default search action
Yousof Al-Hammadi
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi, Deepak Puthal, Chan Yeob Yeun:
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols. Ad Hoc Networks 163: 103579 (2024) - [j29]Kamal Taha, Paul D. Yoo, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun:
Learning a deep-feature clustering model for gait-based individual identification. Comput. Secur. 136: 103559 (2024) - [j28]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Ernesto Damiani, Deepak Puthal, Víctor Mateu, Mohamed Jamal Zemerly, Yousof Al-Hammadi, Chan Yeob Yeun:
Bio-Integrated Hybrid TESLA: A Fully Symmetric Lightweight Authentication Protocol. IEEE Internet Things J. 11(23): 37421-37436 (2024) - [i10]Maurizio Colombo, Rasool Asal, Ernesto Damiani, Lamees Mahmoud AlQassem, Al Anoud Almemari, Yousof Al-Hammadi:
A Quantization-based Technique for Privacy Preserving Distributed Learning. CoRR abs/2406.19418 (2024) - 2023
- [j27]Ahmad Musamih, Ibrar Yaqoob, Khaled Salah, Raja Jayaraman, Yousof Al-Hammadi, Mohammed A. Omar, Samer Ellahham:
Metaverse in Healthcare: Applications, Challenges, and Future Directions. IEEE Consumer Electron. Mag. 12(4): 33-46 (2023) - 2022
- [j26]Khouloud Eledlebi, Chan Yeob Yeun, Ernesto Damiani, Yousof Al-Hammadi:
Empirical Studies of TESLA Protocol: Properties, Implementations, and Replacement of Public Cryptography Using Biometric Authentication. IEEE Access 10: 21941-21954 (2022) - [j25]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi:
Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices. IEEE Access 10: 54912-54921 (2022) - [j24]Ibrar Yaqoob, Khaled Salah, Raja Jayaraman, Yousof Al-Hammadi:
Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Comput. Appl. 34(14): 11475-11490 (2022) - [j23]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi:
Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. Sensors 22(23): 9063 (2022) - [j22]Khouloud Eledlebi, Dymitr Ruta, Hanno Hildmann, Fabrice Saffre, Yousof Al-Hammadi, A. F. Isakovic:
Coverage and Energy Analysis of Mobile Sensor Nodes in Obstructed Noisy Indoor Environment: A Voronoi-Approach. IEEE Trans. Mob. Comput. 21(8): 2745-2760 (2022) - 2021
- [j21]Ahmad Musamih, Khaled Salah, Raja Jayaraman, Junaid Arshad, Mazin Debe, Yousof Al-Hammadi, Samer Ellahham:
A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain. IEEE Access 9: 9728-9743 (2021) - [j20]Ahmad Musamih, Raja Jayaraman, Khaled Salah, Haya R. Hasan, Ibrar Yaqoob, Yousof Al-Hammadi:
Blockchain-Based Solution for Distribution and Delivery of COVID-19 Vaccines. IEEE Access 9: 71372-71387 (2021) - [j19]Mohammad Moussa Madine, Khaled Salah, Raja Jayaraman, Yousof Al-Hammadi, Junaid Arshad, Ibrar Yaqoob:
appXchain: Application-Level Interoperability for Blockchain Networks. IEEE Access 9: 87777-87791 (2021) - [j18]Ahmad Musamih, Raja Jayaraman, Khaled Salah, Haya R. Hasan, Ibrar Yaqoob, Yousof Al-Hammadi:
Blockchain-Based Solution for the Administration of Controlled Medication. IEEE Access 9: 145397-145414 (2021) - [j17]Huda Abualola, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Matching game theoretical model for stable relay selection in a UAV-assisted internet of vehicles. Veh. Commun. 27: 100290 (2021) - 2020
- [j16]Mohammad Moussa Madine, Ammar Ayman Battah, Ibrar Yaqoob, Khaled Salah, Raja Jayaraman, Yousof Al-Hammadi, Sasa Pesic, Samer Ellahham:
Blockchain for Giving Patients Control Over Their Medical Records. IEEE Access 8: 193102-193115 (2020) - [j15]Mohammad Moussa Madine, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Yousof Al-Hammadi, Samer Ellahham, Prasad Calyam:
Fully Decentralized Multi-Party Consent Management for Secure Sharing of Patient Health Records. IEEE Access 8: 225777-225791 (2020) - [j14]Sanjeev Gurugopinath, Yousof Al-Hammadi, Paschalis C. Sofotasios, Sami Muhaidat, Octavia A. Dobre:
Non-Orthogonal Multiple Access with Wireless Caching for 5G-Enabled Vehicular Networks. IEEE Netw. 34(5): 127-133 (2020) - [i9]Sanjeev Gurugopinath, Sami Muhaidat, Yousof Al-Hammadi, Paschalis C. Sofotasios, Octavia A. Dobre:
Non-Orthogonal Multiple Access with Wireless Caching for 5G-Enabled Vehicular Networks. CoRR abs/2001.06959 (2020) - [i8]Khouloud Eledlebi, Dymitr Ruta, Hanno Hildmann, Fabrice Saffre, Yousof Al-Hammadi, Abdel F. Isakovic:
Coverage and Energy Analysis of Mobile Sensor Nodes in Obstructed Noisy Indoor Environment: A Voronoi Approach. CoRR abs/2009.04864 (2020)
2010 – 2019
- 2019
- [j13]Huda S. Goian, Omar Y. Al-Jarrah, Sami Muhaidat, Yousof Al-Hammadi, Paul D. Yoo, Mehrdad Dianati:
Popularity-Based Video Caching Techniques for Cache-Enabled Networks: A Survey. IEEE Access 7: 27699-27719 (2019) - [j12]Amira Al-Aamri, Kamal Taha, Yousof Al-Hammadi, Maher Maalouf, Dirar Homouz:
Analyzing a co-occurrence gene-interaction network to identify disease-gene association. BMC Bioinform. 20(1): 70:1-70:15 (2019) - [j11]Abdelrahman AlMahmoud, Ernesto Damiani, Hadi Otrok, Yousof Al-Hammadi:
Spamdoop: A Privacy-Preserving Big Data Platform for Collaborative Spam Detection. IEEE Trans. Big Data 5(3): 293-304 (2019) - [j10]Sanjeev Gurugopinath, Paschalis C. Sofotasios, Yousof Al-Hammadi, Sami Muhaidat:
Cache-Aided Non-Orthogonal Multiple Access for 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 68(9): 8359-8371 (2019) - [j9]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh, Yousof Al-Hammadi, Ernesto Damiani:
A Novel Protocol for Security of Location Based Services in Multi-agent Systems. Wirel. Pers. Commun. 108(3): 1841-1868 (2019) - [i7]Sanjeev Gurugopinath, Paschalis C. Sofotasios, Yousof Al-Hammadi, Sami Muhaidat:
Cache-Aided Non-Orthogonal Multiple Access for 5G-Enabled Vehicular Networks. CoRR abs/1906.06025 (2019) - 2018
- [j8]Sarah S. Bawazir, Paschalis C. Sofotasios, Sami Muhaidat, Yousof Al-Hammadi, George K. Karagiannidis:
Multiple Access for Visible Light Communications: Research Challenges and Future Trends. IEEE Access 6: 26167-26174 (2018) - [j7]Omar Y. Al-Jarrah, Yousof Al-Hammadi, Paul D. Yoo, Sami Muhaidat, Mahmoud Al-Qutayri:
Semi-supervised multi-layered clustering model for intrusion detection. Digit. Commun. Networks 4(4): 277-286 (2018) - [j6]Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Jiankun Hu:
A new adaptive trust and reputation model for Mobile Agent Systems. J. Netw. Comput. Appl. 124: 33-43 (2018) - [j5]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
A Stackelberg game for street-centric QoS-OLSR protocol in urban Vehicular Ad Hoc Networks. Veh. Commun. 13: 64-77 (2018) - [c25]Zainab Husain, Dymitr Ruta, Fabrice Saffre, Yousof Al-Hammadi, Abdel F. Isakovic:
Search in a Maze-Like Environment with Ant Algorithms: Complexity, Size and Energy Study. ANTS Conference 2018: 150-162 - [c24]Sohailah Alyammahi, Rachad Zaki, Hassan R. Barada, Yousof Al-Hammadi:
System dynamics modelling to attract students to STEM. EDUCON 2018: 1112-1119 - [c23]Zainab Husain, Dymitr Ruta, Fabrice Saffre, Yousof Al-Hammadi, A. F. Isakovic:
Inverted ant colony optimization for search and rescue in an unknown maze-like indoor environment. GECCO (Companion) 2018: 89-90 - [c22]Khouloud Eledlebi, Dymitr Ruta, Fabrice Saffre, Yousof Al-Hammadi, A. F. Isakovic:
Autonomous deployment of mobile sensors network in an unknown indoor environment with obstacles. GECCO (Companion) 2018: 280-281 - [c21]Tasneem Salah, Haya Hasan, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Jiankun Hu:
Secure Autonomous Mobile Agents for Web Services. GLOBECOM 2018: 1-6 - [c20]Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
IoT Applications: From Mobile Agents to Microservices Architecture. IIT 2018: 117-122 - [c19]Mansoor Alblooshi, Khaled Salah, Yousof Al-Hammadi:
Blockchain-based Ownership Management for Medical IoT (MIoT) Devices. IIT 2018: 151-156 - [c18]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
A Cluster-Based QoS-OLSR Protocol for Urban Vehicular Ad Hoc Networks. IWCMC 2018: 554-559 - [c17]Khouloud Eledlebi, Dymitr Ruta, Fabrice Saffre, Yousof Al-Hammadi, Abdel F. Isakovic:
Voronoi-Based Indoor Deployment of Mobile Sensors Network with Obstacles. FAS*W@SASO/ICAC 2018: 20-21 - 2017
- [j4]Omar Y. Al-Jarrah, Yousof Al-Hammadi, Paul D. Yoo, Sami Muhaidat:
Multi-Layered Clustering for Power Consumption Profiling in Smart Grids. IEEE Access 5: 18459-18468 (2017) - [j3]Doaa Al-Terri, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs. Comput. Commun. 104: 108-118 (2017) - [j2]Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Mahmoud Al-Qutayri, Yousof Al-Hammadi, Ernesto Damiani, Jiankun Hu:
BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications. Secur. Commun. Networks 2017: 3606424:1-3606424:18 (2017) - [c16]Khouloud Eledlebi, Dymitr Ruta, Fabrice Saffre, Yousof Al-Hammadi, A. F. Isakovic:
A Model for Self-deployment of Autonomous Mobile Sensor Network in an Unknown Indoor Environment. ADHOCNETS 2017: 208-215 - [c15]Tasneem Salah, Mohamed Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Performance comparison between container-based and VM-based services. ICIN 2017: 185-190 - [c14]Maha Kadadha, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
A street-centric QoS-OLSR Protocol for urban Vehicular Ad Hoc Networks. IWCMC 2017: 1477-1482 - [c13]Haya Hasan, Tasneem Salah, Dina Shehada, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
Secure lightweight ECC-based protocol for multi-agent IoT systems. WiMob 2017: 1-8 - 2016
- [c12]Jamal N. Al-Karaki, Saad Harous, Hassan Al-Muhairi, Yousof Al-Hammadi, Shadi Ayyoub, Ammar AlShabi, Hessa AlZaabi, Moza AlSalhi, Sendyya Salem, Amel AlAmiri:
Towards an innovative computer science & technology curriculum in UAE public schools system. EDUCON 2016: 883-891 - [c11]Sohailah Alyammahi, Rachad Zaki, Hassan R. Barada, Yousof Al-Hammadi:
Attracting students to STEM: Obstructors and facilitators. EDUCON 2016: 941-950 - [c10]Sohailah Alyammahi, Rachad Zaki, Hassan R. Barada, Yousof Al-Hammadi:
Overcoming the challenges in K-12 STEM education. EDUCON 2016: 951-960 - [c9]Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
The evolution of distributed systems towards microservices architecture. ICITST 2016: 318-325 - [i6]Sarah S. Bawazir, Paschalis C. Sofotasios, Sami Muhaidat, Yousof Al-Hammadi, George K. Karagiannidis:
Multiple Access for Visible Light Communications: Research Challenges and Future Trends. CoRR abs/1612.05894 (2016) - 2015
- [j1]Fatima Adly, Omar Alhussein, Paul D. Yoo, Yousof Al-Hammadi, Kamal Taha, Sami Muhaidat, Young-Seon Jeong, Uihyoung Lee, Mohammed Ismail:
Simplified Subspaced Regression Network for Identification of Defect Patterns in Semiconductor Wafer Maps. IEEE Trans. Ind. Informatics 11(6): 1267-1276 (2015) - [c8]Doaa Al-Terri, Hadi Otrok, Hassan R. Barada, Mahmoud Al-Qutayri, Raed M. Shubair, Yousof Al-Hammadi:
QoS-OLSR protocol based on intelligent water drop for Vehicular ad-hoc networks. IWCMC 2015: 1352-1357 - 2014
- [c7]Fatima Adly, Paul D. Yoo, Sami Muhaidat, Yousof Al-Hammadi:
Machine-Learning-Based Identification of Defect Patterns in Semiconductor Wafer Maps: An Overview and Proposal. IPDPS Workshops 2014: 420-429 - 2013
- [c6]Noura Al Ebri, Hadi Otrok, Azzam Mourad, Yousof Al-Hammadi:
Botnet detection: A cooperative game theoretical correlation-based model. ICCIT 2013: 28-32 - 2012
- [c5]Sohailah Makhmasi, Rachad Zaki, Hassan R. Barada, Yousof Al-Hammadi:
Students' interest in STEM education. EDUCON 2012: 1-3 - [c4]Sohailah Makhmasi, Rachad Zaki, Hassan R. Barada, Yousof Al-Hammadi:
Factors influencing STEM teachers' effectiveness in the UAE. FIE 2012: 1-6 - 2010
- [b1]Yousof Al-Hammadi:
Behavioural correlation for malicious bot detection. University of Nottingham, UK, 2010 - [i5]Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
DCA for Bot Detection. CoRR abs/1001.2195 (2010) - [i4]Yousof Al-Hammadi, Uwe Aickelin:
Detecting Botnets Through Log Correlation. CoRR abs/1001.2665 (2010) - [i3]Yousof Al-Hammadi, Uwe Aickelin:
Detecting Bots Based on Keylogging Activities. CoRR abs/1002.1200 (2010) - [i2]Yousof Al-Hammadi, Uwe Aickelin:
Behavioural Correlation for Detecting P2P Bots. CoRR abs/1004.2860 (2010) - [i1]Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
Performance Evaluation of DCA and SRC on a Single Bot Detection. CoRR abs/1004.3919 (2010)
2000 – 2009
- 2008
- [c3]Yousof Al-Hammadi, Uwe Aickelin:
Detecting Bots Based on Keylogging Activities. ARES 2008: 896-902 - [c2]Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith:
DCA for bot detection. IEEE Congress on Evolutionary Computation 2008: 1807-1816 - 2005
- [c1]Yousof Al-Hammadi, Christopher Leckie:
Anomaly detection for Internet worms. Integrated Network Management 2005: 133-146
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint