An overview of enabling technologies for the Internet of Things F Alsubaei, A Abuhussein, S Shiva Internet of Things A to Z: Technologies and Applications, 77-112, 2018 | 211* | 2018 |
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment F Alsubaei, S Shiva, A Abuhussein The 2nd IEEE International Workshop on Networks of Sensors, Wearable, and …, 2017 | 199 | 2017 |
IoMT-SAF: Internet of medical things security assessment framework F Alsubaei, A Abuhussein, V Shandilya, S Shiva Internet of Things 8, 100123, 2019 | 170 | 2019 |
Security threats classification in blockchains JH Mosakheil | 84 | 2018 |
Ensemble classifiers for network intrusion detection using a novel network attack dataset A Mahfouz, A Abuhussein, D Venugopal, S Shiva Future Internet 12 (11), 180, 2020 | 70 | 2020 |
Ontology-based security recommendation for the internet of medical things F Alsubaei, A Abuhussein, S Shiva IEEE Access 7, 48948-48960, 2019 | 55 | 2019 |
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective A Abuhussein, H Bedi, S Shiva 2012 international conference for internet technology and secured …, 2012 | 55 | 2012 |
Access control in fog computing: Challenges and research agenda MA Aleisa, A Abuhussein, FT Sheldon IEEE Access 8, 83986-83999, 2020 | 44 | 2020 |
Novel Approach to Task Scheduling and Load Balancing Using the Dominant Sequence Clustering and Mean Shift Clustering Algorithms A Al-Rahayfeh, S Atiewi, A Abuhussein, M Almiani Future Internet 2019 11 (5), 109, 2019 | 41 | 2019 |
A framework for ranking IoMT solutions based on measuring security and privacy F Alsubaei, A Abuhussein, S Shiva Proceedings of the Future Technologies Conference (FTC) 2018: Volume 1, 205-224, 2019 | 34 | 2019 |
Social-Guard: Detecting Scammers in Online Dating S Al-Rousan, A Abuhussein, F Alsubaei, O Kahveci, H Farra, S Shiva 20th Annual IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY …, 2020 | 25 | 2020 |
Impact of Virtualization on Cloud Computing Energy Consumption: Empirical Study S Atiewi, A Abuhussein, M Abu Saleh 2018 International Conference on Cyber Physical Systems and IoT (CPSIOT 2018), 2018 | 25 | 2018 |
A Survey of Cloud Computing Taxonomies: Rationale and Overview F Polash, A Abuhussein, S Shiva In Internet Technology And Secured Transactions Internet Technology And …, 2014 | 19 | 2014 |
Fine-grained access control in the era of cloud computing: An analytical review K Albulayhi, A Abuhussein, F Alsubaei, FT Sheldon 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 18 | 2020 |
Quantifying security and privacy in Internet of Things solutions F Alsubaei, A Abuhussein, S Shiva NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2018 | 16 | 2018 |
Toward an effective requirement engineering approach for cloud applications A Abuhussein, F Alsubaei, S Shiva Software Engineering in the Era of Cloud Computing, 29-50, 2020 | 15* | 2020 |
Network Intrusion Detection Model Using One-Class Support Vector Machine AM Mahfouz, A Abuhussein, D Venugopal, SG Shiva Advances in Machine Learning and Computational Intelligence, 79-86, 2020 | 14 | 2020 |
Security benchmarks for wearable medical things: stakeholders-centric approach SR Putta, A Abuhussein, F Alsubaei, S Shiva, S Atiewi Fourth International Congress on Information and Communication Technology …, 2020 | 14 | 2020 |
CSSR: Cloud Services Security Recommender A Abuhussein, S Shiva, FT Sheldon 2016 IEEE World Congress on Services (SERVICES), 48 - 55, 2016 | 14 | 2016 |
Performance analysis of two cloud-based iot implementations: Empirical study M Aleisa, AA Hussein, F Alsubaei, FT Sheldon 2020 7th IEEE International conference on cyber security and cloud computing …, 2020 | 10 | 2020 |