Now showing items 221-240 of 250

    • Prediction of infarction volume and infarction growth rate in acute ischemic stroke 

      Kamran, Saadat; Akhtar, Naveed; Alboudi, Ayman; Kamran, Kainat; Ahmad, Arsalan; ... more authors ( Nature Publishing Group , 2017 , Article)
      The prediction of infarction volume after stroke onset depends on the shape of the growth dynamics of the infarction. To understand growth patterns that predict lesion volume changes, we studied currently available models ...
    • Empirical performance evaluation of QUIC protocol for Tor anonymity network 

      Basyoni, Lamiaa; Erbad, Aiman; Alsabah, Mashael; Fetais, Noora; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
      Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ...
    • CloudSafe: A tool for an automated security analysis for cloud computing 

      An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
      Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
    • Systematic identification of threats in the cloud: A Survey 

      Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; ... more authors ( Elsevier B.V. , 2019 , Article)
      When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
    • ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud 

      Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
      In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
    • The role of EEG and EMG combined virtual reality gaming system in facial palsy rehabilitation - A case report 

      Qidwai U.; Ajimsha M.S.; Shakir M. ( Churchill Livingstone , 2019 , Article)
      Background The recovery rates for facial palsy are usually excellent; however, regularly patients present with problems with their fine facial movements that affect their emotional expressions. Objective To discover the ...
    • SOLD: A node-Splitting algorithm for R-tree based on Objects' Locations Distribution 

      Al-Nsour E.; Sleit A.; Alshraideh M. ( SAGE Publications Ltd , 2019 , Article)
      Spatial data indexing methods are of extreme importance as they massively build up as a result of the explosive growth in capturing data with spatial features. No matter how much the data size is, eventually it will reside ...
    • Multi-Objective Security Hardening Optimisation for Dynamic Networks 

      Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference)
      Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ...
    • Multi-moth flame optimization for solving the link prediction problem in complex networks 

      Barham R.; Sharieh A.; Sleit A. ( Springer Verlag , 2019 , Article)
      Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the ...
    • Secure smart contract-enabled control of battery energy storage systems against cyber-attacks 

      Mhaisen N.; Fetais N.; Massoud A. ( Elsevier B.V. , 2019 , Article)
      Battery Energy Storage Systems (BESSs) are an integral part of a sustainable and resilient smart grid. The security of such critical cyber-physical infrastructure is considered as a major priority for both industry and ...
    • Visualization as a mean of big data management: Using Qatar's electricity consumption data 

      Soliman E.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      Visualization as a mean of big data management is the new century revolution. Managing data has become a great challenge today, as the amount of raw data size is increasing rapidly. For data like electricity consumption, ...
    • SpiralSRA: A threat-specific security risk assessment framework for the cloud 

      Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ...
    • Stateless Security Risk Assessment for Dynamic Networks 

      Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ...
    • Short survey of techniques for visualizing events recorded in logs 

      Fernandez R.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      Nowadays, data is being generated in large volumes and the users are left with a staggering amount of textual data that needs to be transformed into information to derive some knowledge from it. However, transforming and ...
    • Using Sparse Matrices to Prevent Information Leakage in Cloud Computing 

      Khan K.; Shaheen M.; Wang Y. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...
    • Virtual Reality Glove for Falconry 

      Al-Hathal T.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      This project is a virtual reality based game. Basically it's about hunting pray-using different types of falcons. And the main idea behind this project is to give more knowledge to the player about a cultural game in more ...
    • Virtual Reality Falconry: Simulation of a Traditional Qatari Sport Methodology and Techniques 

      Kharbach S.; Ahmad S.S.; Haj Ahmed N.M.; Fetais N. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      This paper talks about the process of developing a game called 'Virtual Reality Falconry'. The game is a simulation of the traditional Qatari hunting sport. Falconry refers to the process of hunting wild preys in their ...
    • Smart Grid Cybersecurity: Standards and Technical Countermeasures 

      Hussain S.; Meraj M.; Abughalwa M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      Cybersecurity in smart grids is of critical importance given the heavy reliance of modern societies on electricity and the recent cyberattacks that resulted in blackouts. The evolution of the legacy electric grid to a ...
    • Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach 

      Al Mamun A.; Abdullah Al Mamun M.; Shikfa A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference)
      The technological development of automated vehicles opens novel cybersecurity threats and risks for road safety. Increased connectivity often results in increased risks of a cyber-security attacks, which is one of the ...
    • Deep learning for detection of routing attacks in the internet of things 

      YAVUZ, Furkan Yusuf; Unal, Devrim; GÜL, Ensar ( Atlantis Press , 2018 , Article)
      Cyber threats are a showstopper for Internet of Things (IoT) has recently been used at an industrial scale. Network layer attacks on IoT can cause significant disruptions and loss of information. Among such attacks, routing ...