default search action
Mohammad Hammoudeh
Person information
- affiliation: Manchester Metropolitan University, Department of Computing and Mathematics, UK
- affiliation (PhD 2008): University of Wolverhampton, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j89]Mumin Adam, Mohammad Hammoudeh, Rana Al-Rawashdeh, Basil Alsulaimy:
A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems. IEEE Access 12: 57128-57149 (2024) - [j88]Faria Nawshin, Devrim Unal, Mohammad Hammoudeh, Ponnuthurai N. Suganthan:
AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Networks 161: 103523 (2024) - [j87]Danish Vasan, Mohammad Hammoudeh, Mamoun Alazab:
Broad learning: A GPU-free image-based malware classification. Appl. Soft Comput. 154: 111401 (2024) - [j86]Eiman A. Alhamad, Mohammed S. Al Logmani, Abdullah T. Al-Essa, Mohammad Hammoudeh:
A minutiae-based method to store and compare fingerprints. Int. J. Biom. 16(2): 176-194 (2024) - [j85]Danish Vasan, Ebtesam Jubran S. Alqahtani, Mohammad Hammoudeh, Adel Fadhl Ahmed:
An AutoML-based security defender for industrial control systems. Int. J. Crit. Infrastructure Prot. 47: 100718 (2024) - [j84]Sarah N. Alyami, Hamzah Luqman, Mohammad Hammoudeh:
Reviewing 25 years of continuous sign language recognition research: Advances, challenges, and prospects. Inf. Process. Manag. 61(5): 103774 (2024) - [j83]Sarah N. Alyami, Hamzah Luqman, Mohammad Hammoudeh:
Isolated Arabic Sign Language Recognition Using a Transformer-based Model and Landmark Keypoints. ACM Trans. Asian Low Resour. Lang. Inf. Process. 23(1): 3:1-3:19 (2024) - [j82]Segun I. Popoola, Agbotiname Lucky Imoize, Mohammad Hammoudeh, Bamidele Adebisi, Olamide Jogunola, Abiodun M. Aibinu:
Federated Deep Learning for Intrusion Detection in Consumer-Centric Internet of Things. IEEE Trans. Consumer Electron. 70(1): 1610-1622 (2024) - [c71]Adeola Adewumi, Mohammad Hammoudeh, Tooska Dargahi, Olamide Jogunola:
Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures. ACNS Workshops (1) 2024: 265-280 - [i6]Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh:
Toward Independent Key Encryption based on Q-Problem. IACR Cryptol. ePrint Arch. 2024: 645 (2024) - 2023
- [j81]Yusuf Ucbas, Amna Eleyan, Mohammad Hammoudeh, Manar Alohaly:
Performance and Scalability Analysis of Ethereum and Hyperledger Fabric. IEEE Access 11: 67156-67167 (2023) - [j80]Khaled Chait, Abdelkader Laouid, Mostefa Kara, Mohammad Hammoudeh, Omar Aldabbas, Abdullah T. Al-Essa:
An Enhanced Threshold RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size. IEEE Access 11: 110490-110501 (2023) - [j79]Omego Nnamonu, Mohammad Hammoudeh, Tooska Dargahi:
Digital Forensic Investigation of Web-Based Virtual Reality Worlds: Decentraland as a Case Study. IEEE Commun. Mag. 61(9): 72-78 (2023) - [j78]Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan, Mohammed Al-Khalidi:
A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity. Inf. 14(5): 263 (2023) - [j77]Tarek Gaber, Joseph Bamidele Awotunde, Mohamed Torky, Sunday Adeola Ajagbe, Mohammad Hammoudeh, Wei Li:
Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks. Internet Things 24: 100977 (2023) - [j76]Berdjouh Chafik, Meftah Mohammed Charaf Eddine, Abdelkader Laouid, Mohammad Hammoudeh, Akshi Kumar:
Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces. IEEE Internet Things J. 10(21): 18495-18504 (2023) - [j75]Ahmad AlZu'bi, Lojin Bani Younis, Abdelrahman Abuarqoub, Mohammad Hammoudeh:
Multimodal Deep Learning with Discriminant Descriptors for Offensive Memes Detection. ACM J. Data Inf. Qual. 15(3): 38:1-38:16 (2023) - [j74]Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh:
Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using One-Time Pad Method with a Single Pre-Shared Key. J. Inf. Sci. Eng. 39(1): 183-195 (2023) - [j73]Rania A. Elsayed, Reem Hamada, Mohammad Hammoudeh, Mahmoud I. Abdalla, Shaimaa Ahmed Elsaid:
A Hierarchical Deep Learning-Based Intrusion Detection Architecture for Clustered Internet of Things. J. Sens. Actuator Networks 12(1): 3 (2023) - [j72]Mohammad Hammoudeh, Gregory Epiphaniou, Pedro Pinto:
Cyber-Physical Systems: Security Threats and Countermeasures. J. Sens. Actuator Networks 12(1): 18 (2023) - [j71]Nabil Kadjouh, Ahcène Bounceur, Madani Bezoui, Mohamed Essaid Khanouche, Reinhardt Euler, Mohammad Hammoudeh, Loïc Lagadec, Sohail Jabbar, Fadi M. Al-Turjman:
A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. Mob. Networks Appl. 28(2): 718-731 (2023) - [j70]Sumit Kumar, Arup Kumar Pal, SK Hafizul Islam, Mohammad Hammoudeh:
Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Comput. Appl. 35(7): 4855-4880 (2023) - [j69]Ismail Kertiou, Abdelkader Laouid, Saber Benharzallah, Mohammad Hammoudeh, Muath AlShaikh:
A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments. PeerJ Comput. Sci. 9: e1682 (2023) - [j68]Gregory Epiphaniou, Mohammad Hammoudeh, Hu Yuan, Carsten Maple, Uchenna Ani:
Digital twins in cyber effects modelling of IoT/CPS points of low resilience. Simul. Model. Pract. Theory 125: 102744 (2023) - [j67]Adel Berhoum, Meftah Mohammed Charaf Eddine, Abdelkader Laouid, Mohammad Hammoudeh:
An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(5): 148:1-148:20 (2023) - [j66]Jia Hu, Kuljeet Kaur, Hui Lin, Xiaoding Wang, Mohammad Mehedi Hassan, Imran Razzak, Mohammad Hammoudeh:
Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2382-2391 (2023) - [c70]Md. Mainul Islam, Md. Kamrul Islam, Mohammad Hammoudeh:
High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks. BCCA 2023: 97-103 - [c69]Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi, Khaled Chait, Mohammad Hammoudeh, Ahmed Aziz:
A Binary Matrix-Based Data Representation for Data Compression in Blockchain. BCCA 2023: 307-314 - [c68]Aisha Alansari, Razan Alfaqeer, Mohammad Hammoudeh:
A Review of the Progressive Odyssey of AI-Driven Intrusion Detection Within Embedded Systems. CRiSIS 2023: 3-16 - [c67]Khaled Chait, Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh, Ahcène Bounceur:
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations. ICFNDS 2023: 71-75 - [c66]Ahcène Bounceur, Mohammad Hammoudeh, Jameleddine Hassine, Madani Bezoui, Adel Fadhl Ahmed, Muhamad Felemban:
RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning. ICFNDS 2023: 611-617 - [c65]Ahtesham Ali Mohammed, Ahcène Bounceur, Mohammad Hammoudeh:
Quantum Assisted Architectures for Wireless Systems, the Case of Quantum 6G. ICFNDS 2023: 618-625 - [c64]Chibuzo Obi-Okoli, Olamide Jogunola, Bamidele Adebisi, Mohammad Hammoudeh:
Machine Learning Algorithms to Detect Illicit Accounts on Ethereum Blockchain. ICFNDS 2023: 747-752 - [c63]Omego Nnamonu, Mohammad Hammoudeh, Tooska Dargahi:
Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework. MetaCom 2023: 94-98 - [c62]Hamza Ngadi, Ahcène Bounceur, Madani Bezoui, Laaziz Lahlou, Mohammad Hammoudeh, Nadjia Kara, Laurent Nana:
Toward A Digital Twin IoT for the Validation of AI Algorithms in Smart-City Applications. MLN 2023: 108-117 - [c61]Ahmed Danladi Abdullahi, Tooska Dargahi, Mohammad Hammoudeh:
Poster: Continuous Authentication in Highly Connected 6G-enabled Transportation Systems. VNC 2023: 171-172 - [i5]Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh:
An Efficient Multi-Signature Scheme for Blockchain. IACR Cryptol. ePrint Arch. 2023: 78 (2023) - [i4]Mostefa Kara, Abdelkader Laouid, Omer Al dabbas, Mohammad Hammoudeh, Ahcène Bounceur:
One Digit Checksum for Data Integrity Verification of Cloud-executed Homomorphic Encryption Operations. IACR Cryptol. ePrint Arch. 2023: 231 (2023) - 2022
- [j65]Mohammed Saleh Ali Muthanna, Ammar Muthanna, Ahsan Rafiq, Mohammad Hammoudeh, Reem Alkanhel, Stephen Lynch, Ahmed A. Abd El-Latif:
Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks. Comput. Commun. 183: 33-50 (2022) - [j64]Kim-Kwang Raymond Choo, Mohammad Hammoudeh:
Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice. Distributed Ledger Technol. Res. Pract. 1(1): 1-4 (2022) - [j63]Mostefa Kara, Abdelkader Laouid, Mohammed Amine Yagoub, Reinhardt Euler, Saci Medileh, Mohammad Hammoudeh, Amna Eleyan, Ahcène Bounceur:
A fully homomorphic encryption based on magic number fragmentation and El-Gamal encryption: Smart healthcare use case. Expert Syst. J. Knowl. Eng. 39(5) (2022) - [j62]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh:
Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j61]Ahcène Bounceur, Madani Bezoui, Mohammad Hammoudeh, Loïc Lagadec, Reinhardt Euler:
Finding the polygon hull of a network without conditions on the starting vertex. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j60]Sana Sahar Guia, Abdelkader Laouid, Mohammad Hammoudeh, Ahcène Bounceur, Mai Alfawair, Amna Eleyan:
Co-Simulation of Multiple Vehicle Routing Problem Models. Future Internet 14(5): 137 (2022) - [j59]Dima Taha, Ahmad AlZu'bi, Abdelrahman Abuarqoub, Mohammad Hammoudeh, Mohamed Elhoseny:
Automated Colorectal Polyp Classification Using Deep Neural Networks with Colonoscopy Images. Int. J. Fuzzy Syst. 24(5): 2525-2537 (2022) - [j58]Segun I. Popoola, Ruth Ande, Bamidele Adebisi, Guan Gui, Mohammad Hammoudeh, Olamide Jogunola:
Federated Deep Learning for Zero-Day Botnet Attack Detection in IoT-Edge Devices. IEEE Internet Things J. 9(5): 3930-3944 (2022) - [j57]Olamide Jogunola, Yakubu Tsado, Bamidele Adebisi, Mohammad Hammoudeh:
VirtElect: A Peer-to-Peer Trading Platform for Local Energy Transactions. IEEE Internet Things J. 9(8): 6121-6133 (2022) - [j56]Mohammed Al-Khalidi, Rabab Al-Zaidi, Ahmed M. Abubahia, Hari Mohan Pandey, Md Israfil Biswas, Mohammad Hammoudeh:
Global IoT Mobility: A Path Based Forwarding Approach. J. Sens. Actuator Networks 11(3): 41 (2022) - [j55]Mohammed Zubair, Ali Ghubaish, Devrim Unal, Abdulla K. Al-Ali, Thomas Reimann, Guillaume Alinier, Mohammad Hammoudeh, Junaid Qadir:
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System. Sensors 22(21): 8280 (2022) - [j54]Mostefa Kara, Abdelkader Laouid, Mohammad Hammoudeh, Muath AlShaikh, Ahcène Bounceur:
Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things. IEEE Trans. Ind. Informatics 18(11): 8336-8345 (2022) - [j53]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava:
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks. IEEE Trans. Ind. Informatics 18(11): 8356-8366 (2022) - [j52]Bardia Esmaeili, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Behrouz Zolfaghari, Mohammad Hammoudeh:
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection. IEEE Trans. Ind. Informatics 18(12): 8477-8486 (2022) - [c60]Sara Holm, Mohammad Hammoudeh:
A Comparative Analysis of IoT Protocols for Resource Constraint Devices and Networks. ICFNDS 2022: 616-625 - [c59]Hamza Ngadi, Ahcène Bounceur, Mohammad Hammoudeh, Samir Ouchani, Madani Bezoui, Reinhardt Euler, Abdelkader Laouid:
From Simulation to Digital Twins, the Case of Internet of Things Research and Tools. ICFNDS 2022: 657-666 - [c58]Abdelrahman Abuarqoub, Ahmad AlZu'bi, Mohammad Hammoudeh, Arslan Ahmad, Bassam Al-Shargabi:
A Survey on Vehicular Ad hoc Networks Security Attacks and Countermeasures. ICFNDS 2022: 701-707 - [c57]Olamide Jogunola, Bamidele Adebisi, Haris Gacanin, Mohammad Hammoudeh, Guan Gui:
Optimal Dynamic Multi-source Multi-community Power Schedule and Trading. SmartGridComm 2022: 110-115 - [p8]Andrew Stephens, Mohammad Hammoudeh:
The Efficacy and Real-Time Performance of Refraction Networking. Handbook of Real-Time Computing 2022: 895-912 - [i3]Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava:
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks. CoRR abs/2204.09829 (2022) - 2021
- [j51]Ibrahim A. Elgendy, Ammar Muthanna, Mohammad Hammoudeh, Hadil Shaiba, Devrim Unal, Mashael Khayyat:
Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing. Big Data 9(4): 265-278 (2021) - [j50]Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Carsten Maple, Gregory Epiphaniou, Mohammad Hammoudeh, Hamid Jahankhani, Prashant Pillai:
Optimising driver profiling through behaviour modelling of in-car sensor and global positioning system data. Comput. Electr. Eng. 91: 107047 (2021) - [j49]Segun I. Popoola, Bamidele Adebisi, Mohammad Hammoudeh, Haris Gacanin, Guan Gui:
Stacked recurrent neural network for botnet detection in smart homes. Comput. Electr. Eng. 92: 107039 (2021) - [j48]Devrim Unal, Mohammad Hammoudeh, Muhammad Asif Khan, Abdelrahman Abuarqoub, Gregory Epiphaniou, Ridha Hamila:
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Comput. Secur. 109: 102393 (2021) - [j47]Maliha Rashida, Kawsarul Islam, A. S. M. Kayes, Mohammad Hammoudeh, Mohammad Shamsul Arefin, Mohammad Ashfak Habib:
Towards Developing a Framework to Analyze the Qualities of the University Websites. Comput. 10(5): 57 (2021) - [j46]Aliyu Gana Yisa, Tooska Dargahi, Sana Belguith, Mohammad Hammoudeh:
Security challenges of Internet of Underwater Things: A systematic literature review. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j45]Devrim Unal, Abdulla K. Al-Ali, Ferhat Özgür Çatak, Mohammad Hammoudeh:
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Future Gener. Comput. Syst. 125: 433-445 (2021) - [j44]Segun I. Popoola, Bamidele Adebisi, Mohammad Hammoudeh, Guan Gui, Haris Gacanin:
Hybrid Deep Learning for Botnet Attack Detection in the Internet-of-Things Networks. IEEE Internet Things J. 8(6): 4944-4956 (2021) - [j43]Mainak Adhikari, M. Ambigavathi, Varun G. Menon, Mohammad Hammoudeh:
Random Forest for Data Aggregation to Monitor and Predict COVID-19 Using Edge Networks. IEEE Internet Things Mag. 4(2): 40-44 (2021) - [j42]Mohammad Hammoudeh, Paul A. Watters, Gregory Epiphaniou, A. S. M. Kayes, Pedro Pinto:
Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems". J. Sens. Actuator Networks 10(3): 54 (2021) - [j41]Sohail Jabbar, Huw Lloyd, Mohammad Hammoudeh, Bamidele Adebisi, Umar Raza:
Blockchain-enabled supply chain: analysis, challenges, and future directions. Multim. Syst. 27(4): 787-806 (2021) - [j40]Mohammad Hammoudeh:
Deep Learning Methods for Physical-Layer Wireless Communications - Recent Advances and Future Trends. Phys. Commun. 49: 101546 (2021) - [j39]Segun I. Popoola, Bamidele Adebisi, Ruth Ande, Mohammad Hammoudeh, Kelvin O. O. Anoh, Aderemi A. Atayero:
SMOTE-DRNN: A Deep Learning Algorithm for Botnet Detection in the Internet-of-Things Networks. Sensors 21(9): 2985 (2021) - [j38]Ge Chen, Jun Wu, Wu Yang, Ali Kashif Bashir, Gaolei Li, Mohammad Hammoudeh:
Leveraging Graph Convolutional-LSTM for Energy-Efficient Caching in Blockchain-Based Green IoT. IEEE Trans. Green Commun. Netw. 5(3): 1154-1164 (2021) - [j37]Rafael Salema Marques, Gregory Epiphaniou, Haider M. Al-Khateeb, Carsten Maple, Mohammad Hammoudeh, Paulo André Lima de Castro, Ali Dehghantanha, Kim-Kwang Raymond Choo:
A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks. ACM Trans. Internet Techn. 21(4): 103:1-103:30 (2021) - [c56]Mostefa Kara, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh, Romaissa Kebache:
Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions. ICFNDS 2021: 64-69 - [c55]Thomas Martin, Mohammad Hammoudeh:
Data Preservation System using BoCA: Blockchain-of-Custody Application. ICFNDS 2021: 70-77 - [c54]Elnaz Rabieinejad, Abbas Yazdinejad, Tahereh Hasani, Mohammad Hammoudeh:
Blockchain-based E-commerce for the COVID-19 economic crisis. ICFNDS 2021: 105-112 - [c53]Elnaz Rabieinejad, Abbas Yazdinejad, Tahereh Hasani, Reza M. Parizi, Mohammad Hammoudeh:
An Efficient DeFi-based Data Warehousing Approach in Supply Chain Finance. ICFNDS 2021: 177-185 - [c52]Rubaiath E. Ulfath, Hamed AlQahtani, Mohammad Hammoudeh, Iqbal H. Sarker:
Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection. ICFNDS 2021: 244-251 - [c51]Mohammad Hammoudeh, Bamidele Adebisi, Devrim Unal, Abdelkader Laouid:
Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts. ICFNDS 2021: 299-304 - [c50]Segun I. Popoola, Guan Gui, Bamidele Adebisi, Mohammad Hammoudeh, Haris Gacanin:
Federated Deep Learning for Collaborative Intrusion Detection in Heterogeneous Networks. VTC Fall 2021: 1-6 - 2020
- [j36]Saci Medileh, Abdelkader Laouid, El Moatez Billah Nagoudi, Reinhardt Euler, Ahcène Bounceur, Mohammad Hammoudeh, Muath AlShaikh, Amna Eleyan, Osama Ahmed Khashan:
A flexible encryption technique for the internet of things environment. Ad Hoc Networks 106: 102240 (2020) - [j35]Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, Tooska Dargahi:
PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications. Future Gener. Comput. Syst. 111: 899-918 (2020) - [j34]Animesh Chandra Roy, Mohammad Shamsul Arefin, A. S. M. Kayes, Mohammad Hammoudeh, Khandakar Ahmed:
An Empirical Recommendation Framework to Support Location-Based Services. Future Internet 12(9): 154 (2020) - [j33]Devrim Unal, Mohammad Hammoudeh, Mehmet Sabir Kiraz:
Policy specification and verification for blockchain and smart contracts in 5G networks. ICT Express 6(1): 43-47 (2020) - [j32]Mohamed Elhoseny, R. Sundar Rajan, Mohammad Hammoudeh, K. Shankar, Omar Aldabbas:
Swarm intelligence-based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks. Int. J. Distributed Sens. Networks 16(9): 155014772094913 (2020) - [j31]Kayhan Zrar Ghafoor, Linghe Kong, Sherali Zeadally, Ali Safaa Sadiq, Gregory Epiphaniou, Mohammad Hammoudeh, Ali Kashif Bashir, Shahid Mumtaz:
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives. IEEE Internet Things J. 7(9): 8525-8546 (2020) - [j30]Vipin Kumar Rathi, Vinay Chaudhary, Nikhil Kumar Rajput, Bhavya Ahuja, Amit Kumar Jaiswal, Deepak Gupta, Mohamed Elhoseny, Mohammad Hammoudeh:
A Blockchain-Enabled Multi Domain Edge Computing Orchestrator. IEEE Internet Things Mag. 3(2): 30-36 (2020) - [j29]Mohammad Hammoudeh, John Pimlott, Sana Belguith, Gregory Epiphaniou, Thar Baker, A. S. M. Kayes, Bamidele Adebisi, Ahcène Bounceur:
Network Traffic Analysis for Threat Detection in the Internet of Things. IEEE Internet Things Mag. 3(4): 40-45 (2020) - [j28]Ammar Muthanna, Regina Shamilova, Abdelhamied A. Ateya, Alexander Paramonov, Mohammad Hammoudeh:
A mobile edge computing/software-defined networking-enabled architecture for vehicular networks. Internet Technol. Lett. 3(6) (2020) - [j27]Walid Rjaibi, Mohammad Hammoudeh:
Enhancing and simplifying data security and privacy for multitiered applications. J. Parallel Distributed Comput. 139: 53-64 (2020) - [j26]A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Saiful Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara:
A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues. Sensors 20(9): 2464 (2020) - [j25]Thar Baker, Muhammad Asim, Áine MacDermott, Farkhund Iqbal, Faouzi Kamoun, Babar Shah, Omar Alfandi, Mohammad Hammoudeh:
A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. Pract. Exp. 50(5): 503-518 (2020) - [j24]Gregory Epiphaniou, Prashant Pillai, Mirko Bottarelli, Haider M. Al-Khateeb, Mohammad Hammoudeh, Carsten Maple:
Corrections to "Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security". IEEE Trans. Engineering Management 67(3): 979 (2020) - [j23]Gregory Epiphaniou, Prashant Pillai, Mirko Bottarelli, Haider M. Al-Khateeb, Mohammad Hammoudeh, Carsten Maple:
Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Trans. Engineering Management 67(4): 1059-1073 (2020) - [j22]Steven Walker-Roberts, Mohammad Hammoudeh, Omer Aldabbas, Mehmet Aydin, Ali Dehghantanha:
Threats on the horizon: understanding security threats in the era of cyber-physical systems. J. Supercomput. 76(4): 2643-2664 (2020) - [c49]Mostefa Kara, Abdelkader Laouid, Reinhardt Euler, Mohammed Amine Yagoub, Ahcène Bounceur, Mohammad Hammoudeh, Saci Medileh:
A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem. ICFNDS 2020: 1:1-1:6 - [c48]Sana Sahar Guia, Abdelkader Laouid, Reinhardt Euler, Mohammed Amine Yagoub, Ahcène Bounceur, Mohammad Hammoudeh:
A Salient Object Detection Technique Based on Color Divergence. ICFNDS 2020: 2:1-2:6 - [c47]Mohammad Hammoudeh:
Blockchain, Internet of Things and Digital Twins in Trustless Security of Critical National Infrastructure. ICFNDS 2020: 43:1 - [c46]A. S. M. Kayes, Mohammad Hammoudeh, Shahriar Badsha, Paul A. Watters, Alex Ng, Fatma Mohammed, Mofakharul Islam:
Responsibility Attribution Against Data Breaches. ICIoT 2020: 498-503 - [e6]Zheng Xu, Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh:
Cyber Security Intelligence and Analytics, CSIA 2019, Shenyang, China, 21-22 February 2019. Advances in Intelligent Systems and Computing 928, Springer 2020, ISBN 978-3-030-15234-5 [contents] - [e5]Zheng Xu, Reza M. Parizi, Mohammad Hammoudeh, Octavio Loyola-González:
Cyber Security Intelligence and Analytics - Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics, CSIA 2020, Haikou, China, 28-29 February 2020, Volume 1. Advances in Intelligent Systems and Computing 1146, Springer 2020, ISBN 978-3-030-43305-5 [contents] - [e4]Zheng Xu, Reza M. Parizi, Mohammad Hammoudeh, Octavio Loyola-González:
Cyber Security Intelligence and Analytics - Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics, CSIA 2020, Haikou, China, 28-29 February 2020, Volume 2. Advances in Intelligent Systems and Computing 1147, Springer 2020, ISBN 978-3-030-43308-6 [contents]
2010 – 2019
- 2019
- [j21]Abdelhamied A. Ateya, Ammar Muthanna, Ruslan Kirichek, Mohammad Hammoudeh, Andrey Koucheryavy:
Energy- and Latency-Aware Hybrid Offloading Algorithm for UAVs. IEEE Access 7: 37587-37600 (2019) - [j20]Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb, Mohammad Hammoudeh, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks 95 (2019) - [j19]Fayez Al-Fayez, Mohammad Hammoudeh, Bamidele Adebisi, Khalid Nazim Abdul Sattar:
Assessing the effectiveness of flying ad hoc networks for international border surveillance. Int. J. Distributed Sens. Networks 15(7) (2019) - [j18]Augustine Ikpehai, Bamidele Adebisi, Khaled M. Rabie, Kelvin O. O. Anoh, Ruth Ande, Mohammad Hammoudeh, Haris Gacanin, Uche M. Mbanaso:
Low-Power Wide Area Network Technologies for Internet-of-Things: A Comparative Review. IEEE Internet Things J. 6(2): 2225-2240 (2019) - [j17]Mike Mackintosh, Gregory Epiphaniou, Haider M. Al-Khateeb, Keith J. Burnham, Prashant Pillai, Mohammad Hammoudeh:
Preliminaries of Orthogonal Layered Defence Using Functional and Assurance Controls in Industrial Control Systems. J. Sens. Actuator Networks 8(1): 14 (2019) - [j16]Noshina Tariq, Muhammad Asim, Feras N. Al-Obeidat, Muhammad Zubair Farooqi, Thar Baker, Mohammad Hammoudeh, Ibrahim Ghafir:
The Security of Big Data in Fog-Enabled IoT Applications Including Blockchain: A Survey. Sensors 19(8): 1788 (2019) - [c45]Olamide Jogunola, Mohammad Hammoudeh, Bamidele Adebisi, Kelvin O. O. Anoh:
Demonstrating Blockchain-Enabled Peer-to-Peer Energy Trading and Sharing. CCECE 2019: 1-4 - [c44]Muath AlShaikh, Lamri Laouamer, Abdelkader Laouid, Ahcène Bounceur, Mohammad Hammoudeh:
Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm. ICFNDS 2019: 1:1-1:6 - [c43]Mohammad Alkhawatrah, Yu Gong, Omar Aldabbas, Mohammad Hammoudeh:
Buffer-Aided 5G Cooperative Networks: Considering the Source Delay. ICFNDS 2019: 13:1-13:6 - [c42]Mohammad Hammoudeh, Ibrahim Ghafir, Ahcène Bounceur, Thomas Rawlinson:
Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain. ICFNDS 2019: 27:1-27:5 - [c41]Huw Lloyd, Mohammad Hammoudeh:
A Distributed Cellular Automaton Algorithm for Barrier Formation in Mobile Sensor Networks. Wireless Days 2019: 1-4 - [p7]Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Private Cloud Storage Forensics: Seafile as a Case Study. Handbook of Big Data and IoT Security 2019: 73-127 - [p6]Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou, Mohammad Hammoudeh:
Distributed Filesystem Forensics: Ceph as a Case Study. Handbook of Big Data and IoT Security 2019: 129-151 - [p5]Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Reza M. Parizi:
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study. Handbook of Big Data and IoT Security 2019: 153-177 - [p4]Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou:
Big Data Forensics: Hadoop Distributed File Systems as a Case Study. Handbook of Big Data and IoT Security 2019: 179-210 - [p3]Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Gregory Epiphaniou:
Security in Online Games: Current Implementations and Challenges. Handbook of Big Data and IoT Security 2019: 367-384 - 2018
- [j15]Kelvin O. O. Anoh, Cagri Tanriover, Bamidele Adebisi, Mohammad Hammoudeh:
A New Approach to Iterative Clipping and Filtering PAPR Reduction Scheme for OFDM Systems. IEEE Access 6: 17533-17544 (2018) - [j14]Steven Walker-Roberts, Mohammad Hammoudeh, Ali Dehghantanha:
A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access 6: 25167-25177 (2018) - [j13]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Thar Baker, Sohail Jabbar, Shehzad Khalid, Sardar F. Jaf:
BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access 6: 38947-38958 (2018) - [j12]Muhammad Farhan, Sohail Jabbar, Muhammad Aslam, Mohammad Hammoudeh, Mudassar Ahmad, Shehzad Khalid, Murad Khan, Kijun Han:
IoT-based students interaction framework using attention-scoring assessment in eLearning. Future Gener. Comput. Syst. 79: 909-919 (2018) - [j11]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil, Liangxiu Han, Robert Hegarty, Khaled M. Rabie, Francisco J. Aparicio-Navarro:
Detection of advanced persistent threat using machine-learning correlation analysis. Future Gener. Comput. Syst. 89: 349-359 (2018) - [j10]Ali Benzerbadj, Kechar Bouabdellah, Ahcène Bounceur, Mohammad Hammoudeh:
Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. J. Netw. Comput. Appl. 112: 41-52 (2018) - [j9]Mohammad Hammoudeh, Mounir Arioua:
Sensors and Actuators in Smart Cities. J. Sens. Actuator Networks 7(1): 8 (2018) - [j8]Ibrahim Ghafir, Jibran Saleem, Mohammad Hammoudeh, Hanan Faour, Vaclav Prenosil, Sardar F. Jaf, Sohail Jabbar, Thar Baker:
Security threats to critical infrastructure: the human factor. J. Supercomput. 74(10): 4986-5002 (2018) - [c40]Jibran Saleem, Mohammad Hammoudeh, Umar Raza, Bamidele Adebisi, Ruth Ande:
IoT standardisation: challenges, perspectives and solution. ICFNDS 2018: 1:1-1:9 - [c39]Madani Bezoui, Ahcène Bounceur, Loïc Lagadec, Reinhardt Euler, Mohammad Hammoudeh, Abdelkader Laouid, Abdelkamel Tari:
Detecting gaps and voids in WSNs and IoT networks: the angle-based method. ICFNDS 2018: 36:1-36:7 - [c38]Kelvin O. O. Anoh, Augustine Ikpehai, Dragana Bajovic, Olamide Jogunola, Bamidele Adebisi, Dejan Vukobratovic, Mohammad Hammoudeh:
Virtual microgrids: a management concept for peer-to-peer energy trading. ICFNDS 2018: 43:1-43:5 - [c37]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Francisco J. Aparicio-Navarro, Khaled M. Rabie, Ahmad Jabban:
Disguised executable files in spear-phishing emails: detecting the point of entry in advanced persistent threat. ICFNDS 2018: 44:1-44:5 - [c36]Daniel Kelly, Mohammad Hammoudeh:
Optimisation of the public key encryption infrastructure for the internet of things. ICFNDS 2018: 45:1-45:5 - [c35]Andy Kuszyk, Mohammad Hammoudeh:
Contemporary alternatives to traditional processor design in the post Moore's law era. ICFNDS 2018: 46:1-46:5 - [c34]Ahcène Bounceur, Madani Bezoui, Loïc Lagadec, Reinhardt Euler, Abdelkader Laouid, Mohammad Hammoudeh:
DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks. MSPN 2018: 42-53 - [p2]Jibran Saleem, Mohammad Hammoudeh:
Defense Methods Against Social Engineering Attacks. Computer and Network Security Essentials 2018: 603-618 - [p1]Steven Walker-Roberts, Mohammad Hammoudeh:
Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 131-155 - [e3]Abdelrahman Abuarqoub, Bamidele Adebisi, Mohammad Hammoudeh, Sharefa Murad, Mounir Arioua:
Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26-27, 2018. ACM 2018 [contents] - [i2]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil:
Defending against the advanced persistent threat: Detection of disguised executable files. PeerJ Prepr. 6: e2998 (2018) - 2017
- [j7]Kelvin O. O. Anoh, Bamidele Adebisi, Khaled M. Rabie, Mohammad Hammoudeh, Haris Gacanin:
On Companding and Optimization of OFDM Signals for Mitigating Impulsive Noise in Power-Line Communication Systems. IEEE Access 5: 21818-21830 (2017) - [j6]Abdelrahman Abuarqoub, Mohammad Hammoudeh, Bamidele Adebisi, Sohail Jabbar, Ahcène Bounceur, Hashem Al-Bashar:
Dynamic clustering and management of mobile wireless sensor networks. Comput. Networks 117: 62-75 (2017) - [c33]Kelvin O. O. Anoh, Bamidele Adebisi, Olamide Jogunola, Mohammad Hammoudeh:
Cooperative Hybrid Wireless-Powerline Channel Transmission for Peer-to-Peer Energy Trading and Sharing System. ICFNDS 2017: 7 - [c32]Yahya Atwady, Mohammad Hammoudeh:
A Survey on Authentication Techniques for the Internet of Things. ICFNDS 2017: 8 - [c31]Afnan Aloraini, Mohammad Hammoudeh:
A Survey on Data Confidentiality and Privacy in Cloud Computing. ICFNDS 2017: 10:1-10:7 - [c30]Marwa Boulakbech, Nizar Messai, Yacine Sam, Thomas Devogele, Mohammad Hammoudeh:
IoT Mashups: From IoT Big Data to IoT Big Service. ICFNDS 2017: 20 - [c29]Ibrahim Ghafir, Vaclav Prenosil, Mohammad Hammoudeh, Liangxiu Han, Umar Raza:
Malicious SSL Certificate Detection: A Step Towards Advanced Persistent Threat Defence. ICFNDS 2017: 27 - [c28]Steve Moffat, Mohammad Hammoudeh, Robert Hegarty:
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT. ICFNDS 2017: 34 - [c27]Adam Coates, Mohammad Hammoudeh, Kieran Gerard Holmes:
Internet of Things for Buildings Monitoring: Experiences and Challenges. ICFNDS 2017: 38 - [c26]J. K. Mohsin, Liangxiu Han, Mohammad Hammoudeh, Robert Hegarty:
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments. ICFNDS 2017: 39:1-39:10 - [c25]Kieran Gerard Holmes, Adam Coates, Mohammad Hammoudeh:
Motion Capture Using the Internet of Things Technology: A Tutorial. ICFNDS 2017: 40 - [c24]Peter Barker, Mohammad Hammoudeh:
A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks. ICFNDS 2017: 44:1-44:8 - [c23]Abdelrahman Abuarqoub, Hesham Abusaimeh, Mohammad Hammoudeh, Diaa M. Uliyan, Muhannad A. Abu-Hashem, Sharefa Murad, Mudhafar M. Al-Jarrah, Fayez Al-Fayez:
A Survey on Internet of Thing Enabled Smart Campus Applications. ICFNDS 2017: 50:1-50:7 - [c22]Jibran Saleem, Bamidele Adebisi, Ruth Ande, Mohammad Hammoudeh:
A state of the art survey - Impact of cyber attacks on SME's. ICFNDS 2017: 52 - [c21]Kelvin O. O. Anoh, Bamidele Adebisi, Mohammad Hammoudeh:
A Comparison of ICF and Companding for Impulsive Noise Mitigation in Powerline Communication Systems. ICFNDS 2017: 55:1-55:6 - [c20]Laith Farhan, Ali E. Alissa, Sinan T. Shukur, Mohammad Hammoudeh, Rupak Kharel:
An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks. ICST 2017: 1-6 - [c19]Farid Lalem, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh, Rahim Kacimi, Sanaa Kawther Ghalem:
Distributed faulty sensor node detection in wireless sensor networks based on copula theory. ICC 2017: 198:1-198:8 - [c18]Sanaa Kawther Ghalem, Kechar Bouabdellah, Ahcène Bounceur, Reinhardt Euler, Mohammad Hammoudeh, Farid Lalem:
A copula based approach for measurement validity verification in wireless sensor networks. ICC 2017: 199:1-199:6 - [e2]Mohammad Hammoudeh, Robert M. Newman:
Proceedings of the International Conference on Future Networks and Distributed Systems, ICFNDS 2017, Cambridge, United Kingdom, July 19-20, 2017. ACM 2017, ISBN 978-1-4503-4844-7 [contents] - [i1]Ibrahim Ghafir, Mohammad Hammoudeh, Vaclav Prenosil:
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat. PeerJ Prepr. 5: e2998 (2017) - 2016
- [c17]Umar Raza, Rupak Kharel, Mohammad Hammoudeh, Sunday C. Ekpo, B. R. Whiteside:
A service based wireless sensor networks architecture for high value-added process monitoring. CSNDSP 2016: 1-6 - [c16]Ibrahim Ghafir, Vaclav Prenosil, Jakub Svoboda, Mohammad Hammoudeh:
A Survey on Network Security Monitoring Systems. FiCloud Workshops 2016: 77-82 - [c15]Ibrahim Ghafir, Vaclav Prenosil, Ahmad Alhejailan, Mohammad Hammoudeh:
Social Engineering Attack Strategies and Defence Approaches. FiCloud 2016: 145-149 - [c14]Mohammad Hammoudeh:
Putting the lab on the map: A wireless sensor network system for border security and surveillance. ICC 2016 2016: 4:1 - 2015
- [j5]Mohammad Hammoudeh, Robert M. Newman:
Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance. Inf. Fusion 22: 3-15 (2015) - [j4]Mohammad Hammoudeh, Robert M. Newman:
Information extraction from sensor networks using the Watershed transform algorithm. Inf. Fusion 22: 39-49 (2015) - [j3]Mohammad Hammoudeh, Robert M. Newman, Christopher Dennett, Sarah Mount, Omar Aldabbas:
Map as a Service: A Framework for Visualising and Maximising Information Return from Multi-ModalWireless Sensor Networks. Sensors 15(9): 22970-23003 (2015) - [c13]Mohammad Hammoudeh:
Applying Wireless Sensor Networks to Solve Real-world Problems. IPAC 2015: 1:1 - 2013
- [j2]Mohammad Hammoudeh, Robert M. Newman, Christopher Dennett, Sarah Mount:
Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wirel. Commun. Mob. Comput. 13(9): 809-827 (2013) - [c12]Patrick Dibb, Mohammad Hammoudeh:
Forensic Data Recovery from Android OS Devices: An Open Source Toolkit. EISIC 2013: 226 - [c11]Louis Antani Holt, Mohammad Hammoudeh:
Cloud Forensics: A Technical Approach to Virtual Machine Acquisition. EISIC 2013: 227 - [c10]Abdelrahman Abuarqoub, Mohammad Hammoudeh:
Self-stabilizing algorithm for information extraction from mobile wireless sensor networks. WMNC 2013: 1-4 - 2012
- [c9]Abdelrahman Abuarqoub, Mohammad Hammoudeh, Tariq A. A. Alsboui:
An Overview of Information Extraction from Mobile Wireless Sensor Networks. NEW2AN 2012: 95-106 - 2011
- [c8]Mohammad Hammoudeh, Tariq A. A. Alsboui:
Building Programming Abstractions for Wireless Sensor Networks Using Watershed Segmentation. NEW2AN 2011: 587-597 - 2010
- [e1]Vinu V. Das, R. Vijayakumar, K. G. Srinivasa, Hatim A. Aboalsamh, Mohammad Hammoudeh, Vahid Salmani, Dinesh Kumar Tyagi, Anjali Mohapatra, Bharatheesh Jaysimha, Eliathamby Ambikairajah, Jonathan M. Blackledge:
Information and Communication Technologies - International Conference, ICT 2010, Kochi, Kerala, India, September 7-9, 2010. Proceedings. Communications in Computer and Information Science 101, Springer 2010, ISBN 978-3-642-15765-3 [contents]
2000 – 2009
- 2009
- [b1]Mohammad Hammoudeh:
A distributed data extraction and visualisation service for wireless sensor networks. University of Wolverhampton, UK, 2009 - [c7]Mohammad Hammoudeh, Robert M. Newman, Sarah Mount:
An Approach to Data Extraction and Visualisation for Wireless Sensor Networks. ICN 2009: 156-161 - [c6]Mohammad Hammoudeh, Robert M. Newman, Sarah Mount, Christopher Dennett:
A combined inductive and deductive sense data extraction and visualisation service. ICPS 2009: 159-168 - [c5]Mohammad Hammoudeh, Robert M. Newman, Christopher Dennett, Sarah Mount:
Inductive as a support of deductive data visualisation in Wireless Sensor Networks. ISCC 2009: 277-280 - [c4]Mohammad Hammoudeh, Robert M. Newman, Christopher Dennett, Sarah Mount:
Application Domain Driven Data Visualisation Framework for Wireless Sensor Networks. UIC 2009: 150-162 - [c3]Sarah Mount, Mohammad Hammoudeh, Sam Wilson, Robert M. Newman:
CSP as a Domain-Specific Language Embedded in Python and Jython. CPA 2009: 293-309 - 2008
- [j1]Mohammad Hammoudeh, Robert M. Newman, Sarah Mount:
Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge Replacement. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 16 (2008) - [c2]Robert M. Newman, Mohammad Hammoudeh:
Pennies from Heaven: A Retrospective on the Use of Wireless Sensor Networks for Planetary Exploration. AHS 2008: 263-270 - [c1]Mohammad Hammoudeh:
Modelling Clustering of Sensor Networks with Synchronised Hyperedge Replacement. ICGT 2008: 490-492
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint