TitleAuthorPublication DatePublisherType
    An Interactive Visualization Web Solution for Electricity Consumption in Qatar  Soliman, Engy; Shalaby, Salma; Fetais, Noora2017Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach  Al Mamun A.; Abdullah Al Mamun M.; Shikfa A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Data confidentiality in cloud-based pervasive system  Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge2017Association for Computing MachineryConference Paper
    Deep learning for detection of routing attacks in the internet of things  YAVUZ, Furkan Yusuf; ÜNAL, Devrim; GÜL, Ensar2018Atlantis PressArticle
    Dynamic security metrics for measuring the effectiveness of moving target defense techniques  Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; ... more authors 2018Elsevier LtdArticle
    Enabling broadcast communications in presence of jamming via probabilistic pairing  Pietro, Roberto Di; Oligeri, Gabriele2017Elsevier B.V.Article
    Multi-Objective Security Hardening Optimisation for Dynamic Networks  Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Parallelizing exact motif finding algorithms on multi-core  Abbas, Mostafa M.; Bahig, Hazem M.; Abouelhoda, Mohamed; Mohie-Eldin, M.M.2014Springer Science+Business MediaArticle
    Prediction of infarction volume and infarction growth rate in acute ischemic stroke  Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors 2017Nature Publishing GroupArticle
    Robotic probe positioning system for structural health monitoring  Qidwai U.; Ijaz A.; Akbar A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Role updating in information systems using model checking  Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan2017Springer LondonArticle
    Short survey of techniques for visualizing events recorded in logs  Fernandez R.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Smart Grid Cybersecurity: Standards and Technical Countermeasures  Hussain S.; Meraj M.; Abughalwa M.; Shikfa A.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution  Al-Nsour E.; Sleit A.; Alshraideh M.2019SAGE Publications LtdArticle
    SpiralSRA: A threat-specific security risk assessment framework for the cloud  Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors 2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Stateless Security Risk Assessment for Dynamic Networks  Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Survey of Information Visualization Techniques for Enhancing Visual Analysis  Fernandez, Rachael; Fetais, Noora2017Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Systematic identification of threats in the cloud: A Survey  Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors 2019Elsevier B.V.Article
    The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report  Qidwai U.; Ajimsha M.S.; Shakir M.2019Churchill LivingstoneArticle
    Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques  Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper