Follow
Jemal Abawajy
Jemal Abawajy
Full Professor, Deakin University, Australia
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
A Beloglazov, J Abawajy, R Buyya
Future generation computer systems 28 (5), 755-768, 2012
35602012
Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges
R Buyya, A Beloglazov, J Abawajy
arXiv preprint arXiv:1006.0308, 2010
9582010
User preference of cyber security awareness delivery methods
J Abawajy
Behaviour & information technology 33 (3), 237-248, 2014
5752014
Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study
E Baccarelli, PGV Naranjo, M Scarpiniti, M Shojafar, JH Abawajy
IEEE access 5, 9882-9910, 2017
3862017
Federated internet of things and cloud computing pervasive patient health monitoring system
JH Abawajy, MM Hassan
IEEE Communications Magazine 55 (1), 48-53, 2017
3232017
Power graphs: a survey
J Abawajy, A Kelarev, M Chowdhury
Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013
2282013
Failure-aware resource provisioning for hybrid cloud infrastructure
B Javadi, J Abawajy, R Buyya
Journal of parallel and distributed computing 72 (10), 1318-1331, 2012
2262012
Fault-tolerant scheduling policy for grid computing systems
JH Abawajy
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
2162004
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li
Future Generation Computer Systems 86, 836-850, 2018
2052018
A rough set approach for selecting clustering attribute
T Herawan, MM Deris, JH Abawajy
Knowledge-Based Systems 23 (3), 220-231, 2010
2052010
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments
Z Zhou, F Li, H Zhu, H Xie, JH Abawajy, MU Chowdhury
Neural Computing and Applications 32, 1531-1541, 2020
1902020
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1842012
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
Journal of Network and Computer Applications 36 (1), 324-335, 2013
1732013
Privacy preserving social network data publication
JH Abawajy, MIH Ninggal, T Herawan
IEEE communications surveys & tutorials 18 (3), 1974-1997, 2016
1602016
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1492016
Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems
NR Sabar, J Abawajy, J Yearwood
IEEE Transactions on Evolutionary Computation 21 (2), 315-327, 2016
1382016
Big data in complex systems
AE Hassanien, AT Azar, V Snasael, J Kacprzyk, JH Abawajy
SBD 9, 2015
1382015
Determining service trustworthiness in intercloud computing environments
J Abawajy
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1342009
A data fusion method in wireless sensor networks
D Izadi, JH Abawajy, S Ghanavati, T Herawan
Sensors 15 (2), 2964-2979, 2015
1282015
Classification of Indian classical music with time-series matching deep learning approach
AK Sharma, G Aggarwal, S Bhardwaj, P Chakrabarti, T Chakrabarti, ...
IEEE access 9, 102041-102052, 2021
1152021
The system can't perform the operation now. Try again later.
Articles 1–20