Browsing byAuthorHussain, FK

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 178  next >
Issue DateTitleAuthor(s)
2016-03-02ABC-sampling for balancing imbalanced datasets based on artificial bee colony algorithmBraytee, A; Hussain, FK; Anaissi, A; Kennedy, PJ
2017-01-01Adaptive service e-contract information management reference architectureGill, AQ; Braytee, A; Hussain, FK
2012-12-01An approach to university social responsibility ontology development through text analysesEsfijani, A; Hussain, FK; Chang, E
2015-01-01Architecture of an IoT-based system for football supervision (IoT Football)Ikram, MA; Alshehri, MD; Hussain, FK
2009-04-09An authenticated self-healing key distribution scheme based on bilinear pairingsTian, B; Chang, E; Dillon, TS; Han, S; Hussain, FK
2015-11-25An automated and fuzzy approach for semantically annotating servicesChotipant, S; Hussain, FK; Hussain, OK
2019-01-28A Blockchain based approach for multimedia privacy protection and provenanceVishwa, A; Hussain, FK
2015-01-01Blue Pages: Software as a Service Data SetAlkalbani, AM; Ghamry, AM; Hussain, FK; Hussain, OK
2005-12-01CCCI metrics for the measurement of quality of e-ServiceElizabeth, C; Hussain, FK; Dillon, T
2004-01Classification of trust in peer-to-peer (P2P) communicationHussain, FK; Chang, E; Dillon, TS
2018-01-01Closing the Loop: Placing Ontology Usage Analysis in the Ontology Development and Deployment LifecycleAshraf, J; Hussain, OK; Hussain, FK; Chang, EJ
2014-01-01Cloud service selection: State-of-the-art and future research directionsSun, L; Dong, H; Hussain, FK; Hussain, OK; Chang, E
2016-04-01Cloud-FuSeR: Fuzzy ontology and MCDM based cloud service selectionSun, L; Ma, J; Zhang, Y; Dong, H; Hussain, FK
2018-06-01Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT)Alshehri, MD; Hussain, FK; Hussain, OK
2012-11-01Cognitive radio network security: A surveyParvin, S; Hussain, FK; Hussain, OK; Han, S; Tian, B; Chang, E
2015-11-25Comparative analysis of consumer profile-based methods to predict SLA violationHussain, W; Hussain, FK; Hussain, OK
2015-01-01A comparative analysis of scalable and context-aware trust management approaches for internet of thingsAlshehri, MD; Hussain, FK
2016-10-19A comparative study and future research directions in cloud service discoveryAlkalbani, AM; Hussain, FK
2018-12-01Comparing time series with machine learning-based prediction approaches for violation management in cloud SLAsHussain, W; Hussain, FK; Saberi, M; Hussain, OK; Chang, E
2013-09-01Conjoint trust assessment for secure communication in cognitive radio networksParvin, S; Hussain, FK; Hussain, OK