
(2019), Cham, Switzerland, A7
M Aziz, J Abawajy, I Haq, I Nasir
(2019), Vol. 520, pp. 529-539, DaEng-2015 : Proceedings of the 2nd International Conference on Data Engineering, Kuala Lumpur, Malaysia, E1
S Sharmeen, S Huda, J Abawajy
(2019), Vol. 322, pp. 1-8, Proceedings of the 2019 International Conference on Smart Power & Internet Energy Systems 25–27 April 2019, Deakin University, Melbourne, Australia, Melbourne, Victoria, E1
Predicting breast cancer risk using subset of genes
T Al-Quraishi, J Abawajy, N Al-Quraishi, A Abdalrada, L Al-Omairi
(2019), pp. 1379-1384, CoDIT 2019 : Proceedings of the 6th International Conference on Control, Decision and Information Technologies, Paris, France, E1
High-dimensionality graph data reduction based on proposing a new algorithm
Lamyaa Al-Omairi, J Abawajy, M Chowdhury, T Al-Quraishi
(2019), Vol. 63, Proceedings of 32nd International Conference on Computer Applications in Industry and Engineering, San Diego, California, E1
Foundation of healthcare cybersecurity
J Abawajy
(2018), Vol. 1, pp. 93-120, Information security: foundations, technologies and applications, London, Eng., B1
Universal and secure object ownership transfer protocol for the Internet of Things
B Ray, J Abawajy, M Chowdhury, A Alelaiwi
(2018), Vol. 78, pp. 838-849, Future Generation Computer Systems, C1
A trajectory privacy-preserving scheme based on query exchange in mobile social networks
S Zhang, G Wang, Q Liu, J Abawajy
(2018), Vol. 22, pp. 6121-6133, Soft computing, Berlin, Germany, C1
Fine-Grained Energy Consumption Model of Servers Based on Task Characteristics in Cloud Data Center
Z Zhou, J Abawajy, F Li, Z Hu, M Chowdhury, A Alelaiwi, K Li
(2018), Vol. 6, pp. 27080-27090, IEEE Access, C1
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, A Alelaiwi, F Li
(2018), Vol. 86, pp. 836-850, Future Generation Computer Systems, C1
A Framework for Software Defect Prediction and Metric Selection
S Huda, S Alyahya, M Mohsin Ali, S Ahmad, J Abawajy, H Al-Dossari, J Yearwood
(2018), Vol. 6, pp. 2844-2858, IEEE Access, C1
A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection
S Huda, R Islam, J Abawajy, J Yearwood, M Hassan, G Fortino
(2018), Vol. 83, pp. 193-207, Future Generation Computer Systems, C1
Malware Threats and Detection for Industrial Mobile-IoT Networks
S Sharmeen, S Huda, J Abawajy, W Ismail, M Hassan
(2018), Vol. 6, pp. 15941-15957, IEEE Access, C1
Clone tag detection in distributed RFID systems
H Kamaludin, H Mahdin, J Abawajy
(2018), Vol. 13, pp. 1-22, PLoS One, San Francisco, Calif., C1
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN
J Abawajy, A Kelarev, X Yi, H Jelinek
(2018), Vol. 160, pp. 85-94, Computer Methods and Programs in Biomedicine, Ireland, C1
Secure multi-attribute one-to-many bilateral negotiation framework for e-commerce
R Al-Jaljouli, J Abawajy, M Hassan, A Alelaiwi
(2018), Vol. 11, pp. 415-429, IEEE transactions on services computing, Piscataway, N.J., C1
Identifying cyber threats to mobile-IoT applications in edge computing paradigm
J Abawajy, S Huda, S Sharmeen, M Hassan, A Almogren
(2018), Vol. 89, pp. 525-538, Future Generation Computer Systems, C1
Z Pooranian, J Abawajy, P Vinod, M Conti
(2018), Vol. 11, Energies, C1
Learning automaton based topology control protocol for extending wireless sensor networks lifetime
M Javadi, H Mostafaei, M Chowdhurry, J Abawajy
(2018), Vol. 122, pp. 128-136, Journal of network and computer applications, Amsterdam, The Netherlands, C1
SDN enabled BDSP in public cloud for resource optimization
A Al-Mansoori, J Abawajy, M Chowdhury
(2018), Wireless networks, New York, N.Y., C1
P Sarkar, M Chowdhury, J Abawajy
(2018), Vol. 580, pp. 315-328, ATCI 2017 : International Conference on Applications and Techniques in Cyber Security and Intelligence, Ningbo, China, E1
Breast cancer recurrence prediction using random forest model
T Al-Quraishi, J Abawajy, M Chowdhury, S Rajasegarar, A Abdalrada
(2018), Vol. 700, pp. 318-329, SCDM 2018 : Concise and informative : Proceedings of the 3rd International Conference on Soft Computing and Data Mining, Johor, Malaysia, E1
A Abdalrada, J Abawajy, M Chowdhury, S Rajasegarar, T Al-Quraishi, H Jelinek
(2018), Vol. 700, pp. 135-146, SCDM 2018 : Proceedings of the 3rd International Conference on Soft Computing and Data Mining 2018, Johor, Malaysia, E1
Privacy threat analysis of mobile social network data publishing
J Abawajy, M Ninggal, Z Aghbari, A Darem, A Alhashmi
(2018), Vol. 239, pp. 60-68, SecureComm 2017: Proceedings of the 13th International Conference on Security and Privacy in Communication Networks, Niagara Falls, Ont., E1
Securing websites against homograph attacks
J Abawajy, A Richard, Z Aghbari
(2018), Vol. 239, pp. 47-59, SecureComm 2017 : Proceedings of the 13th EAI International Conference on Security and Privacy Communication Networks, Niagara Falls, Ont., E1
Data-centric task scheduling algorithm for hybrid tasks in cloud data centers
X Li, L Wang, J Abawajy, X Qin
(2018), Vol. 11335, pp. 630-644, ICA3PP 2018 : Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou, China, E1
Delay-aware resource allocation for data analysis in cloud-edge system
X Li, Z Lian, X Qin, J Abawajy
(2018), pp. 816-823, ISPA 2018 : Proceedings of the 16th IEEE International Symposium on Parallel and Distributed Processing with Applications 2018, Melbourne, Vic., E1
Integration of cloud computing and IoT: opportunities and challenges
S Ghanavati, J Abawajy, D Izadi
(2017), pp. 99-117, The internet of things : foundation for smart cities, eHealth and ubiquitous computing, Abingdon, Eng., B1
N Sabar, J Abawajy, J Yearwood
(2017), Vol. 21, pp. 315-327, IEEE Transactions on Evolutionary Computation, C1
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
E Luo, Q Liu, J Abawajy, G Wang
(2017), Vol. 68, pp. 222-233, Future generation computer systems, Amsterdam, The Netherlands, C1
Multilayer hybrid strategy for phishing email zero-day filtering
M Chowdhury, J Abawajy, A Kelarev, T Hochin
(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1
S Huda, J Abawajy, M Abdollahian, R Islam, J Yearwood
(2017), Vol. 29, Concurrency and Computation: Practice and Experience, C1
Federated internet of things and cloud computing pervasive patient health monitoring system
J Abawajy, M Hassan
(2017), Vol. 55, pp. 48-53, IEEE communications magazine, Piscataway, N.J., C1
Virtual networks dependability assessment framework
B Al-Rubaiey, J Abawajy
(2017), Vol. 10, pp. 3-12, International journal of high performance computing and networking, Olney, Eng., C1
Cloud-assisted IoT-based health status monitoring framework
S Ghanavati, J Abawajy, D Izadi, A Alelaiwi
(2017), Vol. 20, pp. 1843-1853, Cluster computing, New York, N.Y., C1
W Nik, B Zhou, J Abawajy, A Zomaya
(2017), Vol. 7, pp. 723-735, International journal on advanced science, engineering and information technology, [Indonesia], C1
Advances in teaching and learning on Facebook in higher institutions
H Chiroma, N Mohd Shuib, A Abubakar, A Zeki, A Gital, T Herawan, J Abawajy
(2017), Vol. 5, pp. 480-500, IEEE access, Piscataway, N.J., C1
A parallel framework for software defect detection and metric selection on cloud computing
M Ali, S Huda, J Abawajy, S Alyahya, H Al-Dossari, J Yearwood
(2017), Vol. 20, pp. 2267-2281, Cluster Computing, C1
E Baccarelli, P Naranjo, M Scarpiniti, M Shojafar, J Abawajy
(2017), Vol. 5, pp. 9882-9910, IEEE access, Piscataway, N.J., C1
Coverage hole repair in WSNs using cascaded neighbor intervention
B Khalifa, Z Aghbari, A Khedr, J Abawajy
(2017), Vol. 17, pp. 7209-7216, IEEE sensors journal, Piscataway, N.J., C1
An analysis quality of experience and energy consumption for video streaming via mobile devices
M Jofri, M Fudzee, M Ismail, J Abawajy
(2017), Vol. 9, pp. 15-20, Journal of telecommunication, electronic and computer engineering, Melaka, Malaysia, C1
Energy-efficient virtual machine consolidation algorithm in cloud data centers
Z Zhou, Z Hu, J Yu, J Abawajy, M Chowdhury
(2017), Vol. 24, pp. 2331-2341, Journal of Central South University, Hunan Sheng, China, C1-1
Fog over virtualized IoT: new opportunity for context-aware networked applications and a case study
P Naranjo, Z Pooranian, S Shamshirband, J Abawajy, M Conti
(2017), Vol. 7, pp. 1-13, Applied sciences, Basel, Switzerland, C1
A framework to analyze quality of service (QoS) for text-to-speech (TTS) services
M Md Fudzee, M Hassan, H Mahdin, S Kasim, J Abawajy
(2017), Vol. 549, pp. 589-597, SCDM 2016 : Proceedings of the Second International Conference on Soft Computing and Data Mining, Bandung, Indonesia, E1
Text detection in low resolution scene images using convolutional neural network
A Risnumawan, I Sulistijono, J Abawajy
(2017), Vol. 549, pp. 366-375, Recent Advances on Soft Computing and Data Mining : the Second International Conference on Soft Computing and Data Mining (SCDM-2016), Bandung, Indonesia, August 18-20, 2016 Proceedings, Bandung, Indonesia, E1
A multi-protocol security framework to support internet of things
B Ray, M Chowdhury, J Abawajy
(2017), Vol. 198, pp. 257-270, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, Guangzhou, China, E1
Security considerations for wireless carrier agonistic bio-monitoring systems
B Townsend, J Abawajy
(2016), Vol. 164, pp. 725-737, Security and privacy in communication networks : 11th international conference, SecureComm 2015 Dallas, TX, USA, October 26-29, 2015 Revised Selected Papers, Berlin, Germany, B1
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
(2016), Vol. 55, pp. 376-390, Future Generation Computer Systems, C1
Rees semigroups of digraphs for classification of data
J Abawajy, A Kelarev, M Miller, J Ryan
(2016), Vol. 92, pp. 121-134, Semigroup forum, New York, N.Y., C1
Evolutionary optimization: A big data perspective
M Bhattacharya, R Islam, J Abawajy
(2016), Vol. 59, pp. 416-426, Journal of Network and Computer Applications, C1
Vertex re-identification attack using neighbourhood-pair properties
J Abawajy, M Ninggal, T Herawan
(2016), Vol. 28, pp. 2906-2919, Concurrency computation: practice and experience, London, Eng., C1
Filtering redundant data from RFID data streams
H Kamaludin, H Mahdin, J Abawajy
(2016), Vol. 2016, pp. 1-7, Journal of sensors, Cairo, Egypt, C1
An alternative data collection scheduling scheme in wireless sensor networks
D Izadi, S Ghanavati, J Abawajy, T Herawan
(2016), Vol. 98, pp. 1287-1304, Computing, Berlin, Germany, C1
J Abawajy, A Kelarev, M Chowdhury, H Jelinek
(2016), Vol. 20, pp. 408-415, IEEE journal of biomedical and health informatics, Piscataway, N.J., C1
Matrix constructions of centroid sets for classification systems
M Chowdhury, J Abawajy, H Jelinek, A Kelarev, J Ryan
(2016), Vol. 30, pp. 2397-2403, Filomat, C1
Secure Object Tracking Protocol for the Internet of Things
B Ray, M Chowdhury, J Abawajy
(2016), Vol. 3, pp. 544-553, IEEE Internet of Things Journal, C1
Privacy preserving social network data publication
J Abawajy, Ninggal, T Herawan
(2016), Vol. 18, pp. 1974-1997, IEEE communications surveys & tutorials, Piscataway, N.J., C1
An approximation approach to discovering web services for uncertain client's qos preference
M Fudzee, J Abawajy, S Kasim, H Mahdin, A Ramli, M Salamat
(2016), Vol. 11, pp. 14085-14088, ARPN journal of engineering and applied sciences, Islamabad, Pakistan, C1
IncSPADE: an incremental sequential pattern mining algorithm based on SPADE property
O Adam, Z Abdullah, A Ngah, K Mokhtar, W Ahmad, T Herawan, N Ahmad, M Deris, A Hamdan, J Abawajy
(2016), Vol. 387, pp. 81-92, 2015 International Conference on Machine Learning and Signal Processing, Ho Chi Minh City, Vietnam, E1
Prediction of virtual networks substrata failures
B Alrubaiey, J Abawajy
(2016), Vol. LNCS 10065, pp. 423-434, APSCC 2016 : Advances in services computing : Proceedings of the 10th Asia-Pacific Services Computing Conference, Zhangjiajie, China, E1
ECG rate control scheme in pervasive health care monitoring system
S Ghanavati, J Abawajy, D Izadi
(2016), pp. 2265-2270, FUZZ-IEEE 2016 : Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, Vancouver, B.C., E1
An alternative sensor cloud architecture for vital signs monitoring
S Ghanavati, J Abawajy, D Izadi
(2016), pp. 2827-2833, IJCNN 2016: Proceedings of the IEEE International Joint Conference on Neural Networks, Vancouver, Canada, E1
Z Pooranian, N Nikmehr, S Najafi-Ravadanegh, H Mahdin, J Abawajy
(2016), pp. 1-6, SoftCOM 2016 : Proceedings of the 2016 24th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, E1
Failure detection in virtual network environment
B Al-Rubaiey, Jemal Abawajy
(2016), pp. 1-4, ITNAC 2016 : Proceedings of the 2016 26th International Telecommunication Networks and Applications Conference, Dunedin, N.Z., E1
Energy efficient approach in RFID network
H Mahdin, J Abawajy, S Yaacob
(2016), Vol. 160, pp. 1-7, IRIS 2016 : Innovating technology for a sustainable future : Proceedings of the International Engineering Research and Innovation Symposium 2016, Melaka, Malaysia, E1-1
Reliability-aware distributed computing scheduling policy
J Abawajy, M Hassan
(2015), Vol. 9532, pp. 627-632, Algorithms and architectures for parallel processing : ICA3PP international workshops and symposiums, Zhangjiajie, China, November 18-20, 2015, proceedings, Cham, Switzerland, B1
An efficient meta-heuristic algorithm for grid computing
Z Pooranian, M Shojafar, J Abawajy, A Abraham
(2015), Vol. 30, pp. 413-434, Journal of combinatorial optimization, Berlin, Germany, C1
Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions
S Bansal, J Abawajy
(2015), Vol. 15, pp. 649-665, Wireless communications and mobile computing, London, Eng., C1
Dynamic path determination policy for distributed multimedia content adaptation
J Abawajy, F Fudzee
(2015), Vol. 74, pp. 8325-8341, Multimedia tools and applications, Berlin, Germany, C1
Multimedia content adaptation service discovery mechanism
J Abawajy, F Fudzee, M Deris
(2015), Vol. 74, pp. 8365-8378, Multimedia tools and applications, Berlin, Germany, C1
An efficient and distributed file search in unstructured peer-to-peer networks
M Shojafar, J Abawajy, Z Delkhah, A Ahmadi, Z Pooranian, A Abraham
(2015), Vol. 8, pp. 120-136, Peer-to-peer networking and applications, New York, N.Y., C1
An alternative node deployment scheme for WSNs
D Izadi, J Abawajy, S Ghanavati
(2015), Vol. 15, pp. 667-675, IEEE Sensors journal, Champaign, III., C1
Policy-based SQLIA detection and prevention approach for RFID systems
J Abawajy, H Fernando
(2015), Vol. 38, pp. 64-71, Computer standards and interfaces, Amsterdam, The Netherlands, C1
Comprehensive analysis of big data variety landscape
J Abawajy
(2015), Vol. 30, pp. 5-14, International journal of parallel, emergent and distributed systems, Bingley, U. K., C1
A data fusion method in wireless sensor networks
D Izadi, J Abawajy, S Ghanavati, T Herawan
(2015), Vol. 15, pp. 2964-2979, Sensors, Basel, Switzerland, C1
An alternative clustering scheme in WSN
D Izadi, J Abawajy, S Ghanavati
(2015), Vol. 15, pp. 4148-4155, IEEE sensors journal, Champaign, Ill., C1
Utility-aware social network graph anonymization
M Ninggal, J Abawajy
(2015), Vol. 56, pp. 137-148, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Distances of centroid sets in a graph-based construction for information security applications
J Abawajy, A Kelarev, M Miller, J Ryan
(2015), Vol. 9, pp. 127-137, Mathematics in computer science, Berlin, Germany, C1
Service level agreement management framework for utility-oriented computing platforms
J Abawajy, M Fudzee, M Hassan, M Alrubaian
(2015), Vol. 71, pp. 4287-4303, Journal of supercomputing, Berlin, Germany, C1
Mitigating malicious feedback attacks in trust management systems
S Chong, J Abawajy
(2015), Vol. 3, pp. 1-18, International journal of trust management in computing and communications, Milton Keynes, Eng., C1
Ideal bases in constructions defined by directed graphs
J Abawajy, A Kelarev, J Ryan
(2015), Vol. 3, pp. 35-49, Electronic journal of graph theory and applications, Jawa Barat, Indonesia, C1
H Jelinek, J Abawajy, J Cornforth, A Kowalczyk, M Negnevitsky, M Chowdhury, R Krones, A Kelarev
(2015), Vol. 2, pp. 396-409, AIMS medical science, Springfield, Mo., C1
J Abawajy, S Mukherjea, S Thampi, A Ruiz-Martínez
(2015), Cham, Switzerland, A7-1
Big data in complex systems : challenges and opportunities
A-E Hassanien, A Azar, V Snasel, J Kacprzyk, J Abawajy
(2015), Cham, Switzerland, A7-1
Secure object tracking protocol for networked RFID systems
B Ray, M Chowdhury, J Abawajy, M Jesmin
(2015), pp. 1-7, SNPD 2015: Proceedings of the IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Takamatsu, Japan, E1
Workflow scheduling on distributed systems
M Abdul Aziz, J Abawajy, R Islam, T Herawan,
(2015), pp. 683-689, ICIEA 2015: Proceedings of the 10th IEEE conference on Industrial Electronics and Applications, Auckland, New Zealand, E1
Layered Workflow Scheduling Algorithm
M Abdul Aziz, J Abawajy, T Herawan
(2015), FUZZ-IEEE 2015: Proceedings of the IEEE International Conference on Fuzzy Systems, Istanbul, TURKEY, E1
A congestion control scheme based on fuzzy logic in wireless body area networks
S Ghanavati, J Abawajy, D Izadi
(2015), pp. 235-242, NCA 2015: Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, Cambridge, Ma., E1
A framework for implementing asynchronous replication scheme in utility-based computing environment
W Nik, B Zhou, A Zomaya, J Abawajy
(2015), pp. 183-190, CCBD 2015: Proceedings of the Cloud Computing and Big Data 2015 International Conference, Shanghai, China, E1
Adaptive energy-efficient qos-aware scheduling algorithm for TCP/IP mobile cloud
M Shojafar, N Cordeschi, J Abawajy, E Baccarelli
(2015), pp. 1-6, GLOBECOM 2015: Proceedings of the IEEE Global Communications 2015 Conference, San Diego, Calif., E1
A competitive three-level pruning technique for information security
M Chowdhury, J Abawajy, A Kelarev, K Sakurai
(2014), Vol. 490, pp. 25-32, Communications in Computer and Information Science, Berlin, Germany, B1
Neighbourhood-pair attack in social network data publishing
M Ninggal, J Abawajy
(2014), Vol. 131, pp. 726-731, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Heidelberg, Germany, B1
An accelerated particle swarm optimization based levenberg marquardt back propagation algorithm
N Nawi, A Khan, M Rehman, M Aziz, T Herawan, J Abawajy
(2014), Vol. 8835, pp. 245-253, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1
Neural network training by hybrid accelerated cuckoo particle swarm optimization algorithm
N Nawi, A Khan, M Rehman, M Aziz, J Abawajy, T Herawan
(2014), Vol. 8835, pp. 237-244, Neural Information Processing, B1
Taxonomy of contention management in interconnected distributed systems
M Salehi, J Abawajy, R Buyya
(2014), Computing Handbook: Computer Science and Software Engineering, New York, USA, B1
H Shah, T Herawan, R Ghazali, R Naseem, M Abdul Aziz, J Abawajy
(2014), Vol. 8834, pp. 559-569, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1
Trends in crime toolkit development
A Khraisat, M Hobbs, A Alazab, J Abawajy, A Ahmad
(2014), Network security technologies: design and applications, Hershey PA, USA, B1
User preference of cyber security awareness delivery methods
J Abawajy
(2014), Vol. 33, pp. 237-248, Behaviour and information technology, Oxford, England, C1
The parameter reduction of the interval-valued fuzzy soft sets and its related algorithms
X Ma, H Qin, N Sulaiman, T Herawan, J Abawajy
(2014), Vol. 22, pp. 57-71, IEEE transactions on fuzzy systems, Piscataway, N. J., C1
Iterative construction of hierarchical classifiers for phishing website detection
J Abawajy, G Beliakov, A Kelarev, M Chowdhury
(2014), Vol. 9, pp. 2089-2098, Journal of Networks, Oulu, Finland, C1
Scalable RFID security framework and protocol supporting Internet of Things
B Ray, J Abawajy, M Chowdhury
(2014), Vol. 67, pp. 89-103, Computer Networks, Amsterdam, The Netherlands, C1
S Javanmardi, M Shojafar, S Shariatmadari, J Abawajy, M Singhal
(2014), Vol. 69, pp. 955-975, The journal of supercomputing, New York, NY, C1
Incidence semirings of graphs and visible bases
J Abawajy, A Kelarev, M Miller, J Ryan
(2014), Vol. 89, pp. 451-459, Bulletin of the Australian Mathematical Society, Cambridge, England, C1
An approach for profiling phishing activities
I Hamid, J Abawajy
(2014), Vol. 45, pp. 27-41, Computers and security, Kidlington, England, C1
Sensor grid middleware metamodeling and analysis
S Chandrasekaran, E Choi, J Abawajy, R Natarajan
(2014), Vol. 2014, pp. 1-12, International Journal of Distributed Sensor Networks, New York, NY, C1
An adaptive path hiding technique for participatory sensing networks
R Rahman, R Islam, I Altas, A Mahmood, J Abawajy
(2014), Future Generation Computer Systems, C1-1
Large iterative multitier ensemble classifiers for security of big data
J Abawajy, A Kelarev, M Chowdhury
(2014), Vol. 2, pp. 352-363, IEEE transactions on emerging topics in computing, New York, NY, C1
Data replication approach with consistency guarantee for data grid
J Abawajy, M Deris
(2014), Vol. 63, pp. 2975-2987, IEEE Transactions on Computers, Piscataway, NJ, C1
A Alazab, M Hobbs, J Abawajy, A Khraisat, M Alazab, A Al Azab
(2014), Vol. 22, pp. 431-449, Information Management and Computer Security, Bingley, Eng., C1
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, R Broadhurst
(2014), Vol. 9, pp. 2878-2891, Journal of networks, Oulu, Finland, C1
Securing a smart anti-counterfeit web application
B Chowdhury, M Chowdhury, J Abawajy
(2014), Vol. 9, pp. 2925-2933, Journal of networks, Oulu, Finland, C1
Automatic generation of meta classifiers with large levels for distributed computing and networking
Jemal Abawajy, Andrei Kelarev, Morshed Chowdhury
(2014), Vol. 9, pp. 2259-2268, Journal of Networks, Oulu, Finland, C1
Decision Trees and Multi-level Ensemble Classifiers for Neurological Diagnostics
H Jelinek, J Abawajy, A Kelarev, M Chowdhury, A Stranieri
(2014), Vol. 1, pp. 1-12, Australian Journal of Medical Science, Milton, QLD, C1
An SLA evaluator for multimedia content adaptation services
M Fudzee, J Mohamed, J Abawajy, S Kasim, M Ismail
(2014), pp. 1-4, ICISA 2014 : Proceedings of the 5th International Conference on Information Science and Applications, Seoul, Korea, E1
PUF-based secure checker protocol for Networked RFID Systems
B Ray, M Chowdhury, J Abawajy
(2014), pp. 78-83, ICOS 2014: Proceedings on the 2014 IEEE Conference on Open Systems, Subang Jaya, Malaysia, E1
Analysis of Insiders Attack Mitigation Strategies
Zulkefli Yusop, Jemal Abawajy
(2014), Vol. 129, pp. 581-591, 2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, MALAYSIA, E1-1
Steno cipher to provide data confidentiality and tampered data recovery for RFID tag
B Ray, M Chowdhury, J Abawajy
(2013), Vol. 443, pp. 37-51, Software engineering, artificial intelligence, networking and parallel/distributed computing 2012, Berlin, Germany, B1
Malware detection and prevention in RFID systems
H Fernando, J Abawajy
(2013), pp. 143-166, Internet of things and inter-cooperative computational technologies for collective intelligence, Heidelberg, Germany, B1
IPMA : Indirect patterns mining algorithm
T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy
(2013), pp. 187-196, Advanced methods for computational collective intelligence, Berlin, Germany, B1
Web malware that targets web applications
A Alazab, J Abawajy, M Hobbs
(2013), pp. 248-264, Social network engineering for secure web data and services, Hershey, Pa., B1
Developing an intelligent intrusion detection and prevention system against web application malware
A Alazab, M Hobbs, J Abawajy, A Khraisat
(2013), pp. 177-184, Advances in security of information and communication networks. First International Conference , SecNet 2013 Cairo, Egypt, September Proceedings, Berlin, Germany, B1
Securing a web-based anti-counterfeit RFID system
B Chowdhury, M Chowdhury, J Abawajy
(2013), pp. 342-355, Security and privacy in communication networks, Cham, Switzerland, B1
Security concerns and remedy in a cloud based e-learning system
M Masud, M Islam, J Abawajy
(2013), pp. 356-366, Security and privacy in communication networks, Berlin, Germany, B1
A framework for scalable distributed provenance storage system
J Abawajy, S Jami, Z Shaikh, S Hammad
(2013), Vol. 35, pp. 179-186, Computer standards & interfaces, Amsterdam, The Netherlands, C1
SQLIA detection and prevention approach for RFID systems
J Abawajy
(2013), Vol. 86, pp. 751-758, Journal of systems and software, Amsterdam, The Netherlands, C1
A Strainieri, J Abawajy, A Kelarev, S Huda, M Chowdhury, H Jelinek
(2013), Vol. 58, pp. 185-193, Artificial intelligence in medicine, Amsterdam, The Netherlands, C1
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
(2013), Vol. 36, pp. 324-335, Journal of network and computer applications, Amsterdam, The Netherlands, C1
Fuzzy logic optimized wireless sensor network routing protocol
D Izadi, J Abawajy, S Ghanavati
(2013), Vol. 19, pp. 115-128, Journal of high speed networks, Amsterdam, The Netherlands, C1
Intelligent battery energy management and control for vehicle-to-grid via cloud computing network
H Khayyam, J Abawajy, B Javadi, A Goscinski, A Stojcevski, A Bab-Hadiashar
(2013), Vol. 111, pp. 971-981, Applied energy, Amsterdam, The Netherlands, C1
Using feature selection and classification scheme for automating phishing email detection
I Hamid, J Abawajy, T Kim
(2013), Vol. 22, pp. 61-70, Studies in informatics and control, Bucharest, Romania, C1
Malware detection and prevention system based on multi-stage rules
A Alazab, M Hobbs, J Abawajy, A Khraisat
(2013), Vol. 7, pp. 29-43, International journal of information security and privacy, Hershey, Pa., C1
A data mining application of the incidence semirings
J Abawajy, A Kelarev, J Yearwood, C Turville
(2013), Vol. 39, pp. 1083-1093, Houston journal of mathematics, Houston, Tx., C1
An efficient scheduling method for grid systems based on a hierarchical stochastic petri net
M Shojafar, Z Pooranian, J Abawajy, M Meybodi
(2013), Vol. 7, pp. 44-52, Journal of computing science and engineering, Seoul, Korea, C1
Centroid sets with largest weight in Munn semirings for data mining applications
J Abawajy, A Kelarev, J Zeleznikow
(2013), Vol. 87, pp. 617-626, Semigroup forum, Berlin, Germany, C1
Multistage approach for clustering and classification of ECG data
J Abawajy, A Kelarev, M Chowdhury
(2013), Vol. 112, pp. 720-730, Computer methods and programs in biomedicine, Amsterdam, The Netherlands, C1
J Abawajy, A Kelarev, M Chowdhury
(2013), Vol. 1, pp. 125-147, Electronic journal of graph theory and applications, [Indonesia], C1
Empirical investigation of decision tree ensembles for monitoring cardiac complications of diabetes
A Kelarev, J Abawajy, A Stranieri, H Jelinek
(2013), Vol. 9, pp. 1-18, International journal of data warehousing and mining, Hershey, PA, C1
Predicting cardiac autonomic neuropathy category for diabetic data with missing values
J Abawajy, A Kelarev, M Chowdhury, A Stranieri, H Jelinek
(2013), Vol. 43, pp. 1328-1333, Computers in biology and medicine, Amsterdam, The Netherlands, C1
Critical analysis and comparative study of security for networked RFID systems
B Ray, M Chowdhury, J Abawajy
(2013), pp. 197-202, SNPD 2013 : Proceedings of the 14th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computin, Honolulu, Hawaii, E1
A fuzzy technique to control congestion in WSN
S Ghanavati, J Abawajy, D Izadi
(2013), pp. 1806-1810, IJCNN 2013 : Proceedings of the International Joint Conference on Neural Networks, Dallas, Texas, E1
A new energy efficient cluster-head and backup selection scheme in WSN
D Izadi, J Abawajy, S Ghanavati
(2013), pp. 408-415, IRI 2013 : Proceedings of the 14th IEEE International Conference on Information Reuse and Integration, San Francisco, California, E1
Profiling phishing email based on clustering approach
I Hamid, J Abawajy
(2013), pp. 628-635, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Vic, E1
Preserving utility in social network graph anonymization
M Ninggal, J Abawajy
(2013), pp. 226-232, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1
The challenges of cloud technology adoption in E-government
M Aziz, J Abawajy, M Chowdhury
(2013), pp. 470-474, 2013 International Conference on Advanced Computer Science Applications and Technologies, Kuching, Malaysia, E1
An approach to faulty reader detection in RFID reader network
H Mahdin, J Abawajy
(2012), pp. 70-84, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1
A security framework for networked RFID
H Fernando, J Abawajy
(2012), pp. 85-114, Internet and distributed computing advancements : theoretical frameworks and practical applications, Hershey, Pa., B1
Mobile agents security protocols
R Al-jaljouli, J Abawajy
(2012), pp. 270-305, Mobile computing techniques in emerging markets : systems, applications and services, Hershey, Pa., B1
Quality control of sensor network data
D Izadi, J Abawajy, S Ghanavati
(2012), pp. 467-480, Advances in automation and robotics, vol.1, selected papers from the 2011 International Conference on Automation and Robotics (ICAR 2011), Dubai, December 1-2, 2011, Berlin, Germany, B1
Security framework for mobile agents-based applications
R Al-jaljouli, J Abawajy
(2012), pp. 242-269, Mobile computing techniques in emerging markets : systems, applications and services, Hershey Pa., B1
Multi-input-multi-output antennas for radio frequency identification systems
S Bansal, J Abawajy
(2012), pp. 96-127, Chipless and conventional radio frequency identification : systems for ubiquitous tagging, United States, B1
Management of service level agreement for service-oriented content adaptation platform
M Fudzee, J Abawajy
(2012), pp. 21-42, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1
Strategies for agent-based negotiation in e-trade
R Al-Jaljouli, J Abawajy
(2012), pp. 43-65, Network and traffic engineering in emerging distributed computing applications, Hershey, Pa., B1
An efficient approach based on trust and reputation for secured selection of grid resources
V Vijayakumar, B Wahida, J Abawajy
(2012), Vol. 27, pp. 1-17, International journal of parallel, emergent and distributed systems, Essex, England, C1
A Beloglazov, J Abawajy, R Buyya
(2012), Vol. 28, pp. 755-768, Future generation computer systems, Amsterdam, Netherlands, C1
Intelligent energy management control of vehicle air conditioning system coupled with engine
H Khayyam, J Abawajy, R Jazar
(2012), Vol. 48, pp. 211-224, Applied thermal engineering, Oxford, England, C1
Failure-aware resource provisioning for hybrid cloud infrastructure
B Javadi, J Abawajy, R Buyya
(2012), Vol. 72, pp. 1318-1331, Journal of parallel and distributed computing, Maryland Heights, Mo., C1
Analysis of asynchronous online discussion forums for collaborative learning
J Abawajy
(2012), Vol. 1, pp. 11-21, International journal of education and learning, Sandy Bay, Tas., C1
Classification systems based on combinatorial semigroups
J Abawajy, A Kelarev
(2012), Vol. 86, pp. 603-612, Semigroup forum, New York, N.Y., C1
A Grobner-Shirshov Algorithm for Applications in Internet Security
A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan
(2012), Vol. 36, pp. 87-100, SOUTHEAST ASIAN BULLETIN OF MATHEMATICS, C1-1
E Bellucci, S Venkatraman, N Muecke, A Stranieri, J Abawajy
(2012), pp. 3-12, HIKM 2012 : Proceedings of the Fifth Australasian Workshop on Health Informatics and Knowledge Management, Melbourne, Vic., E1
Virtual property theft detection framework
N Patterson, M Hobbs, J Abawajy
(2012), pp. 177-184, TRUSTCOM 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
(2012), pp. 296-301, ISCIT 2012 : Proceedings of the 12th IEEE International Symposium on Communications and Information Technologies, Gold Coast, Qld, E1
Detecting and mitigating HX-DoS attacks against cloud web services
A Chonka, J Abawajy
(2012), pp. 429-434, NBIS 2012 : Proceedings of the 2012 International Conference on Network-Based Information Systems, Melbourne, Victoria, E1
Performance evaluation of multi-tier ensemble classifiers for phishing websites
J Abawajy, G Beliakov, A Kelarev, J Yearwood
(2012), pp. 11-16, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1
J Abawajy, A Kelarev, A Stranieri, H Jelinek
(2012), pp. 1-11, CIHealth 2012- Proceedings of the Workshop on New Trends of Computational Intelligence in Health Applciations, Sydney, N.S.W., E1
Secure mobile RFID ownership transfer protocol to cover all transfer scenarios
B Ray, M Chowdhury, J Abawajy
(2012), pp. 1185-1192, ICCCT 2012 : Proceeding of the 7th International Conference on Computing and Convergence Technology, Seoul, Korea, E1
E-commerce trust management system reliability
S Chong, J Abawajy
(2012), pp. 13-18, ISSDM 2012 : Proceedings of the 6th International Conference on New Trends in Information Science, Service Science and Data Mining, Taipei, Taiwan, E1
EFP-M2 : efficient model for mining frequent patterns in transactional database
T Herawan, A Noraziah, Z Abdullah, M Deris, J Abawajy
(2012), pp. 29-38, ICCCI 2012 : Technologies and applications : Proceedings of the 4th International Conference on Computational Collective Intelligence, Ho Chi Minh City, Vietnam, November 28-30, 2012 : proceedings, Ho Chi Minh City, Vietnam, E1
A multi-tier ensemble construction of classifiers for phishing email detection and filtering
J Abawajy, A Kelarev
(2012), pp. 48-56, CSS 2012 : Cyberspace safety and security : 4th International Symposium, Melbourne, Australia, December 12-13, 2012 Proceedings, Melbourne, Victoria, E1
Hybrid cloud resource provisioning policy in the presence of resource failures
B Javadi, J Abawajy, R Sinnott
(2012), pp. 10-17, CloudCom 2012 : Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science, Taipei, Taiwan, E1
A Kelarev, A Stranieri, J Yearwood, J Abawajy, H Jelinek
(2012), pp. 93-101, AusDM 2012 : Proceedings of the 10th Australasian Data Mining Conference, Sydney, N.S.W., E1
Securing RFID systems from SQLIA
H Fernando, J Abawajy
(2011), pp. 245-254, Algorithms and architectures for parallel processing, Berlin, Germany, B1
A protocol for discovering content adaptation services
M Fudzee, J Abawajy
(2011), pp. 235-244, Algorithms and architectures for parallel processing, Berlin, Germany, B1
Hybrid feature selection for phishing email detection
I Hamid, J Abawajy
(2011), pp. 266-275, Algorithms and architectures for parallel processing, Berlin, Germany, B1
QoS-based adaptation service selection broker
M Fudzee, J Abawajy
(2011), Vol. 27, pp. 256-264, Future generation computer systems, Amsterdam, Netherlands, C1
SMS-based medical diagnostic telemetry data transmission protocol for medical sensors
B Townsend, J Abawajy, T Kim
(2011), Vol. 11, pp. 4231-4243, Sensors, Basel, Switzerland, C1
Intelligent energy management control of vehicle air conditioning via look-ahead system
H Khayyam, S Nahavandi, E Hu, A Kouzani, A Chonka, J Abawajy, V Marano, S Davis
(2011), Vol. 31, pp. 3147-3160, Applied thermal engineering, Oxford, U. K., C1
Optimization and matrix constructions for classification of data
A Kelarev, J Yearwood, P Vamplew, J Abawajy, M Chowdhury
(2011), Vol. 41, pp. 65-73, New Zealand journal of mathematics, Auckland, New Zealand, C1
An approach for removing redundant data from RFID data streams
H Mahdin, J Abawajy
(2011), Vol. 11, pp. 9863-9877, Sensors, Lausanne, Switzerland, C1
A Grobner-Shirshov algorithm for applications in internet security
A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan
(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1
Efficient resource selection algorithm for enterprise grid systems
W Nik, B Zhou, A Zomaya, J Abawajy
(2011), pp. 57-62, ISPA 2011 : Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, Busan, Korea, E1
Establishing trust in hybrid cloud computing environments
J Abawajy
(2011), pp. 118-125, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1
Mutual authentication protocol for networked RFID systems
H Fernando, J Abawajy
(2011), pp. 417-424, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1
Phishing email feature selection approach
I Hamid, J Abawajy
(2011), pp. 916-921, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1
Prevention of information harvesting in a cloud services environment
L Batten, J Abawajy, R Doss
(2011), pp. 66-72, CLOSER 2011 : Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, The Netherlands, E1
Attack vector analysis and privacy-preserving social network data publishing
M Ninggal, J Abawajy
(2011), pp. 847-852, TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, Changsha, China, E1
Engaging and effective asynchronous online discussion forums
J Abawajy, T Kim
(2011), pp. 695-705, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1
Online learning environment : taxonomy of asynchronous online discussion forums
J Abawajy, T Kim
(2011), pp. 706-714, Software engineering, business continuity, and education international conferences ASEA, DRBC and EL 2011, held as part of the Future Generation Information Technology Conference, FGIT 2011, in conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011, proceedings, Jeju Island, Korea, E1
Service quality assessment in provision of library services
M Ahmad, J Abawajy, T Kim
(2011), pp. 83-92, UNESST 2011 : Proceedings of the 2011 International Conference on U- and E-service, Science and Technology, Jeju Island, Korea, E1
Privacy threat analysis of social network data
M Ninggal, J Abawajy
(2011), pp. 165-174, ICA3PP 2011 : Proceedings of the 11th Algorithms and Architectures for Parallel Processing International Conference, Melbourne, Victoria, E1
Wi-Fi security : wireless with confidence
L Jacob, D Hutchinson, J Abawajy
(2011), pp. 88-96, ASIC 2011 : Proceedings of the 4th Australian Security and Intelligence Conference, Perth, W. A., E1
Web application protection against SQL injection attack
A Alazab, M Alazab, J Abawajy, M Hobbs
(2011), pp. 1-7, ICITA 2011 : Proceedings of the 7th International Conference on Information Technology and Applications ICITA 2011, Sydney, N.S.W., E1
Risk-based trust management for e-commerce
S Chong, J Abawajy
(2010), pp. 332-351, Trust modeling and management in digital environments : from social concept to system development, Hershey, Pa., USA, B1
Matrices representation of multi soft-sets and its application
T Herawan, M Deris, J Abawajy
(2010), pp. 201-214, Computational science and its applications - ICCSA 2010, Berlin, Germany, B1
Request-driven cross-media content adaptation technique
M Fudzee, J Abawajy
(2010), pp. 91-113, Developing advanced web services through P2P computing and autonomous agents : trends and innovations, Hershey, Pa., USA, B1
Performance analysis of cyber security awareness delivery methods
J Abawajy, T Kim
(2010), pp. 142-148, Security technology, disaster recovery and business continuity, Berlin, Germany, B1
An approach to filtering duplicate RFID data streams
H Mahdin, J Abawajy
(2010), pp. 125-133, U- and E-service, science and technology, Berlin, Germany, B1
A privacy preserving service broker architecture for data sharing
F Al-Neyadi, J Abawajy
(2010), pp. 450-458, Future generation information technology, Berlin, Germany, B1
A rough set approach for selecting clustering attribute
T Herawan, M Deris, J Abawajy
(2010), Vol. 23, pp. 220-231, Knowledge-based systems, Amsterdam, The Netherlands, C1
Internet security applications of the Munn rings
A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan
(2010), Vol. 81, pp. 162-171, Semigroup forum, New York N.Y., C1
Performance analysis of receive diversity in wireless sensor networks over GBSBE models
S Goel, J Abawajy, T Kim
(2010), Vol. 10, pp. 11021-11037, Sensors, Basel, Switzerland, C1
Multi-criteria content adaptation service selection broker
M Fudzee, J Abawajy, M Deris
(2010), pp. 721-726, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing : proceedings : Melbourne, Australia, 17-20 May, 2010, Melbourne, Vic., E1
An optimal transportation routing approach using GIS-based dynamic traffic flows
A Alazab, S Venkatraman, J Abawajy, M Alazab
(2010), pp. 172-178, ICMTA 2010 : Proceedings of the International Conference on Management Technology and Applications, Singapore, E1
R Buyya, A Beloglazov, J Abawajy
(2010), pp. 6-17, PDPTA 2010 : Proceedings of the 2010 International Conference on Parallel and Distributed Processing Techniques and Applications, Las Vegas, Nev., E1
Novel mechanism for evaluating feedback in the grid environment on resource allocation
V Vijayakumar, R Wahida Banu, J Abawajy
(2010), pp. 11-17, GCA 2010 : Proceedings of the 2010 International Conference on Grid Computing and Applications, Las Vegas, Nev., E1
Negotiation strategy for mobile agent-based e-negotiation
R Al-Jaljouli, J Abawajy
(2010), pp. 128-135, PRIMA 2010 : Proceedings of the 13th International conference on principles and practice of multi-agent systems, Kolkatta, India, E1
A hybrid mutual authentication protocol for RFID
H Fernando, J Abawajy
(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Sydney, NSW, E1
Service discovery for service-oriented content adaptation
M Fudzee, J Abawajy, M Deris
(2010), pp. 1-2, MobiQuitous 2010 : Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services, Sydney, NSW, E1
Agents based e-commerce and securing exchanged information
R Al-Jaljouli, J Abawajy
(2009), pp. 383-404, Pervasive computing : innovations in intelligent multimedia and applications, Dordrecht, Germany, B1
Context-based e-health system access control mechanism
F Al-Neyadi, J Abawajy
(2009), pp. 68-77, Advances in information security and its application, Berlin, Germany, B1
Adaptive hierarchical scheduling policy for enterprise grid computing systems
J Abawajy
(2009), Vol. 32, pp. 770-779, Journal of network and computer applications, London, England, C1
An agent architecture for managing data resources in a grid environment
M Pérez, A Sánchez, J Abawajy, V Robles, J Peña
(2009), Vol. 25, pp. 747-755, Future generation computer systems, Amsterdam, The Netherlands, C1
An efficient adaptive scheduling policy for high-performance computing
J Abawajy
(2009), Vol. 25, pp. 364-370, Future generation computer systems, Amsterdam, The Netherlands, C1
Design and delivery of undergraduate IT security management course
J Abawajy
(2009), Vol. 5576, pp. 402-411, Lecture notes in computer science, Heidelberg, Germany, C1
Managing data using neighbour replication on a triangular-grid structure
M Deris, J Abawajy, D Taniar, A Mamat
(2009), Vol. 6, pp. 56-65, International journal of high performance computing and networking, Olney, England, C1
Multi-cluster computing interconnection network performance modeling and analysis
B Javadi, M Akbari, J Abawajy
(2009), Vol. 25, pp. 737-746, Future generation computer systems, Amsterdam, The Netherlands, C1
Human-computer interaction in ubiquitous computing environments
J Abawajy
(2009), Vol. 5, pp. 31-77, International journal of pervasive computing and communications, Bingley, England, C1
A layered security approach for cloud computing infrastructure
M Yildiz, J Abawajy, T Ercan, A Bernoth
(2009), pp. 763-767, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1
An approach to filtering RFID data streams
H Mahdin, J Abawajy
(2009), pp. 742-746, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1
Determining service trustworthiness in inter loud computing environments
J Abawajy
(2009), pp. 784-788, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1
Enhancing RFID tag resistance against cloning attack
J Abawajy
(2009), pp. 18-23, NSS 2009 : Proceedings of the third International Conference on Network and System Security, Gold Coast, Queensland, E1
Information provenance for open distributed collaborative system
D Jami, J Abawajy, Z Shaikh
(2009), pp. 737-741, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1
Multi-tier phishing email classification with an impact of classifier rescheduling
M Islam, J Abawajy, M Warren
(2009), pp. 789-793, ISPAN 2009 : Proceedings of the 2009 10th International Symposium on the Pervasive Systems, Algorithms and Networks, Kaohsiung, Korea, E1
A RFID architecture framework for global supply chain applications
H Fernando, J Abawajy
(2009), pp. 313-320, iiWAS 2009 : Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, Kuala Lumpur, Malaysia, E1-1
An efficient replicated data access approach for large-scale distributed systems
M Deris, J Abawajy, A Mamat
(2008), Vol. 24, pp. 1-9, Future generation computer systems, Amsterdam, Netherlands, C1
Security and privacy threats to volunteer computing
J Abawajy
(2008), Vol. 4, pp. 245-255, International journal of critical infrastructures, Oxford, England, C1
Performance modeling and analysis of heterogeneous meta-computing systems interconnection networks
B Javadia, J Abawajy, M Akbari
(2008), Vol. 34, pp. 488-502, Computers & electrical engineering, Oxford, England, C1
A comprehensive analytical model of interconnection networks in large-scale cluster systems
B Javadi, J Abawajy, M Akbari
(2008), Vol. 20, pp. 75-97, Concurrency and computation : practice & experience, Malden, Mass., C1
An online credential management service for InterGrid computing
J Abawajy
(2008), pp. 101-106, APSCC 2008: Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, Yilan, Taiwan, E1
Investigation of stakeholders commitment to information security awaremess programs
J Abawajy, K Thatcher, T Kim
(2008), pp. 472-476, Proceedings of the 2nd International Conference on Information Security and Assurance : ISA 2008, Hanwha Resort Haeundae, Busan, Korea, E1
Performance of smart antennas with receive diversity in wireless sensor networks
S Goel, J Abawajy
(2008), pp. 272-278, Proceedings of ICSCN 2008 : International Conference on Signal Processing Communications and Networking, Chennai, India, E1
A classification for content adaptation system
M Md Fudzee, J Abawajy
(2008), pp. 426-429, The 10th International Conference on Information Integration and Web-based Applications & Services : iiWAS 2008, Linz, Austria, E1
Analytical communication networks model for enterprise grid computing
B Javadi, M Akbari, J Abawajy
(2007), Vol. 23, pp. 737-747, Future generation computer systems, Amsterdam, The Netherlands, C1
Analytical modeling of interconnection networks in heterogeneous multi-cluster systems
B Javadi, J Abawajy, M Akbari
(2007), Vol. 40, pp. 29-47, Journal of supercomputing, New York, N.Y., C1
A multilevel trust management framework
S Chong, J Abawajy, R Dew
(2007), pp. 776-781, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007), Melbourne, Australia, E1
Communication network analysis of the enterprise grid systems
B Javadi, J Abawajy, M Akbari, S Nahavandi
(2007), pp. 33-40, Proceedings of the fifth Australasian symposium on ACSW frontiers, Ballarat, Australia, E1
Electronic negotiation and security of information exchanged in e-commerce
R Al-Jaljouli, J Abawajy
(2007), pp. 1-11, Proceedings of the 2007 collecter E-commerce conference : Collecter 2007 - 10th anniversary., Melbourne, Vic., E1
Feedback credibility issues in trust management systems
S Chong, J Abawajy
(2007), pp. 387-391, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007, Seoul, Korea, E1
Sensor node activity scheduling approach
J Abawajy, S Nahavandi, F Al-Neyadi
(2007), pp. 72-77, 2007 International Conference on Multimedia and Ubiquitous Engineering : proceedings : MUE 2007 : 26-28 April, 2007, Seoul, Korea, Seoul, Korea, E1
F Al-Neyadi, J Abawajy, M Ders
(2007), pp. 299-304, Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering, Seoul, Korea, E1
Taxonomy and survey of location management systems
A Rahaman, J Abawajy, M Hobbs
(2007), pp. 369-374, 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-Activity (IWEA 2007) : proceedings, Melbourne, Australia, E1
An authorization policy management framework for dynamic medical data sharing
F Al-Neyadi, J Abawajy
(2007), pp. 313-318, IPC 2007 proceedings : the 2007 International Conference on Intelligent Pervasive Computing, Jeju Island, Korea, E1
An authentication framework for e-health systems
F Al-Nayadi, J Abawajy
(2007), pp. 616-620, ISSPIT 2007 : Proceedings of the 2007 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1
Secure mobile agent-based E-negotiation for on-line trading
R Al-Jaljouli, J Abawajy
(2007), pp. 610-615, ISSPIT 2007 : Proceedings of the 2007 7th IEEE International Symposium on Signal Processing and Information Technology, Cairo, Egypt, E1
Multi-cluster computing interconnection network performance modeling and analysis
Bahman Javadi, Mohammad Akbari, Jemal Abawajy, Sacid Nahavandi
(2007), pp. 86-+, 2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, Mangalore, INDIA, E1-1
A reputation-based grid information service
J Abawajy, A Goscinski
(2006), Vol. 3994, pp. 1015-1022, Lecture notes in computer science, Berlin, Germany, C1
Adaptive parallel I/O scheduling algorithm for multiprogrammed systems
J Abawajy
(2006), Vol. 22, pp. 611-619, Future generation computer systems, Netherlands, C1
A novel data replication and management protocol for mobile computing systems
J Abawajy, M Mat Deris, M Omar
(2006), Vol. 2, pp. 3-19, Mobile information systems, Amsterdam, The Netherlands, C1
Managing data using neighbor replication on triangular-grid structure
A Mamat, M Mat Deris, J Abawajy, S Ismail
(2006), Vol. 3994, pp. 1071-1077, Lecture notes in computer science, Heidelberg, Germany, C1
A performance model for analysis of heterogeneous multi-cluster systems
B Javadi, M Akbari, J Abawajy
(2006), Vol. 32, pp. 831-851, Parallel computing, Amsterdam, Netherlands, C1
Supporting disconnected operations in mobile computing
J Abawajy, M Mat Deris
(2006), pp. 911-918, 4th ACS/IEEE international conference on computer systems and applications, Sharjah, UAE, E1
Multi-cluster computing interconnection network performance modeling and analysis
B Javadi, M Akbari, J Abawajy, S Nahavandi
(2006), pp. 90-95, ADCOM 2006: automatic computing: proceedings of the 14th international conference on advanced computing and communications, Surathkal, India, E1
Analysis of interconnection networks in heterogeneous multi-cluster systems
B Javadi, J Abawajy, M Akbari, S Nahavandi
(2006), pp. 1-8, ICCP 2006 : 2006 international conference on parallel processing workshops, Columbus, USA, E1
Economy-based data replication broker
H Lin, J Abawajy, R Buyya
(2006), pp. 1-8, Proceedings of the Second IEEE International Conference on e-science and grid computing, Amsterdam, Netherlands, E1
Analytical interconnection networks model for multi-cluster computing systems
B Javadi, J Abawajy, M Akbari
(2006), pp. 37-42, ASMTA 2006 : Proceedings of the ASMTA 2006 13th international conference on analytical and stochastic modelling techniques and applications, Bonn, Germany, E1
Analysis of multi-cluster computing systems with processor heterogeneity
B Javadi, M Akbari, J Abawajy
(2006), pp. 1-8, CSICC 2006 : Proceedings of the 11th International CSI (Computer Society of Iran) Computer Conference, Tehran, Iran, E1
Analytical network modeling of heterogeneous large-scale cluster systems
B Javadi, J Abawajy, M Akbari, S Nahavandi
(2006), pp. 1-9, ICCC 2006 : Proceedings of the IEEE International Conference on Cluster Computing, Barcelona, Spain, E1
Analytical modeling of communication latency in multi-cluster systems
B Javadi, J Abawajy, M Akbari
(2006), pp. 1-6, Proceedings of the 12th International Conference on parallel and distributed systems (ICPADS`06), Minneapolis, USA, E1
Fault-tolerant dynamic job scheduling policy
J Abawajy
(2005), Vol. 3719, pp. 165-173, Lecture notes in computer science, Berlin, Germany, C1
Autonomic job scheduling policy for grid computing
J Abawajy
(2005), Vol. 3516, pp. 213-220, Lecture notes in computer science, Berlin, Germany, C1
Job scheduling policy for high throughput grid computing
J Abawajy
(2005), Vol. LNCS 3719, pp. 184-192, Lecture notes in computer science, Berlin, Germany, C1
An efficient replicated data management approach for peer-to-peer systems
J Abawajy
(2005), Vol. 3516, pp. 457-463, Lecture Notes in Computer Science, Computational Science – ICCS 2005, Berlin, Germany, C1
Robust parallel job scheduling infrastructure for service-oriented grid computing systems
J Abawajy
(2005), Vol. 3483, pp. 1272-1281, Lecture notes in computer science, Berlin, Germany, C1
Grid accounting service infrastructure for service-oriented grid computing systems
J Abawajy
(2005), Vol. 3458, pp. 167-174, Lecture notes in computer science, Berlin, Germany, C1
Performance analysis of interconnection networks for multi-cluster systems
B Javadi, J Abawajy, M Akbari
(2005), Vol. 3516, pp. 205-212, Lecture notes in computer science, Berlin , Germany, C1
A new approach for efficiently achieving high availability in mobile computing
M Deris, J Abawajy, M Omar
(2005), pp. 60-68, Lecture notes in computer science, Berlin, Germany, C1
High reliability replication technique for Web-server cluster systems
M Mat Deris, J Abawajy, M Zarina, R Mamat
(2005), Vol. 3516, pp. 447-456, Lecture notes in computer science, Berlin, Germany, C1
A new internet meta-search engine and implementation
J Abawajy, M Hu
(2005), pp. 103-110, ACS/IEEE International Conference on Computer Systems and Applications, Cairo, Egypt, E1
Performance analysis of heterogeneous multi-cluster systems
B Javadi, M Akbari, J Abawajy
(2005), pp. 493-500, Proceedings of the 2005 international conference on parallel processing workshops, Oslo, Norway, E1
Modeling of multi-cluster systems in the presence of network heterogeneity
B Javadi, M Akbari, J Abawajy
(2005), pp. 204-211, The proceedings of the International Conference on Computational Science and Engineering, Istanbul, Turkey, E1
Analytical performance modeling of the enterprise grid computing
B Javadi, M Akbari, J Abawajy
(2005), First International Conference on e-science and grid computing, Melbourne, Australia, E1
Fault detection service architecture for grid computing systems
J Abawajy
(2004), Vol. 3044, pp. 107-115, Lecture notes in computer science, Berlin, Germany, C1
Dynamic parallel job scheduling in multi-cluster computing systems
J Abawajy
(2004), Vol. 3036, pp. 27-34, Lecture notes in computer science, Berlin, Germany, C1
Preemptive job scheduling policy for distributively-owned workstation clusters
J Abawajy
(2004), Vol. 14, pp. 255-270, Parallel processing letters, Singapore, C1
Placement of file replicas in data grid environments
J Abawajy
(2004), Vol. 3038, pp. 66-73, Lecture notes in computer science, Berlin, Germany, C1
File replacement algorithm for storage resource managers in data grids
J Abawajy
(2004), Vol. 3038, pp. 339-346, Lecture notes in computer science, Berlin, Germany, C1
Design and evaluation of an agent-based communication model for a parallel file system
M Pérez, A Sánchez, J Abawajy, V Robles, J Peña
(2004), Vol. 3044, pp. 87-96, Lecture notes in computer science, Berlin, Germany, C1-1
Secure accounting and payment infrastructure for grid computing
J Abawajy
(2004), Scientific applications of grid computing, Beijing, China, E1
Grid accounting and payment arcihtecture
J Abawajy
(2004), pp. 82-87, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, Innsbruck, AUSTRIA, E1-1
An integrated resource scheduling approach on cluster computing systems
J Abawajy
(2003), Proceedings - International Parallel and Distributed Processing Symposium, IPDPS 2003, Nice, France, E1-1
Parallel I/O scheduling in multiprogrammed cluster computing systems
J Abawajy
(2003), Vol. 2660, pp. 223-229, Computational Science — ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2–4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1
An adaptive load balancing algorithm for large data parallel processing with communication delay
K Imasaki, J Abawajy
(2003), Vol. 2660, pp. 242-247, Computational Science — ICCS 2003 : International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2–4, 2003 Proceedings, Part IV, Melbourne, Australia and St. Petersburg, Russia, E1-1
Funded Projects at Deakin
Australian Competitive Grants
Effectiveness of wearable continuous blood pressure monitoring device with web platform on hypertension control: A pilot randomized controlled trial.
A/Prof Shariful Islam, Prof Ralph Maddison, Prof Clara Chow, Prof Jemal Abawajy
NHF Vanguard Grant - National Heart Foundation of Australia
- 2019: $73,767
Other Public Sector Funding
Big data small estimation
Prof Jemal Abawajy, Ms Shaila Sharmeen
Australian Bureau of Statistics
- 2021: $6,000
- 2020: $17,500
Industry and Other Funding
Database and Secure Website Development
Prof Jemal Abawajy
Aust Oromo Community Assoc in Victoria
- 2012: $5,000
Intelligent software engineering techniques to monitor and improve the quality of software development and managing the productivity of the developers
Dr Shamsul Huda, Prof John Yearwood, Prof Jemal Abawajy
King Saud University, Sparx Systems
- 2016: $20,000
- 2015: $40,000
Obfuscation-resilient Algorithm for Early Detection of Malicious Software
Prof Jemal Abawajy, Dr Shamsul Huda
Research and and Innovation Agency, Ministry of Education, Saudi Arabia
- 2021: $30,000
Other Funding Sources
Sharing Cybersecurity Data for Australian Research (SCReeD).
Prof Jemal Abawajy, Prof Chang-Tsun Li, Prof Gang Li, A/Prof William Yeoh, Dr Shamsul Huda, Dr Frank Jiang, Dr Jack Li
Cyber Security Research Centre Limited
- 2023: $12,500
- 2022: $10,320
Socrates: Software Security with a focus on critical technologies.
Dr Lei Pan, Dr Syed Wajid Ali Shah, Prof Robin Ram Mohan Doss, Dr Zubair Baig, Prof Jemal Abawajy, Prof Shiri Krebs, Dr Jayson Lamchek, Dr Shamsul Huda, Dr Muna Al-Hawawreh, Dr Naeem Syed, Dr Jack Li, Dr Ye Zhu, Dr Frank Jiang, A/Prof William Yeoh, Prof Chang-Tsun Li, Dr Lennon Chang, A/Prof Patrick Emerton, Dr Hourieh Khalajzadeh, Dr Van-Hau Trieu, Dr Yanjun Zhang, Dr Leo Zhang
Cyber Security Research Centre Limited
- 2023: $120,976
Supervisions
Shaila Sharmeen
Thesis entitled: Semi-Supervised Models for Android Malware Detection
Doctor of Philosophy (Information Technology), School of Information Technology
Saiba Nazah
Thesis entitled: Understanding the Characteristics of Dark Web Forum Using Machine Learning Techniques
Master of Science (Information Technology), School of Information Technology
Lamyaa Jebur Yousif Al-Omairi
Thesis entitled: Linear Dimensionality Reduction Method for Graph Data
Doctor of Philosophy (Information Technology), School of Information Technology
Sara Ghanavati
Thesis entitled: Learning-based Internet of Things Resource Management
Doctor of Philosophy (Information Technology), School of Information Technology
Abdulaziz Aljunaibi
Thesis entitled: Isomorphism as a Paradigm for Strategic Change Management in AbuDhabi government
Doctor of Philosophy (Information Technology), School of Information Technology
Benjamin Jonathan Townsend
Thesis entitled: A Carrier Agnostic Bio-Monitoring Communications Platform
Doctor of Philosophy (Information Technology), School of Information Technology
Baker Alrubaiey
Thesis entitled: Assuring Virtual Network Reliability and Resilience
Doctor of Philosophy (Information Technology), School of Information Technology
Fahed Matar Al Neyadi
Thesis entitled: Securely Sharing Dynamic Medical Information in E-Health
Doctor of Philosophy (Information Technology), School of Information Technology
Masitah Ahmad
Thesis entitled: Service Level Agreements Framework for Digital Library Quality of Service Management
Doctor of Philosophy (Information Technology), School of Information Technology
Sara Ghanavati
Thesis entitled: Congestion Control Mechanism for Sensor-Cloud Infrastructure
Master of Science (Information Technology), School of Information Technology
Mohd Izuan Hafez Ninggal
Thesis entitled: Privacy-Preserving Mechanism for Social Network Data Publishing
Doctor of Philosophy (Information Technology), School of Information Technology
Isredza Rahmi A Hamid
Thesis entitled: Phishing Detection and Traceback Mechanism
Doctor of Philosophy (Information Technology), School of Information Technology
Davood Izadi
Thesis entitled: Enhancing Wireless Sensor Networks Functionalities
Doctor of Philosophy (Information Technology), School of Information Technology
Harinda Fernando
Thesis entitled: Enhancing RFID performance and security in networked environments
Doctor of Philosophy (Information Technology), School of Information Technology
Hairulnizam Bin Mahdin
Thesis entitled: Enhancing RFID Data Quality and Reliability
Doctor of Philosophy (Information Technology), School of Information Technology
Raja Al-Jaljouli
Thesis entitled: Mobile-Agent Based Multi-Constraint One-to-Many Bilateral e-Negotiation Framework
Doctor of Philosophy (Information Technology), School of Information Technology
Soon Chong
Thesis entitled: Risk and Trust Management for Online Distributed System
Doctor of Philosophy (Information Technology), School of Information Technology
Mohd Farhan Md Fudzee
Thesis entitled: Broker-based service-oriented content adaptation framework
Doctor of Philosophy (Information Technology), School of Information Technology
Shivali Goel
Thesis entitled: Antenna Selection and Channel Estimation for Hybrid Relay Systems
Doctor of Philosophy (Information Technology), School of Information Technology
Fera Tri Hartanti
Thesis entitled: Framework for Trusted Smart Government
Doctor of Philosophy (Information Technology), School of Information Technology
Haider Adeeb Kassem Kassem
Thesis entitled: Vision-Based Driver Fatigue Prediction
Doctor of Philosophy (Information Technology), School of Information Technology
Maslina Abdul Aziz
Thesis entitled: QoS-Aware Predictive Workflow Scheduling
Doctor of Philosophy (Information Technology), School of Information Technology
Tahsien Ali Hussein Al-Quraishi
Thesis entitled: Predicting breast cancer risk, recurrence and survivability
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmed Jaber Hussein Al-Mansoori
Thesis entitled: Big Data Stream Processing in the Cloud
Doctor of Philosophy (Information Technology), School of Information Technology
Md Samsul Haque
Thesis entitled: On-Demand Framework for Unmanned Aerial Vehicle Network Security
Master of Science (Information Technology), School of Information Technology
Mohammed Khalil Ibrahim Amain
Thesis entitled: Fault attacks on RSA and Elliptic Curve cryptosystems
Doctor of Philosophy (Information Technology), School of Information Technology
Ahmad Shaker Abdalrada
Thesis entitled: The Role of Various Risk Factors in the Prevalence of Cardiac Autonomic Neuropathy and Associated Diseases.
Doctor of Philosophy (Information Technology), School of Information Technology
Biplob Ray
Thesis entitled: Security framework and protocols for the internet of things
Doctor of Philosophy (Information Technology), School of Information Technology
Ammar Al Azab
Thesis entitled: Malware Detection and Prevention
Doctor of Philosophy (Information Technology), School of Information Technology
Nicholas Patterson
Thesis entitled: A Framework for Detecting Virtual Property Theft in Virtual World Environments
Doctor of Philosophy (Information Technology), School of Information Technology