Showing results 21 to 40 of 118
< previous
next >
Issue Date | Title | Author(s) |
2018-06-01 | Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) | Alshehri, MD; Hussain, FK; Hussain, OK |
2012-11-01 | Cognitive radio network security: A survey | Parvin, S; Hussain, FK; Hussain, OK; Han, S; Tian, B; Chang, E |
2015-11-25 | Comparative analysis of consumer profile-based methods to predict SLA violation | Hussain, W; Hussain, FK; Hussain, OK |
2018-12-01 | Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAs | Hussain, W; Hussain, FK; Saberi, M; Hussain, OK; Chang, E |
2013-09-01 | Conjoint trust assessment for secure communication in cognitive radio networks | Parvin, S; Hussain, FK; Hussain, OK |
2005-01-01 | Context based riskiness assessment | Hussain, OK; Chang, E; Hussain, FK; Dillon, TS; Soh, B |
2017-09-01 | A decision support framework for identifying novel ideas in new product development from cross-domain analysis | Mirtalaie, MA; Hussain, OK; Chang, E; Hussain, FK |
2015-01-01 | Design and implementation of the hadoop-based crawler for SaaS service discovery | Alkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y |
2012-12-01 | Digital signature-based authentication framework in cognitive radio networks | Parvin, S; Hussain, FK; Hussain, OK |
2019-01-09 | Early Detection of Events as a Decision Support in the Milk Collection Planning | Zakeri, A; Saberi, M; Hussain, OK; Chang, E |
2018-01-01 | An early detection system for proactive management of raw milk quality: an australian case study | Zakeri, A; Saberi, M; Hussain, OK; Chang, E |
2019-05-01 | Enhanced quantum-based neural network learning and its application to signature verification | Patel, OP; Tiwari, A; Chaudhary, R; Nuthalapati, SV; Bharill, N; Prasad, M; Hussain, FK; Hussain, OK |
2018-01-01 | Evaluation of U Ontology | Ashraf, J; Hussain, OK; Hussain, FK; Chang, EJ |
2018-07-01 | Event-driven approach for predictive and proactive management of SLA violations in the Cloud of Things | Nawaz, F; Janjua, NK; Hussain, OK; Hussain, FK; Chang, E; Saberi, M |
2022-01-10 | Explainability in supply chain operational risk management: A systematic literature review | Nimmy, SF; Hussain, OK; Chakrabortty, RK; Hussain, FK; Saberi, M |
2018-12-30 | Extracting sentiment knowledge from pros/cons product reviews: Discovering features along with the polarity strength of their associated opinions | Mirtalaie, MA; Hussain, OK; Chang, E; Hussain, FK |
2018-01-01 | Fine tuning a bayesian network and fairly allocating resources to improve procurement performance | Abolbashari, MH; Hussain, OK; Saberi, M; Chang, E; Barolli, L; Woungang, I; Hussain, OK |
2022-10-01 | Fog node discovery and selection: A Systematic literature review | Bukhari, A; Hussain, FK; Hussain, OK |
2017-11-01 | Formulating and managing viable SLAs in cloud computing from a small to medium service provider's viewpoint: A state-of-the-art review | Hussain, W; Hussain, FK; Hussain, OK; Damiani, E; Chang, E |
2013-09-01 | A framework for measuring ontology usage on the web | Ashraf, J; Hussain, OK; Hussain, FK |