• A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems 

      Hameed, Abdul; Khoshkbarforoushha, Alireza; Ranjan, Rajiv; Jayaraman, Prem Prakash; Kolodziej, Joanna; ... more authors ( Springer , 2014 , Article)
      In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application ...
    • Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures 

      Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ...
    • An Enhanced Dynamic-programming Technique For Finding Approximate Overlaps 

      Haj Rachid, Maan; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2014 , Conference Paper)
      The next generation sequencing technology creates a huge number of sequences (reads), which constitute the input for genome assemblers. After prefiltering the sequences, it is required to detect exact overlaps between the ...
    • Cryptographic ransomware encryption detection: Survey 

      Kenan, Begovic; Al-Ali, Abdulaziz; Malluhi, Qutaibah ( Elsevier , 2023 , Article)
      The ransomware threat has loomed over our digital life since 1989. Criminals use this type of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts in ransom. The damage ransomware ...
    • Implementing and Analyzing a Recursive Technique for Building Path Oblivious RAM 

      Rachid, Maan Haj; Riley, Ryan; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)
      It has been demonstrated that encrypting confidential data before storing it is not sufficient because data access patterns can leak significant information about the data itself (Goldreich & Ostrovsky, 1996). Oblivious ...
    • Performance analysis of data intensive cloud systems based on data management and replication: a survey 

      Malik, Saif Ur Rehman; Khan, Samee U.; Ewen, Sam J.; Tziritas, Nikos; Kolodziej, Joanna; ... more authors ( Springer New York LLC , 2016 , Article)
      As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on ...