Michael Kühr, Mohammad Hamad, Pedram MohajerAnsari, Mert D. Pesé, Sebastian Steinhorst.
SoK: Security of the Image Processing Pipeline for Camera-based Sensing in Autonomous Vehicles.
ACM Asia Conference on Computer and Communications Security (ASIA CCS '26)
, 2026.
@inproceedings{kmmps:2026,
author = {Michael K\"uhr and \textbf{Mohammad Hamad} and Pedram MohajerAnsari and Mert D. Pesé and Sebastian Steinhorst},
title = {SoK: Security of the Image Processing Pipeline for Camera-based Sensing in Autonomous Vehicles},
booktitle = {ACM Asia Conference on Computer and Communications Security (ASIA CCS '26)},
year = {2026},
doi = {10.1145/3779208.3785267},
}
Marco Calipari, Fabian Maximilian Schmidt, Mohammad Hamad, Sebastian Steinhorst.
CIAK-CP: Camera feed Injection Attack in Collaborative Perception.
The 41st ACM/SIGAPP Symposium On Applied Computing (SAC2026)
, 2026.
@inproceedings{cshs:2026,
author = {\underline{Marco Calipari} and Fabian Maximilian Schmidt and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {{CIAK-CP}: Camera feed Injection Attack in Collaborative Perception},
booktitle = {The 41st ACM/SIGAPP Symposium On Applied Computing (SAC2026)},
year = {2026},
doi = {10.1145/3748522.3779847},
}
Lukas Eugster, Friedrich Wiemer, Mert D. Pesé, Mohammad Hamad, Sebastian Steinhorst.
Secure Automotive Ethernet: Implementing and Benchmarking MACsec, IPsec, and TLS.
2026 IEEE 103rd Vehicular Technology Conference (VTC2026-Spring)
, 2026.
🏷️Conference
Cite
@inproceedings{eugster2026secure,
author = {Lukas Eugster and Friedrich Wiemer and Mert D. Pesé and Mohammad Hamad and Sebastian Steinhorst},
title = {Secure Automotive Ethernet: Implementing and Benchmarking MACsec, IPsec, and TLS},
booktitle = {2026 IEEE 103rd Vehicular Technology Conference (VTC2026-Spring)},
year = {2026},
}
Pedram MohajerAnsari, Amir Salarpour, Michael Kühr, Siyu Huang, Mohammad Hamad, Sebastian Steinhorst, Habeeb Olufowobi, Mert D. Pesé.
On the Natural Robustness of Vision-Language Models Against Visual Perception Attacks in Autonomous Driving.
The IEEE Intelligent Vehicles Symposium (IV 2026)
, 2026.
🏷️Conference
Cite
@inproceedings{mohajeransari2025naturalrobustnessvisionlanguagemodels,
author = {Pedram MohajerAnsari and Amir Salarpour and Michael K{\"u}hr and Siyu Huang and \textbf{Mohammad Hamad} and Sebastian Steinhorst and Habeeb Olufowobi and Mert D. Pesé},
title = {On the Natural Robustness of Vision-Language Models Against Visual Perception Attacks in Autonomous Driving},
booktitle = {The IEEE Intelligent Vehicles Symposium (IV 2026)},
year = {2026},
}
Mohammad Hamad, Hammadeh, ZAIN A. H., Alessi, Davide, Hasan, Monowar, Pesé, Mert, Lüdtke, Daniel, Steinhorst, Sebastian.
Enhancing Security Through Task Migration in Software-Defined Vehicles.
IEEE Internet of Things Journal
, 2025.
@article{iotj2025,
author = {\textbf{Hamad, Mohammad} and Hammadeh, ZAIN A. H. and Alessi, Davide and Hasan, Monowar and
Pesé, Mert and L{\"u}dtke, Daniel and Steinhorst, Sebastian},
title = {Enhancing Security Through Task Migration in Software-Defined Vehicles},
journal = {IEEE Internet of Things Journal},
year = {2025},
doi = {10.1109/JIOT.2025.3611875},
publisher = {IEEE},
}
@article{10.1145/3728363,
author = {\underline{Finkenzeller, Andreas} and Fucks, Arne and Regnath, Emanuel and \textbf{Hamad, Mohammad} and Steinhorst, Sebastian},
title = {Securing the Precision Time Protocol with SDN-enabled Cyclic Path Asymmetry Analysis},
journal = {ACM Trans. Cyber-Phys. Syst.},
year = {2025},
doi = {10.1145/3728363},
url = {https://doi.org/10.1145/3728363},
publisher = {Association for Computing Machinery},
}
@article{10.1145/3728364,
author = {Hammadeh, ZAIN A. H. and Hasan, Monowar and \textbf{Hamad, Mohammad}},
title = {RESCUE: A Reconfigurable Scheduling Framework for Securing Multi-Core Real-Time Systems},
journal = {ACM Trans. Cyber-Phys. Syst.},
year = {2025},
doi = {10.1145/3728364},
url = {https://doi.org/10.1145/3728364},
publisher = {Association for Computing Machinery},
}
Andreas Finkenzeller, Andrew Roberts, Mauro Bellone, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst.
Sensor Fusion Desynchronization Attacks.
Proceedings of the 37th Euromicro Conference on Real-Time Systems (ECRTS 2025)
, 2025.
🏷️Conference
Cite
@inproceedings{ECRTS2025,
author = {\underline{Andreas Finkenzeller} and Andrew Roberts and Mauro Bellone and Olaf Maennel and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Sensor Fusion Desynchronization Attacks},
booktitle = {Proceedings of the 37th Euromicro Conference on Real-Time Systems (\textbf{ECRTS 2025})},
year = {2025},
}
Juul, Johan Mattias, James Roberts, Andrew, Mohammad Hamad, Venables, Adrian, Ottis, Rain.
Applying Machine Learning for Electronic Warfare Activity Detection at a National Scale.
MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)
, 2025.
@INPROCEEDINGS{11309949,
author = {Juul, Johan Mattias and James Roberts, Andrew and \textbf{Mohammad Hamad} and Venables, Adrian and Ottis, Rain},
title = {Applying Machine Learning for Electronic Warfare Activity Detection at a National Scale},
booktitle = {MILCOM 2025 - 2025 IEEE Military Communications Conference (MILCOM)},
year = {2025},
pages = {1-6},
doi = {10.1109/MILCOM64451.2025.11309949},
}
Michael Kühr, Maximilian Mittmann, Mohammad Hamad, Sebastian Steinhorst.
CATI - An Open-Source Framework to Evaluate Attacks on Cameras for Autonomous Vehicles.
28th Euromicro Conference Series on Digital System Design (DSD) 2025
, 2025.
@inproceedings{kmhs:2025,
author = {\underline{Michael K{\"u}hr} and Maximilian Mittmann and Mohammad Hamad and Sebastian Steinhorst},
title = {CATI - An Open-Source Framework to Evaluate Attacks on Cameras for Autonomous Vehicles},
booktitle = {28th Euromicro Conference Series on Digital System Design (DSD) 2025},
year = {2025},
doi = {10.1109/DSD67783.2025.00078},
}
Pesé, Mert D., Gozubuyuk, Bulut, Andrechek, Eric, Olufowobi, Habeeb, Mohammad Hamad, Shin, Kang G..
MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers.
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
, 2025.
@INPROCEEDINGS{11068822,
author = {Pesé, Mert D. and Gozubuyuk, Bulut and Andrechek, Eric and Olufowobi, Habeeb and \textbf{Hamad, Mohammad} and Shin, Kang G.},
title = {MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers},
booktitle = {2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (\textbf{DSN})},
year = {2025},
pages = {443-456},
doi = {10.1109/DSN64029.2025.00050},
}
Mohammad Hamad, Christian Prehofer, Mikael Asplund, Tobias Loehr, Lucas Bublitz, Alexander Zeh, Mridula Singh, Sebastian Steinhorst.
Cybersecurity Challenges of Autonomous Systems.
Design, Automation and Test in Europe Conference (DATE 2025)
, 2025.
🏷️Conference🟩CORE: A
Cite
@inproceedings{hpalbzss:2025,
author = {\textbf{Mohammad Hamad} and Christian Prehofer and Mikael Asplund and Tobias Loehr and Lucas Bublitz and Alexander Zeh and Mridula Singh and Sebastian Steinhorst},
title = {Cybersecurity Challenges of Autonomous Systems},
booktitle = {Design, Automation and Test in Europe Conference (\textbf{DATE 2025)}},
year = {2025},
pages = {10},
}
Andrew Roberts, Jingyue Cheng, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst.
ADSecLang: A Domain-Specific Language for Cybersecurity Testing of Autonomous Vehicles.
The 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)
, 2025.
🏷️Conference
Cite
@inproceedings{ffrhs:2025,
author = {\underline{Andrew Roberts} and Jingyue Cheng and Olaf Maennel and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {ADSecLang: A Domain-Specific Language for Cybersecurity Testing of Autonomous Vehicles},
booktitle = {The 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)},
year = {2025},
}
Zain A. H. Hammadeh, Mohammad Hamad, Andrzej Olchawa, Milenko Starcik, Ricardo Fradique, Stefan Langhammer, Manuel Hoffmann, Florian Goehler, Daniel Luedtke, Michael Felderer, Sebastian Steinhorst.
Designing Secure Space Systems.
Design, Automation and Test in Europe Conference (DATE 2025)
, 2025.
🏷️Conference🟩CORE: A
Cite
@inproceedings{hhosflhgls:2025,
author = {Zain A. H. Hammadeh and \textbf{Mohammad Hamad} and Andrzej Olchawa and Milenko Starcik and Ricardo Fradique and Stefan Langhammer and Manuel Hoffmann and Florian Goehler and Daniel Luedtke and Michael Felderer and Sebastian Steinhorst},
title = {Designing Secure Space Systems},
booktitle = {Design, Automation and Test in Europe Conference (DATE 2025)},
year = {2025},
pages = {7},
}
Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Raivo Sell, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst.
Analysis of Autonomous Driving Software to Low-Level Sensor Cyber Attacks.
20th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2025)
, 2025.
🏷️Conference🟩CORE: A
Cite
@inproceedings{rmbsmhs:2025,
author = {\underline{Andrew Roberts} and Mohsen Malayjerdi and Mauro Bellone and Raivo Sell and Olaf Maennel and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Analysis of Autonomous Driving Software to Low-Level Sensor Cyber Attacks},
booktitle = {20th International Conference on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2025)},
year = {2025},
pages = {7},
}
Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Raivo Sell, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst.
ADSecData Platform: An Open-Source Data Platform for Autonomous Driving Cybersecurity.
The 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)
, 2025.
🏷️Conference
Cite
@inproceedings{rmbrmhs:2025,
author = {\underline{Andrew Roberts} and Mohsen Malayjerdi and Mauro Bellone and Raivo Sell and Olaf Maennel and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {ADSecData Platform: An Open-Source Data Platform for Autonomous Driving Cybersecurity},
booktitle = {The 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring)},
year = {2025},
}
Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst.
REACT: Autonomous intrusion response system for intelligent vehicles.
Computers & Security
, 2024.
@article{COSE:2024,
author = {\textbf{Mohammad Hamad} and Andreas Finkenzeller and Michael Kühr and Andrew Roberts and Olaf Maennel and Vassilis Prevelakis and Sebastian Steinhorst},
title = {REACT: Autonomous intrusion response system for intelligent vehicles},
journal = {Computers \& Security},
year = {2024},
volume = {145},
doi = {https://doi.org/10.1016/j.cose.2024.104008},
url = {https://www.sciencedirect.com/science/article/pii/S0167404824003134},
}
Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst.
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis.
IEEE International Conference on Computer Communications (IEEE INFOCOM 2024)
, 2024.
🏷️Conference🟩CORE: A*
Cite
@inproceedings{INFOCOM:2023,
author = {\underline{Andreas Finkenzeller} and Oliver Butowski and Emanuel Regnath and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis},
booktitle = {IEEE International Conference on Computer Communications (\textbf{IEEE INFOCOM 2024)}},
year = {2024},
}
Mohammad Hamad, Andreas Finkenzeller, Monowar Hasan, Marc-Oliver Pahl, Sebastian Steinhorst.
A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights.
The 29th Nordic Conference on Secure IT systems (NordSec)
, 2024.
🏷️Conference
Cite
@inproceedings{Nordsec2024,
author = {\textbf{Mohammad Hamad} and Andreas Finkenzeller and Monowar Hasan and Marc-Oliver Pahl and Sebastian Steinhorst},
title = {A Gamified Learning Approach for IoT Security Education using Capture-the-Flag Competitions: Architecture and Insights},
booktitle = {The 29th Nordic Conference on Secure IT systems (NordSec)},
year = {2024},
}
Sherin Kalli Valappil, Lars Vogela, Mohammad Hamad, Sebastian Steinhorst.
Advanced IDPS Architecture for Connected and Autonomous Vehicles.
Proceedings of the 35th IEEE Intelligent Vehicles Symposium (IEEE IV 2024)
, 2024.
🏷️Conference
Cite
@inproceedings{IV:2024,
author = {\underline{Sherin Kalli Valappil} and Lars Vogela and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Advanced IDPS Architecture for Connected and Autonomous Vehicles},
booktitle = {Proceedings of the 35th IEEE Intelligent Vehicles Symposium (IEEE IV 2024)},
year = {2024},
}
Zain A.H. Hammadehand, Monowar Hasan, Mohammad Hamad.
Securing Real-Time Systems using Schedule Reconfiguration.
International Symposium on Real Time Distributed Computing (ISORC 2024)
, 2024.
🏷️Conference
Cite
@inproceedings{ISORC:2024,
author = {Zain A.H. Hammadehand and Monowar Hasan and \textbf{Mohammad Hamad}},
title = {Securing Real-Time Systems using Schedule Reconfiguration},
booktitle = {International Symposium on Real Time Distributed Computing (ISORC 2024)},
year = {2024},
}
Andrew Roberts, Heidari Iman, Mohammad Reza, Bellone, Mauro, Ghasempouri, Tara, Maennel, Olaf, Raik, Jaan, Mohammad Hamad, Steinhorst, Sebastian.
ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms.
Design, Automation, and Test in Europe ( DATE 2024)
, 2024.
🏷️Conference🟩CORE: A
Cite
@inproceedings{ADAssure2024,
author = {\underline{Andrew Roberts} and Heidari Iman, Mohammad Reza and Bellone, Mauro and Ghasempouri, Tara and Maennel, Olaf and Raik, Jaan and \textbf{Mohammad Hamad} and Steinhorst, Sebastian},
title = {ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms},
booktitle = {Design, Automation, and Test in Europe (\textbf {DATE 2024)}},
year = {2024},
}
Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst.
Enhancing Security in Fiat-Shamir Transformation-based Non-Interactive Zero-Knowledge Protocols for IoT Authentication.
International Journal of Information Security
, 2023.
@article{IJIS:2023,
author = {\underline{Firas Hamila} and \textbf{Mohammad Hamad} and Daniel Costa Salgado and Sebastian Steinhorst},
title = {Enhancing Security in Fiat-Shamir Transformation-based Non-Interactive Zero-Knowledge Protocols for IoT Authentication},
journal = {International Journal of Information Security},
year = {2023},
doi = {https://doi.org/10.1007/s10207-023-00779-8},
url = {https://link.springer.com/article/10.1007/s10207-023-00779-8},
}
Mohammad Hamad, Sebastian Steinhorst.
Security Challenges in Autonomous Systems Design.
International Conference on Computational Technologies and Electronics (ICCTE-2023)
, 2023.
@inproceedings{ICCTE:2023,
author = {\textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Security Challenges in Autonomous Systems Design},
booktitle = {International Conference on Computational Technologies and Electronics (ICCTE-2023)},
year = {2023},
doi = {https://doi.org/10.1007/978-3-031-81981-0_13},
}
Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis.
Creating a Security Enforcement Environment for a Vehicular Platform.
IEEE Conference on Standards for Communications and Networking (CSCN 23)
, 2023.
🏷️Conference
Cite
@inproceedings{CSCN:2023,
author = {Marinos Tsantekidis and \underline{Souleima Abdelghani} and \textbf{Mohammad Hamad} and Vassilis Prevelakis},
title = {Creating a Security Enforcement Environment for a Vehicular Platform},
booktitle = {IEEE Conference on Standards for Communications and Networking (CSCN 23)},
year = {2023},
}
Borna Blazevic, Michael Peter, Mohammad Hamad, Sebastian Steinhorst.
TEEVseL4: Trusted Execution Environment for Virtualized seL4-based Systems.
The 29th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’23)
, 2023.
🏷️Conference
Cite
@inproceedings{RTCSA:2023,
author = {\underline{Borna Blazevic} and Michael Peter and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {TEEVseL4: Trusted Execution Environment for Virtualized seL4-based Systems},
booktitle = {The 29th IEEE International Conference on Embedded and
Real-Time Computing Systems and Applications (RTCSA’23)},
year = {2023},
}
Andreas Finkenzeller, Anshu Mathur, Jan Lauinger, Mohammad Hamad, Sebastian Steinhorst.
Simutack - An Attack Simulation Framework for Connected and Autonomous Vehicles.
The 2023 IEEE 97th Vehicular Technology Conference: VTC2023-Spring
, 2023.
🏷️Conference
Cite
@inproceedings{vtc:2023,
author = {\underline{Andreas Finkenzeller} and Anshu Mathur and Jan Lauinger and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Simutack - An Attack Simulation Framework for Connected and Autonomous Vehicles},
booktitle = {The 2023 IEEE 97th Vehicular Technology Conference: VTC2023-Spring},
year = {2023},
}
Mohammad Hamad, Andreas Finkenzeller, Hangmao Liu, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst.
SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation.
IEEE Internet of Things Journal
, 2022.
@article{mhhiotj,
author = {\textbf{Mohammad Hamad} and Andreas Finkenzeller and Hangmao Liu and Jan Lauinger and Vassilis Prevelakis and Sebastian Steinhorst},
title = {SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation},
journal = {IEEE Internet of Things Journal},
year = {2022},
pages = {1-1},
doi = {10.1109/JIOT.2022.3221857},
}
Jan Lauinger, Mohammad Hamad, Sebastian Steinhorst.
Toward a Multi-Layer Intrusion Response System for Connected Vehicles.
The 2022 IEEE 96th Vehicular Technology Conference: VTC2022-Fall
, 2022.
@inproceedings{vtc:2022,
author = {\underline{Jan Lauinger} and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Toward a Multi-Layer Intrusion Response System for Connected Vehicles},
booktitle = {The 2022 IEEE 96th Vehicular Technology Conference: VTC2022-Fall},
year = {2022},
doi = {10.1109/VTC2022-Fall57202.2022.10012711},
}
Finkenzeller, Andreas, Wakim, Thomas, Mohammad Hamad, Steinhorst, Sebastian.
Feasible Time Delay Attacks Against the Precision Time Protocol.
IEEE Global Communications Conference (GLOBECOM 2022)
, 2022.
@INPROCEEDINGS{globecom2,
author = {\underline{Finkenzeller, Andreas} and Wakim, Thomas and \textbf{Hamad, Mohammad} and Steinhorst, Sebastian},
title = {Feasible Time Delay Attacks Against the Precision Time Protocol},
booktitle = {IEEE Global Communications Conference (\textbf{GLOBECOM 2022})},
year = {2022},
pages = {3375-3380},
doi = {10.1109/GLOBECOM48099.2022.10001666},
}
Wenxuan Ye, Xueli An, Xueqiang Yan, Mohammad Hamad, Sebastian Steinhorst.
FLaaS6G: Federated Learning as a Service in 6G Using Distributed Data Management Architecture.
IEEE Global Communications Conference (GLOBECOM 2022)
, 2022.
@inproceedings{globecom1,
author = {\underline{Wenxuan Ye} and Xueli An and Xueqiang Yan and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {FLaaS6G: Federated Learning as a Service in 6G Using Distributed Data Management Architecture},
booktitle = {IEEE Global Communications Conference (\textbf{GLOBECOM 2022})},
year = {2022},
pages = {1247-1252},
doi = {10.1109/GLOBECOM48099.2022.10001307},
}
Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad, Sebastian Steinhorst.
Attack Data Generation Framework for Autonomous Vehicle Sensors.
Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2022)
, 2022.
🏷️Conference🟩CORE: A
Cite
@inproceedings{lflms2022,
author = {\underline{Jan Lauinger} and Andreas Finkenzeller and Henrik Lautebach and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {Attack Data Generation Framework for Autonomous Vehicle Sensors},
booktitle = {Proceedings of the Conference on Design, Automation and Test in Europe (\textbf{DATE 2022})},
year = {2022},
pages = {4},
}
Schönberger, Lea, Mohammad Hamad, Gomez, Javier Velasquez, Steinhorst, Sebastian, Saidi, Selma.
Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol.
IEEE Access
, 2021.
@article{mohammadIEEaccess,
author = {Schönberger, Lea and \textbf{Hamad}, \textbf{Mohammad} and Gomez, Javier Velasquez and Steinhorst, Sebastian and Saidi, Selma},
title = {Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol},
journal = {IEEE Access},
year = {2021},
volume = {9},
pages = {157398-157410},
doi = {10.1109/ACCESS.2021.3127852},
}
Mohammad Hamad, Emanuel Regnath, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst.
SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication.
Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2021)
, 2021.
🏷️Conference🟩CORE: A
Cite
@inproceedings{hamad2021,
author = {\textbf{Mohammad Hamad} and Emanuel Regnath and Jan Lauinger and Vassilis Prevelakis and Sebastian Steinhorst},
title = {SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication},
booktitle = {Proceedings of the Conference on Design, Automation and Test in Europe (\textbf{DATE 2021})},
year = {2021},
}
Jan Lauinger, Jens Ernstberger, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst.
A-poa: Anonymous proof of authorization for decentralized identity management.
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
, 2021.
🏷️Conference
Cite
@inproceedings{lauinger2021poa,
author = {\underline{Jan Lauinger} and Jens Ernstberger and Emanuel Regnath and \textbf{Mohammad Hamad} and Sebastian Steinhorst},
title = {A-poa: Anonymous proof of authorization for decentralized identity management},
booktitle = {2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)},
year = {2021},
pages = {1--9},
organization = {IEEE},
}
@article{hamad2020savta,
author = {\textbf{Hamad, Mohammad} and Prevelakis, Vassilis},
title = {SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study},
journal = {Information},
year = {2020},
volume = {11},
number = {5},
doi = {10.3390/info11050273},
}
@article{hamad2020iov,
author = {\textbf{Mohammad Hamad} and Zain A. H. Hammadeh and Selma Saidi and Vassilis Prevelakis},
title = {Temporal-based intrusion detection for IoV},
journal = {it - Information Technology},
year = {2020},
volume = {62},
number = {5-6},
pages = {227--239},
doi = {doi:10.1515/itit-2020-0009},
}
Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis.
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System.
the 5th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS)
, 2019.
🏷️Conference
Cite
@inproceedings{hamad2019redzone,
author = {\textbf{Mohammad Hamad} and Marinos Tsantekidis and Vassilis Prevelakis},
title = {{Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System}},
booktitle = {the 5th International Conference on Vehicle Technology and Intelligent Transport Systems {(VEHITS)}},
year = {2019},
}
@inbook{book2,
author = {\textbf{Mohammad Hamad} and Tsantekidis Marinos and Vassilis Prevelakis},
title = {{Smart Cities, Green Technologies, and Intelligent Transport Systems}},
year = {2019},
doi = {10.1007/978-3-030-68028-2_15},
publisher = {Springer},
}
Tsantekidis Marinos, Mohammad Hamad, Vassilis Prevelakis, Agha R Mustafa.
Heterogeneous Computing Architectures Challenges and Vision.
Taylor and Francis Ltd
, 2019.
@inbook{book1,
author = {Tsantekidis Marinos and \textbf{Mohammad Hamad} and Vassilis Prevelakis and Agha R Mustafa},
title = {{Heterogeneous Computing Architectures Challenges and Vision}},
year = {2019},
doi = {10.1201/9780429399602},
publisher = {Taylor and Francis Ltd},
}
Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst.
Prediction of Abnormal Temporal Behavior in Real-Time Systems.
The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC 2018)
, 2018.
🏷️Conference
Cite
@inproceedings{hamad2018prediction,
author = {\textbf{Mohammad Hamad} and Zain A. H. Hammadeh and Selma Saidi and Vassilis Prevelakis and Rolf Ernst},
title = {{Prediction of Abnormal Temporal Behavior in Real-Time Systems}},
booktitle = {The 33rd ACM/SIGAPP Symposium On Applied Computing (\textbf{SAC 2018})},
year = {2018},
}
Siddiqi, Muhammad Ali, Seepers, Robert M, Mohammad Hamad, Prevelakis, Vassilis, Strydis, Christos.
Attack-tree-based Threat Modeling of Medical Implants..
The7th International Workshop on Security Proofs for Embedded Systems (PROOFS 2018)
, 2018.
🏷️Conference
Cite
@inproceedings{siddiqi2018attack,
author = {Siddiqi, Muhammad Ali and Seepers, Robert M and \textbf{Mohammad Hamad} and Prevelakis, Vassilis and Strydis, Christos},
title = {Attack-tree-based Threat Modeling of Medical Implants.},
booktitle = {The7th International Workshop on Security Proofs for Embedded Systems (PROOFS 2018)},
year = {2018},
}
Mohammad Hamad, Nolte,Marcus, Prevelakis, Vassilis.
A Framework for Policy Based Secure Intra Vehicle Communication.
2017 IEEE Vehicular Networking Conference (VNC)
, 2017.
🏷️Conference
Cite
@inproceedings{hamad2017framework,
author = {\textbf{Hamad}, \textbf{Mohammad} and Nolte,Marcus and Prevelakis, Vassilis},
title = {{A Framework for Policy Based Secure Intra Vehicle Communication}},
booktitle = {2017 IEEE Vehicular Networking Conference (VNC)},
year = {2017},
}
Mohammad Hamad, Prevelakis, Vassilis.
Secure APIs for Applications in Microkernel-based Systems..
In 2017 International Conference on Information Systems Security and Privacy (ICISSP)
, 2017.
🏷️Conference
Cite
@inproceedings{hamad2017secure,
author = {\textbf{Hamad}, \textbf{Mohammad} and Prevelakis, Vassilis},
title = {Secure APIs for Applications in Microkernel-based Systems.},
booktitle = {In 2017 International Conference on Information Systems Security and Privacy (ICISSP)},
year = {2017},
}
Mohammad Hamad, Schlatow, Johannes, Prevelakis, Vassilis, Ernst, Rolf.
A Communication Framework for Distributed Access Control in Microkernel-based Systems.
12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT16)
, 2016.
🏷️Conference
Cite
@inproceedings{hamad2016communication,
author = {\textbf{Hamad}, \textbf{Mohammad} and Schlatow, Johannes and Prevelakis, Vassilis and Ernst, Rolf},
title = {{A Communication Framework for Distributed Access Control in Microkernel-based Systems}},
booktitle = {12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time Applications (OSPERT16)},
year = {2016},
pages = {11--16},
}
Mohammad Hamad, Nolte,Marcus, Prevelakis, Vassilis.
Towards Comprehensive Threat Modeling for Vehicles.
the 1st Workshop on Security and Dependability of Critical Embedded Real-Time Systems
, 2016.
🏷️Conference
Cite
@inproceedings{hamad2016towards,
author = {\textbf{Hamad}, \textbf{Mohammad} and Nolte,Marcus and Prevelakis, Vassilis},
title = {{Towards Comprehensive Threat Modeling for Vehicles}},
booktitle = {the 1st Workshop on Security and Dependability of Critical Embedded Real-Time Systems},
year = {2016},
pages = {31},
}
Prevelakis, Vassilis, Mohammad Hamad.
Extending the operational envelope of applications.
8th International Conference on Trust and Trustworthy Computing (TRUST 2015)
, 2015.
🏷️Conference
Cite
@inproceedings{prevelakis2015extending,
author = {Prevelakis, Vassilis and \textbf{Hamad}, \textbf{Mohammad}},
title = {Extending the operational envelope of applications},
booktitle = {8th International Conference on Trust and Trustworthy Computing (TRUST 2015)},
year = {2015},
}
Prevelakis, Vassilis, Mohammad Hamad.
A policy-based communications architecture for vehicles.
2015 International Conference on Information Systems Security and Privacy (ICISSP)
, 2015.
🏷️Conference
Cite
@inproceedings{prevelakis2015policy,
author = {Prevelakis, Vassilis and \textbf{Hamad}, \textbf{Mohammad}},
title = {A policy-based communications architecture for vehicles},
booktitle = {2015 International Conference on Information Systems Security and Privacy (ICISSP)},
year = {2015},
pages = {155--162},
organization = {IEEE},
}
Mohammad Hamad, Prevelakis, Vassilis.
Implementation and performance evaluation of embedded ipsec in microkernel os.
2015 World Symposium on Computer Networks and Information Security (WSCNIS)
, 2015.
🏷️Conference
Cite
@inproceedings{hamad2015implementation,
author = {\textbf{Hamad}, \textbf{ Mohammad} and Prevelakis, Vassilis},
title = {Implementation and performance evaluation of embedded ipsec in microkernel os},
booktitle = {2015 World Symposium on Computer Networks and Information Security (WSCNIS)},
year = {2015},
pages = {1--7},
organization = {IEEE},
}