Follow

Submissions from 2018

Link

Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun

Link

Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi

Link

Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung

The X-supply game, Sinan Salman and Suzan Alaswad

Link

A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz

Link

Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah

Link

The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi

PDF

A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat

Link

Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane

Link

Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow

PDF

An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi

Link

Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak

Link

Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Submissions from 2017

PDF

Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah

Link

Evaluation of healthcare enterprise information systems: A structural equation model, Ahed Abugabah

Link

Unsupervised geometrical feature learning from hyperspectral data, Muhammad Ahmad, Adil Mehmood Khan, Rasheed Hussain, Stanislav Protasov, Francis Chow, and Asad Masood Khattak

Link

FLUKES: Autonomous log forensics, intelligence and visualization tool, Monther Aldwairi and Hesham H. Alsaadi

Link

Architecture guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, Asad Khatak, and Raja Muhammad Ubaid Ullah

The best practice in implementing itil service transition for successful it service production, Mohamed Basel Almourad, Mohammed Hussain, and Feras Al-Obeidat

PDF

Identifying Major Tasks from On-line Reviews, Feras Al-Obeidat and Bruce Spencer

Link

Compromised user credentials detection using temporal features: A prudent based approach, Adnan Amin, Sajid Anwar, Babar Shah, and Asad Masood Khattak

Link

Variants of spray and forwarding scheme in delay tolerant networks, Mohammad Abdul Azim, Babar Shah, Beom Su Kim, Kyong Hoon Kim, and Ki Il Kim

PDF

The Creation of an Arabic Emotion Ontology Based on E-Motive, Anoud Bani-Hani, Munir Majdalweieh, and Feras Obeidat

Link

Designing And Implementing B2B Applications Using Argumentative Agents, Jamal Bentahar, Nanjangud Narendra, Zakaria Maamar, Rafiul Alam, and Philippe Thiran

PDF

A Neural network approach to visibility range estimation under foggy weather conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, and Ansar Ul Haque Yasar

Link

The computing professional skills assessment utilized with graduate students, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov

Link

Large residual multiple view 3D CNN for false positive reduction in pulmonary nodule detection, Anton Dobrenkii, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Link

Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan

Link

Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems, Muhammad Fahim, Thar Baker, Asad Masood Khattak, and Omar Alfandi

Link

Physical activity recognizer based on multimodal sensors in smartphone for ubiquitous-lifecare services, Muhammad Fahim, Asad Masood Khattak, Saiqa Aleem, and Haseena Al Katheeri

Link

Joint workload scheduling and BBU allocation in cloud-RAN for 5G networks, Lilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, and Asad Masood Khattak

Link

Deep learning models for bone suppression in chest radiographs, Maxim Gusarev, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Link

Multimedia File Signature Analysis for Smartphone Forensics, D. Hamdi, F. Iqbal, T. Baker, and B. Shah

Link

Securing the internet of things: A worst-case analysis of trade-off between query-anonymity and communication-cost, Kadhim Hayawi, Pin Han Ho, Sujith Samuel Mathew, and Limei Peng

Link

A novel approach for analyzing student interaction with educational systems, Mohammed Hussain, M. Basel Al-Mourad, Abdullah Hussein, Sujith Mathew, and Essam Morsy

Link

Continuous health monitoring using smartphones-A case-study for monitoring diabetic patients in UAE, A. J. Jihad, Sujith Samuel Mathew, Sujni Paul, and D. Ponmary Pushpalatha

Link

Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance, Eleanna Kafeza, Christos Makris, and Gerasimos Rompolas

Link

Forensic analysis of xbox one and playstation 4 gaming consoles, Salam Khanji, Raja Jabir, Farkhund Iqbal, and Andrew Marrington

Link

Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD), Asad M. Khattak, Farkhund Iqbal, Patrick C.K. Hung, Jwo Shiun Sun, Guan Pu Pan, and Jing Jie Lin

Link

Ongoing Research Agenda on the Internet of Things (IoT) in the Context of Artificial Intelligence (AI), Zakaria Maamar

Link

A reference framework for enterprise computing curriculum, Munir Majdalawieh and Adam Marks

Link

Learning systems' learning analytics, Adam Marks, Maytha Al-Ali, and Kees Rietsema

Link

Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro, Rima Masri and Monther Aldwairi

Link

From the Internet of Things to the web of things-enabling by sensing as-A service, Sujith Samuel Mathew, Yacine Atif, and May El-Barachi

A Decision support framework for public healthcare: An approach to follow-up support service, Shah Jahan Miah, John G. Gammack, Rashadul Hasan, and Najmul Hasan

Developing a framework towards design understanding for crowdsourcing research: A content analysis, Shah Jahan Miah, Najmul Hasan, Don Kerr, and John G. Gammack

Link

Gamifying Foundational STEM Skills, Jim Morey, John Gammack, and Erik Thornquist

Link

Towards safer roads through cooperative hazard awareness and avoidance in connected vehicles, Fatma Outay, Faouzi Kammoun, Florent Kaisser, and Mohammed Atiquzzaman

PDF

ConVeh: Driving Safely into a Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, and Samar El-Amine

Link

Authorship attribution of Arabic tweets, Abdullateef Rabab'Ah, Mahmoud Al-Ayyoub, Yaser Jararweh, and Monther Aldwairi

PDF

Towards a Privacy Rule Conceptual Model for Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, and Shih-Chia Huang

Urban road network crisis response management: Time-sensitive decision optimization, Sinan Salman and Suzan Alaswad

PDF

Selecting Sensors when Forecasting Temperature in Smart Buildings, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi

Safe city: Introducing a flawless model and implementation guidelines to reduce crime rate and response time, Abdallah Tubaishat and Rami Elsayed

Link

Collusion attacks in Internet of Things: Detection and mitigation using a fog based model, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub, and Monther Al Dwairi

Submissions from 2016

Link

Bounded message delay with threshold time constraint in delay tolerant networks (DTNs), Ali Abbas, Babar Shah, Feras Al-Obeidat, and Farkhund Iqbal

PDF

An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment, Mohammad Abu-Lebdeh, Fatna Belqasmi, and Roch Glitho

Link

Gait fingerprinting-based user identification on smartphones, Muhammad Ahmad, Adil Mehmood Khan, Joseph Alexander Brown, Stanislav Protasov, and Asad Masood Khattak

Link

Challenges in managing real-time data in health information system (HIS), Usman Akhtar, Asad Masood Khattak, and Sungyoung Lee

Link

Secure and efficient multiparty computation on genomic data, Md Momin Al Aziz, Mohammad Z. Hasan, Noman Mohammed, and Dima Alhadidi

Link

Calculating the speed of vehicles using Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Mehdi Akbari Gurabi, Alberto Rivera Diaz, Md Istiak Mehedi, and Dieter Hogrefe

PDF

An Algorithm for Inferring Big Data Objects Correlation Using Word Net, M. Basel Almourad, Mohammed Hussain, and Talal Bonny

PDF

Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data, Feras Al-Obeidat, Leonardo Feltrin, and Farhi Marir

Link

A meta-heuristic approach for developing PROAFTN with decision tree, Feras Al-Obeidat, Babar Shah, Asad Masood Khattak, and Ali Abbas

Predicting students' performance using mutli-criteria classification: A case study, Feras Al-Obeidat and Abdallah Tubasihat

PDF

Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service, Wael Alrahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, and Azzam Mourad

Link

White-Hat Hacking Framework for Promoting Security Awareness, S. Al-Sharif, F. Iqbal, T. Baker, and A. Khattack

Link

Significant Predictors of e-Learning Readiness for Faculty and Students in a Public University in the UAE, Fida Atallah and Jase Moussa-Inaty

PDF

A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra

PDF

Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar

PDF

A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer

Link

Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee

Link

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe

Link

Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung

Link

Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra

Link

Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah

Link

Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah

PDF

Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli

Link

Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan

Link

Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar

Link

Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry

Link

A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew

Link

Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said

Link

Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid

Link

Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said

Link

Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi

Link

Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet

Link

On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami

PDF

Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat

Link

Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali

Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque

Link

A data visualisation for horizontal eye-movements, Jim Morey and John Gammack

Link

Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra

PDF

An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli

Link

Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah

Link

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak

Link

A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim

PDF

Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi

PDF

Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat