Yousof Al-Hammadi

According to our database1, Yousof Al-Hammadi authored at least 46 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Matching game theoretical model for stable relay selection in a UAV-assisted internet of vehicles.
Veh. Commun., 2021

A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain.
IEEE Access, 2021

2020
Non-Orthogonal Multiple Access with Wireless Caching for 5G-Enabled Vehicular Networks.
IEEE Netw., 2020

Coverage and Energy Analysis of Mobile Sensor Nodes in Obstructed Noisy Indoor Environment: A Voronoi Approach.
CoRR, 2020

Fully Decentralized Multi-Party Consent Management for Secure Sharing of Patient Health Records.
IEEE Access, 2020

Blockchain for Giving Patients Control Over Their Medical Records.
IEEE Access, 2020

2019
A Novel Protocol for Security of Location Based Services in Multi-agent Systems.
Wirel. Pers. Commun., 2019

Cache-Aided Non-Orthogonal Multiple Access for 5G-Enabled Vehicular Networks.
IEEE Trans. Veh. Technol., 2019

Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection.
IEEE Trans. Big Data, 2019

Analyzing a co-occurrence gene-interaction network to identify disease-gene association.
BMC Bioinform., 2019

Popularity-Based Video Caching Techniques for Cache-Enabled Networks: A Survey.
IEEE Access, 2019

2018
A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks.
Veh. Commun., 2018

A new adaptive trust and reputation model for Mobile Agent Systems.
J. Netw. Comput. Appl., 2018

Multiple Access for Visible Light Communications: Research Challenges and Future Trends.
IEEE Access, 2018

Voronoi-Based Indoor Deployment of Mobile Sensors Network with Obstacles.
Proceedings of the 2018 IEEE 3rd International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2018

A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc Networks.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

IoT Applications: From Mobile Agents to Microservices Architecture.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Blockchain-based Ownership Management for Medical IoT (MIoT) Devices.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Secure Autonomous Mobile Agents for Web Services.
Proceedings of the IEEE Global Communications Conference, 2018

Inverted ant colony optimization for search and rescue in an unknown maze-like indoor environment.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Autonomous deployment of mobile sensors network in an unknown indoor environment with obstacles.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

System dynamics modelling to attract students to STEM.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Search in a Maze-Like Environment with Ant Algorithms: Complexity, Size and Energy Study.
Proceedings of the Swarm Intelligence - 11th International Conference, 2018

2017
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications.
Secur. Commun. Networks, 2017

Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs.
Comput. Commun., 2017

Multi-Layered Clustering for Power Consumption Profiling in Smart Grids.
IEEE Access, 2017

Secure lightweight ECC-based protocol for multi-agent IoT systems.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

A street-centric QoS-OLSR Protocol for urban Vehicular Ad Hoc Networks.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Performance comparison between container-based and VM-based services.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

A Model for Self-deployment of Autonomous Mobile Sensor Network in an Unknown Indoor Environment.
Proceedings of the Ad Hoc Networks, 2017

2016
The evolution of distributed systems towards microservices architecture.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

Overcoming the challenges in K-12 STEM education.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Attracting students to STEM: Obstructors and facilitators.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Towards an innovative computer science & technology curriculum in UAE public schools system.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

2015
Simplified Subspaced Regression Network for Identification of Defect Patterns in Semiconductor Wafer Maps.
IEEE Trans. Ind. Informatics, 2015

QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

2014
Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal.
Proceedings of the 2014 IEEE International Parallel & Distributed Processing Symposium Workshops, 2014

2012
Factors influencing STEM teachers' effectiveness in the UAE.
Proceedings of the IEEE Frontiers in Education Conference, 2012

Students' interest in STEM education.
Proceedings of the IEEE Global Engineering Education Conference, 2012

2010
Behavioural correlation for malicious bot detection.
PhD thesis, 2010

Performance Evaluation of DCA and SRC on a Single Bot Detection
CoRR, 2010

Behavioural Correlation for Detecting P2P Bots
CoRR, 2010

Detecting Botnets Through Log Correlation
CoRR, 2010

2008
DCA for bot detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Detecting Bots Based on Keylogging Activities.
Proceedings of the The Third International Conference on Availability, 2008

2005
Anomaly detection for Internet worms.
Proceedings of the Integrated Network Management, 2005


  Loading...