Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing A Beloglazov, J Abawajy, R Buyya Future generation computer systems 28 (5), 755-768, 2012 | 3580 | 2012 |
Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges R Buyya, A Beloglazov, J Abawajy arXiv preprint arXiv:1006.0308, 2010 | 963 | 2010 |
User preference of cyber security awareness delivery methods J Abawajy Behaviour & information technology 33 (3), 237-248, 2014 | 597 | 2014 |
Fog of everything: Energy-efficient networked computing architectures, research challenges, and a case study E Baccarelli, PGV Naranjo, M Scarpiniti, M Shojafar, JH Abawajy IEEE access 5, 9882-9910, 2017 | 396 | 2017 |
Federated internet of things and cloud computing pervasive patient health monitoring system JH Abawajy, MM Hassan IEEE Communications Magazine 55 (1), 48-53, 2017 | 326 | 2017 |
Power graphs: a survey J Abawajy, A Kelarev, M Chowdhury Electronic Journal of Graph Theory and Applications (EJGTA) 1 (2), 125-147, 2013 | 235 | 2013 |
Failure-aware resource provisioning for hybrid cloud infrastructure B Javadi, J Abawajy, R Buyya Journal of parallel and distributed computing 72 (10), 1318-1331, 2012 | 228 | 2012 |
Fault-tolerant scheduling policy for grid computing systems JH Abawajy 18th International Parallel and Distributed Processing Symposium, 2004 …, 2004 | 216 | 2004 |
Minimizing SLA violation and power consumption in Cloud data centers using adaptive energy-aware algorithms Z Zhou, J Abawajy, M Chowdhury, Z Hu, K Li, H Cheng, AA Alelaiwi, F Li Future Generation Computer Systems 86, 836-850, 2018 | 209 | 2018 |
A rough set approach for selecting clustering attribute T Herawan, MM Deris, JH Abawajy Knowledge-Based Systems 23 (3), 220-231, 2010 | 206 | 2010 |
An improved genetic algorithm using greedy strategy toward task scheduling optimization in cloud environments Z Zhou, F Li, H Zhu, H Xie, JH Abawajy, MU Chowdhury Neural Computing and Applications 32, 1531-1541, 2020 | 201 | 2020 |
Using feature selection for intrusion detection system A Alazab, M Hobbs, J Abawajy, M Alazab 2012 international symposium on communications and information technologies …, 2012 | 187 | 2012 |
A multi-tier phishing detection and filtering approach R Islam, J Abawajy Journal of Network and Computer Applications 36 (1), 324-335, 2013 | 178 | 2013 |
Privacy preserving social network data publication JH Abawajy, MIH Ninggal, T Herawan IEEE communications surveys & tutorials 18 (3), 1974-1997, 2016 | 164 | 2016 |
Hybrids of support vector machine wrapper and filter based framework for malware detection S Huda, J Abawajy, M Alazab, M Abdollalihian, R Islam, J Yearwood Future Generation Computer Systems 55, 376-390, 2016 | 151 | 2016 |
Big data in complex systems AE Hassanien, AT Azar, V Snasael, J Kacprzyk, JH Abawajy SBD 9, 2015 | 140 | 2015 |
Heterogeneous cooperative co-evolution memetic differential evolution algorithm for big data optimization problems NR Sabar, J Abawajy, J Yearwood IEEE Transactions on Evolutionary Computation 21 (2), 315-327, 2016 | 139 | 2016 |
Determining service trustworthiness in intercloud computing environments J Abawajy 2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009 | 134 | 2009 |
A data fusion method in wireless sensor networks D Izadi, JH Abawajy, S Ghanavati, T Herawan Sensors 15 (2), 2964-2979, 2015 | 131 | 2015 |
Deadline-aware and energy-efficient IoT task scheduling in fog computing systems: A semi-greedy approach S Azizi, M Shojafar, J Abawajy, R Buyya Journal of network and computer applications 201, 103333, 2022 | 119 | 2022 |