default search action
Mohammed Hussain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j8]Rashid Hussain Khokhar, Benjamin C. M. Fung, Farkhund Iqbal, Khalil Al-Hussaeni, Mohammed Hussain:
Differentially Private Release of Heterogeneous Network for Managing Healthcare Data. ACM Trans. Knowl. Discov. Data 17(6): 90:1-90:30 (2023) - [c16]Mohamed Basel Almourad, Emad Bataineh, Mohammed Hussain, Zelal Wattar:
Usability Assessment of a University Academic Portal using Eye Tracking Technology. ANT/EDI40 2023: 323-330 - [c15]Maxx Richard Rahman, Mohammed Hussain, Thomas Piper, Hans Geyer, Tristan Equey, Norbert Baume, Reid Aikin, Wolfgang Maass:
Modelling Metabolism Pathways using Graph Representation Learning for Fraud Detection in Sports. ICDH 2023: 158-168 - 2022
- [j7]Áine MacDermott, Michal Motylinski, Farkhund Iqbal, Kellyann Stamp, Mohammed Hussain, Andrew Marrington:
Using deep learning to detect social media 'trolls'. Digit. Investig. 43(Supplement): 301446 (2022) - [c14]Munir Majdalawieh, Anoud Bani-Hani, Mohammed Hussain, Aisha Alshamsi:
Assessing the Attacks Against the Online Authentication Methods Using a Comparison Matrix: A Case of Online Banking. CSCI 2022: 1039-1046 - 2021
- [c13]Zainab Khalid, Farkhund Iqbal, Faouzi Kamoun, Mohammed Hussain, Liaqat Ali Khan:
Forensic Analysis of the Cisco WebEx Application. CSNet 2021: 90-97 - [c12]Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Mohammed Hussain, Fazli Wahid:
An Alternate Account on the Ethical Implications of Autonomous Vehicles. Intelligent Environments 2021: 1-5 - [c11]Zainab Khalid, Farkhund Iqbal, Khalil Al-Hussaeni, Áine MacDermott, Mohammed Hussain:
Forensic Analysis of Microsoft Teams: Investigating Memory, Disk and Network. SmartCity360° 2021: 583-601 - 2020
- [j6]Mohammed Hussain, Balaganesh Duraisamy:
Preventing Malicious Packet Drops in MANETs by Counter Based Authenticated Acknowledgement. Ingénierie des Systèmes d Inf. 25(2): 173-181 (2020) - [c10]Michal Motylinski, Áine MacDermott, Farkhund Iqbal, Mohammed Hussain, Saiqa Aleem:
Digital Forensic Acquisition and Analysis of Discord Applications. CCCI 2020: 1-7 - [c9]Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, Ali Arsalan:
Access Permissions for Apple Watch Applications: A Study on Users' Perceptions. CCCI 2020: 1-7
2010 – 2019
- 2019
- [c8]Mohammed Hussain, Abdullah Hussein:
Market Basket Analysis of Student Attendance Records. EDUCON 2019: 1198-1203 - 2018
- [j5]Mohammed Hussain, Dhafer Ben Khedher:
A secure and decentralised SIP for mobile ad hoc networks. Int. J. Commun. Networks Distributed Syst. 20(1): 1-15 (2018) - 2017
- [c7]Mohammed Hussain, Mohamed Basel Al-Mourad, Abdullah Hussein, Sujith Samuel Mathew, Essam Morsy:
A novel approach for analyzing student interaction with educational systems. EDUCON 2017: 1332-1336 - 2016
- [j4]Mohammed Hussain, Mohamed Basel Al-Mourad:
A crowdsource model for quality assurance in cloud computing. Int. J. Grid Util. Comput. 7(3): 177-183 (2016) - [c6]Mohammed Hussain, Mohamed Basel Al-Mourad, Sujith Samuel Mathew:
Collect, Scope, and Verify Big Data - A Framework for Institution Accreditation. AINA Workshops 2016: 187-192 - [c5]Mohamed Basel Al-Mourad, Mohammed Hussain, Talal Bonny:
An Algorithm for Inferring Big Data Objects Correlation Using Word Net. ANT/SEIT 2016: 1238-1243 - 2015
- [j3]Jehad Al-Omari, Mohammed Hussain, Skander Turki, Mehedi Masud:
Well-formed semantic model for co-learning. Comput. Hum. Behav. 51: 821-828 (2015) - 2014
- [j2]Mohammed Hussain, Hanady M. Abdulsalam:
Software quality in the clouds: a cloud-based solution. Clust. Comput. 17(2): 389-402 (2014) - [c4]Mohammed Hussain:
An authentication scheme to protect the location privacy of femtocell users. AICCSA 2014: 652-657 - [c3]Mohammed Hussain, Mohamed Basel Al-Mourad:
Effective Third Party Auditing in Cloud Computing. AINA Workshops 2014: 91-95 - [c2]Mohammed Hussain, Mohamed Basel Almourad:
Trust in Mobile Cloud Computing with LTE-based Deployment. UIC/ATC/ScalCom 2014: 643-648 - 2010
- [b1]Mohammed Hussain:
The Design and Applications of a Privacy-Preserving Identity and Trust-Management System. Queen's University at Kingston, Ontario, Canada, 2010
2000 – 2009
- 2009
- [c1]Mohammed Hussain, David B. Skillicorn:
Guarantee-Based Access Control. CSE (3) 2009: 201-206 - 2001
- [j1]Mohammad Al-Rousan, Mohammed Hussain:
Automatic Recognition of Arabic Sign Language Finger Spelling. Int. J. Comput. Their Appl. 8(2) (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint