Large scale graph processing systems: survey and an experimental evaluation O Batarfi, RE Shawi, AG Fayoumi, R Nouri, SMR Beheshti, A Barnawi, ... Cluster Computing 18, 1189-1213, 2015 | 118 | 2015 |
Big data 2.0 processing systems: Taxonomy and open challenges F Bajaber, R Elshawi, O Batarfi, A Altalhi, A Barnawi, S Sakr Journal of Grid Computing 14, 379-405, 2016 | 85 | 2016 |
Cloud scalability considerations MM Falatah, OA Batarfi International Journal of Computer Science and Engineering Survey 5 (4), 37, 2014 | 39 | 2014 |
A comparison of malware detection techniques based on hidden Markov model S Alqurashi, O Batarfi Journal of Information Security 7 (3), 215-223, 2016 | 34 | 2016 |
On characterizing the performance of distributed graph computation platforms A Barnawi, O Batarfi, SMR Behteshi, R Elshawi, A Fayoumi, R Nouri, ... Performance Characterization and Benchmarking. Traditional to Big Data: 6th …, 2015 | 28 | 2015 |
Benchmarking big data systems: A survey F Bajaber, S Sakr, O Batarfi, A Altalhi, A Barnawi Computer Communications 149, 241-251, 2020 | 27 | 2020 |
Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art F Aldauiji, O Batarfi, M Bayousef IEEE Access 10, 61695-61706, 2022 | 26 | 2022 |
Radwa El Shawi, Ayman G. Fayoumi, Reza Nouri, Seyed-Mehdi-Reza Beheshti, Ahmed Barnawi, and Sherif Sakr. Large scale graph processing systems: survey and an experimental evaluation O Batarfi Cluster Computing 18 (3), 1189-1213, 2015 | 21 | 2015 |
Survey on access control and management issues in cloud and BYOD environment K Almarhabi, K Jambi, F Eassa, O Batarfi International Journal of Computer Science and Mobile Computing 6 (12), 44-54, 2017 | 16 | 2017 |
Big graph processing systems: State-of-the-art and open challenges R Elshawi, O Batarfi, A Fayoumi, A Barnawi, S Sakr 2015 IEEE First International Conference on Big Data Computing Service and …, 2015 | 16 | 2015 |
A Proposed Framework for Access Control in the Cloud and BYOD Environment K Almarhabi, K Jambi, F Eassa, O Batarfi IJCSNS Int. J. Comput. Sci. Netw. Secur 18 (2), 144-152, 2018 | 15 | 2018 |
Impact of android phone rooting on user data integrity in mobile forensics T Almehmadi, O Batarfi 2019 2nd International Conference on Computer Applications & Information …, 2019 | 14 | 2019 |
A comparison between API call sequences and opcode sequences as reflectors of malware behavior S Alqurashi, O Batarfi 2017 12th International Conference for Internet Technology and Secured …, 2017 | 13 | 2017 |
RCR for preventing stack smashing attacks bypass stack canaries DAH Shehab, OA Batarfi 2017 Computing Conference, 795-800, 2017 | 11 | 2017 |
Big data processing systems: state-of-the-art and open challenges S Sakr, F Bajaber, A Barnawi, A Altalhi, R Elshawi, O Batarfi 2015 International Conference on Cloud Computing (ICCC), 1-8, 2015 | 10 | 2015 |
Csrfdtool: Automated detection and prevention of a reflected cross-site request forgery OA Batarfi, AM Alshiky, AA Almarzuki, NA Farraj International Journal of Information Engineering and Electronic Business 6 …, 2014 | 10 | 2014 |
A distributed query execution engine of big attributed graphs O Batarfi, R Elshawi, A Fayoumi, A Barnawi, S Sakr SpringerPlus 5, 1-26, 2016 | 6 | 2016 |
Building a sentiment analysis corpus with multifaceted hierarchical annotation MA Siddiqui, MY Dahab, OA Batarfi International Journal of Computational Linguistics (IJCL) 6 (2), 11-25, 2015 | 6 | 2015 |
Liquid Benchmarking: A Platform for Democratizing the Performance Evaluation Process. S Sakr, A Shafaat, F Bajaber, A Barnawi, O Batarfi, AH Altalhi EDBT, 537-540, 2015 | 5 | 2015 |
An enhanced Dragonfly key exchange protocol against offline dictionary attack E Alharbi, N Alsulami, O Batarfi Journal of Information Security 6 (2), 69-81, 2015 | 5 | 2015 |