Collections in this community

Recent Submissions

TitleAuthorPublication DatePublisherType
Empirical performance evaluation of QUIC protocol for Tor anonymity network  Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
CloudSafe: A tool for an automated security analysis for cloud computing  An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
Systematic identification of threats in the cloud: A Survey  Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors 2019Elsevier B.V.Article
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report  Qidwai U.; Ajimsha M.S.; Shakir M.2019Churchill LivingstoneArticle
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution  Al-Nsour E.; Sleit A.; Alshraideh M.2019SAGE Publications LtdArticle
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud  Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
Multi-Objective Security Hardening Optimisation for Dynamic Networks  Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
Multi-moth flame optimization for solving the link prediction problem in complex networks  Barham R.; Sharieh A.; Sleit A.2019Springer VerlagArticle
Secure smart contract-enabled control of battery energy storage systems against cyber-attacks  Mhaisen N.; Fetais N.; Massoud A.2019Elsevier B.V.Article
Stateless Security Risk Assessment for Dynamic Networks  Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
SpiralSRA: A threat-specific security risk assessment framework for the cloud  Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors 2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Visualization as a mean of big data management: Using Qatar's electricity consumption data  Soliman E.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Short survey of techniques for visualizing events recorded in logs  Fernandez R.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing  Khan K.; Shaheen M.; Wang Y.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Smart Grid Cybersecurity: Standards and Technical Countermeasures  Hussain S.; Meraj M.; Abughalwa M.; Shikfa A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques  Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Virtual Reality Glove for Falconry  Al-Hathal T.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach  Al Mamun A.; Abdullah Al Mamun M.; Shikfa A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
Dynamic security metrics for measuring the effectiveness of moving target defense techniques  Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors 2018Elsevier LtdArticle
Deep learning for detection of routing attacks in the internet of things  YAVUZ, Furkan Yusuf; ÜNAL, Devrim; GÜL, Ensar2018Atlantis PressArticle

View more