• A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption 

      Malluhi, Qutaibah M.; Shikfa, Abdullatif; Trinh, Viet Cuong ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      We address the problem of ciphertext-policy attribute-based encryption with fine access control, a cryptographic primitive which has many concrete application scenarios such as Pay-TV, e-Health, Cloud Storage and so on. ...
    • A model-based approach to self-protection in computing system 

      Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery, Inc , 2013 , Conference Paper)
      This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
    • A multiresolution approach to Recommender systems 

      Badaro, Gilbert; Hajj, Hazem; Haddad, Ali; El-Hajj, Wassim; Shaban, Khaled Bashir ( Association for Computing Machinery, Inc , 2014 , Conference Paper)
      Recommender systems face performance challenges when dealing with sparse data. This paper addresses these challenges and proposes the use of Harmonic Analysis. The method provides a novel approach to the user-item matrix ...
    • A novel architecture for tamper proof electronic health record management system using blockchain wrapper 

      Rahman M.S.; Khalil I.; Mahawaga P.C.; Bouras A.; Yi X. ( Association for Computing Machinery, Inc , 2019 , Conference Paper)
      In this paper, we present a novel architecture of blockchain-based tamper-proof electronic health record (EHR) management system. Recording electronic health data in cloud-based storage systems always pose a threat to ...
    • ArabicWeb16: A new crawl for today's Arabic Web 

      Suwaileh, Reem; Kutlu, Mucahid; Fathima, Nihal; Elsayed, Tamer; Lease, Matthew ( Association for Computing Machinery, Inc , 2016 , Conference Paper)
      Web crawls provide valuable snapshots of the Web which enable a wide variety of research, be it distributional analysis to characterize Web properties or use of language, content analysis in social science, or Information ...
    • Argus: Realistic target coverage by drones 

      Saeed, Ahmed; Abdelkader, Ahmed; Khan, Mouhyemen; Neishaboori, Azin; A. Harras, Khaled; ... more authors ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent visual sensing systems. This potential motivated several research eforts to employ drones as standalone surveillance systems ...
    • ArTest: The First Test Collection for Arabic Web Search with Relevance Rationales 

      Hasanain, Maram; Barkallah, Yassmine; Suwaileh, Reem; Kutlu, Mucahid; Elsayed, Tamer ( Association for Computing Machinery, Inc , 2020 , Conference Paper)
      The scarcity of Arabic test collections has long hindered information retrieval (IR) research over the Arabic Web. In this work, we present ArTest, the first large-scale test collection designed for the evaluation of ad-hoc ...
    • Automatic ranking of information retrieval systems 

      Hasanain M. ( Association for Computing Machinery, Inc , 2018 , Conference Paper)
      Typical information retrieval system evaluation requires expensive manually-collected relevance judgments of documents, which are used to rank retrieval systems. Due to the high cost associated with collecting relevance ...
    • Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures 

      Punekar, Mayur; Malluhi, Qutaibah; Wang, Yongge; Desmedt, Yvo ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ...
    • EveTAR: A new test collection for event detection in Arabic tweets 

      Almerekhi, Hind; Hasanain, Maram; Elsayed, Tamer ( Association for Computing Machinery, Inc , 2016 , Conference Paper)
      Research on event detection in Twitter is often obstructed by the lack of publicly-available evaluation mechanisms such as test collections; this problem is more severe when considering the scarcity of them in languages ...
    • On target coverage in mobile visual sensor networks 

      Neishaboori A.; Saeed A.; Harras K.A.; Mohamed A. ( Association for Computing Machinery, Inc , 2014 , Conference Paper)
      Recent advancements in manufacturing low-cost wireless battery operated cameras has made their application in Wireless Video Sensor Networks (WVSN) increasingly more feasible and affordable. The application of robotic ...
    • On the detection of Kernel-level rootkits using hardware performance counters 

      Singh, Baljit; Evtyushkin, Dmitry; Elwell, Jesse; Riley, Ryan D; Cervesato, Iliano ( Association for Computing Machinery, Inc , 2017 , Conference Paper)
      Recent work has investigated the use of hardware perfor- mance counters (HPCs) for the detection of malware run- ning on a system. These works gather traces of HPCs for a variety of applications (both malicious and ...
    • Tahaqqaq: A Real-Time System for Assisting Twitter Users in Arabic Claim Verification 

      Ali, Zien Sheikh; Mansour, Watheq; Haouari, Fatima; Hasanain, Maram; Elsayed, Tamer; ... more authors ( Association for Computing Machinery, Inc , 2023 , Conference Paper)
      Over the past years, notable progress has been made towards fighting misinformation spread over social media, encouraging the development of many fact-checking systems. However, systems that operate over Arabic content are ...
    • TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles 

      Rathore H.; Samant A.; Jadliwala M.; Mohamed A. ( Association for Computing Machinery, Inc , 2019 , Conference Paper)
      Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board ...
    • Web service cost optimization 

      Aljafer, Hussain; Malik, Zaki; Hashmi, Khayyam; Erradi, Abdelkarim ( Association for Computing Machinery, Inc , 2015 , Conference Paper)
      Cloud computing has become a major building block for Web applications where the service providers provide the costumers with Web services performing certain tasks so the system developers can use these services instead ...