default search action
Qusay H. Mahmoud
Person information
- affiliation: University of Ontario Institute of Technology, Oshawa, ON, Canada
- affiliation (2002 - 2013): University of Guelph, ON, Canada
- affiliation (PhD 2002): Middlesex University, London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j74]Paria Sarzaeim, Qusay H. Mahmoud, Akramul Azim:
A Framework for LLM-Assisted Smart Policing System. IEEE Access 12: 74915-74929 (2024) - [c152]Mohammad Javad Rajaei, Qusay H. Mahmoud:
A Prediction Model for Short Price Jump in Cryptocurrency Market. CCWC 2024: 144-150 - 2023
- [j73]Mahesh Ranaweera, Qusay H. Mahmoud:
Bridging the Reality Gap Between Virtual and Physical Environments Through Reinforcement Learning. IEEE Access 11: 19914-19927 (2023) - [j72]Paria Sarzaeim, Qusay H. Mahmoud, Akramul Azim, Gary Bauer, Ian Bowles:
A Systematic Review of Using Machine Learning and Natural Language Processing in Smart Policing. Comput. 12(12): 255 (2023) - [j71]Mohammad Javad Rajaei, Qusay H. Mahmoud:
A Survey on Pump and Dump Detection in the Cryptocurrency Market Using Machine Learning. Future Internet 15(8): 267 (2023) - [j70]Weimin Zhao, Qusay H. Mahmoud, Sanaa A. Alwidian:
Evaluation of GAN-Based Model for Adversarial Training. Sensors 23(5): 2697 (2023) - [c151]Weimin Zhao, Sanaa A. Alwidian, Qusay H. Mahmoud:
Evaluation of GAN Architectures for Adversarial Robustness of Convolution Classifier. SafeAI@AAAI 2023 - [c150]Michael Lescisin, Qusay H. Mahmoud:
Design and Development of Policy Enforcement for the Privacy by Design Framework. AICCSA 2023: 1-6 - [c149]Mahesh Ranaweera, Qusay H. Mahmoud:
Evaluation of Techniques for Sim2Real Reinforcement Learning. FLAIRS 2023 - [c148]Michael Lescisin, Qusay H. Mahmoud:
A Blockchain-Based Solution for Defining and Enforcing Personal Data Access Policies. ICIT 2023: 118-124 - [c147]Amin Avan, Akramul Azim, Qusay H. Mahmoud:
A Robust Scheduling Algorithm for Overload-Tolerant Real-Time Systems. ISORC 2023: 1-10 - [c146]Weimin Zhao, Qusay H. Mahmoud, Sanaa A. Alwidian:
Building Trust in Deep Learning Models via a Self- Interpretable Visual Architecture. PST 2023: 1-10 - [c145]Amin Avan, Farnaz Kheiri, Qusay H. Mahmoud, Akramul Azim, Masoud Makrehchi, Shahryar Rahnamayan:
A Task Scheduler for Mobile Edge Computing Using Priority-based Reinforcement Learning. SSCI 2023: 539-546 - [c144]Vida Gharavian, Rasa Khosrowshahli, Qusay H. Mahmoud, Masoud Makrehchi, Shahryar Rahnamayan:
Intrusion Detection for Wireless Sensor Network Using Graph Neural Networks. SSCI 2023: 807-813 - 2022
- [j69]Lizhen Tang, Qusay H. Mahmoud:
A Deep Learning-Based Framework for Phishing Website Detection. IEEE Access 10: 1509-1521 (2022) - [j68]Imtiaz Ullah, Qusay H. Mahmoud:
Design and Development of RNN Anomaly Detection Model for IoT Networks. IEEE Access 10: 62722-62750 (2022) - [j67]Weimin Zhao, Sanaa A. Alwidian, Qusay H. Mahmoud:
Adversarial Training Methods for Deep Learning: A Systematic Review. Algorithms 15(8): 283 (2022) - [j66]Mohammad S. Jassas, Qusay H. Mahmoud:
Analysis of Job Failure and Prediction Model for Cloud Computing Using Machine Learning. Sensors 22(5): 2035 (2022) - [j65]Okwudili M. Ezeme, Qusay H. Mahmoud, Akramul Azim:
A Framework for Anomaly Detection in Time-Driven and Event-Driven Processes Using Kernel Traces. IEEE Trans. Knowl. Data Eng. 34(1): 1-14 (2022) - [c143]Mahesh Ranaweera, Qusay H. Mahmoud:
Bridging Reality Gap Between Virtual and Physical Robot through Domain Randomization and Induced Noise. Canadian AI 2022 - [c142]Aakash Gangolli, Qusay H. Mahmoud, Akramul Azim:
A Machine Learning Approach to Predict System-Level Threats from Hardware-Based Fault Injection Attacks on IoT Software. CASCON 2022: 4-11 - [c141]Weimin Zhao, Sanaa A. Alwidian, Hancong Ge, Shahryar Rahnamayan, Qusay H. Mahmoud:
Multi-Objective Differential Evolution and Unseen Adversarial Sample Generation. CASCON 2022: 32-41 - [c140]Imtiaz Ullah, Qusay H. Mahmoud:
An Anomaly Detection Model for IoT Networks based on Flow and Flag Features using a Feed-Forward Neural Network. CCNC 2022: 363-368 - [c139]Aakash Gangolli, Qusay H. Mahmoud, Akramul Azim:
A Machine Learning Based Approach to Detect Fault Injection Attacks in IoT Software Systems. SMC 2022: 2900-2905 - [c138]Mohammad S. Jassas, Qusay H. Mahmoud:
Evaluation of Failure Analysis of IoT Applications Using Edge-Cloud Architecture. SysCon 2022: 1-8 - [c137]Michael Lescisin, Qusay H. Mahmoud:
A Container-Based Architecture to Build and Deploy Applications within a Social Network. SysCon 2022: 1-6 - 2021
- [j64]Nelson Vithayathil Varghese, Qusay H. Mahmoud:
A Hybrid Multi-Task Learning Approach for Optimizing Deep Reinforcement Learning Agents. IEEE Access 9: 44681-44703 (2021) - [j63]Imtiaz Ullah, Qusay H. Mahmoud:
Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks. IEEE Access 9: 103906-103926 (2021) - [j62]Imtiaz Ullah, Qusay H. Mahmoud:
A Framework for Anomaly Detection in IoT Networks Using Conditional Generative Adversarial Networks. IEEE Access 9: 165907-165931 (2021) - [j61]Yosef Ashibani, Qusay H. Mahmoud:
Design and evaluation of a user authentication model for IoT networks based on app event patterns. Clust. Comput. 24(2): 837-850 (2021) - [j60]Lizhen Tang, Qusay H. Mahmoud:
A Survey of Machine Learning-Based Solutions for Phishing Website Detection. Mach. Learn. Knowl. Extr. 3(3): 672-694 (2021) - [j59]Michael Lescisin, Qusay H. Mahmoud:
A Machine Learning Based Monitoring Framework for Side-Channel Information Leaks. IEEE Open J. Comput. Soc. 2: 139-151 (2021) - [j58]Okwudili M. Ezeme, Akramul Azim, Qusay H. Mahmoud:
PESKEA: Anomaly Detection Framework for Profiling Kernel Event Attributes in Embedded Systems. IEEE Trans. Emerg. Top. Comput. 9(2): 957-971 (2021) - [c136]Nelson Vithayathil Varghese, Akramul Azim, Qusay H. Mahmoud:
A Feature-Based Machine Learning Approach for Mixed-Criticality Systems. ICIT 2021: 699-704 - [c135]Mohamed Ibrahim, Kajan Ravindran, Hyon Lee, Omair Farooqui, Qusay H. Mahmoud:
ElectionBlock: An Electronic Voting System using Blockchain and Fingerprint Authentication. ICSA Companion 2021: 123-129 - [c134]Mohammad S. Jassas, Qusay H. Mahmoud:
A Failure Prediction Model for Large Scale Cloud Applications using Deep Learning. SysCon 2021: 1-8 - [c133]Michael Lescisin, Qusay H. Mahmoud:
SocialSDN: Design and Implementation of a Secure Internet Protocol Tunnel Between Social Connections. SysCon 2021: 1-8 - [c132]Imtiaz Ullah, Qusay H. Mahmoud:
Network Traffic Flow Based Machine Learning Technique for IoT Device Identification. SysCon 2021: 1-8 - [c131]Nelson Vithayathil Varghese, Qusay H. Mahmoud:
Optimization of Deep Reinforcement Learning with Hybrid Multi-Task Learning. SysCon 2021: 1-8 - 2020
- [j57]Yosef Ashibani, Qusay H. Mahmoud:
A Multi-Feature User Authentication Model Based on Mobile App Interactions. IEEE Access 8: 96322-96339 (2020) - [j56]Okwudili M. Ezeme, Qusay H. Mahmoud, Akramul Azim:
Design and Development of AD-CGAN: Conditional Generative Adversarial Networks for Anomaly Detection. IEEE Access 8: 177667-177681 (2020) - [j55]Shihab Shahriar Hazari, Qusay H. Mahmoud:
Improving Transaction Speed and Scalability of Blockchain Systems via Parallel Proof of Work. Future Internet 12(8): 125 (2020) - [j54]Bradley Wood, Brock Watling, Zachary Winn, Daniel Messiha, Qusay H. Mahmoud, Akramul Azim:
Remote Method Delegation: a Platform for Grid Computing. J. Grid Comput. 18(4): 711-725 (2020) - [j53]Cornelius Chidubem Agbo, Qusay H. Mahmoud:
Blockchain in Healthcare: Opportunities, Challenges, and Possible Solutions. Int. J. Heal. Inf. Syst. Informatics 15(3): 82-97 (2020) - [j52]Yosef Ashibani, Qusay H. Mahmoud:
A flexible authentication scheme for smart home networks using app interactions and machine learning. J. Intell. Fuzzy Syst. 39(5): 6009-6020 (2020) - [j51]Harsh V. P. Singh, Qusay H. Mahmoud:
NLP-Based Approach for Predicting HMI State Sequences Towards Monitoring Operator Situational Awareness. Sensors 20(11): 3228 (2020) - [c130]Mohammad S. Jassas, Qusay H. Mahmoud:
Evaluation of a Failure Prediction Model for Large Scale Cloud Applications. Canadian AI 2020: 321-327 - [c129]Imtiaz Ullah, Qusay H. Mahmoud:
A Scheme for Generating a Dataset for Anomalous Activity Detection in IoT Networks. Canadian AI 2020: 508-520 - [c128]Michael Lescisin, Qusay H. Mahmoud:
A Monitoring Framework for Side-Channel Information Leaks. ICCE 2020: 1-6 - [c127]Imtiaz Ullah, Qusay H. Mahmoud:
A Technique for Generating a Botnet Dataset for Anomalous Activity Detection in IoT Networks. SMC 2020: 134-140 - [c126]Cornelius Chidubem Agbo, Qusay H. Mahmoud:
Design and Implementation of a Blockchain-Based E-Health Consent Management Framework. SMC 2020: 812-817 - [c125]Harsh V. P. Singh, Qusay H. Mahmoud:
Human-in-the-Loop Error Precursor Detection using Language Translation Modeling of HMI States. SMC 2020: 2237-2242 - [c124]Yosef Ashibani, Qusay H. Mahmoud:
An Intelligent Risk-Based Authentication Approach for Smartphone Applications. SMC 2020: 3807-3812
2010 – 2019
- 2019
- [j50]Mellitus O. Ezeme, Qusay H. Mahmoud, Akramul Azim:
DReAM: Deep Recursive Attentive Model for Anomaly Detection in Kernel Events. IEEE Access 7: 18860-18870 (2019) - [j49]Michael Lescisin, Qusay H. Mahmoud, Anca Cioraca:
Design and Implementation of SFCI: A Tool for Security Focused Continuous Integration. Comput. 8(4): 80 (2019) - [j48]Nick Gregorio, Janahan Mathanamohan, Qusay H. Mahmoud, May AlTaei:
Hacking in the cloud. Internet Technol. Lett. 2(1) (2019) - [j47]Qusay H. Mahmoud, Michael Lescisin, May AlTaei:
Research challenges and opportunities in blockchain and cryptocurrencies. Internet Technol. Lett. 2(2) (2019) - [j46]Shihab S. Hazari, Qusay H. Mahmoud:
Comparative evaluation of consensus mechanisms in cryptocurrencies. Internet Technol. Lett. 2(3) (2019) - [j45]Cornelius Chidubem Agbo, Qusay H. Mahmoud:
Comparison of blockchain frameworks for healthcare applications. Internet Technol. Lett. 2(5) (2019) - [j44]Harsh V. P. Singh, Qusay H. Mahmoud:
ViDAQ: A computer vision based remote data acquisition system for reading multi-dial gauges. J. Ind. Inf. Integr. 15: 29-41 (2019) - [j43]Harsh V. P. Singh, Qusay H. Mahmoud:
Evaluation of ARIMA Models for Human-Machine Interface State Sequence Prediction. Mach. Learn. Knowl. Extr. 1(1): 287-311 (2019) - [j42]Michael Lescisin, Qusay H. Mahmoud:
Ad-hoc messaging infrastructure for peer-to-peer communication. Peer-to-Peer Netw. Appl. 12(1): 60-73 (2019) - [c123]Yosef Ashibani, Qusay H. Mahmoud:
A Behavior-Based Proactive User Authentication Model Utilizing Mobile Application Usage Patterns. Canadian AI 2019: 284-295 - [c122]Okwudili M. Ezeme, Michael Lescisin, Qusay H. Mahmoud, Akramul Azim:
DeepAnom: An Ensemble Deep Framework for Anomaly Detection in System Processes. Canadian AI 2019: 549-555 - [c121]Darren Saguil, Qiao Xue, Qusay H. Mahmoud:
M2MHub: A Blockchain-Based Approach for Tracking M2M Message Provenance. AICCSA 2019: 1-8 - [c120]Imtiaz Ullah, Qusay H. Mahmoud:
A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks. CCNC 2019: 1-6 - [c119]Shihab Shahriar Hazari, Qusay H. Mahmoud:
A Parallel Proof of Work to Improve Transaction Speed and Scalability in Blockchain Systems. CCWC 2019: 916-921 - [c118]Yosef Ashibani, Qusay H. Mahmoud:
User Authentication for Smart Home Networks Based on Mobile Apps Usage. ICCCN 2019: 1-6 - [c117]Harsh V. P. Singh, Qusay H. Mahmoud:
LSTM-based Approach to Monitor Operator Situation Awareness via HMI State Prediction. ICII 2019: 328-337 - [c116]Yosef Ashibani, Qusay H. Mahmoud:
Classification and Feature Extraction for User Identification for Smart Home Networks Based on Apps Access History. ICMLA 2019: 376-380 - [c115]Okwudili M. Ezeme, Qusay H. Mahmoud, Akramul Azim:
A Deep Learning Approach to Distributed Anomaly Detection for Edge Computing. ICMLA 2019: 992-999 - [c114]Ahmed Badr, Laura Rafferty, Qusay H. Mahmoud, Khalid Elgazzar, Patrick C. K. Hung:
A Permissioned Blockchain-Based System for Verification of Academic Records. NTMS 2019: 1-5 - [i3]Nathaniel Aldred, Luke Baal, Graeham Broda, Steven Trumble, Qusay H. Mahmoud:
Design and Implementation of a Blockchain-based Consent Management System. CoRR abs/1912.09882 (2019) - 2018
- [j41]Michael Lescisin, Qusay H. Mahmoud:
Evaluation of Dynamic Analysis Tools for Software Security. Int. J. Syst. Softw. Secur. Prot. 9(3): 34-59 (2018) - [c113]Cornelius Chidubem Agbo, Qusay H. Mahmoud, J. Mikael Eklund:
A Scalable Patient Monitoring System Using Apache Storm. CCECE 2018: 1-6 - [c112]Michael Lescisin, Qusay H. Mahmoud:
Dataset for Web Traffic Security Analysis. IECON 2018: 2700-2705 - [c111]Yosef Ashibani, Qusay H. Mahmoud:
A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns. IECON 2018: 2841-2846 - [c110]Mohammad S. Jassas, Qusay H. Mahmoud:
Failure Analysis and Characterization of Scheduling Jobs in Google Cluster Trace. IECON 2018: 3102-3107 - [c109]May AlTaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, Huwida Said:
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges. IIT 2018: 157-162 - [c108]Cornelius Chidubem Agbo, Qusay H. Mahmoud, J. Mikael Eklund:
An Architecture for Cloud-Assisted Clinical Support System for Patient Monitoring and Disease Detection In Mobile Environments. PervasiveHealth 2018: 245-250 - [c107]Mellitus O. Ezeme, Qusay H. Mahmoud, Akramul Azim:
Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems. RTCSA 2018: 225-231 - [c106]Qusay H. Mahmoud, Ian Andrusiak, May AlTaei:
Toward a Reliable Service-Based Approach to Software Application Development. CBI (1) 2018: 168-177 - [c105]Michael Lescisin, Qusay H. Mahmoud:
Tools for Active and Passive Network Side-Channel Detection for Web Applications. WOOT @ USENIX Security Symposium 2018 - [i2]Rahma Mahmood, Qusay H. Mahmoud:
Evaluation of Static Analysis Tools for Finding Vulnerabilities in Java and C/C++ Source Code. CoRR abs/1805.09040 (2018) - 2017
- [j40]Yosef Ashibani, Qusay H. Mahmoud:
Cyber physical systems security: Analysis, challenges and solutions. Comput. Secur. 68: 81-97 (2017) - [j39]Mohammad S. Jassas, Qusay H. Mahmoud:
A framework for integrating wireless sensors and cloud computing. Int. J. Cloud Comput. 6(2): 95-124 (2017) - [j38]Abdullah A. Qasem, Qusay H. Mahmoud:
Design and implementation of a framework for provisioning algorithms as a service. Int. J. Cloud Comput. 6(3): 265-288 (2017) - [j37]Lutful Karim, Qusay H. Mahmoud, Nidal Nasser, Alagan Anpalagan, Nargis Khan:
Localization in terrestrial and underwater sensor-based m2m communication networks: architecture, classification and challenges. Int. J. Commun. Syst. 30(4) (2017) - [c104]Mellitus Ezeme, Akramul Azim, Qusay H. Mahmoud:
An Imputation-based Augmented Anomaly Detection from Large Traces of Operating System Events. BDCAT 2017: 43-52 - [c103]Imtiaz Ullah, Qusay H. Mahmoud:
A filter-based feature selection model for anomaly-based intrusion detection systems. IEEE BigData 2017: 2151-2159 - [c102]Imtiaz Ullah, Qusay H. Mahmoud:
A hybrid model for anomaly-based intrusion detection in SCADA networks. IEEE BigData 2017: 2160-2167 - [c101]Ian Andrusiak, Qusay H. Mahmoud:
A reliability-aware framework for service-based software development. CCECE 2017: 1-5 - [c100]Yosef Ashibani, Dylan Kauling, Qusay H. Mahmoud:
A context-aware authentication framework for smart homes. CCECE 2017: 1-5 - [c99]Mohammad S. Jassas, Jortin Mathew, Akramul Azim, Qusay H. Mahmoud:
A framework for extending resources of embedded systems using the Cloud. CCECE 2017: 1-5 - [c98]Michael Lescisin, Qusay H. Mahmoud:
DCM: A Python-based middleware for parallel processing applications on small scale devices. CCECE 2017: 1-5 - [c97]Harsh V. P. Singh, Qusay H. Mahmoud:
EYE-on-HMI: A Framework for monitoring human machine interfaces in control rooms. CCECE 2017: 1-5 - [c96]Imtiaz Ullah, Qusay H. Mahmoud:
An intrusion detection framework for the smart grid. CCECE 2017: 1-5 - [c95]Dylan Kauling, Qusay H. Mahmoud:
Sensorian Hub: An IFTTT-based platform for collecting and processing sensor data. CCNC 2017: 504-509 - [c94]Yosef Ashibani, Dylan Kauling, Qusay H. Mahmoud:
A context-aware authentication service for smart homes. CCNC 2017: 588-589 - [c93]Qusay H. Mahmoud, Dylan Kauling, Shaun Zanin:
Hidden android permissions: Remote code execution and shell access using a live wallpaper. CCNC 2017: 599-600 - [c92]Vathalloor Merin George, Qusay H. Mahmoud:
Claimsware: A Claims-Based Middleware for Securing IoT Services. COMPSAC (1) 2017: 649-654 - [c91]Michael Lescisin, Qusay H. Mahmoud:
Ad-hoc messaging infrastructure for P2P communication in disaster management. IHTC 2017: 172-176 - [c90]Yosef Ashibani, Qusay H. Mahmoud:
An efficient and secure scheme for smart home communication using identity-based signcryption. IPCCC 2017: 1-7 - [c89]Harsh V. P. Singh, Qusay H. Mahmoud:
ViDAQ: A Framework for Monitoring Human Machine Interfaces. ISORC 2017: 141-149 - [c88]Harsh V. P. Singh, Qusay H. Mahmoud:
HMI-guard: A platform for detecting errors in human-machine interfaces. SMC 2017: 2861-2866 - [i1]Omar Almootassem, Syed Hamza Husain, Denesh Parthipan, Qusay H. Mahmoud:
A Cloud-based Service for Real-Time Performance Evaluation of NoSQL Databases. CoRR abs/1705.08317 (2017) - 2016
- [c87]Jacob Morra, Qusay H. Mahmoud:
Evaluation of Python-based tools for distributed computing on the Raspberry Pi. CASCON 2016: 149-155 - [c86]Qusay H. Mahmoud, Dhimiter Qendri:
The Sensorian IoT platform. CCNC 2016: 286-287 - [c85]Abdelwahab M. Elnaka, Qusay H. Mahmoud, Xining Li:
Fair and Delay Adaptive Scheduler (FDAS) preliminary modeling and optimization. CCNC 2016: 646-649 - [c84]Abdelwahab M. Elnaka, Qusay H. Mahmoud, Xining Li:
Simulation based comparative performance analysis of QoS traffic scheduling using fair and delay adaptive scheduler (FDAS) versus WFQ and EDF. CCNC 2016: 916-923 - [c83]Michael Lescisin, Qusay H. Mahmoud:
Middleware for writing distributed applications on physical computing devices. MOBILESoft 2016: 21-22 - [c82]Qusay H. Mahmoud, Dhimiter Qendri, Michael Lescisin:
The Sensorian Shield: Transforming the Raspberry Pi into an IoT Platform. SIGCSE 2016: 162 - 2015
- [j36]Lutful Karim, Nidal Nasser, Qusay H. Mahmoud, Alagan Anpalagan, Tarek El Salti:
Range-free localization approach for M2M communication system using mobile anchor nodes. J. Netw. Comput. Appl. 47: 137-146 (2015) - [j35]Sunny Dhillon, Qusay H. Mahmoud:
An evaluation framework for cross-platform mobile application development tools. Softw. Pract. Exp. 45(10): 1331-1357 (2015) - [c81]Mohammad S. Jassas, Abdullah A. Qasem, Qusay H. Mahmoud:
A smart system connecting e-health sensors and the cloud. CCECE 2015: 712-716 - [c80]Mehrin Gilani, Catherine Inibhunu, Qusay H. Mahmoud:
Application and network performance of Amazon elastic compute cloud instances. CloudNet 2015: 315-318 - [c79]Benjamin Ferriman, Tarfa Hamed, Qusay H. Mahmoud:
Storming the cloud: A look at denial of service in the Google App Engine. ICNC 2015: 363-368 - [c78]Harsh V. P. Singh, Syed R. Rizvi, Qusay H. Mahmoud:
Two architectures for real-time sensor data streaming for cloud applications. ISSPIT 2015: 133-138 - 2014
- [j34]Lutful Karim, Qusay H. Mahmoud, Nidal Nasser, Nargis Khan:
An integrated framework for wireless sensor network management. Wirel. Commun. Mob. Comput. 14(12): 1143-1159 (2014) - [c77]Abdelwahab M. Elnaka, Qusay H. Mahmoud, Xining Li:
Fair and delay adaptive scheduler for UC and NGN networks. CCECE 2014: 1-6 - [c76]Daniel Vijayakumar, Qusay H. Mahmoud:
A framework for the service provisioning of community-contributed web APIs. CCECE 2014: 1-7 - [c75]Daniel Vijayakumar, Qusay H. Mahmoud:
Evaluation of a platform for the provisioning of community-contributed web services. IPCCC 2014: 1-8 - 2013
- [c74]Abdelwahab M. Elnaka, Qusay H. Mahmoud:
QoS traffic mapping for a multi-participant session in unified communications networks. CCECE 2013: 1-5 - [c73]Lutful Karim, Qusay H. Mahmoud:
A hybrid mobility model based on social, cultural and language diversity. CollaborateCom 2013: 197-204 - 2012
- [j33]Qusay H. Mahmoud, May AlTaei, Leon Jololian:
A conference to promote undergraduate research in the Arab World. XRDS 18(3): 53-55 (2012) - [j32]Lutful Karim, Tarek El Salti, Nidal Nasser, Qusay H. Mahmoud:
The significant impact of a set of topologies on wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2012: 120 (2012) - [c72]Thomas Hummel, Qusay H. Mahmoud, Piras Maha:
A configurable swarm robot platform for remote sensing applications. CCECE 2012: 1-5 - [c71]Nicholas Mair, Qusay H. Mahmoud:
A collaborative Bluetooth-based approach to localization of mobile devices. CollaborateCom 2012: 363-371 - [c70]Lutful Karim, Qusay H. Mahmoud, Nidal Nasser, Nargis Khan:
LRSA: A multi-component Wireless Sensor Network management framework. GLOBECOM 2012: 683-688 - [c69]Qusay H. Mahmoud, Nicholas Mair, Mohamed F. Younis, Sunny Dhillon:
Hands-on labs for a mini-course on mobile application development (abstract only). SIGCSE 2012: 674 - [c68]Qusay H. Mahmoud, Shaun Zanin, Thanh Ngo:
Integrating mobile storage into database systems courses. SIGITE Conference 2012: 165-170 - 2011
- [c67]Qusay H. Mahmoud:
Workshop - Introducing and teaching smartphone application development. FIE 2011: 1 - [c66]Qusay H. Mahmoud:
Best practices in teaching mobile application development. ITiCSE 2011: 333 - [c65]Qusay H. Mahmoud:
A mobile web-based approach to introductory programming. ITiCSE 2011: 334 - 2010
- [j31]Qusay H. Mahmoud, Leslie Yu:
Integrating the Havana agent platform into the existing web infrastructure. Int. J. Wirel. Mob. Comput. 4(4): 290-304 (2010) - [j30]Eyhab Al-Masri, Qusay H. Mahmoud:
MobiEureka: an approach for enhancing the discovery of mobile web services. Pers. Ubiquitous Comput. 14(7): 609-620 (2010) - [j29]Eyhab Al-Masri, Qusay H. Mahmoud:
WSB: a broker-centric framework for quality-driven web service discovery. Softw. Pract. Exp. 40(10): 917-941 (2010) - [c64]Qusay H. Mahmoud, Thanh Ngo:
A gateway-based framework for finding and accessing mobile web services. IRI 2010: 213-218
2000 – 2009
- 2009
- [j28]Eyhab Al-Masri, Qusay H. Mahmoud:
Web Service Discovery and Client Goals. Computer 42(1): 104-107 (2009) - [j27]Eyhab Al-Masri, Qusay H. Mahmoud:
SmartCon: a context-aware service discovery and selection mechanism using Artificial Neural Networks. Int. J. Intell. Syst. Technol. Appl. 6(1/2): 144-156 (2009) - [c63]Eyhab Al-Masri, Qusay H. Mahmoud:
Identifying Client Goals for Web Service Discovery. IEEE SCC 2009: 202-209 - [c62]Brian Moore, Qusay H. Mahmoud:
A service broker and business model for saas applications. AICCSA 2009: 322-329 - [c61]Eyhab Al-Masri, Qusay H. Mahmoud:
Device-Aware Discovery and Ranking of Mobile Services. CCNC 2009: 1-5 - [c60]Eyhab Al-Masri, Qusay H. Mahmoud:
A Broker for Universal Access to Web Services. CNSR 2009: 118-125 - [c59]Razieh Niazi, Qusay H. Mahmoud:
An Ontology-Based Framework for Discovering Mobile Services. CNSR 2009: 178-184 - [c58]Zakaria Maamar, Qusay H. Mahmoud, Nabil Sahli, Khouloud Boukadi:
Privacy-Aware Web Services in Smart Homes. ICOST 2009: 174-181 - [c57]Qusay H. Mahmoud, Thanh Ngo, Razieh Niazi, Pawel Popowicz, Robert Sydoryshyn, Matthew Wilks, Dave Dietz:
An academic kit for integrating mobile devices into the CS curriculum. ITiCSE 2009: 40-44 - [c56]Eyhab Al-Masri, Qusay H. Mahmoud:
Understanding Web Service Discovery Goals. SMC 2009: 3714-3719 - [c55]Eyhab Al-Masri, Qusay H. Mahmoud:
Discovering the Best Web Service: A Neural Network-based Solution. SMC 2009: 4250-4255 - [c54]Huy Pham, Qusay H. Mahmoud, Alexander Ferworn, Alireza Sadeghian:
Intelligent agent control using simple logic-based hierarchical planning. SoSE 2009: 1-5 - 2008
- [j26]Qusay H. Mahmoud, Allan Dyer:
Mobile Devices in an Introductory Programming Course. Computer 41(6): 106-108 (2008) - [j25]Eyhab Al-Masri, Qusay H. Mahmoud:
Discovering Web Services in Search Engines. IEEE Internet Comput. 12(3): 74-77 (2008) - [j24]Eyhab Al-Masri, Qusay H. Mahmoud:
Toward Quality-Driven Web Service Discovery. IT Prof. 10(3): 24-28 (2008) - [j23]Mosaab Daoud, Qusay H. Mahmoud:
Monte Carlo simulation-based algorithms for estimating the reliability of mobile agent-based systems. J. Netw. Comput. Appl. 31(1): 19-31 (2008) - [j22]Qusay H. Mahmoud, Peter Langendörfer:
Guest editorial: Service-oriented computing. ACM Trans. Internet Techn. 8(3): 11:1-11:3 (2008) - [j21]Zakaria Maamar, Djamal Benslimane, Ghita Kouadri Mostéfaoui, Sattanathan Subramanian, Qusay H. Mahmoud:
Toward Behavioral Web Services Using Policies. IEEE Trans. Syst. Man Cybern. Part A 38(6): 1312-1324 (2008) - [c53]Randy J. Gallant, Qusay H. Mahmoud:
Using Greenfoot and a Moon Scenario to teach Java programming in CS1. ACM Southeast Regional Conference 2008: 118-121 - [c52]Eyhab Al-Masri, Qusay H. Mahmoud:
Investigating web services on the world wide web. WWW 2008: 795-804 - 2007
- [j20]Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab:
Enabling ad-hoc collaboration between mobile users in the MESSENGER project. Clust. Comput. 10(1): 67-79 (2007) - [j19]Eyhab Al-Masri, Qusay H. Mahmoud:
Interoperability among Service Registry Standards. IEEE Internet Comput. 11(3): 74-77 (2007) - [j18]Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud:
Dynamic management of UDDI registries in a wireless environment of web services: Concepts, architecture, operation, and deployment. J. Intell. Inf. Syst. 28(2): 105-131 (2007) - [j17]Qusay H. Mahmoud, Eyhab Al-Masri, Zhixin Wang:
Design and implementation of a smart system for personalization and accurate selection of mobile services. Requir. Eng. 12(4): 221-230 (2007) - [c51]Joshua J. Reynolds, Robbie McLeod, Qusay H. Mahmoud:
Apocrita: a distributed peer-to-peer file sharing system for intranets. ACM Southeast Regional Conference 2007: 174-178 - [c50]Qusay H. Mahmoud, Allan Dyer:
Integrating BlackBerry wireless devices into computer programming and literacy courses. ACM Southeast Regional Conference 2007: 495-500 - [c49]Eyhab Al-Masri, Qusay H. Mahmoud:
A Framework for Efficient Discovery of Web Services Across Heterogeneous Registries. CCNC 2007: 415-419 - [c48]Eyhab Al-Masri, Qusay H. Mahmoud:
QoS-based Discovery and Ranking of Web Services. ICCCN 2007: 529-534 - [c47]Eyhab Al-Masri, Qusay H. Mahmoud:
WSCE: A Crawler Engine for Large-Scale Discovery of Web Services. ICWS 2007: 1104-1111 - [c46]Eyhab Al-Masri, Qusay H. Mahmoud:
Relevancy Ranking of Web Services. SMC 2007: 783-788 - [c45]Mosaab Daoud, Qusay H. Mahmoud:
A fuzzy approach to reliability estimation of mobile agent-based systems. SMC 2007: 2854-2859 - [c44]Huy Pham, Alexander Ferworn, Qusay H. Mahmoud, Alireza Sadeghian:
Applying Model-Driven Development Techniques to the Development of Search and Rescue Systems. SoSE 2007: 1-6 - [c43]Eyhab Al-Masri, Qusay H. Mahmoud:
Crawling multiple UDDI business registries. WWW 2007: 1255-1256 - [c42]Eyhab Al-Masri, Qusay H. Mahmoud:
Discovering the best web service. WWW 2007: 1257-1258 - 2006
- [j16]Qusay H. Mahmoud, Leslie Yu:
Making Software Agents User-Friendly. Computer 39(7): 94-96 (2006) - [j15]Qusay H. Mahmoud, Leslie Yu:
Havana agents for comparison shopping and location-aware advertising in wireless mobile environments. Electron. Commer. Res. Appl. 5(3): 220-228 (2006) - [j14]Qusay H. Mahmoud, Wassam Zahreddine:
Design and implementation of a device-independent system for adaptive composition of web services. Int. J. Internet Protoc. Technol. 1(3): 168-176 (2006) - [j13]Qusay H. Mahmoud, Zakaria Maamar:
Engineering Wireless Mobile Applications. Int. J. Inf. Technol. Web Eng. 1(1): 59-75 (2006) - [j12]Qusay H. Mahmoud, Mosaab Daoud:
An Analytical Approach to Reliability Estimation of Mobile Agent-based Systems. J. Interconnect. Networks 7(2): 217-234 (2006) - [c41]Eyhab Al-Masri, Qusay H. Mahmoud:
A context-aware mobile service discovery and selection mechanism using artificial neural networks. ICEC 2006: 594-598 - [c40]Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab:
On Promoting Ad-Hoc Collaboration Among Messengers. AINA (1) 2006: 785-790 - [c39]Qusay H. Mahmoud, Zakaria Maamar:
Applying the MVC Design Pattern to Multi-Agent Systems. CCECE 2006: 2420-2423 - [c38]Qusay H. Mahmoud, Zhixin Wang:
Customizing and delivering mobile services using software agents and CC/PP. CCNC 2006: 1114-1118 - [c37]Wassam Zahreddine, Qusay H. Mahmoud:
A Succinct Analysis of Web Service Composition. ICEIS (4) 2006: 193-196 - [c36]Qusay H. Mahmoud:
Provisioning Context-Aware Advertisements to Wireless Mobile Users. ICME 2006: 669-672 - [c35]Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab, Wathiq Mansoor:
Ad-Hoc Collaboration Between Messengers: Operations and Incentives. MDM 2006: 10 - [c34]Qusay H. Mahmoud, Zakaria Maamar:
Editorial message: special track on handheld computing. SAC 2006: 984-985 - [e5]Qusay H. Mahmoud, Hans Weghorn:
Wireless Information Systems, Proceedings of the 5th International Workshop on Wireless Information Systems, WIS 2006, In conjunction with ICEIS 2006, Paphos, Cyprus, May 2006. INSTICC Press 2006, ISBN 978-972-8865-48-1 [contents] - 2005
- [j11]Qusay H. Mahmoud:
Revitalizing Computing Science Education. Computer 38(5): 98-100 (2005) - [j10]Zakaria Maamar, Soraya Kouadri Mostéfaoui, Qusay H. Mahmoud:
On Personalizing Web Services Using Context. Int. J. E Bus. Res. 1(3): 41-62 (2005) - [j9]Qusay H. Mahmoud, Wassam Zahreddine:
A Framework for Adaptive and Dynamic Composition of Web Services. J. Interconnect. Networks 6(3): 209-228 (2005) - [j8]Qusay H. Mahmoud, Upkar Varshney:
Guest Editors' Introduction. Mob. Networks Appl. 10(4): 383-384 (2005) - [j7]Jerry Tyan, Qusay H. Mahmoud:
A Comprehensive Service Discovery Solution for Mobile Ad Hoc Networks. Mob. Networks Appl. 10(4): 423-434 (2005) - [j6]Qusay H. Mahmoud:
Guest editor's preface to the special section on discovery and interaction of mobile services. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(1): 1 (2005) - [c33]Mosaab Daoud, Qusay H. Mahmoud:
Reliability Estimation of Mobile Agent Systems Using the Monte Carlo Approach. AINA 2005: 185-188 - [c32]Wassam Zahreddine, Qusay H. Mahmoud:
An Agent-Based Approach to Composite Mobile Web Services. AINA 2005: 189-192 - [c31]Wassam Zahreddine, Qusay H. Mahmoud:
A Framework for Automatic and Dynamic Composition of Personalized Web Services. AINA 2005: 513-518 - [c30]Qusay H. Mahmoud, Zhixin Wang:
An Agent Enabled System for Personalizing Wireless Mobile Services. AMCIS 2005: 227 - [c29]Zakaria Maamar, Soraya Kouadri Mostéfaoui, Qusay H. Mahmoud:
Context for Personalized Web Services. HICSS 2005 - [c28]Qusay H. Mahmoud, Leslie Yu:
An Architecture and Business Model for Making Software Agents Commercially Viable. HICSS 2005 - [c27]Wassam Zahreddine, Qusay H. Mahmoud:
Design and Implementation of a Context-Based System for Composition of Web Services. ICEIS (4) 2005: 119-126 - [c26]Mosaab Daoud, Qusay H. Mahmoud:
Maximizing the route reliability of mobile agents in unreliable environments. ISADS 2005: 97-104 - [c25]Wassam Zahreddine, Qusay H. Mahmoud:
Blending Web services and agents for mobile users. ISADS 2005: 585-590 - [c24]Mosaab Daoud, Qusay H. Mahmoud:
Estimating the Task Route Reliability of Mobile Agent-Based Systems Using Monte Carlo Simulation. ISCC 2005: 569-574 - [c23]Mosaab Daoud, Qusay H. Mahmoud:
Reliability analysis of mobile agent-based systems. SAC 2005: 92-93 - [c22]Qusay H. Mahmoud, Zakaria Maamar:
Special track on handheld computing. SAC 2005: 961-962 - [c21]Zakaria Maamar, Djamal Benslimane, Chirine Ghedira, Qusay H. Mahmoud, Hamdi Yahyaoui:
Tuple spaces for self-coordination of web services. SAC 2005: 1656-1660 - [e4]Hans Weghorn, Qusay H. Mahmoud:
Wireless Information Systems, Proceedings of the 4th International Workshop on Wireless Information Systems, WIS 2005, In conjunction with ICEIS 2005, Miami, USA, May 2005. INSTICC Press 2005 [contents] - 2004
- [j5]Luminita Vasiu, Qusay H. Mahmoud:
Mobile Agents in Wireless Devices. Computer 37(2): 104-105 (2004) - [j4]Qusay H. Mahmoud, Wlodzimierz Dobosiewicz, David A. Swayne:
Making Computer Programming Fun and Accessible. Computer 37(2): 106-108 (2004) - [j3]David A. Swayne, Qusay H. Mahmoud, Wlodzimierz Dobosiewicz:
An "Offshore-Resistant" Degree Program. Computer 37(8): 102-104 (2004) - [j2]Qusay H. Mahmoud:
Practice and experience with Java in education. Sci. Comput. Program. 53(1): 1-2 (2004) - [j1]Qusay H. Mahmoud:
Wireless Java Applications Development. login Usenix Mag. 29(2) (2004) - [c20]Qusay H. Mahmoud, Leslie Yu:
Mobile Agents for Location-Aware Advertising in Mobile Wireless Environments. AMCIS 2004: 259 - [c19]Qusay H. Mahmoud:
A Responsibility-Driven Architecture for Mobile Enterprise Applications. ICEIS (1) 2004: 125-129 - [c18]Qusay H. Mahmoud, Zhujun Xu, Xining Li:
Evaluation of Recent Research in Mobile Agent Platforms for Mobile Devices. ICEIS (4) 2004: 331-336 - [c17]Leslie Yu, Qusay H. Mahmoud:
A Web-Enabled Mobile Agent Platform for E-Commerce and M-Commerce: "The Havana Platform". ICEIS (4) 2004: 425-429 - [c16]Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud, Soraya Kouadri Mostéfaoui, Wathiq Mansoor:
Messengers for the Dynamic Management of Distributed UDDI Registries. MobiQuitous 2004: 346-355 - [c15]Qusay H. Mahmoud:
Design Challenges and Possible Solutions to Wireless Application Development. Software Engineering Research and Practice 2004: 782-788 - [c14]Qusay H. Mahmoud, Wlodzimierz Dobosiewicz, David A. Swayne:
Redesigning introductory computer programming with HTML, JavaScript, and Java. SIGCSE 2004: 120-124 - [c13]Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud, Fahim Akhter:
Dynamic Management of UDDI Registries in a Wireless Environment of Web Services. WWIC 2004: 284-294 - [e3]Qusay H. Mahmoud, Hans Weghorn:
Wireless Information Systems, Proceedings of the 3rd International Workshop on Wireless Information Systems, WIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004. INSTICC Press 2004, ISBN 972-8865-02-3 [contents] - 2003
- [c12]Mieso K. Denko, Qusay H. Mahmoud:
Mobile Agents for Clustering and Routing in Mobile Ad Hoc Networks. ADHOC-NOW 2003: 271-276 - [c11]Qusay H. Mahmoud, Leslie Yu, Christopher Long:
dAMP: A JXTA-Based Peer-to-Peer Media Player. AMCIS 2003: 229 - [c10]Qusay H. Mahmoud, Luminita Vasiu:
Inter-Agent Communication Models. ICEIS (4) 2003: 448-450 - [c9]Qusay H. Mahmoud:
Towards a Software Engineering Approach to Wireless Application Development. Software Engineering Research and Practice 2003: 791-797 - [e2]Qusay H. Mahmoud:
Wireless Information Systems, Proceedings of the 2nd International Workshop on Wireless Information Systems, WIS 2003 In conjunction with ICEIS 2003, Angers, France, April 2003. ICEIS Press 2003, ISBN 972-98816-5-0 [contents] - 2002
- [b1]Qusay H. Mahmoud:
Evolution of network computing paradigms : applications of mobile agents in wired and wireless networks. Middlesex University, London, UK, 2002 - [c8]Zakaria Maamar, Wathiq Mansoor, Qusay H. Mahmoud:
Software agents to support mobile services. AAMAS 2002: 666-667 - [c7]Qusay H. Mahmoud:
Developing Enterprise Applications Using Java. ICEIS 2002: 21 - [c6]Qusay H. Mahmoud, Luminita Vasiu:
Accessing and Using Internet Services from Java-Enabled Handheld Wireless Devices. ICEIS 2002: 1048-1053 - [c5]Zakaria Maamar, Wathiq Mansoor, Qusay H. Mahmoud:
Software Agents in the Wireless World - Application to Mobile Services. M-Services 2002 - [e1]Qusay H. Mahmoud:
Wireless Information Systems, Proceedings of the 1st International Workshop on Wireless Information Systems, WIS 2002 In conjunction with ICEIS 2002, Ciudad Real, Spain, April 2002. ICEIS Press 2002, ISBN 972-98816-0-X [contents] - 2001
- [c4]Qusay H. Mahmoud:
Wireless Application Programming with Java. TOOLS (38) 2001: 202 - [c3]Qusay H. Mahmoud:
Wireless Software Design for Handheld Devices. TOOLS (39) 2001: 360 - 2000
- [c2]Qusay H. Mahmoud:
Using Jini for High-Performance Network Computing. PARELEC 2000: 244-247
1990 – 1999
- 1999
- [c1]Qusay H. Mahmoud:
The Web as a Global Computing Platform. HPCN Europe 1999: 281-290
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint