Jemal Hussien
Jemal Hussien
Full Professor, Deakin University, Australia
Verified email at - Homepage
Cited by
Cited by
Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
A Beloglazov, J Abawajy, R Buyya
Future generation computer systems 28 (5), 755-768, 2012
Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges
R Buyya, A Beloglazov, J Abawajy
arXiv preprint arXiv:1006.0308, 2010
User preference of cyber security awareness delivery methods
J Abawajy
Behaviour & Information Technology 33 (3), 237-248, 2014
Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study
E Baccarelli, PGV Naranjo, M Scarpiniti, M Shojafar, JH Abawajy
IEEE access 5, 9882-9910, 2017
Fault-tolerant scheduling policy for grid computing systems
JH Abawajy
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
Failure-aware resource provisioning for hybrid cloud infrastructure
B Javadi, J Abawajy, R Buyya
Journal of parallel and distributed computing 72 (10), 1318-1331, 2012
A rough set approach for selecting clustering attribute
T Herawan, MM Deris, JH Abawajy
Knowledge-Based Systems 23 (3), 220-231, 2010
Federated internet of things and cloud computing pervasive patient health monitoring system
JH Abawajy, MM Hassan
IEEE Communications Magazine 55 (1), 48-53, 2017
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
Journal of Network and Computer Applications 36 (1), 324-335, 2013
Power graphs: A survey
J Abawajy, A Kelarev, M Chowdhury
Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013
Determining service trustworthiness in intercloud computing environments
J Abawajy
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
Big data in complex systems
AE Hassanien, AT Azar, V Snasael, J Kacprzyk, JH Abawajy
SBD 9, 2015
A layered security approach for cloud computing infrastructure
M Yildiz, J Abawajy, T Ercan, A Bernoth
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
An efficient replicated data access approach for large-scale distributed systems
MM Deris, JH Abawajy, A Mamat
Future Generation Computer Systems 24 (1), 1-9, 2008
Parallel job scheduling on multicluster computing systems
JH Abawajy, SP Dandamudi
null, 11, 2003
Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems
NR Sabar, J Abawajy, J Yearwood
IEEE Transactions on Evolutionary Computation 21 (2), 315-327, 2016
A data fusion method in wireless sensor networks
D Izadi, JH Abawajy, S Ghanavati, T Herawan
Sensors 15 (2), 2964-2979, 2015
Privacy preserving social network data publication
JH Abawajy, MIH Ninggal, T Herawan
IEEE communications surveys & tutorials 18 (3), 1974-1997, 2016
An Approach to Support a Single Service Provider Address Image for Wide Area Networks Environment
JH Abawajy
Proceedings International Conference on Parallel Computing in Electrical …, 2000
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li
Future Generation Computer Systems 86, 836-850, 2018
The system can't perform the operation now. Try again later.
Articles 1–20