• Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis (03/2024).
    Creating a Security Enforcement Environment for a Vehicular Platform.
    2023 IEEE Conference on Standards for Communications and Networking (IEEE CSCN).
    Link: https://ieeexplore.ieee.org/document/10453176
  • Zain A. H. Hammadeh, Monowar Hasan, Mohammad Hamad (06/2024).
    Securing Real-Time Systems using Schedule Reconfiguration.
    2024 IEEE 27th International Symposium on Real-Time Distributed Computing (ISORC).
    Link: https://zenodo.org/records/14806788
  • N. Basheer, B. Pranggono, S. Islam, S.Papastergiou, H. Mouratidis (06/2024).
    Enhancing Malware Detection through Machine Learning using XAI with SHAP Framework.
    20th AIAI (Artificial Intelligence Applications and Innovations).
    Link: https://zenodo.org/records/14832484
  • A. A. Khaled, Md M. Hasan, S. Islam, S. Papastergiou, H. Mouratidis (06/2024).
    Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection.
    20th AIAI (Artificial Intelligence Applications and Innovations).
    Link: https://zenodo.org/records/14832599
  • Lars Wustrich, Sebastian Gallenmuller, Stephan Gunther, Georg Carle, Marc-Oliver Pahl (07/2024).
    Shells Bells: Cyber-Physical Anomaly Detection in Data Centers.
    NOMS 2024 – IEEE Network Operations and Management Symposium.
    Link: https://zenodo.org/records/14807181
  • Sherin Kalli Valappil, Lars Vogela, Mohammad Hamad, Sebastian Steinhorst (07/2024).
    Advanced IDPS Architecture for Connected and Autonomous Vehicles.
    35th IEEE Intelligent Vehicles Symposium (IEEE IV).
    Link: https://zenodo.org/records/14806852
  • Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst (08/2024).
    PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis.
    IEEE International Conference on Computer Communications (IEEE INFOCOM 2024).
    Link: https://zenodo.org/records/14806692
  • Mohammad Hamad, Andreas Finkenzeller, Monowar Hasan, Marc-Oliver Pahl, Sebastian Steinhorst (01/2025)
    A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights.
    Secure IT Systems: 29th Nordic Conference, NordSec 2024
    Link: https://dl.acm.org/doi/10.1007/978-3-031-79007-2_9
  • Mohammad Hamad, Michael Kühr, Haralambos Mouratidis, Eleni-Maria Kalogeraki, Christos Gizelis, Dimitris Papanikas (05/2025).
    Multi-Partner Project: CyberSecDome – Framework for Secure, Collaborative, and Privacy-Aware Incident Handling for Digital Infrastructure.
    2025 Design, Automation & Test in Europe Conference (DATE).
    Link: https://ieeexplore.ieee.org/document/10992768
  • Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, Shareeful Islam, A. K. M. Najmul Islam (09/2023).
    Federated Learning-based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges.
    IEEE Transactions on Consumer Electronics.
    Link: https://zenodo.org/records/10598308
  • Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi (10/2023).
    Cyber threat assessment and management for securing healthcare ecosystems using natural language processing.
    International Journal of Information Security, 23, pages 31–50.
    Link: https://zenodo.org/records/13242578
  • Randhir Kumar, Ahamed Aljuhani, Danish Javeed, Prabhat Kumar, Shareeful Islam, A.K.M. Najmul Islam (02/2024).
    Digital twins-enabled zero-touch network: A smart contract and explainable AI integrated cybersecurity framework.
    Future Generation Computer Systems (Τ. 156, July 2024, pp. 191–205).
    Link: https://zenodo.org/records/11074335
  • Shareeful Islam, Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei & A. K. M. Najmul Islam (06/2024).
    Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS.
    Cognitive Computing (>V. 16, pages 2611–2625).
    Link: https://zenodo.org/records/13254989
  • Panagiotis Katrakazas, Spyros Papastergiou (06/2024).
    A Stakeholder Needs Analysis in Cybersecurity: A Systemic Approach to Enhancing Digital Infrastructure Resilience.
    Businesses 2024, 4(2), 225-240;
    Link: https://zenodo.org/records/13254710
  • Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst (07/2024).
    REACT: Autonomous intrusion response system for intelligent vehicles.
    Computers & Security (V. 145).
    Link:https://zenodo.org/records/13255072
  • Nihala Basheer, Shareeful Islam, Mohammed K. S. Alwaheidi and Spyridon Papastergiou (07/2024).
    Adoption of deep-learning models for managing threats in API calls with transparency obligation practice for overall resilience.
    Sensors, 24(15), 4859.
    Link: https://zenodo.org/records/14806311
  • Jean Haurogné, Nihala Basheer, Shareeful Islam (11/2024).
    Vulnerability detection using BERT-based LLM model with transparency obligation practice towards trustworthy AI.
    Machine Learning with Applications
    Link: https://zenodo.org/records/14806381
  • Zain A. H. Hammadeh, Monowar Hasan, Mohammad Hamad (08/2025).
    RESCUE: A Reconfigurable Scheduling Framework for Securing Multi-Core Real-Time Systems.
    ACM Transactions on Cyber-Physical Systems
    Link: https://zenodo.org/records/17293964
  • Andreas Finkenzeller, Arne Fucks, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst (08/2025).
    Securing the Precision Time Protocol with SDN-enabled Cyclic Path Asymmetry Analysis.
    ACM Transactions on Cyber-Physical Systems
    Link: https://zenodo.org/records/17294266