|
2017 |
Sahel Alouneh, Saed Abed, George Ghinea,"Security of VoIP traffic over low or limited bandwidth networks",Security Communication Networks,John Wiley,Volume 9, pp. 5591–5599, 2017. (Thomson Reuters ISI),2017 |
|
2017 |
Amani Abu Jabal, Elisa Bertino, Geeth de Mel,"Provenance-based Scientific Workflow Search",In Proceedings of the 2017 IEEE 13th International Conference on e-Science,Auckland, New Zealand, October 24- 27,2017 |
|
2017 |
Sorin Adam Matei, Amani Abu Jabal, Elisa Bertino,"Do Sticky Elites Produce Online Knowledge of Higher Quality?",In Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM),Sydney, Australia, July 31 - August 3,2017 |
|
2017 |
Feras Al-Hawari, Terry Jernberg, and Roger Cleghorn,"System and method for automatic correction of flight time skew of timing signals in simulated source synchronous interface operation",U.S. Patent 9,542,512,USA,2017 [View] |
|
2017 |
Elisa Bertino, Amani Abu Jabal, Seraphin Calo, Christian Makaya, Maroun Touma, Dinesh Verma, Christopher Williams,"Provenance-Based Analytics Services for Access Control Policies",In Proceedings of the 2017 IEEE 13th World Congress on Services (SERVICES),Honolulu, Hawaii, USA, June 25-30, pp. 94-101,2017 |
|
2016 |
Amani Abu Jabal, Elisa Bertino,"SimP: Secure interoperable multi-granular provenance framework",In Proceedings of the 2016 IEEE 12th International Conference on e-Science,Baltimore, MD, USA, October 23 - 27, pp. 270-275,2016 |
|
2016 |
Dr. Ismail Hababeh, Prof. Sahel Alouneh, Dr. Ala’ Khalifeh,"A Position Aware Mobile Application for E-Health Services",The 7th International Conference in Intelligent Systems, Modelling and Simulation (ISMS),pp. 144-148,2016 |
|
2016 |
Dr. Khalil, Issa, Dr. Ismail Hababeh, Dr. Abdallah Khreishah,"Secure Inter Cloud Data Migration",The 7th International Conference in Information and Communication Systems (ICICS),pp. 62-67,2016 |
|
2016 |
Samer Nofal, Katie Atkinson, Paul E. Dunne,"Looking-ahead in backtracking algorithms for abstract argumentation",Int. J. Approx. Reason,78: 265-282,2016 [View] |
|
2016 |
Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh,"A Multidimension Taxonomy of Insider Threats in Cloud Computing",The Computer Journal,Oxford Publication,Volume. 59, Issue. 11, Nov, 2016. (Thomson Reuters ISI),2016 |
|
2016 |
Barghash, A., Arslan, T., and Helms, V.,"Journal of Proteomics and Bioinformatics. Robust detection of outlier samples and genes in expression datasets.",2016 |
|
2016 |
Sahel Alouneh, Mazen Kharbutli, Rana Al-Qurem,"Software Approach for Stack Memory Protection Based on Duplication and Randomisation",International Journal of Internet Technology and Secured Transactions,INDERSCIENCE,Volume 6, Issue 4, 2016. (Scopus),2016 |
|
2016 |
Jose Schutt-Aine, Dennis Nagle, Feras Al-Hawari, Ambrish Varma, Jilin Tan, Ping Liu, Shangli Wu, Yubao Meng, Qi Zhao, and Zhongyong Zhou,"System, method, and computer program product for input/output buffer modeling",U.S. Patent 9,460,250,USA,2016 [View] |
|
2016 |
Sahel Alouneh, Heba Bsoul, Mazen Kharbutli,"A Software Tool to Protect Executable Files from Buffer Overflow Attacks",International Journal of Internet Technology and Secured Transactions,INDERSCIENCE,Volume 6, Issue 2, 2016 . (Scopus),2016 |
|
2016 |
Sahel Alouneh, Ismail Hababeh, Feras Al-Hawari, and Tamer Alajrami,"Innovative methodology for elevating big data analysis and security",The 2nd International Conference on Open Source Software Computing (OSSCOM 2016),Beirut, Lebanon,2016 |