Follow
Jemal Abawajy
Jemal Abawajy
Full Professor, Deakin University, Australia
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing
A Beloglazov, J Abawajy, R Buyya
Future generation computer systems 28 (5), 755-768, 2012
35802012
Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges
R Buyya, A Beloglazov, J Abawajy
arXiv preprint arXiv:1006.0308, 2010
9632010
User preference of cyber security awareness delivery methods
J Abawajy
Behaviour & information technology 33 (3), 237-248, 2014
5972014
Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study
E Baccarelli, PGV Naranjo, M Scarpiniti, M Shojafar, JH Abawajy
IEEE access 5, 9882-9910, 2017
3962017
Federated internet of things and cloud computing pervasive patient health monitoring system
JH Abawajy, MM Hassan
IEEE Communications Magazine 55 (1), 48-53, 2017
3262017
Power graphs: a survey
J Abawajy, A Kelarev, M Chowdhury
Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013
2352013
Failure-aware resource provisioning for hybrid cloud infrastructure
B Javadi, J Abawajy, R Buyya
Journal of parallel and distributed computing 72 (10), 1318-1331, 2012
2282012
Fault-tolerant scheduling policy for grid computing systems
JH Abawajy
18th International Parallel and Distributed Processing Symposium, 2004 …, 2004
2162004
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms
Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li
Future Generation Computer Systems 86, 836-850, 2018
2092018
A rough set approach for selecting clustering attribute
T Herawan, MM Deris, JH Abawajy
Knowledge-Based Systems 23 (3), 220-231, 2010
2062010
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments
Z Zhou, F Li, H Zhu, H Xie, JH Abawajy, MU Chowdhury
Neural Computing and Applications 32, 1531-1541, 2020
2012020
Using feature selection for intrusion detection system
A Alazab, M Hobbs, J Abawajy, M Alazab
2012 international symposium on communications and information technologies …, 2012
1872012
A multi-tier phishing detection and filtering approach
R Islam, J Abawajy
Journal of Network and Computer Applications 36 (1), 324-335, 2013
1782013
Privacy preserving social network data publication
JH Abawajy, MIH Ninggal, T Herawan
IEEE communications surveys & tutorials 18 (3), 1974-1997, 2016
1642016
Hybrids of support vector machine wrapper and filter based framework for malware detection
S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood
Future Generation Computer Systems 55, 376-390, 2016
1512016
Big data in complex systems
AE Hassanien, AT Azar, V Snasael, J Kacprzyk, JH Abawajy
SBD 9, 2015
1402015
Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems
NR Sabar, J Abawajy, J Yearwood
IEEE Transactions on Evolutionary Computation 21 (2), 315-327, 2016
1392016
Determining service trustworthiness in intercloud computing environments
J Abawajy
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1342009
A data fusion method in wireless sensor networks
D Izadi, JH Abawajy, S Ghanavati, T Herawan
Sensors 15 (2), 2964-2979, 2015
1312015
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach
S Azizi, M Shojafar, J Abawajy, R Buyya
Journal of network and computer applications 201, 103333, 2022
1192022
The system can't perform the operation now. Try again later.
Articles 1–20