


default search action
Hussam M. N. Al Hamadi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j14]Min Wu
, Kefeng Guo
, Kapal Dev
, Hussam M. N. Al Hamadi
, Keshav Singh
, Sunder Ali Khowaja
, Xingwang Li
:
Federated Learning in STAR-RIS Aided SAGINs. IEEE Commun. Stand. Mag. 9(2): 23-29 (2025)
[j13]Feng Zhou, Kefeng Guo
, Cheng Jian, Sunder Ali Khowaja
, Kapal Dev, Thippa Reddy Gadekallu, Hussam M. N. Al Hamadi:
RSMA-assisted SHAPTINs: secrecy performance under imperfect hardware and channel estimation errors. Neural Comput. Appl. 37(26): 22161-22178 (2025)
[j12]Nabeel Al-Qirim
, Anoud Bani-Hani, Munir Majdalawieh
, Hussam M. N. Al Hamadi
, Mohammad Kamrul Hasan
:
DiGraph-Enabled Digital Twin and Label-Encoding Machine Learning for SCADA Network's Cyber Attack Analysis in Industry 5.0. IEEE Open J. Commun. Soc. 6: 3404-3416 (2025)
[j11]Sunder Ali Khowaja
, Lewis Nkenyereye
, Parus Khuwaja
, Hussam M. N. Al Hamadi
, Kapal Dev
:
Depression Detection From Social Media Posts Using Emotion Aware Encoders and Fuzzy Based Contrastive Networks. IEEE Trans. Fuzzy Syst. 33(1): 43-53 (2025)- 2024
[j10]Song-Kyoo Kim
, Xiaomei Feng
, Hussam M. N. Al Hamadi
, Ernesto Damiani
, Chan Yeob Yeun
, Sivaprasad Nandyala
:
Advanced Machine Learning Based Malware Detection Systems. IEEE Access 12: 115296-115305 (2024)
[c25]Ivan Cvitic
, Hussam M. N. Al Hamadi
, Tibor Mijo Kuljanic, David Aleksic:
An Empirical Analysis of Machine Learning Approaches for Phishing Detection. FABULOUS 2024: 34-53
[c24]Nouf Alsuwaidi, Nouf Alharmoodi, Hussam M. N. Al Hamadi
:
The Transformative Impact of Zero-Trust Architecture on Healthcare Security. ICCR 2024: 1-8
[c23]Zil e Huma, Jawad Ahmad, Hussam M. N. Al Hamadi
, Baraq Ghaleb, William J. Buchanan, Sana Ullah Jan:
ACNN-IDS: An Attention-Based CNN for Cyberattack Detection in IoT. ICCR 2024: 1-6
[c22]Abdelbasset Azzouz
, Nida Nasir, Rachid Bouhmidi, Hussam M. N. Al Hamadi:
Optimized Shape Design of a Dual-Band Circular Slot High Gain Array Antenna Using Genetic Algorithm for 2.4 GHz Applications. ICSPIS 2024: 1-6
[i6]Sunder Ali Khowaja
, Parus Khuwaja
, Kapal Dev
, Hussam M. N. Al Hamadi
, Engin Zeydan:
Pathway to Secure and Trustworthy 6G for LLMs: Attacks, Defense, and Opportunities. CoRR abs/2408.00722 (2024)
[i5]Fang Wang, Hussam M. N. Al Hamadi
, Ernesto Damiani:
A Visualized Malware Detection Framework with CNN and Conditional GAN. CoRR abs/2409.14439 (2024)- 2023
[j9]Fatma Taher
, Omar Al Fandi, Mousa Al-Kfairy
, Hussam M. N. Al Hamadi
, Saed Alrabaee:
A Proposed Artificial Intelligence Model for Android-Malware Detection. Informatics 10(3): 67 (2023)
[c21]Afnan Asasfeh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi
, Wathiq Mansoor, Taher M. Ghazal:
Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics. DASC/PiCom/CBDCom/CyberSciTech 2023: 84-88
[c20]Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi
, Fatma Taher, Taher M. Ghazal:
Review of Fundamental, Security, and Privacy in Metaverse. DASC/PiCom/CBDCom/CyberSciTech 2023: 408-414- 2022
[j8]Kais Belwafi
, Ruba Alkadi, Sultan Al-Ameri, Hussam M. N. Al Hamadi
, Abdulhadi Shoufan
:
Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey. IEEE Access 10: 87577-87601 (2022)
[j7]Zhibo Zhang
, Hussam M. N. Al Hamadi
, Ernesto Damiani
, Chan Yeob Yeun
, Fatma Taher
:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access 10: 93104-93139 (2022)
[j6]Muhammad Hanif
, Nadeem Iqbal
, Fida Ur Rahman, Muhammad Adnan Khan
, Taher M. Ghazal
, Sagheer Abbas
, Munir Ahmad
, Hussam M. N. Al Hamadi
, Chan Yeob Yeun
:
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System. Sensors 22(16): 6243 (2022)
[j5]Muhammad Umar Nasir, Muhammad Zubair, Taher M. Ghazal, Muhammad Farhan Khan, Munir Ahmad, Atta-ur-Rahman, Hussam M. N. Al Hamadi, Muhammad Adnan Khan, Wathiq Mansoor:
Kidney Cancer Prediction Empowered with Blockchain Security Using Transfer Learning. Sensors 22(19): 7483 (2022)
[c19]Fang Wang, Hussam M. N. Al Hamadi
, Ernesto Damiani:
A Visualized Malware Detection Framework with CNN and Conditional GAN. IEEE Big Data 2022: 6540-6546
[c18]Ateeq Ur Rehman
, Jehangir Arshad
, Muhammad Tariq Sadiq
, Abdul Rehman, Munir Ahmad, Mohammad Kamrul Hasan, Hussam M. N. Al Hamadi
, Tauqeer Faiz:
Implementation of an Intelligent Animal Monitoring System Using Wireless Sensor Network and IoT Platform. ICCR 2022: 1-11
[c17]Ala Abdelrazaq Alhammadi, Hussam M. N. Al Hamadi
, Chan Yeob Yeun, Ernesto Damiani:
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model. ICCR 2022: 1-9
[c16]Fatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, Sagheer Abbas, Hussam M. N. Al Hamadi
:
Drones network security enhancement using smart based block-chain technology. ICCR 2022: 1-6
[c15]Zhibo Zhang
, Ernesto Damiani, Hussam M. N. Al Hamadi
, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. ICCR 2022: 1-5
[c14]Martina Morcos, Hussam M. N. Al Hamadi
, Ernesto Damiani, Sivaprasad Nandyala
, Brian McGillion:
A Surrogate-Based Technique for Android Malware Detectors' Explainability. WiMob 2022: 112-117
[i4]Miguel A. Ramirez, Song-Kyoo Kim, Hussam M. N. Al Hamadi, Ernesto Damiani, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun:
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey. CoRR abs/2202.10276 (2022)
[i3]Zhibo Zhang, Hussam M. N. Al Hamadi
, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. CoRR abs/2208.14937 (2022)
[i2]Zhibo Zhang, Ernesto Damiani, Hussam M. N. Al Hamadi
, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. CoRR abs/2209.03166 (2022)
[i1]Miguel A. Ramirez, Sangyoung Yoon
, Ernesto Damiani, Hussam M. N. Al Hamadi
, Claudio Agostino Ardagna, Nicola Bena
, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun:
New data poison attacks on machine learning classifiers for mobile exfiltration. CoRR abs/2210.11592 (2022)- 2021
[c13]Hussam M. N. Al Hamadi
, Nida Nasir
, Chan Yeob Yeun, Ernesto Damiani:
A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities. ICC Workshops 2021: 1-6
[c12]Fatema Maasmi, Martina Morcos, Hussam M. N. Al Hamadi
, Ernesto Damiani:
Identifying Applications' State via System Calls Activity: A Pipeline Approach. ICECS 2021: 1-6- 2020
[c11]Mohammed Al Neaimi, Hussam M. N. Al Hamadi
, Chan Yeob Yeun, M. Jamal Zemerly
:
Digital Forensic Analysis of Files Using Deep Learning. ICSPIS 2020: 1-4
2010 – 2019
- 2019
[j4]Hussam M. N. Al Hamadi
, Chan Yeob Yeun
, Mohamed Jamal Zemerly
, Mahmoud Al-Qutayri, Amjad Gawanmeh
, Yousof Al-Hammadi
, Ernesto Damiani:
A Novel Protocol for Security of Location Based Services in Multi-agent Systems. Wirel. Pers. Commun. 108(3): 1841-1868 (2019)- 2017
[j3]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri:
Guided Test Case Generation for Enhanced ECG Bio-Sensors Functional Verification. Int. J. E Health Medical Commun. 8(4): 1-20 (2017)
[j2]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Joonsang Baek
, Mahmoud Al-Qutayri:
Lightweight Security Protocol for ECG Bio-Sensors. Wirel. Pers. Commun. 95(4): 5097-5120 (2017)
[c10]Md Sarwar Kamal
, Sazia Parvin
, Kashif Saleem
, Hussam M. N. Al Hamadi
, Amjad Gawanmeh
:
Efficient low cost supervisory system for Internet of Things enabled smart home. ICC Workshops 2017: 864-869
[c9]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri:
Lightweight security protocol for health monitoring in Ambient Assisted Living environment. ICC Workshops 2017: 1282-1287- 2016
[c8]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri:
Simulation Framework for a Security Protocol for Wireless Body Sensor Networks. LCN Workshops 2016: 248-253
[c7]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri:
Assertion-based verification technique for ECG bio-sensor algorithms. MWSCAS 2016: 1-4- 2015
[c6]Amjad Gawanmeh
, Hussam M. N. Al Hamadi
, Mahmoud Al-Qutayri
, Shiu-Kai Chin, Kashif Saleem
:
Reliability analysis of healthcare information systems: State of the art and future directions. HealthCom 2015: 68-74
[c5]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri
:
An automatic ECG generator for testing and evaluating ECG sensor algorithms. IDT 2015: 78-83- 2014
[c4]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri
:
A verification methodology for a wireless body sensor network functionality. BHI 2014: 635-639
[c3]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri
:
Formalizing electrocardiogram (ECG) signal behavior in event-B. Healthcom 2014: 55-60- 2013
[j1]Hussam M. N. Al Hamadi
, Chan Yeob Yeun
, Mohamed Jamal Zemerly
:
A Novel Security Scheme for the Smart Grid and SCADA Networks. Wirel. Pers. Commun. 73(4): 1547-1559 (2013)
[c2]Hussam M. N. Al Hamadi
, Amjad Gawanmeh
, Mahmoud Al-Qutayri
:
Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems. ICECS 2013: 100-101- 2011
[c1]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh:
Formal modeling and verification of DLK protocol. ICITST 2011: 578-583
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-30 00:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







