default search action
Awny Alnusair
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Majdi Rawashdeh, Yazan Alshboul, Mohammed G. H. al Zamil, Samer Samarah, Awny Alnusair, M. Shamim Hossain:
A security framework for QaaS model in intelligent transportation systems. Microprocess. Microsystems 90: 104500 (2022) - [c16]Hong Liu, Md Nour Hossain, Awny Alnusair:
Fostering Active Learning in Introductory Programming Courses by Utilizing Multiple Programming Tools and Enrichment Activities. ICETC 2022: 379-385 - 2021
- [j8]Hong Liu, Chen Zhong, Awny Alnusair, Sheikh Rabiul Islam:
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques. J. Netw. Syst. Manag. 29(4): 40 (2021) - [c15]Muath Obaidat, Joseph Brown, Awny Alnusair:
Blind Attack Flaws in Adaptive Honeypot Strategies. AIIoT 2021: 491-496 - 2020
- [c14]Abdul Razaque, Kalkamanova Kamila Myrzabekovna, Spanova Yerkezhan Magbatkyzy, Muder Almiani, Baktygulova Aray Doszhanovna, Awny Alnusair:
Secure Password-Driven Fingerprint Biometrics Authentication. SDS 2020: 95-99
2010 – 2019
- 2019
- [j7]Majdi Rawashdeh, Awny Alnusair:
Models for Multimedia Mobile Cloud in Smart Cities. Multim. Syst. 25(5): 525-534 (2019) - [j6]Mohammed G. H. al Zamil, Samer Samarah, Majdi Rawashdeh, M. Shamim Hossain, Mohammed F. Alhamid, Mohsen Guizani, Awny Alnusair:
False-Alarm Detection in the Fog-Based Internet of Connected Vehicles. IEEE Trans. Veh. Technol. 68(7): 7035-7044 (2019) - [c13]Majdi Rawashdeh, Awny Alnusair, Muder Almiani, Lina Sawalha:
JMentor: An Ontology-Based Framework for Software Understanding and Reuse. AICCSA 2019: 1-8 - [c12]Chen Zhong, Awny Alnusair, Brandon Sayger, Aaron Troxell, Jun Yao:
AOH-Map: A Mind Mapping System for Supporting Collaborative Cyber Security Analysis. CogSIMA 2019: 74-80 - 2018
- [j5]Mohammed G. H. al Zamil, Majdi Rawashdeh, Samer Samarah, M. Shamim Hossain, Awny Alnusair, Sk. Md. Mizanur Rahman:
An Annotation Technique for In-Home Smart Monitoring Environments. IEEE Access 6: 1471-1479 (2018) - [c11]Lindsey Thomas, Adam Vaughan, Zachary Courtney, Chen Zhong, Awny Alnusair:
Supporting Collaboration Among Cyber Security Analysts Through Visualizing Their Analytical Reasoning Processes. ICME Workshops 2018: 1-6 - 2017
- [j4]Awny Alnusair, Chen Zhong, Majdi Rawashdeh, M. Shamim Hossain, Atif Alamri:
Context-aware multimodal recommendations of multimedia data in cyber situational awareness. Multim. Tools Appl. 76(21): 22823-22843 (2017) - 2016
- [j3]Majdi Rawashdeh, Mohammed F. Alhamid, Jihad M. Alja'am, Awny Alnusair, Abdulmotaleb El-Saddik:
Tag-based personalized recommendation in social media services. Multim. Tools Appl. 75(21): 13299-13315 (2016) - [c10]Majdi Rawashdeh, Awny Alnusair, Nasser Mustafa, Mahmoud Migdadi:
Multimedia Mobile Cloud Computing: Application models for performance enhancement. ICME Workshops 2016: 1-6 - [c9]Awny Alnusair, Majdi Rawashdeh, Mohammed F. Alhamid, M. Anwar Hossain, Ghulam Muhammad:
Reusing Software Libraries Using Semantic Graphs. IRI 2016: 531-540 - 2014
- [j2]Gongjun Yan, Danda B. Rawat, Hui Shi, Awny Alnusair:
Developing and Applying Smartphone Apps in Online Courses. J. Inf. Syst. Educ. 25(2): 149-159 (2014) - [j1]Awny Alnusair, Tian Zhao, Gongjun Yan:
Rule-based detection of design patterns in program code. Int. J. Softw. Tools Technol. Transf. 16(3): 315-334 (2014) - [c8]M. Anwar Hossain, Atif Alamri, Mohammed F. Alhamid, Majdi Rawashdeh, Awny Alnusair:
Collaborative recommendation of ambient media services. ICME Workshops 2014: 1-6 - [c7]Majdi Rawashdeh, Mohammed F. Alhamid, Heung-Nam Kim, Awny Alnusair, Vanessa Maclsaac, Abdulmotaleb El-Saddik:
Graph-based personalized recommendation in social tagging systems. ICME Workshops 2014: 1-6 - 2013
- [c6]Awny Alnusair, Tian Zhao, Gongjun Yan:
Automatic recognition of design motifs using semantic conditions. SAC 2013: 1062-1067 - 2010
- [c5]Awny Alnusair, Tian Zhao, Eric Bodden:
Effective API navigation and reuse. IRI 2010: 7-12 - [c4]Awny Alnusair, Tian Zhao:
Component search and reuse: An ontology-based approach. IRI 2010: 258-261 - [c3]Awny Alnusair, Tian Zhao:
Using Semantic Inference for Software Understanding and Design Recovery. ITNG 2010: 980-985
2000 – 2009
- 2009
- [c2]Awny Alnusair, Tian Zhao:
Using Ontology Reasoning for Reverse Engineering Design Patterns. MoDELS (Workshops) 2009: 344-358 - [c1]Awny Alnusair, Tian Zhao:
Towards a Model-driven Approach for Reverse Engineering Design Patterns. TWOMDE@MoDELS 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint