Professor Zahir Tari
Professor Zahir Tari
Research Director, RMIT Cyber Security Centre, RMIT University, School of Computing Technologies
Verified email at - Homepage
Cited by
Cited by
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ...
IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014
MetaCDN: Harnessing ‘Storage Clouds’ for high performance content delivery
J Broberg, R Buyya, Z Tari
Journal of Network and Computer Applications 32 (5), 1012-1022, 2009
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living
ARM Forkan, I Khalil, Z Tari, S Foufou, A Bouras
Pattern Recognition 48 (3), 628-641, 2015
CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living
A Forkan, I Khalil, Z Tari
Future Generation Computer Systems 35, 114-127, 2014
An efficient privacy-preserving ranked keyword search method
C Chen, X Zhu, P Shen, J Hu, S Guo, Z Tari, AY Zomaya
IEEE Transactions on Parallel and Distributed Systems 27 (4), 951-963, 2015
Coupling metrics for predicting maintainability in service-oriented designs
M Perepletchikov, C Ryan, K Frampton, Z Tari
2007 Australian Software Engineering Conference (ASWEC'07), 329-340, 2007
A role-based access control for intranet security
Z Tari, SW Chan
IEEE Internet Computing 1 (5), 24-34, 1997
SCADASim—A framework for building SCADA simulations
C Queiroz, A Mahmood, Z Tari
IEEE Transactions on Smart Grid 2 (4), 589-597, 2011
Extraction of shape skeletons from grayscale images
ZSG Tari, J Shah, H Pien
Computer Vision and Image Understanding 66 (2), 133-146, 1997
Object normal forms and dependency constraints for object-oriented schemata
Z Tari, J Stokes, S Spaccapietra
ACM Transactions on Database Systems (TODS) 22 (4), 513-569, 1997
A role based access control for web services
R Wonohoesodo, Z Tari
IEEE International Conference onServices Computing, 2004.(SCC 2004 …, 2004
Building a SCADA security testbed
C Queiroz, A Mahmood, J Hu, Z Tari, X Yu
2009 Third International Conference on Network and System Security, 357-364, 2009
BDCaM: Big data for context-aware monitoring—A personalized knowledge discovery framework for assisted healthcare
ARM Forkan, I Khalil, A Ibaida, Z Tari
IEEE transactions on cloud computing 5 (4), 628-641, 2015
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
A Almalawi, X Yu, Z Tari, A Fahad, I Khalil
Computers & Security 46, 94-110, 2014
The impact of service cohesion on the analyzability of service-oriented software
M Perepletchikov, C Ryan, Z Tari
IEEE Transactions on Services Computing 3 (2), 89-103, 2010
Toward an efficient and scalable feature selection approach for internet traffic classification
A Fahad, Z Tari, I Khalil, I Habib, H Alnuweiri
Computer Networks 57 (9), 2040-2057, 2013
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE
R Meersman, Z Tari
Springer Berlin/Heidelberg., 2005
Security and privacy in cloud computing
Z Tari
IEEE Computer Architecture Letters 1 (01), 54-57, 2014
Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling
H Kumarage, I Khalil, Z Tari, A Zomaya
Journal of Parallel and Distributed Computing 73 (6), 790-806, 2013
Fundamentals of distributed object systems: the CORBA perspective
Z Tari, O Bukhres
John Wiley & Sons, 2004
The system can't perform the operation now. Try again later.
Articles 1–20