default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Mohammad Hammoud
aka: Mohammad H. Hammoud
Carnegie Mellon University Qatar
Likely matches
- Mohammad Hammoudeh
Manchester Metropolitan University, Department of Computing and Mathematics, UK - Mohammad Ali A. Hammoudeh
Qassim University, Buraydah, Saudi Arabia
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 229 matches
- 2024
- Mumin Adam, Mohammad Hammoudeh, Rana Al-Rawashdeh, Basil Alsulaimy:
A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems. IEEE Access 12: 57128-57149 (2024) - Faria Nawshin, Devrim Unal, Mohammad Hammoudeh, Ponnuthurai N. Suganthan:
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Networks 161: 103523 (2024) - Danish Vasan, Mohammad Hammoudeh, Mamoun Alazab:
Broad learning: A GPU-free image-based malware classification. Appl. Soft Comput. 154: 111401 (2024) - Eiman A. Alhamad, Mohammed S. Al Logmani, Abdullah T. Al-Essa, Mohammad Hammoudeh:
A minutiae-based method to store and compare fingerprints. Int. J. Biom. 16(2): 176-194 (2024) - Danish Vasan, Ebtesam Jubran S. Alqahtani, Mohammad Hammoudeh, Adel Fadhl Ahmed:
An AutoML-based security defender for industrial control systems. Int. J. Crit. Infrastructure Prot. 47: 100718 (2024) - Sarah N. Alyami, Hamzah Luqman, Mohammad Hammoudeh:
Reviewing 25 years of continuous sign language recognition research: Advances, challenges, and prospects. Inf. Process. Manag. 61(5): 103774 (2024) - Sarah N. Alyami, Hamzah Luqman, Mohammad Hammoudeh:
Isolated Arabic Sign Language Recognition Using a Transformer-based Model and Landmark Keypoints. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(1): 3:1-3:19 (2024) - Segun I. Popoola, Agbotiname Lucky Imoize, Mohammad Hammoudeh, Bamidele Adebisi, Olamide Jogunola, Abiodun M. Aibinu:
Federated Deep Learning for Intrusion Detection in Consumer-Centric Internet of Things. IEEE Trans. Consumer Electron. 70(1): 1610-1622 (2024) - Adeola Adewumi, Mohammad Hammoudeh, Tooska Dargahi, Olamide Jogunola:
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures. ACNS Workshops (1) 2024: 265-280 - Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh:
Toward Independent Key Encryption based on Q-Problem. IACR Cryptol. ePrint Arch. 2024: 645 (2024) - 2023
- Khaled Chait, Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh, Omar Aldabbas, Abdullah T. Al-Essa:
An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size. IEEE Access 11: 110490-110501 (2023) - Yusuf Ucbas, Amna Eleyan, Mohammad Hammoudeh, Manar Alohaly:
Performance and Scalability Analysis of Ethereum and Hyperledger Fabric. IEEE Access 11: 67156-67167 (2023) - Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan, Mohammed Al-Khalidi:
A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity. Inf. 14(5): 263 (2023) - Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, Sunday Adeola Ajagbe, Mohammad Hammoudeh, Wei Li:
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks. Internet Things 24: 100977 (2023) - Berdjouh Chafik, Meftah Mohammed Charaf Eddine, Abdelkader Laouid, Mohammad Hammoudeh, Akshi Kumar:
Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces. IEEE Internet Things J. 10(21): 18495-18504 (2023) - Ahmad AlZu'bi, Lojin Bani Younis, Abdelrahman Abuarqoub, Mohammad Hammoudeh:
Multimodal Deep Learning with Discriminant Descriptors for Offensive Memes Detection. ACM J. Data Inf. Qual. 15(3): 38:1-38:16 (2023) - Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh:
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. J. Inf. Sci. Eng. 39(1): 183-195 (2023) - Rania A. Elsayed, Reem Hamada, Mohammad Hammoudeh, Mahmoud I. Abdalla, Shaimaa Ahmed Elsaid:
A Hierarchical Deep Learning-Based Intrusion Detection Architecture for Clustered Internet of Things. J. Sens. Actuator Networks 12(1): 3 (2023) - Mohammad Hammoudeh, Gregory Epiphaniou, Pedro Pinto:
Cyber-Physical Systems: Security Threats and Countermeasures. J. Sens. Actuator Networks 12(1): 18 (2023) - Nabil Kadjouh, Ahcène Bounceur, Madani Bezoui, Mohamed Essaid Khanouche, Reinhardt Euler, Mohammad Hammoudeh, Loïc Lagadec, Sohail Jabbar, Fadi M. Al-Turjman:
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. Mob. Networks Appl. 28(2): 718-731 (2023) - Sumit Kumar, Arup Kumar Pal, SK Hafizul Islam, Mohammad Hammoudeh:
Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput. Appl. 35(7): 4855-4880 (2023) - Ismail Kertiou, Abdelkader Laouid, Saber Benharzallah, Mohammad Hammoudeh, Muath AlShaikh:
A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments. PeerJ Comput. Sci. 9: e1682 (2023) - Gregory Epiphaniou, Mohammad Hammoudeh, Hu Yuan, Carsten Maple, Uchenna Ani:
Digital twins in cyber effects modelling of IoT/CPS points of low resilience. Simul. Model. Pract. Theory 125: 102744 (2023) - Adel Berhoum, Meftah Mohammed Charaf Eddine, Abdelkader Laouid, Mohammad Hammoudeh:
An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(5): 148:1-148:20 (2023) - Jia Hu, Kuljeet Kaur, Hui Lin, Xiaoding Wang, Mohammad Mehedi Hassan, Imran Razzak, Mohammad Hammoudeh:
Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2382-2391 (2023) - Md. Mainul Islam, Md. Kamrul Islam, Mohammad Hammoudeh:
High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks. BCCA 2023: 97-103 - Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi, Khaled Chait, Mohammad Hammoudeh, Ahmed Aziz:
A Binary Matrix-Based Data Representation for Data Compression in Blockchain. BCCA 2023: 307-314 - Aisha Alansari, Razan Alfaqeer, Mohammad Hammoudeh:
A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems. CRiSIS 2023: 3-16 - Wassim A. El Ahmar, Yahya Massoud, Dhanvin Kolhatkar, Hamzah Alghamdi, Mohammad Al Ja'afreh, Robert Laganière, Riad I. Hammoud:
Enhanced Thermal-RGB Fusion for Robust Object Detection. CVPR Workshops 2023: 365-374 - Ahcène Bounceur, Mohammad Hammoudeh, Jameleddine Hassine, Madani Bezoui, Adel Fadhl Ahmed, Muhamad Felemban:
RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning. ICFNDS 2023: 611-617
skipping 199 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-18 00:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint