• Paillier's encryption: Implementation and cloud applications 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Paillier's additive homomorphic encryption is increasingly used in recent research in the field of cloud secure outsourcing and privacy-preserving computation in addition to other cryptographic tools such as garbled circuits. ...
    • Parallelizing exact motif finding algorithms on multi-core 

      Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M. ( Springer Science+Business Media , 2014 , Article)
      The motif finding problem is one of the important and challenging problems in bioinformatics. A variety of sequential algorithms have been proposed to find exact motifs, but the running time is still not suitable due to ...
    • Performance Evaluation of No-Pairing ECC-Based KPABE on IoT Platforms 

      Hijawi, Ula; Unal, Devrim; Hamila, Ridha; Gastli, Adel; Ellabban, Omar ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Internet of Things (IoT) networks operating in lightweight resource-constrained devices have been growing constantly in a wide range of areas. Such networks collect sensitive information over time that represent the users' ...
    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Proportionally fair approach for tor's circuits scheduling 

      Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ...
    • Qatar Green Schools Initiative: Energy Management System with Cost-Efficient and Lightweight Networked IoT 

      Hijawi, Ula; Gastli, Adel; Hamila, Ridha; Ellabban, Omar; Unal, Devrim ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the growing need of developing real-time energy management and automation systems, building energy efficiency is of large focus in recent research. In particular, school buildings require special attention to occupants' ...
    • QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol 

      Basyoni L.; Erbad A.; Alsabah M.; Fetais N.; Mohamed A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ...
    • Real-time robotic avatar control using fuzzy gaze-classification for people with disability 

      Qidwai, Uvais; Shakir, Mohamed; Bahameish, Mariam ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Robotic control with gaze-classification has been an area of interest for quite some time. In this paper, a novel solution of implementing sensing system with intelligent visualization has been presented. Such a system can ...
    • Real-Time Scheduling for Electric Vehicles Charging/Discharging Using Reinforcement Learning 

      Mhaisen, N.; Fetais, N.; Massoud, Ahmed ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the increase in Electric Vehicles (EVs) penetration, their charging needs form an additional burden on the grid. Thus, charging coordination is necessary for safe and efficient EV use. The scheduling of EVs is especially ...
    • Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
      In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
    • Reasoning about security policies of services using answer set programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      In this paper, we propose a formal framework for checking the consistency of security policies of services using Answer Set Programming (ASP). We illustrate that the formalisation of security policies of the service providers ...
    • Robotic probe positioning system for structural health monitoring 

      Qidwai U.; Ijaz A.; Akbar A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Structural health Monitoring (SHM) is a very critical component for sustainable civil and mechanical structures in modern urban settings. The sky-scrappers and huge bridges in modern metropolis today are essential aspects ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System 

      Zubair, Mohammed; Ghubaish, Ali; Unal, Devrim; Al-Ali, Abdulla; Reimann, Thomas; ... more authors ( MDPI , 2022 , Article)
      Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • SLiFi: Exploiting Visible Light Communication VLC to Authenticate WiFi Access Points 

      Amin, Hafsa; Asadulla, Faryal; Jaffar, Aisha; Oligeri, Gabriele; Al-Sabah, Mashael ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      This work presents an effective and efficient solution (SLiFi) to the evil twin attack in wireless networks. The evil twin is a rogue Wifi Access Point (AP) that pretends to be an authentic one by using the same network ...
    • Smart energy usage and visualization based on micro-moments 

      Alsalemi, Abdullah; Bensaali, Faycal; Amira, Abbes; Fetais, Noora; Sardianos, Christos; ... more authors ( Springer Verlag , 2020 , Conference Paper)
      Due to global energy demands and overwhelming environmental dilemmas, exorbitant domestic energy usage is a colossal barrier towards energy efficiency. Tremendous research efforts have been poured into a plethora of methods ...
    • Smart Grid Cybersecurity: Standards and Technical Countermeasures 

      Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
    • SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution 

      Al-Nsour E.; Sleit A.; Alshraideh M. ( SAGE Publications Ltd , 2019 , Article)
      Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...