Submissions from 2019
Developing a faster pattern matching algorithms for intrusion detection system, Ibrahim Obeidat and Mazen AlZubi
Intensive pre-processing of KDD Cup 99 for network intrusion classification using machine learning techniques, Ibrahim M. Obeidat, Nabhan Hamadneh, Mouhammd Alkasassbeh, Mohammad Almseidin, and Mazen Ibrahim AlZubi
Investigation of the impact of a wireless Fog Warning System with respect to road traffic on a highway, Fatma Outay, Absar Ul Haque Ahmar, Faouzi Kamoun, Ansar Ul Haque Yasar, Christoph Sommer, Nafaa Jabeur, and Samar El-Amine
Estimating ambient visibility in the presence of fog: a deep convolutional neural network approach, Fatma Outay, Bilal Taha, Hazar Chaabani, Faouzi Kamoun, Naoufel Werghi, and Ansar Ul Haque Yasar
A Quality-of-Things model for assessing the Internet-of-Things' nonfunctional properties, Ayesha Qamar, Muhammad Asim, Zakaria Maamar, Saad Saeed, and Thar Baker
Energy production predication via Internet of Thing based machine learning system, Pedro P. Rebouças Filho, Samuel L. Gomes, Navar M.Mendonça e Nascimento, Cláudio M.S. Medeiros, Fatma Outay, and Victor Hugo C. de Albuquerque
A location-sensitive and network-aware broker for recommending Web services, Saad Saeed, Muhammad Asim, Thar Baker, and Zakaria Maamar
Compromised user credentials detection in a digital enterprise using behavioral analytics, Saleh Shah, Babar Shah, Adnan Amin, Feras Al-Obeidat, Francis Chow, Fernando Joaquim Lopes Moreira, and Sajid Anwar
Computer-Aided Diagnostic System for Early Detection of Acute Renal Transplant Rejection Using Diffusion-Weighted MRI, Mohamed Shehata, Fahmi Khalifa, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Mohamed Abou El-Ghar, Amy C. Dwyer, Georgy Gimel'Farb, Robert S. Keynton, and Ayman El-Baz
Understanding users’ acceptance of smart homes, Ahmed Shuhaiber and Ibrahim Mashal
Dynamic Clustering for IoT Key Management in Hostile Application Area, Soumaya Souaidi, Tayeb Kenaza, Badis Djamaa, and Monther Aldwairi
Accurately forecasting temperatures in smart buildings using fewer sensors, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi
The security of big data in fog-enabled iot applications including blockchain: A survey, Noshina Tariq, Muhammad Asim, Feras Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, and Ibrahim Ghafir
A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT, Noshina Tariq, Muhammad Asim, Zakaria Maamar, M. Zubair Farooqi, Noura Faci, and Thar Baker
User behavior prediction via heterogeneous information preserving network embedding, Weiwei Yuan, Kangya He, Guangjie Han, Donghai Guan, and Asad Masood Khattak
QoS enhancement with deep learning-based interference prediction in mobile IoT, Saniya Zafar, Sobia Jangsher, Ouns Bouachir, Moayad Aloqaily, and Jalel Ben Othman
Combining RSS-SVM with genetic algorithm for Arabic opinions analysis, Amel Ziani, Nabiha Azizi, Djamel Zenakhra, Soraya Cheriguene, and Monther Aldwairi
Submissions from 2018
Data from: Fuzziness-based active learning framework to enhance hyperspectral image classification performance for discriminative and generative classifiers, Muhammad Ahmad, Stanislav Protasov, Adil Mehmood Khan, Rasheed Hussain, Asad Masood Khattak, and Wajahat Ali Khan
Fuzziness-based active learning framework to enhance hyperspectral image classification performance for discriminative and generative classifiers, Muhammad Ahmad, Stanislav Protasov, Adil Mehmood Khan, Rasheed Hussain, Asad Masood Khattak, and Wajahat Ali Khan
Anomaly payload signature generation system based on efficient tokenization methodology, Monther Aldwairi, Wail Mardini, and Alaa Alhowaide
A Consumer Perspective on Digital Games: Factors for Successful Game Development, Saiqa Aleem, Luiz Fernando Capretz, and Faheem Ahmed
SafePath: Differentially-private publishing of passenger trajectories in transportation systems, Khalil Al-Hussaeni, Benjamin C.M. Fung, Farkhund Iqbal, Gaby G. Dagher, and Eun G. Park
Differentially private multidimensional data publishing, Khalil Al-Hussaeni, Benjamin C.M. Fung, Farkhund Iqbal, Junqiang Liu, and Patrick C.K. Hung
Knowledge-based reasoning and recommendation framework for intelligent decision making, Rahman Ali, Muhammad Afzal, Muhammad Sadiq, Maqbool Hussain, Taqdir Ali, Sungyoung Lee, and Asad Masood Khattak
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model, Shadi Aljawarneh, Monther Aldwairi, and Muneer Bani Yassein
The Opinion Management Framework: Identifying and addressing customer concerns extracted from online product reviews, Feras Al-Obeidat, Bruce Spencer, and Eleanna Kafeza
A best-practice model of university-students relationship development: An empirical study, Raed Musbah Alqirem, Husam Mustafa Alnaimi, and Ahmed Shuhaiber
Arabic authorship attribution: An extensive study on twitter posts, Malik H. Altakrori, Farkhund Iqbal, Benjamin C.M. Fung, Steven H.H. Ding, and Abdallah Tubaishat
Long-term integrity and non-repudiation protocol for multiple entities, Mohamad Badra and Rouba Borghol
Neural word and entity embeddings for ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat
Cloud-SEnergy: A bin-packing based multi-cloud service broker for energy efficient composition and execution of data-intensive applications, Thar Baker, Bandar Aldawsari, Muhammad Asim, Hissam Tawfik, Zakaria Maamar, and Rajkumar Buyya
A survey and taxonomy on nonorthogonal multiple-access schemes for 5G networks, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, and Alagan Anpalagan
An analytical study on the holy Quran based on the order of words in Arabic and conjunction, Rahima Bentrcia, Samir Zidat, and Farhi Marir
Extracting semantic relations from the Quranic Arabic based on Arabic conjunctive patterns, Rahima Bentrcia, Samir Zidat, and Farhi Marir
Security and privacy challenges in smart cities, Trevor Braun, Benjamin C.M. Fung, Farkhund Iqbal, and Babar Shah
Context mining of sedentary behaviour for promoting self-awareness using a smartphone, Muhammad Fahim, Thar Baker, Asad Masood Khattak, Babar Shah, Saiqa Aleem, and Francis Chow
Entity linking of tweets based on dominant entity candidates, Yue Feng, Fattane Zarrinkalam, Ebrahim Bagheri, Hossein Fani, and Feras Al-Obeidat
Investigation of Indecent Images of Children cases: Challenges and suggestions collected from the trenches, Virginia N.L. Franqueira, Joanne Bryce, Noora Al Mutawa, and Andrew Marrington
Hacking in the cloud, Nick Gregorio, Janahan Mathanamohan, Qusay H. Mahmoud, and May AlTaei
Preface, Hakim Hacid, Wojciech Cellary, Hua Wang, Hye Young Paik, and Rui Zhou
An SLA-Aware Cloud Coalition Formation Approach for Virtualized Networks, Souad Hadjres, Nadjia Kara, May El Barachi, and Fatna Belqasmi
A secure and decentralised SIP for mobile ad hoc networks, Mohammed Hussain and Dhafer Ben Khedher
A study of detecting child pornography on smart phone, Farkhund Iqbal, Andrew Marrington, Patrick C.K. Hung, Jing Jie Lin, Guan Pu Pan, Shih Chia Huang, and Benjamin Yankson
Book Review: Disruptive Classroom Technologies: A Framework For Innovation In Education, Nadine Jaafarawi and Afshan Parkar
Advanced Temporal Constraints for Business Processes Modelling and Execution, Eleanna Kafeza
An enhanced mobility and temperature aware routing protocol through multi-criteria decision making method in wireless body area networks, Beom Su Kim, Babar Shah, Feras Al-Obediat, Sana Ullah, Kyong Hoon Kim, and Ki Il Kim
Opportunistic mining of top-n high utility patterns, Junqiang Liu, Xingxing Zhang, Benjamin C.M. Fung, Jiuyong Li, and Farkhund Iqbal
Software agents meet internet of things, Zakaria Maamar, Noura Faci, Slim Kallel, Mohamed Sellami, and Emir Ugljanin
Enhanced teamwork communication model for electronic clinical pathways in healthcare, Wasef Mater, Monther Aldwairi, and Roliana Ibrahim
Evaluating User Vulnerabilities Vs Phisher Skills In Spear Phishing, Mathew Nicho, Hussein Fakhry, and Uche Egbue
Explore like a local: Student generated websites as representation of emirati perspectives on Dubai tourism, Michael R. Ogden, Melissa Lee Price, and Noela Michael
Concurrent direct assessment of foundation skills for general education, Anthony Rhodes, Maurice Danaher, and Ashley Ater Kranov
Business process analytics and big data systems: A roadmap to bridge the gap, Sherif Sakr, Zakaria Maamar, Ahmed Awad, Boualem Benatallah, and Wil M.P. Van Der Aalst
Alleviating road network congestion: Traffic pattern optimization using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad
Towards the transversal detection of DDoS network attacks in 5G multi-tenant overlay networks, Ana Serrano Mamolar, Zeeshan Pervez, Jose M. Alcaraz Calero, and Asad Masood Khattak
A generalized deep learning-based diagnostic system for early diagnosis of various types of pulmonary nodules, Ahmed Shaffie, Ahmed Soliman, Luay Fraiwan, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor van Berkel, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz
Fuzzy searching and routing in unstructured mobile peer-to-peer networks, Babar Shah, Farkhund Iqbal, Omar Alfandi, Yoonsoo Kim, Seok Yoon Kang, and Ki Il Kim
A Cloud-Based Architecture for Multimedia Conferencing Service Provisioning, Abbas Soltanian, Fatna Belqasmi, Sami Yangui, Mohammad A. Salahuddin, Roch Glitho, and Halima Elbiaze
Concepções Pessoais de Competência e Rendimento Acadêmico: Estudo Longitudinal no Ensino Secundário Português, Joana Stocker and Luisa Faria
Hijacked destination images? Autonomous representations of Dubai and Abu Dhabi in The Amazing Race, U.S.A, Russell B. Williams
Collusion attacks mitigation in internet of things: a fog based model, Qussai Yaseen, Monther Aldwairi, Yaser Jararweh, Mahmoud Al-Ayyoub, and Brij Gupta
Energy-efficient region shift scheme to support mobile sink group in wireless sensor networks, Yongbin Yim, Kyong Hoon Kim, Monther Aldwairi, and Ki Il Kim
Classification with class noises through probabilistic sampling, Weiwei Yuan, Donghai Guan, Tinghuai Ma, and Asad Masood Khattak
Socialized healthcare service recommendation using deep learning, Weiwei Yuan, Chenliang Li, Donghai Guan, Guangjie Han, and Asad Masood Khattak
Submissions from 2017
Adaptive Forwarding Scheme for Bounded Time Constraint in Delay Tolerant Networks, Ali Abbas, Babar Shah, and Ki Il Kim
Integrating RFID with Healthcare Information Systems: Toward Smart Hospitals, Ahed Abugabah
RFID adoption in healthcare organizations in UAE, Ahed Abugabah
Feature extraction and selection for Arabic tweets authorship authentication, Mahmoud Al-Ayyoub, Yaser Jararweh, Abdullateef Rabab’ah, and Monther Aldwairi
Secure approximation of edit distance on genomic data, Md Momin Al Aziz, Dima Alhadidi, and Noman Mohammed
Pattern matching of signature-based ids using myers algorithm under mapreduce framework, Monther Aldwairi, Ansam M. Abu-Dalo, and Moath Jarrah
Detection of drive-by download attacks using machine learning approach, Monther Aldwairi, Musaab Hasan, and Zayed Balbahaith
Analyzing students’ performance using multi-criteria classification, Feras Al-Obeidat, Abdallah Tubaishat, Anna Dillon, and Babar Shah
A prudent based approach for compromised user credentials detection, Adnan Amin, Babar Shah, Sajid Anwar, Feras Al-Obeidat, Asad Masood Khattak, and Awais Adnan
Real-time routing protocols for (m,k)-firm streams based on multi-criteria in wireless sensor networks, Mohammad Abdul Azim, Beom Su Kim, Babar Shah, and Ki Il Kim
Lightweight and efficient privacy-preserving data aggregation approach for the Smart Grid, Mohamad Badra and Sherali Zeadally
Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT), Oladayo Bello, Sherali Zeadally, and Mohamad Badra
Introduction, Martha Chaiklin
Cost-sensitive elimination of mislabeled training data, Donghai Guan, Weiwei Yuan, Tinghuai Ma, Asad Masood Khattak, and Francis Chow
Revealing determinant factors for early breast cancer recurrence by decision tree, Jimin Guo, Benjamin C.M. Fung, Farkhund Iqbal, Peter J.K. Kuppen, Rob A.E.M. Tollenaar, Wilma E. Mesker, and Jean Jacques Lebrun
Adapting selection strategies of executors of business processes based on profit and social qualities, Hakim Hacid, Emir Ugljanin, Mohamed Sellami, and Zakaria Maamar
Mining Educational Data for Academic Accreditation: Aligning Assessment with Outcomes, Mohammed Hussain, Mohamed Al-Mourad, Sujith Mathew, and Abdullah Hussein
A Preliminary Study of Research-Driven University Spin-off Companies in UAE, Farkhund Iqbal, Patrick Hung, and Suaad Mohammed Mohammed
Energy Management for Internet of Things-enabled Smart Cities in the UAE (Working Paper), Asad Masood Khattak
Extending the framework for mobile health information systems Research: A content analysis, Shah Jahan Miah, John Gammack, and Najmul Hasan
Healthcare support for underserved communities using a mobile social media platform, Shah Jahan Miah, Najmul Hasan, Rashadul Hasan, and John Gammack
A Big Data Analytics Method for Tourist Behaviour Analysis, Shah Jahan Miah, Huy Quan Vu, John Gammack, and Michael McGrath
On-Cloud Healthcare Clinic: An e-health consultancy approach for remote communities in a developing country, Shah J. Miah, Jahidul Hasan, and John G. Gammack
A tree based broadcast scheme for (m, k)-firm real-time stream in wireless sensor networks, Ho Sung Park, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim
Three-dimensional wireless ad hoc and sensor networks 2016, Soo Chang Park, Babar Shah, Euisin Lee, and Ki Il Kim
OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, and Wajahat Ali Khan
mlCAF: Multi-level cross-domain semantic context fusioning for behavior identification, Muhammad Asif Razzaq, Claudia Villalonga, Sungyoung Lee, Usman Akhtar, Maqbool Ali, Eun Soo Kim, Asad Masood Khattak, Hyonwoo Seung, Taeho Hur, Jaehun Bang, Dohyeong Kim, and Wajahat Ali Khan
Assessing students' foundation skills prior to the STEM majors, Anthony Rhodes, Maurice M. Danaher, and Ashley Ater Kranov
Urban road network crisis response management: time-sensitive decision optimization, Sinan Salman and Suzan Alaswad
Implementation guidelines for green data centres, Abdallah Tubaishat and Sara Sumaidaa
Submissions from 2016
Bloom Filters Optimized Wu-Manber for Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, and Babar Shah
Critical Success Factors to Improve the Game Development Process from a Developer’s Perspective, Saiqa Aleem, Luiz Fernando Capretz, and Faheem Ahmed
Game development software engineering process life cycle: a systematic review, Saiqa Aleem, Luiz Fernando Capretz, and Faheem Ahmed
Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN, Rashid Amin, Nadir Shah, Babar Shah, and Omar Alfandi
An improved privacy solution for the smart grid, Mohamad Badra and Sherali Zeadally
Development of a DSS and Online Tools to Support Sleep Disorder Consultations using Design Science., Jacqueline Blake, Don Kerr, and John Gammack