Title | Author | Publication Date | Publisher | Type |
ECG encryption and identification based security solution on the Zynq SoC for connected health systems
| Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal | 2017 | Academic Press Inc. | Article |
Data confidentiality in cloud-based pervasive system
| Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge | 2017 | Association for Computing Machinery | Conference Paper |
Role updating in information systems using model checking
| Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan | 2017 | Springer London | Article |
Enabling broadcast communications in presence of jamming via probabilistic pairing
| Pietro, Roberto Di; Oligeri, Gabriele | 2017 | Elsevier B.V. | Article |
An Interactive Visualization Web Solution for Electricity Consumption in Qatar
| Soliman, Engy; Shalaby, Salma; Fetais, Noora | 2017 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Survey of Information Visualization Techniques for Enhancing Visual Analysis
| Fernandez, Rachael; Fetais, Noora | 2017 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Prediction of infarction volume and infarction growth rate in acute ischemic stroke
| Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; Inshasi, Jihad; Salam, Abdul; Shuaib, Ashfaq; Qidwai, Uvais... more authors ... less authors | 2017 | Nature Publishing Group | Article |
Systematic identification of threats in the cloud: A Survey
| Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; Khan K.M.... more authors ... less authors | 2019 | Elsevier B.V. | Article |
The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report
| Qidwai U.; Ajimsha M.S.; Shakir M. | 2019 | Churchill Livingstone | Article |
SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution
| Al-Nsour E.; Sleit A.; Alshraideh M. | 2019 | SAGE Publications Ltd | Article |
Multi-Objective Security Hardening Optimisation for Dynamic Networks
| Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. | 2019 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Stateless Security Risk Assessment for Dynamic Networks
| Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
SpiralSRA: A threat-specific security risk assessment framework for the cloud
| Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; Khan K.M.... more authors ... less authors | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Visualization as a mean of big data management: Using Qatar's electricity consumption data
| Soliman E.; Fetais N. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Short survey of techniques for visualizing events recorded in logs
| Fernandez R.; Fetais N. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Smart Grid Cybersecurity: Standards and Technical Countermeasures
| Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques
| Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Virtual Reality Glove for Falconry
| Al-Hathal T.; Fetais N. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach
| Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. | 2018 | Institute of Electrical and Electronics Engineers Inc. | Conference Paper |
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
| Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; Khan K.M.... more authors ... less authors | 2018 | Elsevier Ltd | Article |