Saleh Atiewi
Al-Hussein Bin Talal University
Data securityDynamic priority schedulingInternet privacyThe InternetOperating systemStability (learning theory)Scheduling (computing)LoginAlgorithmTwo-level schedulingCloud testingDistributed computingFixed-priority pre-emptive schedulingEnvironmental economicsGraph (abstract data type)Load balancing (computing)Recurrent neural networkEncryptionWearable computerData centerAuthenticationProvisioningRound-robin schedulingCryptographyMultiple encryptionCloud computing securityMobile deviceApplication layerMulti-factor authenticationComputer data storageLogistic mapVirtual machineEfficient energy useEavesdroppingChaoticGreen Information TechnologyTask (computing)Carbon taxGraphics processing unitEnergy consumptionScope (project management)Packet filteringShort distanceComputer networkFair-share schedulingIntrusion detection systemComputer scienceNode (networking)ScalabilityMean-shiftQuality of serviceVirtualizationWearable technologyBluetoothJob shop schedulingAndroid (operating system)Cluster analysisGreen computingBig dataAnalyticsReal-time computingCloud computingInternet of ThingsUtility computingProtocol (object-oriented programming)ServerAdvanced Encryption StandardRobustness (computer science)
12Publications
4H-index
58Citations
Publications 12
Newest
#1Yahia Alemami (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 1
#2Mohamad Afendee Mohamed (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 6
Last. Mustafa Mamat (UniSZA: Universiti Sultan Zainal Abidin)H-Index: 15
view all 4 authors...
There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional...
2 CitationsSource
#1Saleh AtiewiH-Index: 4
#2Amer Al-RahayfehH-Index: 8
Last. Yaser JararwehH-Index: 40
view all 7 authors...
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations presents a challenge in the IoT-cloud architecture. To overcome security issues, we propose a cloud-enabled IoT environment supported by multifactor au...
3 CitationsSource
#1Muder Almiani (Al-Hussein Bin Talal University)H-Index: 5
#2Alia AbuGhazleh (JUST: Jordan University of Science and Technology)H-Index: 3
Last. Abdul Razaque (IT University)H-Index: 1
view all 5 authors...
Abstract As a results of the large scale development of the Internet of Things (IoT), cloud computing capabilities including networking, data storage, management, and analytics are brought very close to the edge of networks forming Fog computing and enhancing transferring and processing of tremendous amount of data. As the Internet becomes more deeply integrated into our business operations through IoT platform, the desire for reliable and efficient connections increases as well. Fog and Cloud s...
23 CitationsSource
#1Muder AlmianiH-Index: 5
#2Abdul RazaqueH-Index: 10
Last. Basel MagablehH-Index: 4
view all 8 authors...
Source
#1Swapnika Reddy Putta (SCSU: St. Cloud State University)H-Index: 1
#2Abdullah Abuhussein (SCSU: St. Cloud State University)H-Index: 6
Last. Saleh Atiewi (Al-Hussein Bin Talal University)H-Index: 4
view all 5 authors...
Internet of Medical Things (IoMT) is a fast-emerging technology in healthcare with a lot of scope for security vulnerabilities. Like any other Internet-connected device, IoMT is not immune to breaches. These breaches can not only affect the functionality of the device but also impact the security and privacy (S&P) of the data. The impact of these breaches can be life-threatening. The proposed methodology used a stakeholder-centric approach to improve the security of IoMT wearables. The proposed ...
1 CitationsSource
#1Muder Almiani (Al-Hussein Bin Talal University)H-Index: 5
#2Abdul Razaque (NYIT: New York Institute of Technology)H-Index: 10
Last. Saleh Atiewi (Al-Hussein Bin Talal University)H-Index: 4
view all 7 authors...
In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorn...
Source
#1Amer Al-RahayfehH-Index: 8
#2Saleh AtiewiH-Index: 4
Last. Muder AlmianiH-Index: 5
view all 4 authors...
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling and load balancing approaches, we propose a novel approach that uses dominant sequence clustering (DSC) for task scheduling and a weighted least connection (WLC) algorithm for load balancing. First, users’ tasks are cluste...
2 CitationsSource
#1Saleh Atiewi (TNB: Universiti Tenaga Nasional)H-Index: 4
#2Salman Yussof (TNB: Universiti Tenaga Nasional)H-Index: 14
Last. Mutasem ZalloumH-Index: 1
view all 4 authors...
Cloud computing is a fascinating and profitable area in modern distributed computing. Aside from providing millions of users the means to use offered services through their own computers, terminals, and mobile devices, cloud computing presents an environment with low cost, simple user interface, and low power consumption by employing server virtualisation in its offered services (e.g., Infrastructure as a Service). The pool of virtual machines found in a cloud computing data centre (DC) must run...
2 CitationsSource
#1Saleh Atiewi (Al-Hussein Bin Talal University)H-Index: 4
#2Abdullah Abuhussein (SCSU: St. Cloud State University)H-Index: 6
Last. Mohammad Abu Saleh (Al-Hussein Bin Talal University)H-Index: 1
view all 3 authors...
Global warming, which is currently one of the greatest environmental challenges, is caused by carbon emissions. A report from the Energy Information Administration indicates that approximately 98% of CO2 emissions can be attributed to energy consumption. The trade-off between efficient and ecologically sound operation represents a major challenge faced by many organizations at present. In addition, numerous companies are currently compelled to pay a carbon tax for the resources they use and the ...
2 CitationsSource
Apr 29, 2016 in LISAT (Long Island Systems, Applications and Technology Conference)
#1Saleh Atiewi (TNB: Universiti Tenaga Nasional)H-Index: 4
#2Salman Yussof (TNB: Universiti Tenaga Nasional)H-Index: 14
Last. Muder Almiani (Al-Hussein Bin Talal University)H-Index: 5
view all 4 authors...
Cloud computing is a model for delivering information technology services, wherein resources are retrieved from the Internet through web-based tools and applications instead of a direct connection to a server. The capability to provision and release cloud computing resources with minimal management effort or service provider interaction led to the rapid increase of the use of cloud computing. Therefore, balancing cloud computing resources to provide better performance and services to end users i...
6 CitationsSource