Follow
Jemal Abawajy
Jemal Abawajy
Full Professor, Deakin University, Australia
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
A Beloglazov, J Abawajy, R Buyya
Future generation computer systems 28 (5), 755-768, 2012
31522012
Energy-efficient management of data center resources for cloud computing: A vision, architectural elements, and open challenges
R Buyya, A Beloglazov, J Abawajy
arXiv preprint arXiv:1006.0308, 2010
8212010
User preference of cyber security awareness delivery methods
J Abawajy
Behaviour & Information Technology 33 (3), 237-248, 2014
4042014
Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study
E Baccarelli, PGV Naranjo, M Scarpiniti, M Shojafar, JH Abawajy
IEEE access 5, 9882-9910, 2017
3192017
Federated internet of things and cloud computing pervasive patient health monitoring system
JH Abawajy, MM Hassan
IEEE Communications Magazine 55 (1), 48-53, 2017
2432017
Fault-tolerant scheduling policy for grid computing systems
JH Abawajy
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
2112004
Failure-aware resource provisioning for hybrid cloud infrastructure
B Javadi, J Abawajy, R Buyya
Journal of parallel and distributed computing 72 (10), 1318-1331, 2012
2062012
A rough set approach for selecting clustering attribute
T Herawan, MM Deris, JH Abawajy
Knowledge-Based Systems 23 (3), 220-231, 2010
1902010
Power graphs: a survey
J Abawajy, A Kelarev, M Chowdhury
Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013
1712013
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
Journal of Network and Computer Applications 36 (1), 324-335, 2013
1512013
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li
Future Generation Computer Systems 86, 836-850, 2018
1352018
Determining service trustworthiness in intercloud computing environments
J Abawajy
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1262009
Big data in complex systems
AE Hassanien, AT Azar, V Snasael, J Kacprzyk, JH Abawajy
SBD 9, 2015
1222015
Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems
NR Sabar, J Abawajy, J Yearwood
IEEE Transactions on Evolutionary Computation 21 (2), 315-327, 2016
1172016
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1162012
A data fusion method in wireless sensor networks
D Izadi, JH Abawajy, S Ghanavati, T Herawan
Sensors 15 (2), 2964-2979, 2015
1092015
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1082016
A layered security approach for cloud computing infrastructure
M Yildiz, J Abawajy, T Ercan, A Bernoth
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1042009
Privacy preserving social network data publication
JH Abawajy, MIH Ninggal, T Herawan
IEEE communications surveys & tutorials 18 (3), 1974-1997, 2016
1032016
An efficient replicated data access approach for large-scale distributed systems
MM Deris, JH Abawajy, A Mamat
Future Generation Computer Systems 24 (1), 1-9, 2008
942008
The system can't perform the operation now. Try again later.
Articles 1–20