Follow
Yoosef Abushark
Title
Cited by
Cited by
Year
Intrudtree: a machine learning based cyber security intrusion detection model
IH Sarker, YB Abushark, F Alsolami, AI Khan
Symmetry 12 (5), 754, 2020
912020
Behavdt: a behavioral decision tree learning to build user-centric context-aware predictive model
IH Sarker, A Colman, J Han, AI Khan, YB Abushark, K Salah
Mobile Networks and Applications 25 (3), 1151-1161, 2020
542020
An integrated approach of fuzzy logic, AHP and TOPSIS for estimating usable-security of web applications
R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan
IEEE Access 8, 50944-50957, 2020
502020
A knowledge-based integrated system of hesitant fuzzy set, ahp and topsis for evaluating security-durability of web applications
R Kumar, AI Khan, YB Abushark, MM Alam, A Agrawal, RA Khan
IEEE Access 8, 48870-48885, 2020
352020
Key issues in healthcare data integrity: Analysis and recommendations
AK Pandey, AI Khan, YB Abushark, MM Alam, A Agrawal, R Kumar, ...
IEEE Access 8, 40612-40628, 2020
312020
Contextpca: Predicting context-aware smartphone apps usage based on machine learning techniques
IH Sarker, YB Abushark, AI Khan
Symmetry 12 (4), 499, 2020
232020
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling
IH Sarker, H Alqahtani, F Alsolami, AI Khan, YB Abushark, MK Siddiqui
Journal of Big Data 7 (1), 1-23, 2020
152020
Early detection of design faults relative to requirement specifications in agent-based models
Y Abushark, J Thangarajah, T Miller, J Harland, M Winikoff
Proceedings of the 14th International Conference on Autonomous Agents and …, 2015
142015
Checking consistency of agent designs against interaction protocols for early-phase defect location
YB Abushark, J Thangarajah, T Miller, J Harland
Proceedings of the 13th International Joint Conference on Autonomous Agents …, 2014
142014
Security risk assessment of healthcare web application through adaptive neuro-fuzzy inference system: A design perspective
J Kaur, AI Khan, YB Abushark, MM Alam, SA Khan, A Agrawal, R Kumar, ...
Risk Management and Healthcare Policy 13, 355, 2020
112020
Requirements specification via activity diagrams for agent-based systems
Y Abushark, T Miller, J Thangarajah, M Winikoff, J Harland
Autonomous Agents and Multi-Agent Systems 31 (3), 423-468, 2017
112017
Impact assessment of covid-19 pandemic through machine learning models
FJ Alsolami, AS Al-Malaise Alghamdi, AI Khan, YB Abushark, A Almalawi, ...
Computers, Materials and Continua, 2895-2912, 2021
42021
Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique
AI Khan, A ALGhamdi, FJ Alsolami, YB Abushark, A Almalawi, AM Ali, ...
CMC-Comput. Mater. Contin 70, 2835-2860, 2022
32022
Mobile expert system: exploring context-aware machine learning rules for personalized decision-making in mobile applications
IH Sarker, AI Khan, YB Abushark, F Alsolami
Symmetry 13 (10), 1975, 2021
32021
Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective
YB Abushark, AI Khan, FJ Alsolami, A Almalawi, MM Alam, A Agrawal, ...
CMC-COMPUTERS MATERIALS & CONTINUA 68 (1), 1203-1218, 2021
32021
DBP-CNN: Deep learning-based prediction of DNA-binding proteins by coupling discrete cosine transform with two-dimensional convolutional neural network
O Barukab, F Ali, W Alghamdi, Y Bassam, SA Khan
Expert Systems with Applications 197, 116729, 2022
22022
Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions
IH Sarker, AI Khan, YB Abushark, F Alsolami
Mobile Networks and Applications, 1-17, 2022
22022
Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment
AS Alfakeeh, A Almalawi, FJ Alsolami, YB Abushark, AI Khan, ...
CMC-Comput. Mater. Contin 70, 2297-2317, 2022
22022
Mobile deep learning: Exploring deep neural network for predicting context-aware smartphone usage
IH Sarker, YB Abushark, AI Khan, MM Alam, R Nowrozy
SN Computer Science 2 (3), 1-12, 2021
22021
A framework for automatically ensuring the conformance of agent designs
Y Abushark, J Thangarajah, J Harland, T Miller
Journal of Systems and Software 131, 266-310, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20