Mohammad Hamad
Mohammad Hamad
Department of Computer Engineering. Technical University of Munich
Verified email at - Homepage
Cited by
Cited by
SAVTA: A hybrid vehicular threat model: Overview and case study
M Hamad, V Prevelakis
Information 11 (5), 273, 2020
Attack-tree-based Threat Modeling of Medical Implants
MA Siddiqi, RM Seepers, M Hamad, V Prevelakis, C Strydis
7th International Workshop on Security Proofs for Embedded Systems (PROOFS), 2018
Prediction of abnormal temporal behavior in real-time systems
M Hamad, ZAH Hammadeh, S Saidi, V Prevelakis, R Ernst
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 359-367, 2018
Towards Comprehensive Threat Modeling for Vehicles
M Hamad, M Nolte, V Prevelakis
1st Workshop on Security and Dependability of Critical Embedded Real-Time …, 2016
A communication framework for distributed access control in microkernel-based systems
M Hamad, J Schlatow, V Prevelakis, R Ernst
12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time …, 2016
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System
M Hamad, T Marinos, V Prevelakis
5th International Conference on Vehicle Technology and Intelligent Transport …, 2019
SEEMQTT: secure end-to-end MQTT-based communication for mobile IoT systems using secret sharing and trust delegation
M Hamad, A Finkenzeller, H Liu, J Lauinger, V Prevelakis, S Steinhorst
IEEE Internet of Things Journal 10 (4), 3384-3406, 2022
A framework for policy based secure intra vehicle communication
M Hamad, M Nolte, V Prevelakis
2017 IEEE Vehicular Networking Conference (VNC), 1-8, 2017
Implementation and performance evaluation of embedded ipsec in microkernel os
M Hamad, V Prevelakis
2015 World Symposium on Computer Networks and Information Security (WSCNIS), 1-7, 2015
Intrusion response system for vehicles: Challenges and vision
M Hamad, M Tsantekidis, V Prevelakis
International Conference on Smart Cities and Green ICT Systems, 321-341, 2019
A policy-based communications architecture for vehicles
V Prevelakis, M Hamad
2015 International Conference on Information Systems Security and Privacy …, 2015
A-poa: Anonymous proof of authorization for decentralized identity management
J Lauinger, J Ernstberger, E Regnath, M Hamad, S Steinhorst
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2021
A Multilayer Secure Framework for Vehicular Systems
M Hamad
TU Braunschweig, 2020
Attack Data Generation Framework for Autonomous Vehicle Sensors
J Lauinger, A Finkenzeller, H Lautebach, M Hamad, S Steinhorst
Proceedings of the Conference on Design, Automation and Test in Europe (DATE …, 2022
Towards an increased detection sensitivity of time-delay attacks on precision time protocol
L Schönberger, M Hamad, JV Gomez, S Steinhorst, S Saidi
IEEE access 9, 157398-157410, 2021
SPPS: Secure policy-based publish/subscribe system for V2C communication
M Hamad, E Regnath, J Lauinger, V Prevelakis, S Steinhorst
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 529-534, 2021
Simutack-An Attack Simulation Framework for Connected and Autonomous Vehicles
A Finkenzeller, A Mathur, J Lauinger, M Hamad, S Steinhorst
2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 1-7, 2023
Feasible time delay attacks against the precision time protocol
A Finkenzeller, T Wakim, M Hamad, S Steinhorst
GLOBECOM 2022-2022 IEEE Global Communications Conference, 3375-3380, 2022
Extending the Operational Envelope of Applications
V Prevelakis, M Hamad
8th International Conference on Trust & Trustworthy Computing (TRUST 2015), 2015
Quantitative system-level security verification of the IoV infrastructure
J Lauinger, M Aslam, M Hamad, S Raza, S Steinhorst
arXiv preprint arXiv:2101.06137, 2021
The system can't perform the operation now. Try again later.
Articles 1–20