


default search action
Talal H. Noor
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Talal H. Noor:
MPDP: A Probabilistic Architecture for Microservice Performance Diagnosis and Prediction. Comput. Syst. Sci. Eng. 48(5): 1273-1299 (2024) - [j16]Hanan Almukhalfi
, Ayman Noor
, Talal H. Noor
:
Traffic management approaches using machine learning and deep learning techniques: A survey. Eng. Appl. Artif. Intell. 133: 108147 (2024) - [j15]Talal H. Noor
, Ayman Noor
, Ahmed F. Alharbi, Ahmed Faisal, Rakan Alrashidi, Ahmed S. Alsaedi, Ghada Alharbi
, Tawfeeq Alsanoosy
, Abdullah Alsaeedi
:
Real-Time Arabic Sign Language Recognition Using a Hybrid Deep Learning Model. Sensors 24(11): 3683 (2024) - 2023
- [j14]Talal H. Noor:
Behavior Analysis-Based IoT Services For Crowd Management. Comput. J. 66(9): 2208-2219 (2023) - [j13]Tao Hai, Arindam Sarkar
, Rahul Karmakar
, Mohammad Zubair Khan
, Ayman Noor
, Talal H. Noor
, Abhinav Kumar
, A. Yvaz:
Neural session key exchange in the Industrial Internet of Things using hyperchaotic-guided vector-valued artificial neural synchronization. Eng. Appl. Artif. Intell. 125: 106683 (2023) - [j12]Talal H. Noor
:
Human Action Recognition-Based IoT Services for Emergency Response Management. Mach. Learn. Knowl. Extr. 5(1): 330-345 (2023) - 2022
- [j11]Abdulqader M. Almars
, Malik Almaliki, Talal H. Noor
, Majed Alwateer
, El-Sayed Atlam:
HANN: Hybrid Attention Neural Network for Detecting Covid-19 Related Rumors. IEEE Access 10: 12334-12344 (2022) - [j10]Talal H. Noor, Abdulqader Almars
, Ibrahim Gad
, El-Sayed Atlam
, Mahmoud Elmezain
:
Spatial Impressions Monitoring during COVID-19 Pandemic Using Machine Learning Techniques. Comput. 11(4): 52 (2022) - [j9]Abdulqader M. Almars
, El-Sayed Atlam, Talal H. Noor
, Elmarhomy Ghada, Rasha M. Al-Makhlasawy, Ibrahim Gad
:
Users opinion and emotion understanding in social media regarding COVID-19 vaccine. Computing 104(6): 1481-1496 (2022) - 2021
- [j8]Talal H. Noor:
A service classification model for IoT services discovery. Computing 103(11): 2553-2572 (2021)
2010 – 2019
- 2018
- [j7]Talal H. Noor, Sherali Zeadally, Abdullah Alfazi, Quan Z. Sheng
:
Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. 115: 70-85 (2018) - 2016
- [j6]Talal H. Noor, Quan Z. Sheng
, Zakaria Maamar
, Sherali Zeadally:
Managing Trust in the Cloud: State of the Art and Research Challenges. Computer 49(2): 34-45 (2016) - [j5]Talal H. Noor, Quan Z. Sheng
, Lina Yao, Schahram Dustdar
, Anne H. H. Ngu:
CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services. IEEE Trans. Parallel Distributed Syst. 27(2): 367-380 (2016) - [c10]Abdullah Alfazi, Quan Z. Sheng
, Wei Emma Zhang
, Lina Yao, Talal H. Noor:
Identification as a Service: Large-Scale Cloud Service Discovery over the World Wide Web. BigData Congress 2016: 485-492 - 2015
- [j4]Jian Yu, Quan Z. Sheng
, Joshua K. Y. Swee, Jun Han, Chengfei Liu
, Talal H. Noor:
Model-driven development of adaptive web service processes with aspects and rules. J. Comput. Syst. Sci. 81(3): 533-552 (2015) - [c9]Abdullah Alfazi, Quan Z. Sheng
, Yongrui Qin
, Talal H. Noor:
Ontology-Based Automatic Cloud Service Categorization for Enhancing Cloud Service Discovery. EDOC 2015: 151-158 - 2014
- [b1]Talal H. Noor, Quan Z. Sheng
, Athman Bouguettaya
:
Trust Management in Cloud Services. Springer 2014, ISBN 978-3-319-12249-6, pp. 1-119 - [j3]Talal H. Noor, Quan Z. Sheng
, Anne H. H. Ngu, Schahram Dustdar
:
Analysis of Web-Scale Cloud Services. IEEE Internet Comput. 18(4): 55-61 (2014) - [c8]Abdullah Alfazi, Talal H. Noor, Quan Z. Sheng
, Yong Xu:
Towards Ontology-Enhanced Cloud Services Discovery. ADMA 2014: 616-629 - [p1]Talal H. Noor, Quan Z. Sheng
:
Web Service-Based Trust Management in Cloud Environments. Advanced Web Services 2014: 101-120 - 2013
- [j2]Talal H. Noor, Quan Z. Sheng
, Sherali Zeadally, Jian Yu:
Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surv. 46(1): 12:1-12:30 (2013) - [c7]Talal H. Noor, Quan Z. Sheng
, Anne H. H. Ngu, Abdullah Alfazi, Jeriel Law:
Cloud Armor: a platform for credibility-based trust management of cloud services. CIKM 2013: 2509-2512 - [c6]Talal H. Noor, Quan Z. Sheng
, Abdullah Alfazi, Jeriel Law, Anne H. H. Ngu:
Identifying Fake Feedback for Effective Trust Management in Cloud Environments. ICSOC Workshops 2013: 47-58 - [c5]Talal H. Noor, Quan Z. Sheng
, Abdullah Alfazi:
Detecting Occasional Reputation Attacks on Cloud Services. ICWE 2013: 416-423 - [c4]Talal H. Noor, Quan Z. Sheng
, Abdullah Alfazi, Anne H. H. Ngu, Jeriel Law:
CSCE: A Crawler Engine for Cloud Services Discovery on the World Wide Web. ICWS 2013: 443-450 - [c3]Talal H. Noor, Quan Z. Sheng
, Abdullah Alfazi:
Reputation Attacks Detection for Effective Trust Assessment among Cloud Services. TrustCom/ISPA/IUCC 2013: 469-476 - 2011
- [c2]Talal H. Noor, Quan Z. Sheng
:
Credibility-Based Trust Management for Services in Cloud Environments. ICSOC 2011: 328-343 - [c1]Talal H. Noor, Quan Z. Sheng
:
Trust as a Service: A Framework for Trust Management in Cloud Environments. WISE 2011: 314-321 - 2010
- [j1]Talal H. Noor, Mohammad Hweidi, Ahmed Mohiuddin, Damith Chinthana Ranasinghe:
Stenog-Shell Framework for Anonymous File Exchange. J. Ubiquitous Syst. Pervasive Networks 1(1): 9-17 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint