Submissions from 2018
Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun
Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi
Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung
The X-supply game, Sinan Salman and Suzan Alaswad
A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz
Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi
A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat
Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane
Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow
An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi
Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak
Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Submissions from 2017
Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah
Evaluation of healthcare enterprise information systems: A structural equation model, Ahed Abugabah
Unsupervised geometrical feature learning from hyperspectral data, Muhammad Ahmad, Adil Mehmood Khan, Rasheed Hussain, Stanislav Protasov, Francis Chow, and Asad Masood Khattak
FLUKES: Autonomous log forensics, intelligence and visualization tool, Monther Aldwairi and Hesham H. Alsaadi
Architecture guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, Asad Khatak, and Raja Muhammad Ubaid Ullah
The best practice in implementing itil service transition for successful it service production, Mohamed Basel Almourad, Mohammed Hussain, and Feras Al-Obeidat
Identifying Major Tasks from On-line Reviews, Feras Al-Obeidat and Bruce Spencer
Compromised user credentials detection using temporal features: A prudent based approach, Adnan Amin, Sajid Anwar, Babar Shah, and Asad Masood Khattak
Variants of spray and forwarding scheme in delay tolerant networks, Mohammad Abdul Azim, Babar Shah, Beom Su Kim, Kyong Hoon Kim, and Ki Il Kim
The Creation of an Arabic Emotion Ontology Based on E-Motive, Anoud Bani-Hani, Munir Majdalweieh, and Feras Obeidat
Designing And Implementing B2B Applications Using Argumentative Agents, Jamal Bentahar, Nanjangud Narendra, Zakaria Maamar, Rafiul Alam, and Philippe Thiran
A Neural network approach to visibility range estimation under foggy weather conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, and Ansar Ul Haque Yasar
The computing professional skills assessment utilized with graduate students, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov
Large residual multiple view 3D CNN for false positive reduction in pulmonary nodule detection, Anton Dobrenkii, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan
Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems, Muhammad Fahim, Thar Baker, Asad Masood Khattak, and Omar Alfandi
Physical activity recognizer based on multimodal sensors in smartphone for ubiquitous-lifecare services, Muhammad Fahim, Asad Masood Khattak, Saiqa Aleem, and Haseena Al Katheeri
Joint workload scheduling and BBU allocation in cloud-RAN for 5G networks, Lilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, and Asad Masood Khattak
Deep learning models for bone suppression in chest radiographs, Maxim Gusarev, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Multimedia File Signature Analysis for Smartphone Forensics, D. Hamdi, F. Iqbal, T. Baker, and B. Shah
Securing the internet of things: A worst-case analysis of trade-off between query-anonymity and communication-cost, Kadhim Hayawi, Pin Han Ho, Sujith Samuel Mathew, and Limei Peng
A novel approach for analyzing student interaction with educational systems, Mohammed Hussain, M. Basel Al-Mourad, Abdullah Hussein, Sujith Mathew, and Essam Morsy
Continuous health monitoring using smartphones-A case-study for monitoring diabetic patients in UAE, A. J. Jihad, Sujith Samuel Mathew, Sujni Paul, and D. Ponmary Pushpalatha
Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance, Eleanna Kafeza, Christos Makris, and Gerasimos Rompolas
Forensic analysis of xbox one and playstation 4 gaming consoles, Salam Khanji, Raja Jabir, Farkhund Iqbal, and Andrew Marrington
Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD), Asad M. Khattak, Farkhund Iqbal, Patrick C.K. Hung, Jwo Shiun Sun, Guan Pu Pan, and Jing Jie Lin
Ongoing Research Agenda on the Internet of Things (IoT) in the Context of Artificial Intelligence (AI), Zakaria Maamar
A reference framework for enterprise computing curriculum, Munir Majdalawieh and Adam Marks
Learning systems' learning analytics, Adam Marks, Maytha Al-Ali, and Kees Rietsema
Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro, Rima Masri and Monther Aldwairi
From the Internet of Things to the web of things-enabling by sensing as-A service, Sujith Samuel Mathew, Yacine Atif, and May El-Barachi
A Decision support framework for public healthcare: An approach to follow-up support service, Shah Jahan Miah, John G. Gammack, Rashadul Hasan, and Najmul Hasan
Developing a framework towards design understanding for crowdsourcing research: A content analysis, Shah Jahan Miah, Najmul Hasan, Don Kerr, and John G. Gammack
Gamifying Foundational STEM Skills, Jim Morey, John Gammack, and Erik Thornquist
Towards safer roads through cooperative hazard awareness and avoidance in connected vehicles, Fatma Outay, Faouzi Kammoun, Florent Kaisser, and Mohammed Atiquzzaman
ConVeh: Driving Safely into a Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, and Samar El-Amine
Authorship attribution of Arabic tweets, Abdullateef Rabab'Ah, Mahmoud Al-Ayyoub, Yaser Jararweh, and Monther Aldwairi
Towards a Privacy Rule Conceptual Model for Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, and Shih-Chia Huang
Urban road network crisis response management: Time-sensitive decision optimization, Sinan Salman and Suzan Alaswad
Selecting Sensors when Forecasting Temperature in Smart Buildings, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi
Safe city: Introducing a flawless model and implementation guidelines to reduce crime rate and response time, Abdallah Tubaishat and Rami Elsayed
Collusion attacks in Internet of Things: Detection and mitigation using a fog based model, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub, and Monther Al Dwairi
Submissions from 2016
Bounded message delay with threshold time constraint in delay tolerant networks (DTNs), Ali Abbas, Babar Shah, Feras Al-Obeidat, and Farkhund Iqbal
An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment, Mohammad Abu-Lebdeh, Fatna Belqasmi, and Roch Glitho
Gait fingerprinting-based user identification on smartphones, Muhammad Ahmad, Adil Mehmood Khan, Joseph Alexander Brown, Stanislav Protasov, and Asad Masood Khattak
Challenges in managing real-time data in health information system (HIS), Usman Akhtar, Asad Masood Khattak, and Sungyoung Lee
Secure and efficient multiparty computation on genomic data, Md Momin Al Aziz, Mohammad Z. Hasan, Noman Mohammed, and Dima Alhadidi
Calculating the speed of vehicles using Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Mehdi Akbari Gurabi, Alberto Rivera Diaz, Md Istiak Mehedi, and Dieter Hogrefe
An Algorithm for Inferring Big Data Objects Correlation Using Word Net, M. Basel Almourad, Mohammed Hussain, and Talal Bonny
Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data, Feras Al-Obeidat, Leonardo Feltrin, and Farhi Marir
A meta-heuristic approach for developing PROAFTN with decision tree, Feras Al-Obeidat, Babar Shah, Asad Masood Khattak, and Ali Abbas
Predicting students' performance using mutli-criteria classification: A case study, Feras Al-Obeidat and Abdallah Tubasihat
Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service, Wael Alrahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, and Azzam Mourad
White-Hat Hacking Framework for Promoting Security Awareness, S. Al-Sharif, F. Iqbal, T. Baker, and A. Khattack
Significant Predictors of e-Learning Readiness for Faculty and Students in a Public University in the UAE, Fida Atallah and Jase Moussa-Inaty
A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra
Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar
A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer
Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee
A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe
Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung
Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra
Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah
Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah
Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli
Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan
Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar
Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry
A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad
Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew
Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said
Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid
Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said
Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi
Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet
On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami
Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat
Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali
Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque
A data visualisation for horizontal eye-movements, Jim Morey and John Gammack
Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra
An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli
Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah
Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak
A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim
Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi
Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat