default search action
Mohammad Hamad
Person information
- affiliation: Technical University of Munich (TUM), Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst:
REACT: Autonomous intrusion response system for intelligent vehicles. Comput. Secur. 145: 104008 (2024) - [j5]Firas Hamila, Mohammad Hamad, Daniel Costa Salgado, Sebastian Steinhorst:
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. Int. J. Inf. Sec. 23(2): 1131-1148 (2024) - [c21]Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms. DATE 2024: 1-6 - [c20]Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst:
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. INFOCOM 2024: 461-470 - [c19]Zain Alabedin Haj Hammadeh, Monowar Hasan, Mohammad Hamad:
Securing Real-Time Systems using Schedule Reconfiguration. ISORC 2024: 1-10 - [c18]Sherin Kalli Valappil, Lars Vogel, Mohammad Hamad, Sebastian Steinhorst:
Advanced IDPS Architecture for Connected and Autonomous Vehicles. IV 2024: 1779-1785 - [i6]Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst:
REACT: Autonomous Intrusion Response System for Intelligent Vehicles. CoRR abs/2401.04792 (2024) - [i5]Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst:
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. CoRR abs/2401.10664 (2024) - [i4]Michael Kühr, Mohammad Hamad, Pedram MohajerAnsari, Mert D. Pesé, Sebastian Steinhorst:
SoK: Security of the Image Processing Pipeline in Autonomous Vehicles. CoRR abs/2409.01234 (2024) - [i3]Pedram MohajerAnsari, Alkim Domeke, Jan de Voor, Arkajyoti Mitra, Grace Johnson, Amir Salarpour, Habeeb Olufowobi, Mohammad Hamad, Mert D. Pesé:
Discovering New Shadow Patterns for Black-Box Attacks on Lane Detection of Autonomous Vehicles. CoRR abs/2409.18248 (2024) - 2023
- [j4]Mohammad Hamad, Andreas Finkenzeller, Hangmao Liu, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst:
SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation. IEEE Internet Things J. 10(4): 3384-3406 (2023) - [c17]Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis:
Creating a Security Enforcement Environment for a Vehicular Platform. CSCN 2023: 278-283 - [c16]Borna Blazevic, Michael Peter, Mohammad Hamad, Sebastian Steinhorst:
TEEVseL4: Trusted Execution Environment for Virtualized seL4-Based Systems. RTCSA 2023: 67-76 - [c15]Andreas Finkenzeller, Anshu Mathur, Jan Lauinger, Mohammad Hamad, Sebastian Steinhorst:
Simutack - An Attack Simulation Framework for Connected and Autonomous Vehicles. VTC2023-Spring 2023: 1-7 - [i2]Mohammad Hamad, Sebastian Steinhorst:
Security Challenges in Autonomous Systems Design. CoRR abs/2312.00018 (2023) - 2022
- [c14]Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad, Sebastian Steinhorst:
Attack Data Generation Framework for Autonomous Vehicle Sensors. DATE 2022: 128-131 - [c13]Wenxuan Ye, Xueli An, Xueqiang Yan, Mohammad Hamad, Sebastian Steinhorst:
FLaaS6G: Federated Learning as a Service in 6G Using Distributed Data Management Architecture. GLOBECOM 2022: 1247-1252 - [c12]Andreas Finkenzeller, Thomas Wakim, Mohammad Hamad, Sebastian Steinhorst:
Feasible Time Delay Attacks Against the Precision Time Protocol. GLOBECOM 2022: 3375-3380 - [c11]Jan Lauinger, Mohammad Hamad, Sebastian Steinhorst:
Toward a Multi-Layer Intrusion Response System for Connected Vehicles. VTC Fall 2022: 1-2 - 2021
- [j3]Lea Schönberger, Mohammad Hamad, Javier Velasquez Gomez, Sebastian Steinhorst, Selma Saidi:
Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol. IEEE Access 9: 157398-157410 (2021) - [c10]Mohammad Hamad, Emanuel Regnath, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst:
SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication. DATE 2021: 529-534 - [c9]Jan Lauinger, Jens Ernstberger, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst:
A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management. IEEE ICBC 2021: 1-9 - [i1]Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst:
Quantitative System-Level Security Verification of the IoV Infrastructure. CoRR abs/2101.06137 (2021) - 2020
- [b1]Mohammad Hamad:
A Multilayer Secure Framework for Vehicular Systems (Ein mehrschichtiges sicheres Framework für Fahrzeugsysteme). Braunschweig University of Technology, Germany, 2020 - [j2]Mohammad Hamad, Vassilis Prevelakis:
SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study. Inf. 11(5): 273 (2020) - [j1]Mohammad Hamad, Zain Alabedin Haj Hammadeh, Selma Saidi, Vassilis Prevelakis:
Temporal-based intrusion detection for IoV. it Inf. Technol. 62(5-6): 227-239 (2020)
2010 – 2019
- 2019
- [c8]Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis:
Intrusion Response System for Vehicles: Challenges and Vision. SMARTGREENS/VEHITS (Selected Papers) 2019: 321-341 - [c7]Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis:
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System. VEHITS 2019: 148-158 - 2018
- [c6]Muhammad Ali Siddiqi, Robert M. Seepers, Mohammad Hamad, Vassilis Prevelakis, Christos Strydis:
Attack-tree-based Threat Modeling of Medical Implants. PROOFS 2018: 32-49 - [c5]Mohammad Hamad, Zain Alabedin Haj Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst:
Prediction of abnormal temporal behavior in real-time systems. SAC 2018: 359-367 - [c4]Mohammad Hamad, Mustafa R. Agha, Vassilis Prevelakis:
ProSEV: Proxy-Based Secure and Efficient Vehicular Communication. VNC 2018: 1-8 - 2017
- [c3]Mohammad Hamad, Vassilis Prevelakis:
Secure APIs for Applications in Microkernel-based Systems. ICISSP 2017: 553-558 - [c2]Mohammad Hamad, Marcus Nolte, Vassilis Prevelakis:
A framework for policy based secure intra vehicle communication. VNC 2017: 1-8 - 2015
- [c1]Vassilis Prevelakis, Mohammad Hamad:
A Policy-based Communications Architecture for Vehicles. ICISSP 2015: 155-162
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint