Jemal Abawajy
Deakin University
H-index: 58
Oceania-Australia
Top articles of Jemal Abawajy
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Untraceable blockchain-assisted authentication and key exchange in medical consortiums | Journal of Systems Architecture | Ali Shahidinejad Jemal Abawajy Shamsul Huda | 2024/4/12 |
Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: Scientometric mapping of research frontiers | Arka Ghosh Jemal Abawajy Morshed Chowdhury | 2024/4/10 | |
MDS-Based Cloned Device Detection in IoT-Fog Network | IEEE Internet of Things Journal | Zainab AlJabri Jemal Abawajy Shamsul Huda | 2024/3/19 |
A Novel Choquet Integral-based VIKOR Approach under Q-rung Orthopair Hesitant Fuzzy Environment | IEEE Transactions on Fuzzy Systems | Hongwu Qin Yibo Wang Xiuqin Ma Jemal H Abawajy | 2024/2/9 |
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT | Ali Shahidinejad Jemal Abawajy | 2024 | |
A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing | Israel López-Plata Christopher Expósito-Izquierdo Eduardo Lalla-Ruiz Belén Melián-Batista J Marcos Moreno-Vega | 2015 | |
Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis | Artificial Intelligence Review | Belal Abdullah Hezam Murshed Suresha Mallappa Jemal Abawajy Mufeed Ahmed Naji Saif Hasib Daowd Esmail Al-Ariki | 2023/6 |
Special issue on neural computing and applications in cyber intelligence: ATCI 2022 | Neural Computing and Applications | Kai Liu Jingjing Cao Yimin Yang Wun-She Yap Rui Tan | 2022/10 |
Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications | IEEE Transactions on Network Science and Engineering | Ali Shahidinejad Jemal Abawajy | 2023/12/27 |
Message from SmartCity 2020 General Chairs | JJPC Rodrigues Amiya Nayak Jemal Abawajy | 2023/1/29 | |
SDN enabled BDSP in public cloud for resource optimization | Wireless Networks | Ahmed Al-Mansoori Jemal Abawajy Morshed Chowdhury | 2023/4 |
Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles | IEEE Transactions on Consumer Electronics | Ali Shahidinejad Jemal Abawajy | 2023/12/27 |
FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning | Multimedia Tools and Applications | Belal Abdullah Hezam Murshed Suresha Jemal Abawajy Mufeed Ahmed Naji Saif Hudhaifa Mohammed Abdulwahab | 2023/12 |
A comprehensive review of lightweight authenticated encryption for iot devices | Zainab AlJabri Jemal Abawajy Shamsul Huda | 2023 | |
Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2 | Jemal H Abawajy Zheng Xu Mohammed Atiquzzaman Xiaolu Zhang | 2023/3/29 | |
Decentralized lattice-based device-to-device authentication for the edge-enabled IoT | IEEE Systems Journal | Ali Shahidinejad Jemal Abawajy | 2023/10/12 |
Efficient Provably-Secure Authentication Protocol for Multi-Domain IIoT Using a Combined Off-Chain and On-Chain Approach | IEEE Internet of Things Journal | Ali Shahidinejad Jemal Abawajy | 2023/12/27 |
Honorary Chair | Yu-Sheng Lu Cheng-Tang Pan Yasuhisa Hirata Ratchatin Chanchareon Shirley Devapriya Dewasurendra | 2014/6/14 | |
Design and development of a smartphone app for Hypertension management: an intervention mapping approach | Elton H Lobo Chandan Karmakar Mohamed Abdelrazek Jemal Abawajy Clara K Chow | 2023/3/15 | |
A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection | Nomica Choudhry Jemal Abawajy Shamsul Huda Imran Rao | 2023/10/4 |