Publications
- Hijawi, D. Unal, R. Hamila, A. Gastli and O. Ellabban, "Lightweight KPABE Architecture Enabled in Mesh Networked Resource-Constrained IoT Devices," in IEEE Access, vol. 9, pp. 5640-5650, 2021, doi: 10.1109/ACCESS.2020.3048192.
- M. Noorizadeh, M. Shakerpour, N. Meskin, D. Unal and K. Khorasani, "A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed," in IEEE Access, vol. 9, pp. 16239-16253, 2021, doi: 10.1109/ACCESS.2021.3053135.
- Basyoni, Lamiaa, et al. "Traffic Analysis Attacks on Tor: A Survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Mhaisen, Naram, Noora Fetais, and Ahmed Massoud. "Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Salahuddin, Tooba, and Uvais Qidwai. "A Cloud-based Solution for Rapid and Smart Neuropathy Detection." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Jabbar, Rateb, et al. "A Model-Based Testing Framework for Validating an IoT Solution for Blockchain-Based Vehicles Communication." (2020).
- Hammoudeh, Mohammad, et al. "A service-oriented approach for sensing in the Internet of Things: intelligent transportation systems and privacy use cases." IEEE Sensors Journal (2020).
- Jabbar, Rateb, et al. "Formal Verification and Model-Based Testing Techniques for Validating a Blockchain-Based Healthcare Records Sharing System." (2020).
- Jabbar, Rateb, et al. "Blockchain technology for healthcare: Enhancing shared electronic health record interoperability and integrity." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Bhamare, Deval, et al. "Cybersecurity for industrial control systems: A survey." Computers & Security 89 (2020): 101677.
- Nhlabatsi, Armstrong, et al. "Design and Implementation of a Threat-Specific Security Risk Assessment Tool." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Hybrid Particle Swarm Optimization with Sine Cosine Algorithm and Nelder–Mead Simplex for Solving Engineering Design Problems
- Hijawi, Ula, et al. "Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Unal, Devrim, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. "Policy specification and verification for blockchain and smart contracts in 5G networks." ICT Express 6.1 (2020): 43-47.
- Mhaisen, Naram, et al. "To chain or not to chain: A reinforcement learning approach for blockchain-enabled IoT monitoring applications." Future Generation Computer Systems 111 (2020): 39-51.
- Basyoni, Lamiaa, et al. "Traffic Analysis Attacks on Tor: A Survey." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Hijawi, Ula, et al. "Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Unal, Devrim, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. "Policy specification and verification for blockchain and smart contracts in 5G networks." ICT Express 6.1 (2020): 43-47.
- Hijawi, Ula, et al. "Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT." 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). IEEE, 2020.
- Barham, Reham Shawqi, Ahmad Sharieh, and Azzam Sleit. "A meta-heuristic framework based on clustering and preprocessed datasets for solving the link prediction problem." Journal of Information Science 45.6 (2019): 794-817.
- Kasit, KASIT KASIT. "An Enhanced K-means Clustering Algorithm for Multi-attributes Data." International Journal of Computer Science and Information Security (IJCSIS) 17.2 (2019).
- Fernandez, Rachael, Salma Shalaby, and Noora Fetais. "Cyber security in Banking: Challenges, Solutions and Trends."
- Zubair, Mohammed, et al. "Exploiting bluetooth vulnerabilities in e-health IoT devices." Proceedings of the 3rd International Conference on Future Networks and Distributed Systems. 2019.
- Alsawalqah, Hamad, et al. "Factors Impacting on CMMI Acceptance Among Software Development Firms: A Qualitative Assessment." Modern Applied Science 13.3 (2019).
- Eshtay, Mohammed, Azzam Sleit, and Monther Aldwairi. "Implementing bi-temporal properties into various NoSQL database categories." International Journal of Computing 18.1 (2019): 45-52.
- Al-Nsour, Esam, Azzam Sleit, and Mohammad Alshraideh. "SOLD: A node-Splitting algorithm for R-tree based on Objects’ Locations Distribution." Journal of Information Science 45.2 (2019): 169-195.
- Salem, Asma, et al. "Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms." KSII Transactions on Internet & Information Systems 13.8 (2019).
- Yadegar, Meysam, Nader Meskin, and Wassim M. Haddad. "An output‐feedback adaptive control architecture for mitigating actuator attacks in cyber‐physical systems." International Journal of Adaptive Control and Signal Processing 33.6 (2019): 943-955.
- Baniamerian, Amir, Khashayar Khorasani, and Nader Meskin. "Determination of Security Index for Linear Cyber-Physical Systems Subject to Malicious Cyber Attacks." 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019.
- Basyoni, Lamiaa, et al. "Empirical performance evaluation of QUIC protocol for Tor anonymity network." 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC). IEEE, 2019.
- Barham, Reham, Ahmad Sharieh, and Azzam Sleit. "Multi-moth flame optimization for solving the link prediction problem in complex networks." Evolutionary Intelligence .4 (2019): 563-591.
- Hong, Jin B., et al. "Systematic identification of threats in the cloud: A survey." Computer Networks 150 (2019): 46-69.
- Nhlabatsi, Armstrong, et al. "Threatriskevaluator: A tool for assessing threat-specific security risks in the cloud." 2019 International Conference on Cyber Security for Emerging Technologies (CSET). IEEE, 2019.
- Mahmood, Arif, and Somaya Al-Maadeed. "Action Recognition in Poor Quality Spectator Crowd Videos."
- Fetais, Noora, and Rachael Fernandez. "Framework for Visualizing Browsing Patterns Captured in Computer Logs." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Shalaby, Salma Tarek, Engy Khaled Soliman, and Noora Fetais. "Visualization of Electricity Consumption in Qatar." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Al-Hathal, Turkea, and Noora Fetais. "Virtual reality glove for falconry." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
- Fetais, Noora, et al. "Virtual Reality Game for Falconry." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Kharbach, Sarah, et al. "Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
- Al-Thani, Haya, et al. "Unsupervised Technique for Anomaly Detection in Qatar Stock Market." 2018 International Conference on Computer and Applications (ICCA). IEEE, 2018.
- Nhlabatsi, Armstrong Mazinyane, et al. "Threat-specific security risk evaluation in the cloud." IEEE Transactions on Cloud Computing (2018). 8. Nhlabatsi, Armstrong, et al. "ThreatBased Security Risk Evaluation in the Cloud." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018. 9. Moataz, Tarik, et al. "Substring search over encrypted data." Journal of Computer Security 26.1 (2018): 1-30. 10. Amin, Hafsa, et al. "SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 3. Vol. 2018. No. 3. Hamad bin Khalifa University Press (HBKU Press), 2018. 11. Barham, Reham, Ahmad Sharieh, and Azzam Sleit. "Moth flame optimization based on golden section search and its application for link prediction problem." Mod Appl Sci 13.1 (2018): 10-27. 12. Senturk, Izzet F., et al. "A resource provisioning framework for bioinformatics applications in multi-cloud environments." Future Generation Computer Systems 78 (2018): 379-391.
- Abdelbarr, Mohamed, et al. "3D dynamic displacement-field measurement for structural health monitoring using inexpensive RGB-D based sensor." Smart materials and structures 26.12 (2017): 125016.
- Kamran, Saadat, et al. "Abstract TP62: To Determine the Evolution of Stroke Volume Overtime Using ANFIS." Stroke 48.suppl_1 (2017): ATP62-ATP62.
- Soliman, Engy, Salma Shalaby, and Noora Fetais. "An Interactive Visualization Web Solution for Electricity Consumption in Qatar." 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017.
- Jiang, Richard, et al. Biometric Security and Privacy. Springer International Publishing AG, 2017.
- Punekar, Mayur, et al. "Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures." Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies. 2017.
- Gupta, Lav, et al. "COLAP: A predictive framework for service function chain placement in a multi-cloud environment." 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC). IEEE, 2017.
- Djelouat, Hamza, et al. "Compressive sensing based electronic nose platform." Digital Signal Processing 60 (2017): 350-359.
- Qidwai, Uvais, and Muhammad Ali Akbar. "Coordinated robotic system for civil structural health monitoring." MATEC Web of Conferences. Vol. 120. EDP Sciences, 2017.
- Khan, Khaled M., Mahboob Shaheen, and Yongge Wang. "Data confidentiality in cloud-based pervasive system." Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. 2017.
- Chaudhry, Junaid, et al. "Data security among ISO/IEEE 11073 compliant personal healthcare devices through statistical fingerprinting." Institute of Electrical and Electronics Engineers, 2017.
- Hong, Jin Bum, and Dong Seong Kim. "Discovering and mitigating new attack paths using graphical security models." 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W). IEEE, 2017.
- Zhai, Xiaojun, et al. "ECG encryption and identification based security solution on the Zynq SoC for connected health systems." Journal of Parallel and Distributed Computing 106 (2017): 143-152.
- Di Pietro, Roberto, and Gabriele Oligeri. "Enabling broadcast communications in presence of jamming via probabilistic pairing." Computer Networks 116 (2017): 33-46.
- Ali, Amine Ait Si, et al. "Enhanced Biometric Security and Privacy Using ECG on the Zynq SoC." Biometric Security and Privacy. Springer, Cham, 2017. 179-202.
- Yusuf, Simon Enoch, et al. "Evaluating the effectiveness of security metrics for dynamic networks." 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, 2017.
- Gupta, Lav, et al. "Fault and performance management in multi-cloud based NFV using shallow and deep predictive structures." Journal of Reliable Intelligent Environments 3.4 (2017): 221-231.
- Awan, Ruqayya, et al. "Glandular morphometrics for objective grading of colorectal adenocarcinoma histology images." Scientific Reports 7.1 (2017): 1-12.
- Elwell, Jesse, et al. "Hardening extended memory access control schemes with self-verified address spaces." 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). IEEE, 2017.
- Nita, G. M., et al. "Higher order statistical frequency domain decomposition for operational modal analysis." Mechanical Systems and Signal Processing 84 (2017): 100-112.
- Khan, Khaled M., and Armstrong Nhlabatsi. "Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe." International Journal of Humanities and Social Sciences 11.7 (2017): 1821-1824.
- Abdaoui, Abderrazak, Tarek M. El Fouly, and Mohamed H. Ahmed. "Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring." Journal of Network and Computer Applications 83 (2017): 181-189.
- Khan, Khaled M., and Zhuhan Jiang. "Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service." 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 2017.
- Mansourkiaie, Fatemeh, et al. "Maximizing lifetime in wireless sensor network for structural health monitoring with and without energy harvesting." IEEE Access 5 (2017): 2383-2395.
- Bhamare, Deval, et al. "Multi-objective scheduling of micro-services for optimal service function chains." 2017 IEEE international conference on communications (ICC). IEEE, 2017.
- Farhat, Ali AH, et al. "OCR-based hardware implementation for Qatari number plate on the Zynq SoC." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
- Zhang, Peng, and Mikhail J. Atallah. "On approximate pattern matching with thresholds." Information Processing Letters 123 (2017): 21-26.
- Bhamare, Deval, et al. "Optimal virtual network function placement in multi-cloud service function chaining architecture." Computer Communications 102 (2017): 1-16.
- Bahig, Hazem M., Mostafa M. Abbas, and M. M. Mohie-Eldin. "Parallelizing partial digest problem on multicore system." International Conference on Bioinformatics and Biomedical Engineering. Springer, Cham, 2017.
- Kamran, Saadat, et al. "Prediction of infarction volume and infarction growth rate in acute ischemic stroke." Scientific reports 7.1 (2017): 1-8.
- Wang, Yongge, and Qutaibah M. Malluhi. "Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project." IACR Cryptol. ePrint Arch. 2017 (2017): 1258.
- Jahanshahi, Mohammad R., et al. "Reconfigurable swarm robots for structural health monitoring: a brief review." International Journal of Intelligent Robotics and Applications 1.3 (2017): 287-305.
- Hu, Jinwei, et al. "Role updating in information systems using model checking." Knowledge and Information Systems 51.1 (2017): 187-234.
- Wang, Shumiao, et al. "Secure collaboration in engineering systems design." Journal of Computing and Information Science in Engineering 17.4 (2017).
- Nassar, Mohamed, et al. "Securing aggregate queries for dna databases." IEEE Transactions on Cloud Computing (2017).
- Fernandez, Rachael, and Noora Fetais. "Short survey of techniques for visualizing events recorded in logs." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
- Noel, Adam B., et al. "Structural health monitoring using wireless sensor networks: A comprehensive survey." IEEE Communications Surveys & Tutorials 19.3 (2017): 1403-1423.
- Fernandez, Rachael, and Noora Fetais. "Survey of information visualization techniques for enhancing visual analysis." 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017.
- Bao, Bin, et al. "Treating triple negative breast cancer cells with erlotinib plus a select antioxidant overcomes drug resistance by targeting cancer cell heterogeneity." Scientific Reports 7 (2017): 44125.
- Soliman, Engy, and Noora Fetais. "Visualization as a mean of big data management: Using Qatar's electricity consumption data." 2017 9th IEEE-GCC Conference and Exhibition (GCCCE). IEEE, 2017.
- Elsayed, Mohamed, et al. "Walsh transform with moving average filtering for data compression in wireless sensor networks." 2017 IEEE 13th International Colloquium on Signal Processing & its Applications (CSPA). IEEE, 2017.
- Dehghan, Afshin, and Mubarak Shah. "Binary quadratic programing for online tracking of hundreds of people in extremely crowded scenes." IEEE transactions on pattern analysis and machine intelligence 40.3 (2017): 568-581.
- Qidwai, Uvais, et al. "Intelligent integrated instrumentation platform for monitoring long-term bedridden patients." 2016 IEEE EMBS Conference on Biomedical Engineering and Sciences (IECBES). IEEE, 2016.
- Rihan, Rana Adnan, and Khaled M. Khan. "Using Block Cipher for Confidentiality of Images in Cloud-Based Systems." 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW). IEEE, 2016.
- Al Marri, Wadha J., et al. "The similarity-aware relational database set operators." Information Systems 59 (2016): 79-93.
- Rachid, Maan Haj, and Qutaibah Malluhi. "Solving All-Pairs Suffix Prefix–Theory and Practice." Qatar Foundation Annual Research Conference Proceedings Volume 2016 Issue 1. Vol. 2016. No. 1. Hamad bin Khalifa University Press (HBKU Press), 2016.
- Yusuf, Simon Enoch, et al. "Security modeling and analysis of dynamic enterprise networks." 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 2016.
- Raza, Shan E. Ahmed, et al. "Robust normalization protocols for multiplexed fluorescence bioimage analysis." BioData mining 9.1 (2016): 11.
- Asuncion, Vernon, et al. "Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming." International Journal of Cooperative Information Systems 25.01 (2016): 1650003.
- Aliakbar, Muhammad, et al. "Progressive image stitching algorithm for vision based automated inspection." 2016 International Conference on Machine Learning and Cybernetics (ICMLC). Vol. 1. IEEE, 2016.
- Wang, Yongge, and Qutaibah M. Malluhi. "Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes." European Symposium on Research in Computer Security. Springer, Cham, 2016.
- Elsersy, Mohamed, et al. "Performance evaluation of experimental damage detection in structure health monitoring using acceleration." 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, 2016.
- Malik, Saif Ur Rehman, et al. "Performance analysis of data intensive cloud systems based on data management and replication: a survey." Distributed and Parallel Databases 34.2 (2016): 179-215.
- Badawy, Ahmed, et al. "On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks." 2016 IEEE Wireless Communications and Networking Conference. IEEE, 2016.
- Qidwai, Uvais, et al. "Monitoring DVT cuffs for long-term operation: A fuzzy approach." 2016 IEEE 12th International Colloquium on Signal Processing & Its Applications (CSPA). IEEE, 2016.
- Zhai, Xiaojun, et al. "MLP neural network-based gas classification system on Zynq SoC." IEEE Access 4 (2016): 8138-8146.
- 15. Sirinukunwattana, Korsuk, et al. "Locality sensitive deep learning for detection and classification of nuclei in routine colon cancer histology images." IEEE transactions on medical imaging 35.5 (2016): 1196-1206.
- Elsersy, Mohamed, Tarek Mohamed Elfouly, and Mohamed Hossam Ahmed. "Joint optimal placement, routing, and flow assignment in wireless sensor networks for structural health monitoring." IEEE Sensors Journal 16.12 (2016): 5095-5106.
- 17. Gutierrez, Christopher N., et al. "Inhibiting and detecting offline password cracking using ErsatzPasswords." ACM Transactions on Privacy and Security (TOPS) 19.3 (2016): 1-30.
- Abdaoui, Abderrazak, Mohamed H. Ahmed, and Tarek M. El Fouly. "Impact of time synchronization error on the mode-shape calculation in wireless sensor networks for structural health monitoring." 2016 IEEE Wireless Communications and Networking Conference. IEEE, 2016.
- Akbar, Muhammad Ali. "Image Stitching System With Scanning Microscopy for Histopathological Applications." Qatar Foundation Annual Research Conference Proceedings Volume 2018 Issue 2. Vol. 2018. No. 2. Hamad bin Khalifa University Press (HBKU Press), 2018.
- Tahir, Anas, and Uvais Qidwai. "Humanoid Robots for children with Autism: Experiences with Robosapien and NAO."
- Awan, Ruqayya, et al. "How divided is a cell? Eigenphase nuclei for classification of mitotic phase in cancer histology images." 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI). IEEE, 2016.
- Wang, Yongge, Qutaibah M. Malluhi, and Khaled MD Khan. "Garbled computation in cloud." Future Generation Computer Systems 62 (2016): 54-65.
- Bhamare, Deval, et al. "Feasibility of supervised machine learning for cloud security." 2016 International Conference on Information Science and Security (ICISS). IEEE, 2016.
- El-Manzalawy, Yasser, et al. "FastRNABindR: Fast and accurate prediction of protein-RNA interface residues." PloS one 11.7 (2016): e0158445.
- Gupta, Lav, Raj Jain, and Mohammed Samaka. "Analysis of an application delivery platform for software defined infrastructures." International Journal of Communication Networks and Distributed Systems 17.3 (2016): 296-314.
|
|