Jemal H. Abawajy

Jemal Abawajy is a faculty member at Deakin University and has published more than 100 articles in refereed journals and conferences as well as a number of technical reports. He is on the editorial board of several international journals and edited several international journals and conference proceedings. He has also been a member of the organizing committee for over 60 international conferences and workshops serving in various capacities including best paper award chair, general co-chair, publication chair, vice-chair, and program committee. He is actively involved in funded research in building secure, efficient, and reliable infrastructures for large-scale distributed systems. Towards this vision, he is working in several areas including: pervasive and networked systems (mobile, wireless network, sensor networks, grid, cluster, and P2P), e-science and e-business technologies and applications, and performance analysis and evaluation.

Publications

Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset
Deden Witarsyah, Mohd Farhan Md Fudzee, Mohamad Aizi Salamat, Iwan Tri Riyadi Yanto, Jemal Abawajy. © 2020. 24 pages.
Electronic government (e-gov) is applied to support performance and create more efficient and effective public services. Grouping data in soft-set theory can be considered as a...
Mobile Agents Security Protocols
Raja Al-Jaljouli, Jemal H. Abawajy. © 2014. 37 pages.
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on...
Trends in Crime Toolkit Development
Ansam Khraisat, Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ahmad Azab. © 2014. 16 pages.
Cybercriminals continue to target online users of banks. They are improving their techniques and using high levels of skill in their attacks. Their continued search for different...
Network and Traffic Engineering in Emerging Distributed Computing Applications
Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, Mustafa Mat Deris. © 2013. 376 pages.
Advances such as cloud computing and streaming multimedia are steadily increasing the demand on network resources, and telecommunications providers must ensure that their...
Management of Service Level Agreement for Service-Oriented Content Adaptation Platform
Mohd Farhan Md Fudzee, Jemal H. Abawajy. © 2013. 22 pages.
It is paramount to provide seamless and ubiquitous access to rich contents available online to interested users via a wide range of devices with varied characteristics. Recently...
Strategies for Agent-Based Negotiation in E-Trade
Raja Al-Jaljouli, Jemal H. Abawajy. © 2013. 23 pages.
E-negotiation handles negotiation over the Internet without human supervision and has shown effectiveness in concluding verifiable and more favorable agreements in a reasonably...
Web Malware that Targets Web Applications
Ammar Alazab, Jemal H. Abawajy, Michael Hobbs. © 2013. 17 pages.
Web applications have steadily increased, making them very important in areas, such as financial sectors, e-commerce, e-government, social media network, medical data...
Malware Detection and Prevention System Based on Multi-Stage Rules
Ammar Alazab, Michael Hobbs, Jemal Abawajy, Ansam Khraisat. © 2013. 15 pages.
The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to...
Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes
Andrei V. Kelarev, Jemal Abawajy, Andrew Stranieri, Herbert F. Jelinek. © 2013. 18 pages.
Cardiac complications of diabetes require continuous monitoring since they may lead to increased morbidity or sudden death of patients. In order to monitor clinical complications...
Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications
Jemal H. Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, Mustafa Mat Deris. © 2012. 357 pages.
As software and computer hardware grows in complexity, networks have grown to match. The increasing scale, complexity, heterogeneity, and dynamism of communication networks...
Security Framework for Mobile Agents-Based Applications
Raja Al-Jaljouli, Jemal H. Abawajy. © 2012. 28 pages.
Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various...
Mobile Agents Security Protocols
Raja Al-Jaljouli, Jemal H. Abawajy. © 2012. 36 pages.
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on...
An Approach to Faulty Reader Detection in RFID Reader Network
Hairulnizam Mahdin, Jemal H. Abawajy. © 2012. 15 pages.
Radio Frequency Identification (RFID) technology is becoming increasingly popular as an automated tool for object monitoring and identification in a cost-efficient manner. RFID...
A Security Framework for Networked RFID
Harinda Sahadeva Fernando, Jemal H. Abawajy. © 2012. 30 pages.
In the last decade RFID technology has become a major contender for managing large scale logistics operations and generating and distributing the massive amount of data involved...
Multi-Input-Multi-Output Antennas for Radio Frequency Identification Systems
Shivali G. Bansal, Jemal H. Abawajy. © 2012. 32 pages.
In this chapter the authors discuss the physical insight of the role of wireless communication in RFID systems. In this respect, this chapter gives a brief introduction on the...
Risk-Based Trust Management for E-Commerce
Soon-Keow Chong, Jemal H. Abawajy. © 2010. 20 pages.
Electronic commerce (e-commerce) offers enormous opportunities for online trading while at the same time presenting potential risks. Although various mechanisms have been...
Request-Driven Cross-Media Content Adaptation Technique
Mohd Farhan Md Fudzee, Jemal Abawajy. © 2010. 23 pages.
Devices, standards and software develop rapidly, but still often independently of each other. This creates problems in terms of content suitability on various devices. Also, in...