A survey of clustering algorithms for big data: Taxonomy and empirical analysis A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ... IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014 | 828 | 2014 |
MetaCDN: Harnessing ‘Storage Clouds’ for high performance content delivery J Broberg, R Buyya, Z Tari Journal of Network and Computer Applications 32 (5), 1012-1022, 2009 | 197 | 2009 |
CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living A Forkan, I Khalil, Z Tari Future Generation Computer Systems 35, 114-127, 2014 | 170 | 2014 |
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living ARM Forkan, I Khalil, Z Tari, S Foufou, A Bouras Pattern Recognition 48 (3), 628-641, 2015 | 166 | 2015 |
A role-based access control for intranet security Z Tari, SW Chan IEEE Internet Computing 1 (5), 24-34, 1997 | 149 | 1997 |
Coupling metrics for predicting maintainability in service-oriented designs M Perepletchikov, C Ryan, K Frampton, Z Tari 2007 Australian Software Engineering Conference (ASWEC'07), 329-340, 2007 | 148 | 2007 |
An efficient privacy-preserving ranked keyword search method C Chen, X Zhu, P Shen, J Hu, S Guo, Z Tari, AY Zomaya IEEE Transactions on Parallel and Distributed Systems 27 (4), 951-963, 2015 | 140 | 2015 |
SCADASim—A framework for building SCADA simulations C Queiroz, A Mahmood, Z Tari IEEE Transactions on Smart Grid 2 (4), 589-597, 2011 | 137 | 2011 |
Extraction of shape skeletons from grayscale images ZSG Tari, J Shah, H Pien Computer Vision and Image Understanding 66 (2), 133-146, 1997 | 135 | 1997 |
A role based access control for web services R Wonohoesodo, Z Tari IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004 | 117 | 2004 |
Object normal forms and dependency constraints for object-oriented schemata Z Tari, J Stokes, S Spaccapietra ACM Transactions on Database Systems (TODS) 22 (4), 513-569, 1997 | 114 | 1997 |
Building a SCADA security testbed C Queiroz, A Mahmood, J Hu, Z Tari, X Yu 2009 Third International Conference on Network and System Security, 357-364, 2009 | 106 | 2009 |
BDCaM: Big data for context-aware monitoring—A personalized knowledge discovery framework for assisted healthcare ARM Forkan, I Khalil, A Ibaida, Z Tari IEEE transactions on cloud computing 5 (4), 628-641, 2015 | 101 | 2015 |
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems A Almalawi, X Yu, Z Tari, A Fahad, I Khalil Computers & Security 46, 94-110, 2014 | 101 | 2014 |
Toward an efficient and scalable feature selection approach for internet traffic classification A Fahad, Z Tari, I Khalil, I Habib, H Alnuweiri Computer Networks 57 (9), 2040-2057, 2013 | 90 | 2013 |
The impact of service cohesion on the analyzability of service-oriented software M Perepletchikov, C Ryan, Z Tari IEEE Transactions on Services Computing 3 (2), 89-103, 2010 | 89 | 2010 |
Fundamentals of distributed object systems Z Tari, O Bukhres, OA Bukhres Wiley-Interscience, 2001 | 78 | 2001 |
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling H Kumarage, I Khalil, Z Tari, A Zomaya Journal of Parallel and Distributed Computing 73 (6), 790-806, 2013 | 76 | 2013 |
A case for peering of content delivery networks R Buyya, AMK Pathan, J Broberg, Z Tari IEEE Distributed Systems Online 7 (10), 3-3, 2006 | 74 | 2006 |
An efficient data-driven clustering technique to detect attacks in SCADA systems A Almalawi, A Fahad, Z Tari, A Alamri, R AlGhamdi, AY Zomaya IEEE Transactions on Information Forensics and Security 11 (5), 893-906, 2015 | 73 | 2015 |