Hosam Alamleh

Orcid: 0000-0003-3455-6616

According to our database1, Hosam Alamleh authored at least 21 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing the Invisible Thread: A Comprehensive Analysis of BLE Tracker Security in Apple AirTags and Samsung SmartTags.
CoRR, 2024

Credit Card Transactions Fraud Detection for Multiple Consumer Behaviors.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

2023
"ChatGPT vs. Student: A Dataset for Source Classification of Computer Science Answers.
Dataset, April, 2023

Secure Mobile Payment Architecture Enabling Multi-factor Authentication.
CoRR, 2023

Multi-path Data Transmission to Protect Data in Transit.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Counter-surveillance Technique by Diversifying Transmission Links.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

Optimizing Smart Home Performance and User Convenience with RSSI-based Proximity Detection.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network Environment.
CoRR, 2022

Preprint: Privacy-preserving IoT Data Sharing Scheme.
CoRR, 2022

2021
Secure and Fraud Proof Online Payment System for Credit Cards.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Server-Side Distinction of Incoming Traffic Transmission Medium Using Machine Learning.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

Comparative Analysis of Underwater Positioning and Navigation Systems.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

CI2FA: Continuous Indoor Two-factor Authentication Based On Trilateration System.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Analysis of the Design Requirements for Remote Internet-Based E-Voting Systems.
Proceedings of the IEEE World AI IoT Congress, 2021

2020
0EISUA: Zero Effort Indoor Secure User Authentication.
IEEE Access, 2020

Enforcing Location-based Access Policies Using the Existing IEEE 802.11 Infrastructure.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Implementing Variable Power Transmission Patterns for Authentication Purposes.
Proceedings of the Intelligent Computing, 2020

0EI2FA: Zero Effort Indoor Two Factor Authentication.
Proceedings of the 14th International Conference on Innovations in Information Technology, 2020

A weighting system for building RSS maps by crowdsourcing data from smartphones.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

A Cheat-proof System To Validate GPS Location Data.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Two Methods for Authentication Using Variable Transmission Power Patterns.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020


  Loading...