Qussai Yaseen
Qussai Yaseen
Associate Professor, Department of Computer Information Systems, Jordan University of Science and
Verified email at just.edu.jo - Homepage
Cited by
Cited by
A fog computing based system for selective forwarding detection in mobile wireless sensor networks
Q Yaseen, F AlBalas, Y Jararweh, M Al-Ayyoub
2016 IEEE 1st International Workshops on Foundations and Applications of …, 2016
Knowledge acquisition and insider threat prediction in relational database systems
Q Yaseen, B Panda
2009 International Conference on Computational Science and Engineering 3 …, 2009
Predicting and preventing insider threat in relational database systems
Q Yaseen, B Panda
IFIP International Workshop on Information Security Theory and Practices …, 2010
Insider threat mitigation: preventing unauthorized knowledge acquisition
Q Yaseen, B Panda
International Journal of Information Security 11 (4), 269-280, 2012
Collusion attacks mitigation in internet of things: a fog based model
Q Yaseen, M Aldwairi, Y Jararweh, M Al-Ayyoub, B Gupta
Multimedia Tools and Applications 77 (14), 18249-18268, 2018
Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks
Q Yaseen, F Albalas, Y Jararwah, M Al‐Ayyoub
Transactions on Emerging Telecommunications Technologies 29 (4), e3183, 2018
A new enhancement to the R-tree node splitting
AF Al-Badarneh, Q Yaseen, I Hmeidi
Journal of Information Science 36 (1), 3-18, 2010
Cloud support for large scale e-healthcare systems
Q Althebyan, Q Yaseen, Y Jararweh, M Al-Ayyoub
Annals of Telecommunications 71 (9-10), 503-515, 2016
Multi-threading based map reduce tasks scheduling
Q Althebyan, O ALQudah, Y Jararweh, Q Yaseen
2014 5th International Conference on Information and Communication Systems …, 2014
Pep-side caching: an insider threat port
Q Yaseen, Q Althebyan, Y Jararweh
2013 IEEE 14th International Conference on Information Reuse & Integration …, 2013
Evaluating map reduce tasks scheduling algorithms over cloud computing infrastructure
Q Althebyan, Y Jararweh, Q Yaseen, O AlQudah, M Al‐Ayyoub
Concurrency and Computation: practice and experience 27 (18), 5686-5699, 2015
Malicious modification attacks by insiders in relational databases: prediction and prevention
Q Yaseen, B Panda
2010 IEEE Second International Conference on Social Computing, 849-856, 2010
Collusion attacks in internet of things: detection and mitigation using a fog based model
Q Yaseen, Y Jararweh, M Al-Ayyoub, M AlDwairi
2017 IEEE Sensors Applications Symposium (SAS), 1-5, 2017
Extracting the roots of Arabic words without removing affixes
Q Yaseen, I Hmeidi
Journal of Information Science 40 (3), 376-385, 2014
Tackling insider threat in cloud relational databases
Q Yaseen, B Panda
2012 IEEE Fifth International Conference on Utility and Cloud Computing, 215-218, 2012
Mitigating insider threat in cloud relational databases
Q Yaseen, Q Althebyan, B Panda, Y Jararweh
Security and Communication Networks 9 (10), 1132-1145, 2016
An enhanced AODV protocol for avoiding black holes in MANET
QM Yaseen, M Aldwairi
Procedia Computer Science 134, 371-376, 2018
A scalable Map Reduce tasks scheduling: a threading-based approach
Q Althebyan, O AlQudah, Y Jararweh, Q Yaseen
International journal of computational science and engineering 14 (1), 44-54, 2017
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase
Q Yaseen, B Panda
2010 Fourth International Conference on Network and System Security, 312-317, 2010
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability
Q Althebyan, R Mohawesh, Q Yaseen, Y Jararweh
2015 10th International Conference for Internet Technology and Secured …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20