Follow

Submissions from 2016

PDF

An Algorithm for Inferring Big Data Objects Correlation Using Word Net, M. Basel Almourad, Mohammed Hussain, and Talal Bonny

PDF

Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data, Feras Al-Obeidat, Leonardo Feltrin, and Farhi Marir

Link

A meta-heuristic approach for developing PROAFTN with decision tree, Feras Al-Obeidat, Babar Shah, Asad Masood Khattak, and Ali Abbas

Predicting students' performance using mutli-criteria classification: A case study, Feras Al-Obeidat and Abdallah Tubasihat

PDF

Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service, Wael Alrahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, and Azzam Mourad

Link

White-Hat Hacking Framework for Promoting Security Awareness, S. Al-Sharif, F. Iqbal, T. Baker, and A. Khattack

PDF

A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra

PDF

Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar

PDF

A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer

Link

Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee

Link

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe

Link

Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung

Link

Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra

Link

Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah

Link

Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah

PDF

Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli

Link

Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan

Link

Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar

Link

Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry

Link

A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew

Link

Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said

Link

Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid

Link

Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said

Link

Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi

Link

Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet

Link

On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami

PDF

Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat

Link

Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali

Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque

Link

A data visualisation for horizontal eye-movements, Jim Morey and John Gammack

Link

Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra

PDF

An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli

Link

Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah

Link

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak

Link

A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim

PDF

Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi

PDF

Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat

Link

IoT end-user applications provisioning in the cloud: State of the art, Sami Yangui, Roch H. Glitho, Fatna Belqasmi, Monique J. Morrow, and Paul A. Polakos

Link

Android device hacking tricks and countermeasures, Khulood Al Zaabi

Link

Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks, Khulood Ali Al Zaabi

Submissions from 2015

Link

Smart parking system for vehicles, Sripriya Srikant Adhatarao, Omar Alfandi, Arne Bochem, and Dieter Hogrefe

Link

Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters, Monther Aldwairi and Koloud Al-Khamaiseh

Link

Challenges of leveraging mobile sensing devices in wireless healthcare, Omar Alfandi, Suhail Ahmed, May El Barachi, and Adil Khan

Link

Received signal strength indication for movement detection, Omar Alfandi, Arne Bochem, Kirill Bulert, Dieter Hogrefe, and Alwin Maier

Link

Social learning on the move - A research roadmap, Dima Alhadidi, Zakaria Maamar, and Farhi Marir

Link

Towards HSS as a virtualized service for 5G networks, Hanieh Alipour, Fatna Belqasmi, Mohammad Abu-Lebdeh, and Roch Glitho

Link

Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington

Link

Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal

Link

A new information model towards context-aware service provisioning in the Internet-of-Things, Mohab Aly, May Elbarachi, and Rachida Dssouli

Link

A novel cryptography based privacy preserving solution for urban mobility and traffic control, Mohamad Badra and Elyes Ben Hamida

Link

An innovative platform for person-centric health and wellness support, Oresti Banos, Muhammad Bilal Amin, Wajahat Ali Khan, Muhammad Afzel, Mahmood Ahmad, Maqbool Ali, Taqdir Ali, Rahman Ali, Muhammad Bilal, Manhyung Han, Jamil Hussain, Maqbool Hussain, Shujaat Hussain, Tae Ho Hur, Jae Hun Bang, Thien Huynh-The, Muhammad Idris, Dong Wook Kang, Sang Beom Park, Hameed Siddiqui, Le Ba Vui, Muhammad Fahim, Asad Masood Khattak, Byeong Ho Kang, and Sungyoung Lee

Link

NGNaaS: NGNs as cloud computing services, Fatna Belqasmi, May El Barachi, Jose M.Alcaraz Calero, Mohamad Badra, and Omar Alfandi

Link

An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center, Faouzi Kamoun, Omar Alfandi, and Sami Miniaoui

PDF

Weaving risk identification into crowdsourcing lifecycle, Faouzi Kamoun, Dima Alhadidi, and Zakaria Maamar

Link

Correlating health and wellness analytics for personalized decision making, Wajahat Ali Khan, Muhammad Idris, Taqdir Ali, Rahman Ali, Shujaat Hussain, Maqbool Hussain, Muhammad Bilal Amin, Asad Masood Khattak, Yuan Weiwei, Muhammad Afzal, Sungyoung Lee, and Byeong Ho Kang

Link

Secure and private management of healthcare databases for data mining, Noman Mohammed, Samira Barouti, Dima Alhadidi, and Rui Chen

Link

Interface development for a gaze-controlled reading support application, Jim Morey, John Gammack, and Erik S. Thornquist

Link

How can one learn mathematical word problems in a second language? A cognitive load perspective, Jase Moussa-Inaty, Mark Causapin, and Timothy Groombridge

Submissions from 2014

Link

CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

An information security awareness program to address common security concerns in IT unit, Shadi Al Awawdeh and Abdallah Tubaishat

Link

A comparison of forensic acquisition techniques for android devices: A case study investigation of orweb browsing sessions, Nedaa Al Barghouthy and Andrew Marrington

Link

Ethics behind cyber warfare: A study of Arab citizens awareness, Nedaa Baker Al Barghuthi and Huwida Said

Link

An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi

Link

A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal

Link

Online engineering courses: Benchmarking quality, Maurice Danaher

Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 Moscow, Russia, September 26–27, 2013 revised selected papers, Pavel Gladyshev, Andrew Marrington, and Ibrahim Baggili

Link

Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal

Link

Differentiated QoS for overlay-based disaster response systems, Mohammadmajid Hormati, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi

Link

An authentication scheme to protect the location privacy of femtocell users, Mohammed Hussain

Link

Trust in Mobile Cloud Computing with LTE-based Deployment, Mohammed Hussain and Basel Mohamed Almourad

Link

Effective third party auditing in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

A new business model and architecture for context-aware applications provisioning in the cloud, Nadjia Kara, May El Barachi, Abderrahmane El Bardai, and Omar Alfandi

Impact of cloud computing adoption on firm stock price - An empirical research, Adam M. Mahmood, Faruk Arslan, Jagadish Dandu, Godwin Udo, and Aurelia Nicholas-Donald

Link

Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Testing the forensic soundness of forensic examination environments on bootable media, Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

Link

An infrastructure for robotic applications as cloud computing services, Carla Mouradian, Fatima Zahra Errounda, Fatna Belqasmi, and Roch Glitho

Link

Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem, Hani Nemati, Arjun Singhvi, Nadjia Kara, and May El Barachi

Link

A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Razieh Safaripour, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi

Submissions from 2013

Deploying open source software (OSS) in UAE schools, Manar Abu Talib, Mezhel Bashayer, Abdulla Huda, Khalid Reem, and Ali Zamzam

Link

Critical structure of ethics behind offensive cyber warfare, Nedaa B. Al Barghouthi and Huwida Said

Link

Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs, Omar Alfandi, Arne Bochem, Ansgar Kellner, and Dieter Hogrefe

Link

BlackBerry PlayBook backup forensic analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington

Link

Towards a unified agent-based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi

Link

The forensic investigation of android private browsing sessions using orweb, Nedaa Al Barghouthy, Andrew Marrington, and Ibrahim Baggili

Link

Symmetrically-private database search in cloud computing, Samira Barouti, Dima Alhadidi, and Mourad Debbabi

Link

An Introduction to Business Problem-Solving and Decision-Making, John C. Beachboard and Kregg Aytes

Link

An architecture for QoS-enabled video telephony in a 3GPP 4G evolved packet core environment, Fatna Belqasmi, Hanieh Alipour, Malek El Ferjani, and Roch Glitho

Link

The design and implementation of a wireless healthcare application for WSN-enabled IMS environments, May El Barachi and Omar Alfandi

Link

A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks, May El Barachi, Sleiman Rabah, Nadjia Kara, Rachida Dssouli, and Joey Paquet

Link

The study of the interrelation between law programs and digital forensics in UAE Academia, Asif Iqbal, Hanan Al Obaidli, Huwida Said, and Mario Guimaraes

Link

WCAG 1.0 versus WCAG 2.0 Web Accessibility Compliance: A Case Study, Faouzi Kamoun, Basel M. Al Mourad, and Emad Bataineh

Link

Enhancing protection techniques of e-banking security services using open source cryptographic algorithms, Adel Khelifi, Maher Aburrous, Manar Abu Talib, and P. V.S. Shastry

Link

A reliable mobile application for safety on roads, Adel Khelifi, Lama Mahmoud Daoud, and Manar Abu Talib

Link

A social network-based architecture for on-line RoSCAs in the developing world, Gilles Kounou, Christian Akpona, Herve Ahouantchede, Rose Gohoue, Fatna Belqasmi, and Roch Glitho

Link

Students' perception on the use of visual tilings to support their learning of programming concepts, Hai Ning Liang, Charles Fleming, Jim Morey, Kamran Sedig, and Ka Lok Man

Link

Towards an efficient sales pitch with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar

Link

An E-health Infrastructure Design to Support Management of Lifestyle Disease, Shah Jahan Miah, John G. Gammack, and Md. Jahidul Hasan

Link

Innovative RFID solution for tracking and control, Sami Miniaoui and Faouzi Kamoun