default search action
Hussam M. N. Al Hamadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j10]Song-Kyoo Kim, Xiaomei Feng, Hussam M. N. Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Sivaprasad Nandyala:
Advanced Machine Learning Based Malware Detection Systems. IEEE Access 12: 115296-115305 (2024) - 2023
- [j9]Fatma Taher, Omar Al Fandi, Mousa Al-Kfairy, Hussam M. N. Al Hamadi, Saed Alrabaee:
A Proposed Artificial Intelligence Model for Android-Malware Detection. Informatics 10(3): 67 (2023) - 2022
- [j8]Kais Belwafi, Ruba Alkadi, Sultan Al-Ameri, Hussam M. N. Al Hamadi, Abdulhadi Shoufan:
Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey. IEEE Access 10: 87577-87601 (2022) - [j7]Zhibo Zhang, Hussam M. N. Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. IEEE Access 10: 93104-93139 (2022) - [j6]Muhammad Hanif, Nadeem Iqbal, Fida Ur Rahman, Muhammad Adnan Khan, Taher M. Ghazal, Sagheer Abbas, Munir Ahmad, Hussam M. N. Al Hamadi, Chan Yeob Yeun:
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System. Sensors 22(16): 6243 (2022) - [j5]Muhammad Umar Nasir, Muhammad Zubair, Taher M. Ghazal, Muhammad Farhan Khan, Munir Ahmad, Atta-ur-Rahman, Hussam M. N. Al Hamadi, Muhammad Adnan Khan, Wathiq Mansoor:
Kidney Cancer Prediction Empowered with Blockchain Security Using Transfer Learning. Sensors 22(19): 7483 (2022) - 2019
- [j4]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh, Yousof Al-Hammadi, Ernesto Damiani:
A Novel Protocol for Security of Location Based Services in Multi-agent Systems. Wirel. Pers. Commun. 108(3): 1841-1868 (2019) - 2017
- [j3]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Guided Test Case Generation for Enhanced ECG Bio-Sensors Functional Verification. Int. J. E Health Medical Commun. 8(4): 1-20 (2017) - [j2]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Joonsang Baek, Mahmoud Al-Qutayri:
Lightweight Security Protocol for ECG Bio-Sensors. Wirel. Pers. Commun. 95(4): 5097-5120 (2017) - 2013
- [j1]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly:
A Novel Security Scheme for the Smart Grid and SCADA Networks. Wirel. Pers. Commun. 73(4): 1547-1559 (2013)
Conference and Workshop Papers
- 2023
- [c20]Afnan Asasfeh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Wathiq Mansoor, Taher M. Ghazal:
Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics. DASC/PiCom/CBDCom/CyberSciTech 2023: 84-88 - [c19]Nadia Mohammed Al-Nowfleh, Nidal A. Al-Dmour, Hussam M. N. Al Hamadi, Fatma Taher, Taher M. Ghazal:
Review of Fundamental, Security, and Privacy in Metaverse. DASC/PiCom/CBDCom/CyberSciTech 2023: 408-414 - 2022
- [c18]Fang Wang, Hussam M. N. Al Hamadi, Ernesto Damiani:
A Visualized Malware Detection Framework with CNN and Conditional GAN. IEEE Big Data 2022: 6540-6546 - [c17]Ala Abdelrazaq Alhammadi, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Ernesto Damiani:
A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning Model. ICCR 2022: 1-9 - [c16]Fatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, Sagheer Abbas, Hussam M. N. Al Hamadi:
Drones network security enhancement using smart based block-chain technology. ICCR 2022: 1-6 - [c15]Zhibo Zhang, Ernesto Damiani, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. ICCR 2022: 1-5 - [c14]Martina Morcos, Hussam M. N. Al Hamadi, Ernesto Damiani, Sivaprasad Nandyala, Brian McGillion:
A Surrogate-Based Technique for Android Malware Detectors' Explainability. WiMob 2022: 112-117 - 2021
- [c13]Hussam M. N. Al Hamadi, Nida Nasir, Chan Yeob Yeun, Ernesto Damiani:
A Verified Protocol for Secure Autonomous and Cooperative Public Transportation in Smart Cities. ICC Workshops 2021: 1-6 - [c12]Fatema Maasmi, Martina Morcos, Hussam M. N. Al Hamadi, Ernesto Damiani:
Identifying Applications' State via System Calls Activity: A Pipeline Approach. ICECS 2021: 1-6 - 2020
- [c11]Mohammed Al Neaimi, Hussam M. N. Al Hamadi, Chan Yeob Yeun, M. Jamal Zemerly:
Digital Forensic Analysis of Files Using Deep Learning. ICSPIS 2020: 1-4 - 2017
- [c10]Md Sarwar Kamal, Sazia Parvin, Kashif Saleem, Hussam M. N. Al Hamadi, Amjad Gawanmeh:
Efficient low cost supervisory system for Internet of Things enabled smart home. ICC Workshops 2017: 864-869 - [c9]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Lightweight security protocol for health monitoring in Ambient Assisted Living environment. ICC Workshops 2017: 1282-1287 - 2016
- [c8]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Simulation Framework for a Security Protocol for Wireless Body Sensor Networks. LCN Workshops 2016: 248-253 - [c7]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Assertion-based verification technique for ECG bio-sensor algorithms. MWSCAS 2016: 1-4 - 2015
- [c6]Amjad Gawanmeh, Hussam M. N. Al Hamadi, Mahmoud Al-Qutayri, Shiu-Kai Chin, Kashif Saleem:
Reliability analysis of healthcare information systems: State of the art and future directions. HealthCom 2015: 68-74 - [c5]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
An automatic ECG generator for testing and evaluating ECG sensor algorithms. IDT 2015: 78-83 - 2014
- [c4]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
A verification methodology for a wireless body sensor network functionality. BHI 2014: 635-639 - [c3]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Formalizing electrocardiogram (ECG) signal behavior in event-B. Healthcom 2014: 55-60 - 2013
- [c2]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems. ICECS 2013: 100-101 - 2011
- [c1]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh:
Formal modeling and verification of DLK protocol. ICITST 2011: 578-583
Informal and Other Publications
- 2024
- [i5]Fang Wang, Hussam M. N. Al Hamadi, Ernesto Damiani:
A Visualized Malware Detection Framework with CNN and Conditional GAN. CoRR abs/2409.14439 (2024) - 2022
- [i4]Miguel A. Ramirez, Song-Kyoo Kim, Hussam M. N. Al Hamadi, Ernesto Damiani, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun:
Poisoning Attacks and Defenses on Artificial Intelligence: A Survey. CoRR abs/2202.10276 (2022) - [i3]Zhibo Zhang, Hussam M. N. Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research. CoRR abs/2208.14937 (2022) - [i2]Zhibo Zhang, Ernesto Damiani, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Fatma Taher:
Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural Network. CoRR abs/2209.03166 (2022) - [i1]Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam M. N. Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun:
New data poison attacks on machine learning classifiers for mobile exfiltration. CoRR abs/2210.11592 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint