Mohammad Hammoudeh
Orcid: 0000-0003-1058-0996Affiliations:
- Manchester Metropolitan University, Department of Computing and Mathematics, UK
- University of Wolverhampton, UK (PhD 2008)
According to our database1,
Mohammad Hammoudeh
authored at least 178 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., November, 2024
Federated Deep Learning for Intrusion Detection in Consumer-Centric Internet of Things.
IEEE Trans. Consumer Electron., February, 2024
Isolated Arabic Sign Language Recognition Using a Transformer-based Model and Landmark Keypoints.
ACM Trans. Asian Low Resour. Lang. Inf. Process., January, 2024
SimProx: A Similarity-Based Aggregation in Federated Learning With Client Weight Optimization.
IEEE Open J. Commun. Soc., 2024
Reviewing 25 years of continuous sign language recognition research: Advances, challenges, and prospects.
Inf. Process. Manag., 2024
Int. J. Crit. Infrastructure Prot., 2024
IACR Cryptol. ePrint Arch., 2024
Appl. Soft Comput., 2024
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks.
Ad Hoc Networks, 2024
A Multi-Layered Security Framework for Medical Imaging: Integrating Compressed Digital Watermarking and Blockchain.
IEEE Access, 2024
IEEE Access, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks.
Internet Things, December, 2023
Multimodal Deep Learning with Discriminant Descriptors for Offensive Memes Detection.
ACM J. Data Inf. Qual., September, 2023
An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks.
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2023
Simul. Model. Pract. Theory, May, 2023
A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity.
Inf., May, 2023
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure.
Mob. Networks Appl., April, 2023
Secure and efficient image retrieval through invariant features selection in insecure cloud environments.
Neural Comput. Appl., March, 2023
Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
J. Sens. Actuator Networks, February, 2023
A Hierarchical Deep Learning-Based Intrusion Detection Architecture for Clustered Internet of Things.
J. Sens. Actuator Networks, February, 2023
A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments.
PeerJ Comput. Sci., 2023
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key.
J. Inf. Sci. Eng., 2023
Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces.
IEEE Internet Things J., 2023
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations.
IACR Cryptol. ePrint Arch., 2023
Digital Forensic Investigation of Web-Based Virtual Reality Worlds: Decentraland as a Case Study.
IEEE Commun. Mag., 2023
IEEE Access, 2023
An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size.
IEEE Access, 2023
Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023
Toward A Digital Twin IoT for the Validation of AI Algorithms in Smart-City Applications.
Proceedings of the Machine Learning for Networking - 6th International Conference, 2023
Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations.
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023
A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems.
Proceedings of the Risks and Security of Internet and Systems, 2023
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.
IEEE Trans. Ind. Informatics, 2022
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System.
Sensors, 2022
J. Sens. Actuator Networks, 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Machine Learning to Classify Religious Communities and Detect Extremism on Social Networks: ML to CRCs and DE Through Text Tweets on SNs.
Int. J. Organ. Collect. Intell., 2022
Automated Colorectal Polyp Classification Using Deep Neural Networks with Colonoscopy Images.
Int. J. Fuzzy Syst., 2022
Trans. Emerg. Telecommun. Technol., 2022
Analysis of attribute-based cryptographic techniques and their application to protect cloud services.
Trans. Emerg. Telecommun. Technol., 2022
A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case.
Expert Syst. J. Knowl. Eng., 2022
Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice.
Distributed Ledger Technol. Res. Pract., 2022
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks.
Comput. Commun., 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022
A Comparative Analysis of IoT Protocols for Resource Constraint Devices and Networks.
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022
Proceedings of the Handbook of Real-Time Computing, 2022
2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021
Leveraging Graph Convolutional-LSTM for Energy-Efficient Caching in Blockchain-Based Green IoT.
IEEE Trans. Green Commun. Netw., 2021
SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks.
Sensors, 2021
Deep Learning Methods for Physical-Layer Wireless Communications - Recent Advances and Future Trends.
Phys. Commun., 2021
Multim. Syst., 2021
J. Sens. Actuator Networks, 2021
Random Forest for Data Aggregation to Monitor and Predict COVID-19 Using Edge Networks.
IEEE Internet Things Mag., 2021
IEEE Internet Things J., 2021
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption.
Future Gener. Comput. Syst., 2021
Security challenges of Internet of Underwater Things: A systematic literature review.
Trans. Emerg. Telecommun. Technol., 2021
Comput., 2021
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things.
Comput. Secur., 2021
Comput. Electr. Eng., 2021
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing.
Big Data, 2021
Federated Deep Learning for Collaborative Intrusion Detection in Heterogeneous Networks.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
2020
Threats on the horizon: understanding security threats in the era of cyber-physical systems.
J. Supercomput., 2020
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020
Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020
Softw. Pract. Exp., 2020
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020
J. Parallel Distributed Comput., 2020
A mobile edge computing/software-defined networking-enabled architecture for vehicular networks.
Internet Technol. Lett., 2020
IEEE Internet Things Mag., 2020
IEEE Internet Things Mag., 2020
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives.
IEEE Internet Things J., 2020
Swarm intelligence-based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020
Policy specification and verification for blockchain and smart contracts in 5G networks.
ICT Express, 2020
Future Internet, 2020
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications.
Future Gener. Comput. Syst., 2020
Ad Hoc Networks, 2020
Proceedings of the IEEE International Conference on Informatics, 2020
A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems.
J. Sens. Actuator Networks, 2019
Low-Power Wide Area Network Technologies for Internet-of-Things: A Comparative Review.
IEEE Internet Things J., 2019
Assessing the effectiveness of flying ad hoc networks for international border surveillance.
Int. J. Distributed Sens. Networks, 2019
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019
A Distributed Cellular Automaton Algorithm for Barrier Formation in Mobile Sensor Networks.
Proceedings of the 2019 Wireless Days, 2019
Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
Proceedings of the Handbook of Big Data and IoT Security, 2019
2018
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Defending against the advanced persistent threat: Detection of disguised executable files.
PeerJ Prepr., 2018
Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links.
J. Netw. Comput. Appl., 2018
Future Gener. Comput. Syst., 2018
IoT-based students interaction framework using attention-scoring assessment in eLearning.
Future Gener. Comput. Syst., 2018
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure.
IEEE Access, 2018
IEEE Access, 2018
A New Approach to Iterative Clipping and Filtering PAPR Reduction Scheme for OFDM Systems.
IEEE Access, 2018
DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Contemporary alternatives to traditional processor design in the post Moore's law era.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018
Proceedings of the Computer and Network Security Essentials., 2018
2017
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat.
PeerJ Prepr., 2017
Comput. Networks, 2017
On Companding and Optimization of OFDM Signals for Mitigating Impulsive Noise in Power-Line Communication Systems.
IEEE Access, 2017
Distributed faulty sensor node detection in wireless sensor networks based on copula theory.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
A copula based approach for measurement validity verification in wireless sensor networks.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks.
Proceedings of the Eleventh International Conference on Sensing Technology, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication Systems.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017
2016
Putting the lab on the map: A wireless sensor network system for border security and surveillance.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
A service based wireless sensor networks architecture for high value-added process monitoring.
Proceedings of the 10th International Symposium on Communication Systems, 2016
2015
Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-ModalWireless Sensor Networks.
Sensors, 2015
Inf. Fusion, 2015
Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance.
Inf. Fusion, 2015
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015
2013
Interpolation techniques for building a continuous map from discrete wireless sensor network data.
Wirel. Commun. Mob. Comput., 2013
Self-stabilizing algorithm for information extraction from mobile wireless sensor networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013
2012
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012
2011
Building Programming Abstractions for Wireless Sensor Networks Using Watershed Segmentation.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2011
2009
A distributed data extraction and visualisation service for wireless sensor networks.
PhD thesis, 2009
Proceedings of the thirty-second Communicating Process Architectures Conference, 2009
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 2009 international conference on Pervasive services, 2009
Proceedings of the Eighth International Conference on Networks, 2009
2008
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge Replacement.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008
Proceedings of the Graph Transformations, 4th International Conference, 2008
Pennies from Heaven: A Retrospective on the Use of Wireless Sensor Networks for Planetary Exploration.
Proceedings of the NASA/ESA Conference on Adaptive Hardware and Systems, 2008