Mohammad Hamad
Mohammad Hamad
Department of Computer Engineering. Technical University of Munich
Verified email at - Homepage
Cited by
Cited by
SAVTA: A hybrid vehicular threat model: Overview and case study
M Hamad, V Prevelakis
Information 11 (5), 273, 2020
Attack-tree-based Threat Modeling of Medical Implants
MA Siddiqi, RM Seepers, M Hamad, V Prevelakis, C Strydis
7th International Workshop on Security Proofs for Embedded Systems (PROOFS), 2018
Towards Comprehensive Threat Modeling for Vehicles
M Hamad, M Nolte, V Prevelakis
1st Workshop on Security and Dependability of Critical Embedded Real-Time …, 2016
A communication framework for distributed access control in microkernel-based systems
M Hamad, J Schlatow, V Prevelakis, R Ernst
12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time …, 2016
Prediction of abnormal temporal behavior in real-time systems
M Hamad, ZAH Hammadeh, S Saidi, V Prevelakis, R Ernst
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 359-367, 2018
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System
M Hamad, T Marinos, V Prevelakis
5th International Conference on Vehicle Technology and Intelligent Transport …, 2019
Implementation and performance evaluation of embedded ipsec in microkernel os
M Hamad, V Prevelakis
2015 World Symposium on Computer Networks and Information Security (WSCNIS), 1-7, 2015
A framework for policy based secure intra vehicle communication
M Hamad, M Nolte, V Prevelakis
2017 IEEE Vehicular Networking Conference (VNC), 1-8, 2017
A policy-based communications architecture for vehicles
V Prevelakis, M Hamad
2015 International Conference on Information Systems Security and Privacy …, 2015
SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation
M Hamad, A Finkenzeller, H Liu, J Lauinger, V Prevelakis, S Steinhorst
IEEE Internet of Things Journal 10 (4), 3384-3406, 2022
A-poa: Anonymous proof of authorization for decentralized identity management
J Lauinger, J Ernstberger, E Regnath, M Hamad, S Steinhorst
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2021
Intrusion Response System for Vehicles: Challenges and Vision
M Hamad, M Tsantekidis, V Prevelakis
International Conference on Smart Cities and Green ICT Systems, 321-341, 2019
Spps: secure policy-based publish/subscribe system for v2c communication
M Hamad, E Regnath, J Lauinger, V Prevelakis, S Steinhorst
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 529-534, 2021
A Multilayer Secure Framework for Vehicular Systems
M Hamad
TU Braunschweig, 2020
Extending the Operational Envelope of Applications
V Prevelakis, M Hamad
8th International Conference on Trust & Trustworthy Computing (TRUST 2015), 2015
Feasible Time Delay Attacks Against the Precision Time Protocol
A Finkenzeller, T Wakim, M Hamad, S Steinhorst
GLOBECOM 2022-2022 IEEE Global Communications Conference, 3375-3380, 2022
Attack Data Generation Framework for Autonomous Vehicle Sensors
J Lauinger, A Finkenzeller, H Lautebach, M Hamad, S Steinhorst
Proceedings of the Conference on Design, Automation and Test in Europe (DATE …, 2022
Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol
L Schönberger, M Hamad, JV Gomez, S Steinhorst, S Saidi
IEEE access 9, 157398-157410, 2021
Quantitative system-level security verification of the IoV infrastructure
J Lauinger, M Aslam, M Hamad, S Raza, S Steinhorst
arXiv preprint arXiv:2101.06137, 2021
Secure APIs for applications in microkernel-based systems
M Hamad, V Prevelakis
International Conference on Information Systems Security and Privacy 2, 553-558, 2017
The system can't perform the operation now. Try again later.
Articles 1–20