Hussam M. N. Al Hamadi

Orcid: 0000-0002-1353-4138

According to our database1, Hussam M. N. Al Hamadi authored at least 29 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Proposed Artificial Intelligence Model for Android-Malware Detection.
Informatics, 2023

Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Review of Fundamental, Security, and Privacy in Metaverse.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Kidney Cancer Prediction Empowered with Blockchain Security Using Transfer Learning.
Sensors, 2022

A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System.
Sensors, 2022

New data poison attacks on machine learning classifiers for mobile exfiltration.
CoRR, 2022

Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network.
CoRR, 2022

Poisoning Attacks and Defenses on Artificial Intelligence: A Survey.
CoRR, 2022

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research.
IEEE Access, 2022

Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey.
IEEE Access, 2022

A Surrogate-Based Technique for Android Malware Detectors' Explainability.
Proceedings of the 18th International Conference on Wireless and Mobile Computing, 2022

A Visualized Malware Detection Framework with CNN and Conditional GAN.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Identifying Applications' State via System Calls Activity: A Pipeline Approach.
Proceedings of the 28th IEEE International Conference on Electronics, 2021

A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Digital Forensic Analysis of Files Using Deep Learning.
Proceedings of the 3rd International Conference on Signal Processing and Information Security, 2020

2019
A Novel Protocol for Security of Location Based Services in Multi-agent Systems.
Wirel. Pers. Commun., 2019

2017
Lightweight Security Protocol for ECG Bio-Sensors.
Wirel. Pers. Commun., 2017

Guided Test Case Generation for Enhanced ECG Bio-Sensors Functional Verification.
Int. J. E Health Medical Commun., 2017

Efficient low cost supervisory system for Internet of Things enabled smart home.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Lightweight security protocol for health monitoring in Ambient Assisted Living environment.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

2016
Assertion-based verification technique for ECG bio-sensor algorithms.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016

Simulation Framework for a Security Protocol for Wireless Body Sensor Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

2015
An automatic ECG generator for testing and evaluating ECG sensor algorithms.
Proceedings of the 10th International Design & Test Symposium, 2015

Reliability analysis of healthcare information systems: State of the art and future directions.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Formalizing electrocardiogram (ECG) signal behavior in event-B.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

A verification methodology for a wireless body sensor network functionality.
Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics, 2014

2013
A Novel Security Scheme for the Smart Grid and SCADA Networks.
Wirel. Pers. Commun., 2013

Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems.
Proceedings of the 20th IEEE International Conference on Electronics, 2013

2011
Formal modeling and verification of DLK protocol.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011


  Loading...