Amjad Gawanmeh

Orcid: 0000-0002-3897-0681

According to our database1, Amjad Gawanmeh authored at least 89 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-Source Attention-Based Fusion for Segmentation of Natural Disasters.
IEEE Geosci. Remote. Sens. Lett., 2024

Uncovering the Potential of Indoor Localization: Role of Deep and Transfer Learning.
IEEE Access, 2024

2023
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework.
Ann. des Télécommunications, November, 2023

IoT-Enabled Precision Agriculture: Developing an Ecosystem for Optimized Crop Management.
Inf., April, 2023

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions.
IEEE Access, 2023

Exploring 2D Representation and Transfer Learning Techniques for People Identification in Indoor Localization.
Proceedings of the 6th International Conference on Signal Processing and Information Security, 2023

Predicting Student Dropout in Online Learning Platforms Using Deep Learning Techniques.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023

2022
Fog-based distributed trust and reputation management system for internet of things.
J. King Saud Univ. Comput. Inf. Sci., 2022

GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking.
J. King Saud Univ. Comput. Inf. Sci., 2022

Information Adoption Patterns and Online Knowledge Payment Behavior: The Moderating Role of Product Type.
Inf., 2022

Probabilistic analysis of security attacks in cloud environment using hidden Markov models.
Trans. Emerg. Telecommun. Technol., 2022

Prediction of Electric Vehicle Charging Stations Distribution Using Machine Learning.
Proceedings of the 5th International Conference on Signal Processing and Information Security, 2022

DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

2021
The Mental Challenges of Emergency Remote Learning: UAE Engineering Students Case Study.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers.
J. King Saud Univ. Comput. Inf. Sci., 2020

Towards building a blockchain framework for IoT.
Clust. Comput., 2020

A Big Data Fusion to Profile CPS Security Threats Against Operational Technology.
Proceedings of the 21st IEEE International Symposium on "A World of Wireless, 2020

Performance Evaluation of a Lightweight IoT Authentication Protocol.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

RAASID: A Multipurpose Crowd Sensing Smart System With Sentimental Analysis.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

A Microservices Architecture for ADS-B Data Security Using Blockchain.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

2019
A Novel Protocol for Security of Location Based Services in Multi-agent Systems.
Wirel. Pers. Commun., 2019

Collision-Prevention Conditions for Wireless Personal Area Networks.
IEEE Netw. Lett., 2019

A Distributed Algorithm with Optimum Communication for Cyber Physical Systems: Multi-tank Process Case Study.
Proceedings of the 2019 IEEE International Systems Conference, 2019

XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud Environments.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Security and Privacy Challenges of Integrated Disruptive Technologies.
Proceedings of the 2nd International Conference on Signal Processing and Information Security, 2019

A Framework for Integrating Big Data Security Into Agricultural Supply Chain.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

2018
Probabliistic analysis of electrocardiogram (ECG) heart signal.
Comput. Syst. Sci. Eng., 2018

Integrating a decision tree perspective at the operational-level of BPM+.
Comput. Syst. Sci. Eng., 2018

Analysis of MAC Protocols for Real-Time Monitoring of Heart and Respiratory Signals.
Proceedings of the 43rd IEEE Conference on Local Computer Networks Workshops, 2018

Optimised Sensor Based Smart System for Efficient Monitoring of Grain Storage.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Sensing-as-a-Service Decentralized Data Access Control Mechanism for Cyber Physical Systems.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Lightweight Security Protocol for ECG Bio-Sensors.
Wirel. Pers. Commun., 2017

Introduction to the Special Issue on Communication, Computing, and Networking in Cyber-Physical Systems.
Scalable Comput. Pract. Exp., 2017

Smart Solutions for RFID based Inventory Management Systems: A Survey.
Scalable Comput. Pract. Exp., 2017

Design and Verification of a Blood Cell Separation Microfluidic Device.
Int. J. Online Eng., 2017

Guided Test Case Generation for Enhanced ECG Bio-Sensors Functional Verification.
Int. J. E Health Medical Commun., 2017

Design and analysis of control strategies for a cyber physical system.
Comput. Syst. Sci. Eng., 2017

The Optimal Deployment, Coverage, and Connectivity Problems in Wireless Sensor Networks: Revisited.
IEEE Access, 2017

Securing Big Data Efficiently through Microaggregation Technique.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Formal Verification of Control Strategies for a Cyber Physical System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Efficient low cost supervisory system for Internet of Things enabled smart home.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Lightweight security protocol for health monitoring in Ambient Assisted Living environment.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

2016
Introduction to the Special Issue on Reliability and Security of e-Health Information Systems.
Scalable Comput. Pract. Exp., 2016

Improvement Strategies for Device Interoperability Middleware using Formal Reliability Analysis.
Scalable Comput. Pract. Exp., 2016

Formal Verification of a Microfluidic Device for Blood Cell Separation.
Scalable Comput. Pract. Exp., 2016

Assertion-based verification technique for ECG bio-sensor algorithms.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

Simulation Framework for a Security Protocol for Wireless Body Sensor Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

Formal Analysis of Collision Prevention of Two Wireless Personal Area Networks.
Proceedings of the International Conference on Computational Science 2016, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Open Issues in Reliability, Safety, and Efficiency of Connected Health.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems.
Scalable Comput. Pract. Exp., 2015

An automatic ECG generator for testing and evaluating ECG sensor algorithms.
Proceedings of the 10th International Design & Test Symposium, 2015

Formal reliability analysis of Device Interoperability Middleware (DIM) based E-health system using PRISM.
Proceedings of the 17th International Conference on E-health Networking, 2015

Formalizing the movement of microparticles in a continuous flow microfluidic device for field flow fractionation.
Proceedings of the 17th International Conference on E-health Networking, 2015

Reliability analysis of healthcare information systems: State of the art and future directions.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Design and verification of a frequency domain equalizer.
Microelectron. J., 2014

Automatic Verification of Security Policies in Firewalls with Dynamic Rule Sequence.
Proceedings of the 11th International Conference on Information Technology: New Generations, 2014

Validating connected vehicles architecture.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Understanding traffic: Towards a smart traffic control architecture.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Optimizing lifetime of homogeneous wireless sensor networks for vehicular monitoring.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Formal reliability analysis of a typical FHIR standard based e-Health system using PRISM.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

Formalizing electrocardiogram (ECG) signal behavior in event-B.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

Performance evaluation of time and frequency domain equalizers.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

Real time verification of firewalls with dynamic rulebase update.
Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering, 2014

A verification methodology for a wireless body sensor network functionality.
Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics, 2014

2013
Traffic Shaping and Delay Optimization in Demand Side Management.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems.
Proceedings of the 20th IEEE International Conference on Electronics, 2013

An axiomatic model for formal specification requirements of ubiquitous healthcare systems.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Formal error analysis and verification of a frequency domain equalizer.
Proceedings of the 10th IEEE International NEWCAS Conference, 2012

Novel algorithm for detecting conflicts in firewall rules.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

A Demand Side Management Traffic Shaping and Scheduling Algorithm.
Proceedings of the Sixth Asia Modelling Symposium, 2012

2011
Embedding and Verification of ZigBee Protocol Stack in Event-B.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Modeling and verification of firewall configurations using domain restriction method.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Formal modeling and verification of DLK protocol.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2009
Rank Functions Based Inference System for Group Key Management Protocols Verification.
Int. J. Netw. Secur., 2009

2008
Formal verification of ASMs using MDGs.
J. Syst. Archit., 2008

Event-B based invariant checking of secrecy in group key protocols.
Proceedings of the LCN 2008, 2008

2007
A Design for Verification Approach Using an Embedding of PSL in aSML.
J. Circuits Syst. Comput., 2007

Rank Theorems for Forward Secrecy in Group Key Management Protocols.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
Embedding and Verification of PSL using AsmL.
Proceedings of the 12th International Workshop on Abstract State Machines, 2005

2004
Assertion based verification of PSL for SystemC designs.
Proceedings of the 2004 International Symposium on System-on-Chip, 2004

Enabling SystemC Verification using Abstract State Machines.
Proceedings of the Forum on specification and Design Languages, 2004

2003
Formal Verification of ASM Designs Using the MDG Tool.
Proceedings of the 1st International Conference on Software Engineering and Formal Methods (SEFM 2003), 2003

Interfacing ASM with the MDG Tool.
Proceedings of the Abstract State Machines, 2003


  Loading...