Mohammad Hammoudeh

Orcid: 0000-0003-1058-0996

Affiliations:
  • Manchester Metropolitan University, Department of Computing and Mathematics, UK
  • University of Wolverhampton, UK (PhD 2008)


According to our database1, Mohammad Hammoudeh authored at least 158 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Isolated Arabic Sign Language Recognition Using a Transformer-based Model and Landmark Keypoints.
ACM Trans. Asian Low Resour. Lang. Inf. Process., January, 2024

2023
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks.
Internet Things, December, 2023

Multimodal Deep Learning with Discriminant Descriptors for Offensive Memes Detection.
ACM J. Data Inf. Qual., September, 2023

An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks.
ACM Trans. Asian Low Resour. Lang. Inf. Process., May, 2023

Digital twins in cyber effects modelling of IoT/CPS points of low resilience.
Simul. Model. Pract. Theory, May, 2023

A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity.
Inf., May, 2023

A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure.
Mob. Networks Appl., April, 2023

Secure and efficient image retrieval through invariant features selection in insecure cloud environments.
Neural Comput. Appl., March, 2023

Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Cyber-Physical Systems: Security Threats and Countermeasures.
J. Sens. Actuator Networks, February, 2023

A Hierarchical Deep Learning-Based Intrusion Detection Architecture for Clustered Internet of Things.
J. Sens. Actuator Networks, February, 2023

A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments.
PeerJ Comput. Sci., 2023

Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key.
J. Inf. Sci. Eng., 2023

Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces.
IEEE Internet Things J., 2023

One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations.
IACR Cryptol. ePrint Arch., 2023

An Efficient Multi-Signature Scheme for Blockchain.
IACR Cryptol. ePrint Arch., 2023

Performance and Scalability Analysis of Ethereum and Hyperledger Fabric.
IEEE Access, 2023

An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size.
IEEE Access, 2023

Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

A Binary Matrix-Based Data Representation for Data Compression in Blockchain.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks.
IEEE Trans. Ind. Informatics, 2022

Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things.
IEEE Trans. Ind. Informatics, 2022

IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.
IEEE Trans. Ind. Informatics, 2022

Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System.
Sensors, 2022

Global IoT Mobility: A Path Based Forwarding Approach.
J. Sens. Actuator Networks, 2022

Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices.
IEEE Internet Things J., 2022

VirtElect: A Peer-to-Peer Trading Platform for Local Energy Transactions.
IEEE Internet Things J., 2022

Automated Colorectal Polyp Classification Using Deep Neural Networks with Colonoscopy Images.
Int. J. Fuzzy Syst., 2022

Co-Simulation of Multiple Vehicle Routing Problem Models.
Future Internet, 2022

Finding the polygon hull of a network without conditions on the starting vertex.
Trans. Emerg. Telecommun. Technol., 2022

Analysis of attribute-based cryptographic techniques and their application to protect cloud services.
Trans. Emerg. Telecommun. Technol., 2022

A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case.
Expert Syst. J. Knowl. Eng., 2022

Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice.
Distributed Ledger Technol. Res. Pract., 2022

Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks.
Comput. Commun., 2022

Optimal Dynamic Multi-source Multi-community Power Schedule and Trading.
Proceedings of the IEEE International Conference on Communications, 2022

From Simulation to Digital Twins, the Case of Internet of Things Research and Tools.
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022

A Comparative Analysis of IoT Protocols for Resource Constraint Devices and Networks.
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022

A Survey on Vehicular Ad hoc Networks Security Attacks and Countermeasures.
Proceedings of the 6th International Conference on Future Networks & Distributed Systems, 2022

The Efficacy and Real-Time Performance of Refraction Networking.
Proceedings of the Handbook of Real-Time Computing, 2022

2021
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021

Leveraging Graph Convolutional-LSTM for Energy-Efficient Caching in Blockchain-Based Green IoT.
IEEE Trans. Green Commun. Netw., 2021

SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks.
Sensors, 2021

Deep Learning Methods for Physical-Layer Wireless Communications - Recent Advances and Future Trends.
Phys. Commun., 2021

Blockchain-enabled supply chain: analysis, challenges, and future directions.
Multim. Syst., 2021

Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems".
J. Sens. Actuator Networks, 2021

Random Forest for Data Aggregation to Monitor and Predict COVID-19 Using Edge Networks.
IEEE Internet Things Mag., 2021

Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks.
IEEE Internet Things J., 2021

A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption.
Future Gener. Comput. Syst., 2021

Security challenges of Internet of Underwater Things: A systematic literature review.
Trans. Emerg. Telecommun. Technol., 2021

Towards Developing a Framework to Analyze the Qualities of the University Websites.
Comput., 2021

Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things.
Comput. Secur., 2021

Stacked recurrent neural network for botnet detection in smart homes.
Comput. Electr. Eng., 2021

Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data.
Comput. Electr. Eng., 2021

Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing.
Big Data, 2021

Federated Deep Learning for Collaborative Intrusion Detection in Heterogeneous Networks.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

An Efficient DeFi-based Data Warehousing Approach in Supply Chain Finance.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

Blockchain-based E-commerce for the COVID-19 economic crisis.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

Data Preservation System using BoCA: Blockchain-of-Custody Application.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021

2020
Threats on the horizon: understanding security threats in the era of cyber-physical systems.
J. Supercomput., 2020

Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security.
IEEE Trans. Engineering Management, 2020

Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security".
IEEE Trans. Engineering Management, 2020

A secure fog-based platform for SCADA-based IoT critical infrastructure.
Softw. Pract. Exp., 2020

A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues.
Sensors, 2020

Enhancing and simplifying data security and privacy for multitiered applications.
J. Parallel Distributed Comput., 2020

A mobile edge computing/software-defined networking-enabled architecture for vehicular networks.
Internet Technol. Lett., 2020

A Blockchain-Enabled Multi Domain Edge Computing Orchestrator.
IEEE Internet Things Mag., 2020

Network Traffic Analysis for Threat Detection in the Internet of Things.
IEEE Internet Things Mag., 2020

Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives.
IEEE Internet Things J., 2020

Swarm intelligence-based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks.
Int. J. Distributed Sens. Networks, 2020

Policy specification and verification for blockchain and smart contracts in 5G networks.
ICT Express, 2020

An Empirical Recommendation Framework to Support Location-Based Services.
Future Internet, 2020

PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications.
Future Gener. Comput. Syst., 2020

A flexible encryption technique for the internet of things environment.
Ad Hoc Networks, 2020

Responsibility Attribution Against Data Breaches.
Proceedings of the IEEE International Conference on Informatics, 2020

A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

A Salient Object Detection Technique Based on Color Divergence.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

2019
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey.
Sensors, 2019

Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems.
J. Sens. Actuator Networks, 2019

Low-Power Wide Area Network Technologies for Internet-of-Things: A Comparative Review.
IEEE Internet Things J., 2019

Assessing the effectiveness of flying ad hoc networks for international border surveillance.
Int. J. Distributed Sens. Networks, 2019

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
Ad Hoc Networks, 2019

Energy- and Latency-Aware Hybrid Offloading Algorithm for UAVs.
IEEE Access, 2019

A Distributed Cellular Automaton Algorithm for Barrier Formation in Mobile Sensor Networks.
Proceedings of the 2019 Wireless Days, 2019

Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Buffer-Aided 5G Cooperative Networks: Considering the Source Delay.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Demonstrating Blockchain-Enabled Peer-to-Peer Energy Trading and Sharing.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Distributed Filesystem Forensics: Ceph as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data Forensics: Hadoop Distributed File Systems as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Security threats to critical infrastructure: the human factor.
J. Supercomput., 2018

Defending against the advanced persistent threat: Detection of disguised executable files.
PeerJ Prepr., 2018

Sensors and Actuators in Smart Cities.
J. Sens. Actuator Networks, 2018

Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links.
J. Netw. Comput. Appl., 2018

Detection of advanced persistent threat using machine-learning correlation analysis.
Future Gener. Comput. Syst., 2018

IoT-based students interaction framework using attention-scoring assessment in eLearning.
Future Gener. Comput. Syst., 2018

A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure.
IEEE Access, 2018

BotDet: A System for Real Time Botnet Command and Control Traffic Detection.
IEEE Access, 2018

A New Approach to Iterative Clipping and Filtering PAPR Reduction Scheme for OFDM Systems.
IEEE Access, 2018

DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

IoT standardisation: challenges, perspectives and solution.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Contemporary alternatives to traditional processor design in the post Moore's law era.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Optimisation of the public key encryption infrastructure for the internet of things.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Detecting gaps and voids in WSNs and IoT networks: the angle-based method.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Virtual microgrids: a management concept for peer-to-peer energy trading.
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, 2018

Defense Methods Against Social Engineering Attacks.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat.
PeerJ Prepr., 2017

Dynamic clustering and management of mobile wireless sensor networks.
Comput. Networks, 2017

On Companding and Optimization of OFDM Signals for Mitigating Impulsive Noise in Power-Line Communication Systems.
IEEE Access, 2017

Distributed faulty sensor node detection in wireless sensor networks based on copula theory.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A copula based approach for measurement validity verification in wireless sensor networks.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks.
Proceedings of the Eleventh International Conference on Sensing Technology, 2017

A state of the art survey - Impact of cyber attacks on SME's.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Motion Capture Using the Internet of Things Technology: A Tutorial.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Internet of Things for Buildings Monitoring: Experiences and Challenges.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

IoT Mashups: From IoT Big Data to IoT Big Service.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

A Survey on Authentication Techniques for the Internet of Things.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication Systems.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

A Survey on Data Confidentiality and Privacy in Cloud Computing.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

A Survey on Internet of Thing Enabled Smart Campus Applications.
Proceedings of the International Conference on Future Networks and Distributed Systems, 2017

2016
Putting the lab on the map: A wireless sensor network system for border security and surveillance.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

A Survey on Network Security Monitoring Systems.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016

Social Engineering Attack Strategies and Defence Approaches.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

A service based wireless sensor networks architecture for high value-added process monitoring.
Proceedings of the 10th International Symposium on Communication Systems, 2016

2015
Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-ModalWireless Sensor Networks.
Sensors, 2015

Information extraction from sensor networks using the Watershed transform algorithm.
Inf. Fusion, 2015

Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance.
Inf. Fusion, 2015

Applying Wireless Sensor Networks to Solve Real-world Problems.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

2013
Interpolation techniques for building a continuous map from discrete wireless sensor network data.
Wirel. Commun. Mob. Comput., 2013

Self-stabilizing algorithm for information extraction from mobile wireless sensor networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Cloud Forensics: A Technical Approach to Virtual Machine Acquisition.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

Forensic Data Recovery from Android OS Devices: An Open Source Toolkit.
Proceedings of the 2013 European Intelligence and Security Informatics Conference, 2013

2012
An Overview of Information Extraction from Mobile Wireless Sensor Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

2011
Building Programming Abstractions for Wireless Sensor Networks Using Watershed Segmentation.
Proceedings of the Smart Spaces and Next Generation Wired/Wireless Networking, 2011

2009
A distributed data extraction and visualisation service for wireless sensor networks.
PhD thesis, 2009

CSP as a Domain-Specific Language Embedded in Python and Jython.
Proceedings of the thirty-second Communicating Process Architectures Conference, 2009

Application Domain Driven Data Visualisation Framework for Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Inductive as a support of deductive data visualisation in Wireless Sensor Networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

A combined inductive and deductive sense data extraction and visualisation service.
Proceedings of the 2009 international conference on Pervasive services, 2009

An Approach to Data Extraction and Visualisation for Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Networks, 2009

2008
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge Replacement.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2008

Modelling Clustering of Sensor Networks with Synchronised Hyperedge Replacement.
Proceedings of the Graph Transformations, 4th International Conference, 2008

Pennies from Heaven: A Retrospective on the Use of Wireless Sensor Networks for Planetary Exploration.
Proceedings of the NASA/ESA Conference on Adaptive Hardware and Systems, 2008


  Loading...