Select Publications

Book Chapters

Chowdhury L; Kamal MS; Ripon SH; Parvin S; Hussain OK; Ashour A; Chowdhury BR, 2024, 'A biological data-driven mining technique by using hybrid classifiers with rough set', in Research Anthology on Bioinformatics, Genomics, and Computational Biology, pp. 1 - 20, http://dx.doi.org/10.4018/979-8-3693-3026-5.ch001

Saberi M; Saberi Z; Aasadabadi MR; Hussain OK; Chang E, 2020, 'A Customer-Oriented Assortment Selection in the Big Data Environment', in Lecture Notes on Data Engineering and Communications Technologies, pp. 161 - 172, http://dx.doi.org/10.1007/978-3-030-34986-8_11

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Measuring and Analysing the Use of Ontologies A Semantic Framework for Measuring Ontology Usage', in , Springer

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Closing the Loop: Placing Ontology Usage Analysis in the Ontology Development and Deployment Lifecycle', in Measuring and Analysing the Use of Ontologies, Springer, pp. 23 - 47, http://dx.doi.org/10.1007/978-3-319-75681-3_2

Ali S; AlBalushi T; Nadir Z; Hussain OK, 2018, 'Cyber Security for Cyber Physical Systems', in CYBER SECURITY FOR CYBER PHYSICAL SYSTEMS, SPRINGER-VERLAG BERLIN, http://dx.doi.org/10.1007/978-3-319-75880-0

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'Cyber-physical systems security', in Cyber security for cyber physical systems, Springer, pp. 1 - 10, http://dx.doi.org/10.1007/978-3-319-75880-0_1

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'Distributed control systems security for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 141 - 160, http://dx.doi.org/10.1007/978-3-319-75880-0_7

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'Embedded systems security for cyber-physical systems', in Cyber Security for Cyber Physical Systems, Springer, pp. 115 - 140, http://dx.doi.org/10.1007/978-3-319-75880-0_6

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Evaluation of U Ontology', in Measuring and Analysing the Use of Ontologies, Springer, pp. 243 - 268, http://dx.doi.org/10.1007/978-3-319-75681-3_9

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'ICS/SCADA system security for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 89 - 113, http://dx.doi.org/10.1007/978-3-319-75880-0_5

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Identification Phase: Ontology Usage Network Analysis Framework (OUN-AF)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 63 - 101, http://dx.doi.org/10.1007/978-3-319-75681-3_4

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Investigation Phase: Empirical Analysis of Domain Ontology Usage (EMP-AF)', in Measuring and Analysing the Use of Ontologies. Studies in Computational Intelligence., Springer, Cham, pp. 103 - 140, http://dx.doi.org/10.1007/978-3-319-75681-3_5

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Investigation Phase: Quantitative Analysis of Domain Ontology Usage (QUA-AF)', in Measuring and Analysing the Use of Ontologies. Studies in Computational Intelligence, Springer, Cham, pp. 141 - 169, http://dx.doi.org/10.1007/978-3-319-75681-3_6

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Motivation', in Measuring and Analysing the Use of Ontologies, Springer, pp. 1 - 21, http://dx.doi.org/10.1007/978-3-319-75681-3_1

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'New Research Directions', in Measuring and Analysing the Use of Ontologies, Springer, pp. 269 - 271, http://dx.doi.org/10.1007/978-3-319-75681-3_10

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Ontology Usage Analysis Framework (OUSAF)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 49 - 62, http://dx.doi.org/10.1007/978-3-319-75681-3_3

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Representation Phase: Ontology Usage Ontology (U Ontology)', in Measuring and Analysing the Use of Ontologies, Springer, pp. 171 - 203, http://dx.doi.org/10.1007/978-3-319-75681-3_7

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'Risk management for CPS security', in Cyber Security for Cyber Physical Systems, Springer, pp. 11 - 33, http://dx.doi.org/10.1007/978-3-319-75880-0_2

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'Standards for CPS', in Cyber Security for Cyber Physical Systems, Springer, pp. 161 - 174, http://dx.doi.org/10.1007/978-3-319-75880-0_8

Ashraf J; Hussain OK; Hussain FK; Chang EJ, 2018, 'Utilization Phase: Utilization of OUSAF', in Measuring and Analysing the Use of Ontologies, Springer, pp. 205 - 242, http://dx.doi.org/10.1007/978-3-319-75681-3_8

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'Wireless sensor network security for cyber-physical systems', in Cyber Security for Cyber Physical Systems, Springer, pp. 35 - 63, http://dx.doi.org/10.1007/978-3-319-75880-0_3

Ali S; Al Balushi T; Nadir Z; Hussain OK, 2018, 'WSN security mechanisms for CPS', in Cyber security for cyber physical systems, Springer, pp. 65 - 87, http://dx.doi.org/10.1007/978-3-319-75880-0_4

Chang EJ; Hussain OK; Dillon TS, 2013, 'Application of fuzzy inference systems in real world scenarios', in , pp. 101 - 107, http://dx.doi.org/10.1007/978-3-642-35641-4_16

Hussain OK; Hussain O; Sangka B; Hussain F, 2012, 'Determining the Significance of Assessment Criteria for Risk Analysis in Business Associations', in Jain LC; Chee PL (ed.), Handbook on Decision Making: Reviews and applications of intelligent decision support systems

Hussain OK; Dillon T, 2010, 'Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-Driven Production', in Xhafa F; Barolli L; Papajorgji PJ (ed.), Complex Intelligent Systems and Their Applications, Springer Verlag

Hussain OK; Chang E; Hussain FK; Dillon TS, 2008, 'Determining the failure level for risk analysis in an e-commerce interaction', in , pp. 290 - 323, http://dx.doi.org/10.1007/978-3-540-89784-2_12

Hussain OK; Chang E; Hussain F; Dillon T, 2007, 'Communicating Recommendations in a Service-Oriented Environment', in


Back to profile page