Sign In

Publications

Recent Journal Papers:

[1]          M. Abdallah, M. A. Talib, S. Feroz, Q. Nasir, H. Abdalla, and B. Mahfood, "Artificial intelligence applications in solid waste management: A systematic research review," Waste Management, vol. 109, pp. 231–246, 2020.

[2]          A. Alketbi, Q. Nasir, and M. A. Talib, "Novel blockchain reference model for government services: Dubai government case study," International Journal of System Assurance Engineering and Management, pp. 1–22, 2020.

[3]          O. A. Waraga, M. Bettayeb, Q. Nasir, and M. A. Talib, "Design and implementation of automated IoT security testbed," Computers & Security, vol. 88, p. 101648, 2020.

[4]          J. Al Ali, Q. Nasir, and F. T. Dweiri, "Business continuity framework for Internet of Things (IoT) Services," International Journal of System Assurance Engineering and Management, pp. 1–15, 2020.

[5]          M. A. Talib, A. Alsaafin, and S. M. Medjden, "Application of Quality in Use Model to Evaluate the User Experience of Online Banking Software," Journal of Cases on Information Technology (JCIT), vol. 22, no. 2, pp. 34–51, 2020.

[6]          M. A. Talib, "Open Source Software in the Arab World: A Literature Survey," in Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications, IGI Global, 2020, pp. 1646–1663.

[7]          M. Lataifeh, A. Elnagar, I. Shahin, and A. B. Nassif, "Arabic audio clips: Identification and discrimination of authentic Cantillations from imitations," Neurocomputing, vol. 418, pp. 162–177, 2020.

[8]          M. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, "Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection," IEEE Transactions on Network and Service Management, 2020.

[9]          M. Injadat, A. Moubayed, A. B. Nassif, and A. Shami, "Systematic ensemble model selection approach for educational data mining," Knowledge-Based Systems, p. 105992, 2020.

[10]        C. López-Mart\'\in, Y. Villuendas-Rey, M. Azzeh, A. Bou-Nassif, and S. Banitaan, "Transformed k-nearest neighborhood output distance minimization for predicting the Defect Density of Software Projects," Journal of Systems and Software, p. 110592, 2020.

[11]        H. Ghandorh, A. Noorwali, A. B. Nassif, L. F. Capretz, and R. Eagleson, "A Systematic Literature Review for Software Portability Measurement: Preliminary Results," in Proceedings of the 2020 9th International Conference on Software and Computer Applications, 2020, pp. 152–157.

[12]        I. Shahin, A. B. Nassif, and S. Hamsa, "Novel cascaded Gaussian mixture model-deep neural network classifier for speaker identification in emotional talking environments," Neural Computing and Applications, vol. 32, no. 7, pp. 2575–2587, 2020.

[13]        T. Rose, K. Kifayat, S. Abbas, and M. Asim, "A hybrid anomaly-based intrusion detection system to improve time complexity in the Internet of Energy environment," Journal of Parallel and Distributed Computing, vol. 145, pp. 124–139, 2020.

[14]        S. U. Rahman, A. Khan, S. Abbas, F. Alam, and N. Rashid, "Hybrid system for automatic detection of gunshots in indoor environment," Multimedia Tools and Applications, pp. 1–11, 2020.

[15]        A. M. Khedr, W. Osamy, A. Salim, and S. Abbas, "A Novel Association Rule-Based Data Mining Approach for Internet of Things Based Wireless Sensor Networks," IEEE Access, vol. 8, pp. 151574–151588, 2020.

[16]        M. Asad, M. Asim, T. Javed, M. O. Beg, H. Mujtaba, and S. Abbas, "DeepDetect: Detection of distributed denial of service attacks using deep learning," The Computer Journal, vol. 63, no. 7, pp. 983–994, 2020.

[17]        G. Mehmood, M. Z. Khan, S. Abbas, M. Faisal, and H. U. Rahman, "An Energy-Efficient and Cooperative Fault-Tolerant Communication Approach for Wireless Body Area Network," IEEE Access, vol. 8, pp. 69134–69147, 2020.

[18]        A. Khelifi, M. A. Talib, D. Nouichi, and M. S. Eltawil, "Toward an Efficient Deployment of Open Source Software in the Internet of Vehicles Field," Arabian Journal for Science and Engineering, vol. 44, no. 11, pp. 8939–8961, 2019.

[19]        M. A. Talib, O. Einea, Q. Nasir, M. F. Mowakeh, and M. Eltawil, "Enhancing computing studies in high schools: A systematic literature review & UAE case study," Heliyon, vol. 5, no. 2, p. e01235, 2019.

[20]        A. O. A. Salam, R. E. Sheriff, S. R. Al-Araji, K. Mezher, and Q. Nasir, "Spectrum sensing in cognitive radio using multitaper method based on MIMO-OFDM techniques," Annals of Telecommunications, vol. 74, no. 11–12, pp. 727–736, 2019.

[21]        Q. Nasir and O. Mahdi, "Patch antenna performance optimization and multi-band operation using single rectangular slot," Wireless Personal Communications, vol. 109, no. 1, pp. 155–173, 2019.

[22]        T. Bonny and Q. Nasir, "Clock glitch fault injection attack on an FPGA-based non-autonomous chaotic oscillator," Nonlinear Dynamics, vol. 96, no. 3, pp. 2087–2101, 2019.

[23]        A. O. A. Salam, R. E. Sheriff, S. R. Al-Araji, K. Mezher, and Q. Nasir, "Adaptive threshold and optimal frame duration for multi-taper spectrum sensing in cognitive radio," ICT Express, vol. 5, no. 1, pp. 31–36, 2019.

[24]        I. Shahin, A. B. Nassif, and S. Hamsa, "Emotion recognition using hybrid Gaussian mixture model and deep neural network," IEEE Access, vol. 7, pp. 26777–26787, 2019.

[25]        A. B. Nassif, I. Shahin, I. Attili, M. Azzeh, and K. Shaalan, "Speech recognition using deep neural networks: A systematic review," IEEE Access, vol. 7, pp. 19143–19165, 2019.

[26]        A. B. Nassif, M. Azzeh, A. Idri, and A. Abran, "Software development effort estimation using regression fuzzy models," Computational intelligence and neuroscience, vol. 2019, 2019.

[27]        F. Salo, A. B. Nassif, and A. Essex, "Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection," Computer Networks, vol. 148, pp. 164–175, 2019.

[28]        S. Abbas, M. Merabti, K. Kifayat, and T. Baker, "Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks," KSII Transactions on Internet and Information Systems (TIIS), vol. 13, no. 12, pp. 6214–6242, 2019.

[29]        M. Faisal, S. Abbas, H. U. Rahman, M. Z. Khan, and A. U. Rahman, "An Analysis of DDoS Attacks on the Instant Messengers," Security and Communication Networks, vol. 2019, 2019.

[30]        N. Abbas, M. Asim, N. Tariq, T. Baker, and S. Abbas, "A mechanism for securing IoT-enabled applications at the fog layer," Journal of Sensor and Actuator Networks, vol. 8, no. 1, p. 16, 2019.

[31]        D. Mouheb, S. Abbas, and M. Merabti, "Cybersecurity Curriculum Design: A Survey," in Transactions on Edutainment XV, Springer, 2019, pp. 93–107.

[32]        M. Abrar, A. T. H. Sim, and S. Abbas, "Associative Classification using Automata with Structure based Merging," strategies, vol. 10, no. 7, 2019.

[33]        F. Alam, S. U. Rahman, N. Tairan, H. Shah, M. S. Abohashrh, and S. Abbas, "An Automatic Medical Image Registration Approach Based on Common Sub-regions of Interest," Journal of Medical Imaging and Health Informatics, vol. 9, no. 2, pp. 251–260, 2019.

[34]        M. Abu Talib, S. Abbas, Q. Nasir, and M. F. Mowakeh, "Systematic literature review on Internet-of-Vehicles communication security," International Journal of Distributed Sensor Networks, vol. 14, no. 12, p. 1550147718815054, 2018.

[35]        Q. Nasir and E. Khalil, "Experimental evaluation of haptic data communication with prediction," Multimedia Tools and Applications, vol. 77, no. 19, pp. 25005–25025, 2018.

[36]        Q. Nasir, I. A. Qasse, M. Abu Talib, and A. B. Nassif, "Performance analysis of hyperledger fabric platforms," Security and Communication Networks, vol. 2018, 2018.

[37]        A. O. Salam, R. E. Sheriff, S. R. Al-Araji, K. Mezher, and Q. Nasir, "Adaptive interacting multiple model-Kalman filter for multitaper spectrum sensing in cognitive radio," Electronics Letters, vol. 54, no. 5, pp. 321–322, 2018.

[38]        Q. Nasir, "Behaviour of fractional loop delay zero crossing digital phase locked loop (FR-ZCDPLL)," International Journal of Electronics, vol. 105, no. 1, pp. 153–163, 2018.

[39]        M. A. Talib, "Testing closed source software: computer forensic tool case study," Journal of Computer Virology and Hacking Techniques, vol. 14, no. 2, pp. 167–179, 2018.

[40]        M. A. Talib, "Towards Sustainable Development Through Open Source Software in the Arab World," in Optimizing Contemporary Application and Processes in Open Source Software, IGI Global, 2018, pp. 222–242.

[41]        M. Azzeh and A. B. Nassif, "Project productivity evaluation in early software effort estimation," Journal of Software: Evolution and Process, vol. 30, no. 12, p. e2110, 2018.

[42]        F. Salo, M. Injadat, A. B. Nassif, A. Shami, and A. Essex, "Data mining techniques in intrusion detection systems: A systematic literature review," IEEE Access, vol. 6, pp. 56046–56058, 2018.

[43]        A. Moubayed, M. Injadat, A. B. Nassif, H. Lutfiyya, and A. Shami, "E-learning: Challenges and research opportunities using machine learning & Data analytics," IEEE Access, vol. 6, pp. 39117–39138, 2018.

[44]        I. Shahin and A. B. Nassif, "Three-stage speaker verification architecture in emotional talking environments," International Journal of Speech Technology, vol. 21, no. 4, pp. 915–930, 2018.

[45]        I. Shahin, A. B. Nassif, and M. Bahutair, "Emirati-accented speaker identification in each of neutral and shouted talking environments," International Journal of Speech Technology, vol. 21, no. 2, pp. 265–278, 2018.

[46]        M. Hosni, A. Idri, A. Abran, and A. B. Nassif, "On the value of parameter tuning in heterogeneous ensembles effort estimation," Soft Computing, vol. 22, no. 18, pp. 5977–6010, 2018.

[47]        S. Abbas, M. Faisal, H. Ur Rahman, M. Zahid Khan, M. Merabti, and A. U. R. Khan, "Masquerading attacks detection in mobile Ad Hoc networks," IEEE Access, vol. 6, 2018, doi: 10.1109/ACCESS.2018.2872115.

[48]        G. Mehmood, M. Z. Khan, H. U. Rahman, and S. Abbas, "An efficient and secure session key establishment scheme for health-care applications in wireless body area networks," J. Eng. Appl. Sci., vol. 37, no. 1, pp. 9–18, 2018.

[49]        M. Faisal, S. Abbas, and H. U. Rahman, "Identity attack detection system for 802.11-based ad hoc networks," EURASIP Journal on Wireless Communications and Networking, vol. 2018, no. 1, p. 128, 2018.



Recent Confernece Papers


[1]          I. A. Qasse, J. Spillner, M. A. Talib, and Q. Nasir, "A Study on {\DH}Apps Characteristics," in 2020 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), 2020, pp. 88–93.

[2]          Q. Nasir, "Performance analysis Secure Wireless Communication using Antenna Subset Modulation," in 2020 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT), 2020, pp. 131–137.

[3]          J. Spillner, M. Abu Talib, Q. Nasir, and F. Khalilnia, "CIFS'19 Workshop Chairs' Welcome & Organization," in Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2019, pp. 85–86.

[4]          M. Bettayeb, O. A. Waraga, M. A. Talib, Q. Nasir, and O. Einea, "IoT Testbed Security: Smart Socket and Smart Thermostat," in 2019 IEEE Conference on Application, Information and Network Security (AINS), 2019, pp. 18–23.

[5]          J. Al Ali, Q. Nasir, and F. T. Dweiri, "Business continuity management framework of Internet of Things (IoT)," in 2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019, pp. 1–7.

[6]          D. Nouichi, M. Abdelsalam, Q. Nasir, and S. Abbas, "IoT devices security using RF fingerprinting," in 2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019, pp. 1–7.

[7]          M. Al-Haidary and Q. Nasir, "Physically Unclonable Functions (PUFs): A Systematic Literature Review," in 2019 Advances in Science and Engineering Technology International Conferences (ASET), 2019, pp. 1–6.

[8]          A. M. Darya, H. Vakani, and Q. Nasir, "Error Control Codes for Molecular Communication Channels: A Survey," in 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2019, pp. 1–4.

[9]          M. Bettayeb, S. Ghunaim, N. Mohamed, and Q. Nasir, "Error Correction Codes in Wireless Sensor Networks: A Systematic Literature Review," in 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2019, pp. 1–6.

[10]        I. A. Qasse, M. Abu Talib, and Q. Nasir, "Inter Blockchain Communication: A Survey," in Proceedings of the ArabWIC 6th Annual International Conference Research Track, 2019, pp. 1–6.

[11]        M. Bettayeb, Q. Nasir, and M. A. Talib, "Firmware update attacks and security for iot devices: Survey," in Proceedings of the ArabWIC 6th Annual International Conference Research Track, 2019, pp. 1–6.

[12]        M. A. Talib, N. Ahmed, B. Alkouz, and A. Abdulkarim, "Exploratory Study on Estimating the Cost of an Open Source Platform for an Astronomy Center," in Proceedings of the ArabWIC 6th Annual International Conference Research Track, 2019, pp. 1–7.

[13]        R. Hamoudi, M. Bettayeb, A. Alsaafin, M. Hachim, Q. Nassir, and A. B. Nassif, "Identifying Patterns of Breast Cancer Genetic Signatures using Unsupervised Machine Learning," in 2019 IEEE International Conference on Imaging Systems and Techniques (IST), 2019, pp. 1–6.

[14]        M. Baziyad, A. B. Nassif, T. Rabie, and R. Fareh, "Comparative Study on the Performance of Heuristic Optimization Techniques in Robotic Path Planning," in Proceedings of the 2019 3rd International Conference on Advances in Artificial Intelligence, 2019, pp. 157–161.

[15]        S. Meskini, A. B. Nassif, and L. F. Capretz, "Can we rely on smartphone applications?," in International Conference on Objects, Components, Models and Patterns, 2019, pp. 305–312.

[16]        F. Salo, M. Injadat, A. Moubayed, A. B. Nassif, and A. Essex, "Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 276–281.

[17]        I. Shahin and A. B. Nassif, "Emirati-accented speaker identification in stressful talking conditions," in 2019 International Conference on Electrical and Computing Technologies and Applications (ICECTA), 2019, pp. 1–6.

[18]        A. B. Nassif, O. Mahdi, Q. Nasir, M. A. Talib, and M. Azzeh, "Machine Learning Classifications of Coronary Artery Disease," in 2018 International Joint Symposium on Artificial Intelligence and Natural Language Processing (iSAI-NLP), 2018, pp. 1–6.

[19]        N. Ahmed, M. A. Talib, and Q. Nasir, "Program-flow attestation of IoT systems software," in 2018 15th Learning and Technology Conference (L&T), 2018, pp. 67–73.

[20]        A. Alketbi, Q. Nasir, and M. A. Talib, "Blockchain for government services—Use cases, security benefits and challenges," in 2018 15th Learning and Technology Conference (L&T), 2018, pp. 112–119.

[21]        C. López-Mart\'\in, M. Azzeh, A. Bou-Nassif, and S. Banitaan, "Upsilon-SVR Polynomial Kernel for Predicting the Defect Density in New Software Projects," in 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018, pp. 1377–1382.

[22]        M. Azzeh, A. B. Nassif, S. Banitaan, and C. López-Mart\'\in, "Ensemble of Learning Project Productivity in Software Effort Based on Use Case Points," in 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA), 2018, pp. 1427–1431.

[23]        M. Injadat, F. Salo, A. B. Nassif, A. Essex, and A. Shami, "Bayesian optimization with machine learning algorithms towards anomaly detection," in 2018 IEEE Global Communications Conference (GLOBECOM), 2018, pp. 1–6.

[24]        S. Ismail and N. A. Bou, "Utilizing third-order hidden Markov models for emotional talking condition recognition," in 2018 14th IEEE International Conference on Signal Processing (ICSP), 2018, pp. 250–254.