default search action
Yoosef B. Abushark
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Khloud A. Alshaikh, Omaima Almatrafi, Yoosef B. Abushark:
BERT-Based Model for Aspect-Based Sentiment Analysis for Analyzing Arabic Open-Ended Survey Responses: A Case Study. IEEE Access 12: 2288-2302 (2024) - 2023
- [j14]Iqbal H. Sarker, Asif Irshad Khan, Yoosef B. Abushark, Fawaz Alsolami:
Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions. Mob. Networks Appl. 28(1): 296-312 (2023) - [j13]Abdulmohsen Almalawi, Asif Irshad Khan, Fawaz Alsolami, Yoosef B. Abushark, Ahmed S. Alfakeeh:
Managing Security of Healthcare Data for a Modern Healthcare System. Sensors 23(7): 3612 (2023) - 2022
- [j12]Yoosef B. Abushark:
An intelligent feature selection approach with systolic tree structures for efficient association rules in big data environment. Comput. Electr. Eng. 101: 108080 (2022) - 2021
- [j11]Iqbal H. Sarker, Yoosef B. Abushark, Asif Irshad Khan, Md. Mottahir Alam, Raza Nowrozy:
Mobile Deep Learning: Exploring Deep Neural Network for Predicting Context-Aware Smartphone Usage. SN Comput. Sci. 2(3): 146 (2021) - [j10]Iqbal H. Sarker, Asif Irshad Khan, Yoosef B. Abushark, Fawaz Alsolami:
Mobile Expert System: Exploring Context-Aware Machine Learning Rules for Personalized Decision-Making in Mobile Applications. Symmetry 13(10): 1975 (2021) - 2020
- [j9]Abhishek Kumar Pandey, Asif Irshad Khan, Yoosef B. Abushark, Md. Mottahir Alam, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan:
Key Issues in Healthcare Data Integrity: Analysis and Recommendations. IEEE Access 8: 40612-40628 (2020) - [j8]Rajeev Kumar, Asif Irshad Khan, Yoosef B. Abushark, Md. Mottahir Alam, Alka Agrawal, Raees Ahmad Khan:
A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications. IEEE Access 8: 48870-48885 (2020) - [j7]Rajeev Kumar, Asif Irshad Khan, Yoosef B. Abushark, Md. Mottahir Alam, Alka Agrawal, Raees Ahmad Khan:
An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications. IEEE Access 8: 50944-50957 (2020) - [j6]Iqbal H. Sarker, Hamed AlQahtani, Fawaz Alsolami, Asif Irshad Khan, Yoosef B. Abushark, Mohammad Khubeb Siddiqui:
Context pre-modeling: an empirical analysis for classification based user-centric context-aware predictive modeling. J. Big Data 7(1): 51 (2020) - [j5]Iqbal H. Sarker, Alan Colman, Jun Han, Asif Irshad Khan, Yoosef B. Abushark, Khaled Salah:
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. Mob. Networks Appl. 25(3): 1151-1161 (2020) - [j4]Iqbal H. Sarker, Yoosef B. Abushark, Asif Irshad Khan:
ContextPCA: Predicting Context-Aware Smartphone Apps Usage Based On Machine Learning Techniques. Symmetry 12(4): 499 (2020) - [j3]Iqbal H. Sarker, Yoosef B. Abushark, Fawaz Alsolami, Asif Irshad Khan:
IntruDTree: A Machine Learning Based Cyber Security Intrusion Detection Model. Symmetry 12(5): 754 (2020) - [i1]Iqbal H. Sarker, Alan Colman, Jun Han, Asif Irshad Khan, Yoosef B. Abushark, Khaled Salah:
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model. CoRR abs/2001.00621 (2020)
2010 – 2019
- 2017
- [j2]Yoosef B. Abushark, Tim Miller, John Thangarajah, Michael Winikoff, James Harland:
Requirements specification via activity diagrams for agent-based systems. Auton. Agents Multi Agent Syst. 31(3): 423-468 (2017) - [j1]Yoosef B. Abushark, John Thangarajah, James Harland, Tim Miller:
A framework for automatically ensuring the conformance of agent designs. J. Syst. Softw. 131: 266-310 (2017) - 2016
- [c7]Yoosef B. Abushark, John Thangarajah, Tim Miller, Michael Winikoff, James Harland:
Requirements Specification in The Prometheus Methodology via Activity Diagrams. AAMAS 2016: 1247-1248 - [c6]Yoosef B. Abushark:
A Systematic Approach for Detecting Defects in Agent Designs: (Doctoral Consortium). AAMAS 2016: 1520-1521 - 2015
- [c5]Yoosef B. Abushark, John Thangarajah, Tim Miller, James Harland, Michael Winikoff:
Early Detection of Design Faults Relative to Requirement Specifications in Agent-Based Models. AAMAS 2015: 1071-1079 - 2014
- [c4]Yoosef B. Abushark, John Thangarajah, Tim Miller, James Harland:
Checking consistency of agent designs against interaction protocols for early-phase defect location. AAMAS 2014: 933-940 - [c3]Yoosef B. Abushark, Michael Winikoff, Tim Miller, James Harland, John Thangarajah:
Checking The Correctness of Agent Designs Against Model-Based Requirements. ECAI 2014: 953-954 - 2013
- [c2]Yoosef B. Abushark, John Thangarajah:
Propagating AUML Protocols to Detailed Design. EMAS@AAMAS 2013: 19-37 - [c1]Yoosef B. Abushark, John Thangarajah:
AUML protocols: from specification to detailed design. AAMAS 2013: 1173-1174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint