Mohammed Hussain
Mohammed Hussain
College of Technological Innovation, Zayed University
Verified email at - Homepage
Cited by
Cited by
SECaaS: security as a service for cloud-based applications
M Hussain, H Abdulsalam
Proceedings of the Second Kuwait Conference on e-Services and e-Systems, 1-4, 2011
UMLintr: a UML profile for specifying intrusions
M Hussein, M Zulkernine
13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006
Intrusion detection aware component-based systems: A specification-based framework
M Hussein, M Zulkernine
Journal of Systems and Software 80 (5), 700-710, 2007
A lightweight perceptron-based intrusion detection system for fog computing
B Sudqi Khater, AWB Abdul Wahab, MYIB Idris, M Abdulla Hussain, ...
Applied Sciences 9 (1), 178, 2019
The impact of cloud computing on ITIL service strategy processes
MB Al Mourad, M Hussain
International Journal of Computer and Communication Engineering 3 (5), 367, 2014
Software quality in the clouds: a cloud-based solution
M Hussain, HM Abdulsalam
Cluster computing 17 (2), 389-402, 2014
The design and applications of a privacy-preserving identity and trust-management system
M Hussain
Canadian theses, 2010
Effective third party auditing in cloud computing
M Hussain, MB Al-Mourad
2014 28th International Conference on Advanced Information Networking and …, 2014
Trust in Mobile Cloud Computing with LTE-based Deployment
M Hussain, B Almourad
IEEE Conference on Scalable Computing and Communications, 643-648, 2014
Mining Educational Data for Academic Accreditation: Aligning Assessment with Outcomes
M Hussain, M Al-Mourad, S Mathew, A Hussein
Global Journal of Flexible Systems Management 18 (1), 51–60, 2017
Well-formed semantic model for co-Learning
J Alomari, M Hussain, S Turki, M Masud
Computers in Human Behavior, 2015
Collect, Scope, and Verify Big Data – A Framework for Institution Accreditation
M Hussain, M Al-Mourad, S Mathew
Advanced Information Networking and Applications Workshops (WAINA), 2016 …, 2016
Personas: Beyond identity protection by information control
DB Skillicorn, M Hussain
A Report to the Privacy Commissioner of Canada, 2009
Persona-based identity management: A novel approach to privacy protection
M Hussain, DB Skillicorn
Proceedings of the 13th Nordic workshop on secure it systems, 201-212, 2008
Software specification and attack languages
M Hussein
Advances in Enterprise Information Technology Security, 285-301, 2007
A secure and decentralised SIP for mobile ad hoc networks
M Hussain, DB Khedher
International Journal of Communication Networks and Distributed Systems 20 …, 2018
Social-media based assessment of academic programs
A Hussein, M Hussain
Studies in Educational Evaluation 62 (September), 149 - 157, 2019
A crowdsource model for quality assurance in cloud computing
M Hussain, MB Al-Mourad
International Journal of Grid and Utility Computing 7 (3), 177-183, 2016
Guarantee-based access control
M Hussain, DB Skillicorn
2009 International Conference on Computational Science and Engineering 3 …, 2009
Personas: Beyond Identity Protection by Information Control A Report to the Privacy Commissioner of Canada
DB Skillicorn, M Hussain
The system can't perform the operation now. Try again later.
Articles 1–20