Research

Selected conference and journal publications of Computer Science faculty

231 entries « 1 of 5 »

2021

Naser AlDuaij; Jason Nieh

Tap: an app framework for dynamically composable mobile systems Inproceedings

In: Suman Banerjee; Luca Mottola; Xia Zhou (Ed.): MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June - 2 July, 2021, pp. 336–349, ACM, 2021.

Links | BibTeX

Zaid Hussain; Hosam M. F. AboElFotoh; Bader F. AlBdaiwi

Independent Spanning Trees in Eisenstein-Jacobi Networks Journal Article

In: CoRR, abs/2101.09797 , 2021.

Links | BibTeX

Hesham AlMansouri; Zaid Hussain

Real-Time Fault-Tolerance Node-to-Node Disjoint Paths Algorithm for Symmetric Networks Journal Article

In: CoRR, abs/2103.09801 , 2021.

Links | BibTeX

Mohammad Awadh; Zaid Hussain

Panconnectivity Algorithm for Eisenstein-Jacobi Networks Journal Article

In: CoRR, abs/2103.10500 , 2021.

Links | BibTeX

Hussain M. J. Almohri; Layne T. Watson; Homa Alemzadeh; Mohammad Al-Mutawa

On Parallel Real-Time Security Improvement Using Mixed-Integer Programming Journal Article

In: IEEE Access, 9 , pp. 58824–58837, 2021.

Links | BibTeX

Khalid Sultan; Jamal Bentahar; Hamdi Yahyaoui; Rabeb Mizouni

Model checking agent-based communities against uncertain group commitments and knowledge Journal Article

In: Expert Syst. Appl., 177 , pp. 114792, 2021.

Links | BibTeX

Ding-Chau Wang; Ing-Ray Chen; Hamid Al-Hamadi

Reliability of Autonomous Internet of Things Systems With Intrusion Detection Attack-Defense Game Design Journal Article

In: IEEE Trans. Reliab., 70 (1), pp. 188–199, 2021.

Links | BibTeX

2020

Hussain M. J. Almohri; Mohammad Al-Mutawa; Mahmoud Alawadh; Karim O. Elish

A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud Journal Article

In: Secur. Commun. Networks, 2020 , pp. 8873258:1–8873258:12, 2020.

Links | BibTeX

Hussain M. J. Almohri; Layne T. Watson; David Evans

Predictability of IP Address Allocations for Cloud Computing Platforms Journal Article

In: IEEE Trans. Inf. Forensics Secur., 15 , pp. 500–511, 2020.

Links | BibTeX

Hussain M. J. Almohri; Layne T. Watson; David Evans

An Attack-Resilient Architecture for the Internet of Things Journal Article

In: IEEE Trans. Inf. Forensics Secur., 15 , pp. 3940–3954, 2020.

Links | BibTeX

Mohammad Qasem; Hussain M. J. Almohri

An efficient deception architecture for cloud-based virtual networks Journal Article

In: CoRR, abs/2004.06933 , 2020.

Links | BibTeX

Mohamed Mejri; Hamdi Yahyaoui; Azzam Mourad; Mohamad Chehab

A rewriting system for the assessment of XACML policies relationship Journal Article

In: Comput. Secur., 97 , pp. 101957, 2020.

Links | BibTeX

Hamdi Yahyaoui; Hala S. Own; Ahmed Agwa; Zakaria Maamar

A novel scalable representative-based forecasting approach of service quality Journal Article

In: Computing, 102 (11), pp. 2471–2500, 2020.

Links | BibTeX

Hamid Al-Hamadi; Mohammad Saoud; Ing-Ray Chen; Jin-Hee Cho

Optimizing the Lifetime of IoT-Based Star and Mesh Networks Journal Article

In: IEEE Access, 8 , pp. 63090–63105, 2020.

Links | BibTeX

Hamid Al-Hamadi; Ing-Ray Chen; Ding-Chau Wang; Meshal Almashan

Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems Journal Article

In: IEEE Access, 8 , pp. 168994–169009, 2020.

Links | BibTeX

Hamid Al-Hamadi; Ing-Ray Chen; Ding-Chau Wang; Meshal Almashan

Corrections to "Attack and Defense Strategies for Intrusion Detection in Autonomous Distributed IoT Systems" Journal Article

In: IEEE Access, 8 , pp. 207181, 2020.

Links | BibTeX

Ehab Essa; M. Shamim Hossain; Ahmed S. Tolba; Hazem M. Raafat; Samir Elmougy; Ghulam Muhammad

Toward cognitive support for automated defect detection Journal Article

In: Neural Comput. Appl., 32 (9), pp. 4325–4333, 2020.

Links | BibTeX

2019

Naser AlDuaij; Alexander Van't Hof; Jason Nieh

Heterogeneous Multi-Mobile Computing Inproceedings

In: Junehwa Song; Minkyong Kim; Nicholas D. Lane; Rajesh Krishna Balan; Fahim Kawsar; Yunxin Liu (Ed.): Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019, pp. 494–507, ACM, 2019.

Links | BibTeX

Naser AlDuaij; Alexander Van't Hof; Jason Nieh

Heterogeneous Multi-Mobile Computing Inproceedings

In: Junehwa Song; Minkyong Kim; Nicholas D. Lane; Rajesh Krishna Balan; Fahim Kawsar; Yunxin Liu (Ed.): Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2019, Seoul, Republic of Korea, June 17-21, 2019, pp. 707, ACM, 2019.

Links | BibTeX

William Blanc; Lina G. Hashem; Karim O. Elish; Hussain M. J. Almohri

Identifying Android Malware Families Using Android-Oriented Metrics Inproceedings

In: Chaitanya Baru; Jun Huan; Latifur Khan; Xiaohua Hu; Ronay Ak; Yuanyuan Tian; Roger S. Barga; Carlo Zaniolo; Kisung Lee; Yanfang Fanny Ye (Ed.): 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, December 9-12, 2019, pp. 4708–4713, IEEE, 2019.

Links | BibTeX

Hamdi Yahyaoui; Reem Al-Daihani

A novel trend based SAX reduction technique for time series Journal Article

In: Expert Syst. Appl., 130 , pp. 113–123, 2019.

Links | BibTeX

Hamid Al-Hamadi; Ing-Ray Chen; Jin-Hee Cho

Trust Management of Smart Service Communities Journal Article

In: IEEE Access, 7 , pp. 26362–26378, 2019.

Links | BibTeX

Jin-Hee Cho; Hamid Al-Hamadi; Ing-Ray Chen

COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks Journal Article

In: IEEE Access, 7 , pp. 92296–92313, 2019.

Links | BibTeX

Ing-Ray Chen; Jia Guo; Ding-Chau Wang; Jeffrey J. P. Tsai; Hamid Al-Hamadi; Ilsun You

Trust-Based Service Management for Mobile Cloud IoT Systems Journal Article

In: IEEE Trans. Netw. Serv. Manag., 16 (1), pp. 246–263, 2019.

Links | BibTeX

Jia Guo; Ing-Ray Chen; Ding-Chau Wang; Jeffrey J. P. Tsai; Hamid Al-Hamadi

Trust-Based IoT Cloud Participatory Sensing of Air Quality Journal Article

In: Wirel. Pers. Commun., 105 (4), pp. 1461–1474, 2019.

Links | BibTeX

Hamid Al-Hamadi; Ing-Ray Chen; Ding-Chau Wang

Analysis of Attack-Defense Strategies in Autonomous Distributed IoT Systems Inproceedings

In: 14th IEEE International Symposium on Autonomous Decentralized System, ISADS 2019, Utrecht, The Netherlands, April 8-10, 2019, pp. 1–6, IEEE, 2019.

Links | BibTeX

2018

Zaid Hussain

An Improved One-to-All Broadcasting in Higher Dimensional Eisenstein-Jacobi Networks Inproceedings

In: Ivan Merelli; Pietro Liò; Igor V. Kotenko (Ed.): 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2018, Cambridge, United Kingdom, March 21-23, 2018, pp. 34–44, IEEE Computer Society, 2018.

Links | BibTeX

Hussain M. J. Almohri; Layne T. Watson; David Evans

Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds Journal Article

In: IEEE Trans. Inf. Forensics Secur., 13 (6), pp. 1361–1375, 2018.

Links | BibTeX

Hussain M. J. Almohri; David Evans

Fidelius Charm: Isolating Unsafe Rust Code Inproceedings

In: Ziming Zhao; Gail-Joon Ahn; Ram Krishnan; Gabriel Ghinita (Ed.): Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pp. 248–255, ACM, 2018.

Links | BibTeX

Hamdi Yahyaoui; Hala S. Own

Unsupervised clustering of service performance behaviors Journal Article

In: Inf. Sci., 422 , pp. 558–571, 2018.

Links | BibTeX

Ing-Ray Chen; Jia Guo; Ding-Chao Wang; Jeffrey J. P. Tsai; Hamid Al-Hamadi; Ilsun You

Trust as a Service for IoT Service Management in Smart Cities Inproceedings

In: 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018, Exeter, United Kingdom, June 28-30, 2018, pp. 1358–1365, IEEE, 2018.

Links | BibTeX

Mubarak Al-Marri; Hazem M. Raafat; Mustafa Abdallah; Sherif M. Abdou; Mohsen A. Rashwan

Computer Aided Qur'an Pronunciation using DNN Journal Article

In: J. Intell. Fuzzy Syst., 34 (5), pp. 3257–3271, 2018.

Links | BibTeX

2017

Jeremy Andrus; Naser AlDuaij; Jason Nieh

Binary compatible graphics support in Android for running iOS apps Inproceedings

In: K. R. Jayaram; Anshul Gandhi; Bettina Kemme; Peter R. Pietzuch (Ed.): Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11 - 15, 2017, pp. 55–67, ACM, 2017.

Links | BibTeX

Zaid Hussain; Arash Shamaei

Higher dimensional Eisenstein-Jacobi networks Journal Article

In: J. Parallel Distributed Comput., 102 , pp. 91–102, 2017.

Links | BibTeX

Zaid Hussain; Bader F. AlBdaiwi; Anton Cerný

Node-independent spanning trees in Gaussian networks Journal Article

In: J. Parallel Distributed Comput., 109 , pp. 324–332, 2017.

Links | BibTeX

Zaid Hussain; Bader F. AlBdaiwi; Anton Cerný

Node-Independent Spanning Trees in Gaussian Networks Journal Article

In: CoRR, abs/1701.02991 , 2017.

Links | BibTeX

Mohamed Raef Smaoui

A Novel Method to Investigate the Effect of Social Network "Hook" Images on Purchasing Prospects in E-Commerce Journal Article

In: Complexity, 2017 , pp. 9264920:1–9264920:16, 2017.

Links | BibTeX

Xun Tang; Maha Alabduljalil; Xin Jin; Tao Yang

Partitioned Similarity Search with Cache-Conscious Data Traversal Journal Article

In: ACM Trans. Knowl. Discov. Data, 11 (3), pp. 34:1–34:38, 2017.

Links | BibTeX

Mansour Abdulaziz

Data Collection Techniques Using Multi-Channel Network Coding in Low-Power and Lossy Networks PhD Thesis

George Mason University, Fairfax, Virginia, USA, 2017.

Links | BibTeX

Mansour Abdulaziz; Robert Simon

MuTrans: A multi-channel network coding approach to mobile data collection Inproceedings

In: 13th Annual Conference on Wireless On-demand Network Systems and Services, WONS 2017, Jackson, WY, USA, February 21-24, 2017, pp. 120–123, IEEE, 2017.

Links | BibTeX

Mehmet Hakan Karaata; Fawaz M. AlAzemi

An optimal adaptive stabilizing algorithm for two edge-disjoint paths problem Journal Article

In: The Journal of Supercomputing, 73 (3), pp. 1257–1273, 2017.

Links | BibTeX

Hussain M. J. Almohri; Long Cheng; Danfeng Yao; Homa Alemzadeh

On Threat Modeling and Mitigation of Medical Cyber-Physical Systems Inproceedings

In: Paolo Bonato; Honggang Wang (Ed.): Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2017, Philadelphia, PA, USA, July 17-19, 2017, pp. 114–119, IEEE Computer Society / ACM, 2017.

Links | BibTeX

Hussain M. J. Almohri; Sayed A. Almohri

Security Evaluation by Arrogance: Saving Time and Money Inproceedings

In: 1st IEEE/ACM International Workshop on Software Engineeting for Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017, pp. 12–16, IEEE, 2017.

Links | BibTeX

Mohamed Mejri; Hamdi Yahyaoui

Formal specification and integration of distributed security policies Journal Article

In: Comput. Lang. Syst. Struct., 49 , pp. 1–35, 2017.

Links | BibTeX

Jumana El-Qurna; Hamdi Yahyaoui; Mohammed Almulla

A new framework for the verification of service trust behaviors Journal Article

In: Knowl. Based Syst., 121 , pp. 7–22, 2017.

Links | BibTeX

Hamid Al-Hamadi; Ing-Ray Chen

Trust-Based Decision Making for Health IoT Systems Journal Article

In: IEEE Internet Things J., 4 (5), pp. 1408–1419, 2017.

Links | BibTeX

Jia Guo; Ing-Ray Chen; Ding-Chao Wang; Jeffrey J. P. Tsai; Hamid Al-Hamadi

A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces Inproceedings

In: Antonio J. Tallón-Ballesteros; Kaicheng Li (Ed.): Fuzzy Systems and Data Mining III - Proceedings of FSDM 2017 [Hualien, Taiwan, November 2017], pp. 479–484, IOS Press, 2017.

Links | BibTeX

Hazem M. Raafat; M. Shamim Hossain; Ehab Essa; Samir Elmougy; Ahmed S. Tolba; Ghulam Muhammad; Ahmed Ghoneim

Fog Intelligence for Real-Time IoT Sensor Data Analytics Journal Article

In: IEEE Access, 5 , pp. 24062–24069, 2017.

Links | BibTeX

Bader F. AlBdaiwi; Hosam M. F. AboElFotoh

A GPU-based genetic algorithm for the p-median problem Journal Article

In: J. Supercomput., 73 (10), pp. 4221–4244, 2017.

Links | BibTeX

2016

Bader Albader; Bella Bose

Edge Disjoint Hamiltonian Cycles in Gaussian Networks Journal Article

In: IEEE Trans. Computers, 65 (1), pp. 315–321, 2016.

Links | BibTeX

231 entries « 1 of 5 »