Jemal Abawajy

Jemal Abawajy

Deakin University

H-index: 58

Oceania-Australia

About Jemal Abawajy

Jemal Abawajy, With an exceptional h-index of 58 and a recent h-index of 44 (since 2020), a distinguished researcher at Deakin University, specializes in the field of Cloud Computing, Internet of Things, Fog/Edge Computing, Cybersecurity, Machine Learning..

His recent articles reflect a diverse array of research interests and contributions to the field:

Untraceable blockchain-assisted authentication and key exchange in medical consortiums

Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: Scientometric mapping of research frontiers

MDS-Based Cloned Device Detection in IoT-Fog Network

A Novel Choquet Integral-based VIKOR Approach under Q-rung Orthopair Hesitant Fuzzy Environment

An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT

A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing

Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis

Special issue on neural computing and applications in cyber intelligence: ATCI 2022

Jemal Abawajy Information

University

Position

Full Professor Australia

Citations(all)

16211

Citations(since 2020)

8342

Cited By

11075

hIndex(all)

58

hIndex(since 2020)

44

i10Index(all)

229

i10Index(since 2020)

151

Email

University Profile Page

Deakin University

Google Scholar

View Google Scholar Profile

Jemal Abawajy Skills & Research Interests

Cloud Computing

Internet of Things

Fog/Edge Computing

Cybersecurity

Machine Learning.

Top articles of Jemal Abawajy

Title

Journal

Author(s)

Publication Date

Untraceable blockchain-assisted authentication and key exchange in medical consortiums

Journal of Systems Architecture

Ali Shahidinejad

Jemal Abawajy

Shamsul Huda

2024/4/12

Redefining the construction managerial landscape to facilitate Industry 4.0 implementation: Scientometric mapping of research frontiers

Arka Ghosh

Jemal Abawajy

Morshed Chowdhury

2024/4/10

MDS-Based Cloned Device Detection in IoT-Fog Network

IEEE Internet of Things Journal

Zainab AlJabri

Jemal Abawajy

Shamsul Huda

2024/3/19

A Novel Choquet Integral-based VIKOR Approach under Q-rung Orthopair Hesitant Fuzzy Environment

IEEE Transactions on Fuzzy Systems

Hongwu Qin

Yibo Wang

Xiuqin Ma

Jemal H Abawajy

2024/2/9

An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT

Ali Shahidinejad

Jemal Abawajy

2024

A greedy randomized adaptive search procedure for scheduling IoT tasks in virtualized fog–cloud computing

Israel López-Plata

Christopher Expósito-Izquierdo

Eduardo Lalla-Ruiz

Belén Melián-Batista

J Marcos Moreno-Vega

2015

Short text topic modelling approaches in the context of big data: taxonomy, survey, and analysis

Artificial Intelligence Review

Belal Abdullah Hezam Murshed

Suresha Mallappa

Jemal Abawajy

Mufeed Ahmed Naji Saif

Hasib Daowd Esmail Al-Ariki

...

2023/6

Special issue on neural computing and applications in cyber intelligence: ATCI 2022

Neural Computing and Applications

Kai Liu

Jingjing Cao

Yimin Yang

Wun-She Yap

Rui Tan

...

2022/10

Anonymous Blockchain-Assisted Authentication Protocols for Secure Cross-Domain IoD Communications

IEEE Transactions on Network Science and Engineering

Ali Shahidinejad

Jemal Abawajy

2023/12/27

Message from SmartCity 2020 General Chairs

JJPC Rodrigues

Amiya Nayak

Jemal Abawajy

2023/1/29

SDN enabled BDSP in public cloud for resource optimization

Wireless Networks

Ahmed Al-Mansoori

Jemal Abawajy

Morshed Chowdhury

2023/4

Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles

IEEE Transactions on Consumer Electronics

Ali Shahidinejad

Jemal Abawajy

2023/12/27

FAEO-ECNN: cyberbullying detection in social media platforms using topic modelling and deep learning

Multimedia Tools and Applications

Belal Abdullah Hezam Murshed

Suresha

Jemal Abawajy

Mufeed Ahmed Naji Saif

Hudhaifa Mohammed Abdulwahab

...

2023/12

A comprehensive review of lightweight authenticated encryption for iot devices

Zainab AlJabri

Jemal Abawajy

Shamsul Huda

2023

Tenth International Conference on Applications and Techniques in Cyber Intelligence (ICATCI 2022): Volume 2

Jemal H Abawajy

Zheng Xu

Mohammed Atiquzzaman

Xiaolu Zhang

2023/3/29

Decentralized lattice-based device-to-device authentication for the edge-enabled IoT

IEEE Systems Journal

Ali Shahidinejad

Jemal Abawajy

2023/10/12

Efficient Provably-Secure Authentication Protocol for Multi-Domain IIoT Using a Combined Off-Chain and On-Chain Approach

IEEE Internet of Things Journal

Ali Shahidinejad

Jemal Abawajy

2023/12/27

Honorary Chair

Yu-Sheng Lu

Cheng-Tang Pan

Yasuhisa Hirata

Ratchatin Chanchareon

Shirley Devapriya Dewasurendra

...

2014/6/14

Design and development of a smartphone app for Hypertension management: an intervention mapping approach

Elton H Lobo

Chandan Karmakar

Mohamed Abdelrazek

Jemal Abawajy

Clara K Chow

...

2023/3/15

A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection

Nomica Choudhry

Jemal Abawajy

Shamsul Huda

Imran Rao

2023/10/4

See List of Professors in Jemal Abawajy University(Deakin University)