TitleAuthorPublication DatePublisherType
    CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems  Zhang, Fan; Malluhi, Qutaibah M.; Elsayed, Tamer; Khan, Samee U.; Li, Keqin; ... more authors 2015ElsevierArticle
    CloudSafe: A tool for an automated security analysis for cloud computing  An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Empirical performance evaluation of QUIC protocol for Tor anonymity network  Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Empowering users of cloud computing on data confidentiality  Khan, Khaled M.; Shaheen, Mahboob2014IEEEConference Paper
    Multi-moth flame optimization for solving the link prediction problem in complex networks  Barham R.; Sharieh A.; Sleit A.2019Springer VerlagArticle
    Secure smart contract-enabled control of battery energy storage systems against cyber-attacks  Mhaisen N.; Fetais N.; Massoud A.2019Elsevier B.V.Article
    ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud  Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Conference Paper