العنوانالمؤلفتاريخ النشرالناشرالنوع
    Parallelizing exact motif finding algorithms on multi-core  Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M.2014Springer Science+Business MediaArticle
    A novel multi-hop body-To-body routing protocol for disaster and emergency networks  Ben Arbia, Dhafer; Alam, Muhammad Mahtab; Attia, Rabah; Ben Hamida, Elye2016Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Green operator cooperation for radio frequency transmission minimization  Amamou, Lamis; Boujelben, Maissa; Ghazzai, Hakim; Bouallegue, Ammar; Besbes, Hichem2016Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Group owner election in Wi-Fi direct  Khan, Muhammad Asif; Cherif, Wael; Filali, Fethi2016Institute of Electrical and Electronics Engineers Inc.Conference Paper
    An efficient instance hiding scheme  Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong2016Association for Computing MachineryConference Paper
    Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming  Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh2016World Scientific Publishing Co. Pte LtdArticle
    Prediction of infarction volume and infarction growth rate in acute ischemic stroke  Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors 2017Nature Publishing GroupArticle
    An Interactive Visualization Web Solution for Electricity Consumption in Qatar  Soliman, Engy; Shalaby, Salma; Fetais, Noora2017Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Survey of Information Visualization Techniques for Enhancing Visual Analysis  Fernandez, Rachael; Fetais, Noora2017Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Enabling broadcast communications in presence of jamming via probabilistic pairing  Pietro, Roberto Di; Oligeri, Gabriele2017Elsevier B.V.Article
    Data confidentiality in cloud-based pervasive system  Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge2017Association for Computing MachineryConference Paper
    Role updating in information systems using model checking  Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan2017Springer LondonArticle
    ECG encryption and identification based security solution on the Zynq SoC for connected health systems  Zhai, Xiaojun; Ait Si Ali, Amine; Amira, Abbes; Bensaali, Faycal2017Academic Press Inc.Article
    Dynamic security metrics for measuring the effectiveness of moving target defense techniques  Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors 2018Elsevier LtdArticle
    Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach  Al Mamun A.; Abdullah Al Mamun M.; Shikfa A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Robotic probe positioning system for structural health monitoring  Qidwai U.; Ijaz A.; Akbar A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Smart Grid Cybersecurity: Standards and Technical Countermeasures  Hussain S.; Meraj M.; Abughalwa M.; Shikfa A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques  Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Virtual Reality Glove for Falconry  Al-Hathal T.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Deep learning for detection of routing attacks in the internet of things  YAVUZ, Furkan Yusuf; ÜNAL, Devrim; GÜL, Ensar2018Atlantis PressArticle