-
Security Challenges in Autonomous Systems Design
Mohammad Hamad, Sebastian Steinhorst (12/2023)
International Conference on Computational Technologies and Electronics
Link: https://zenodo.org/records/14806580
-
Creating a Security Enforcement Environment for a Vehicular Platform
Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis (03/2024)
2023 IEEE Conference on Standards for Communications and Networking (IEEE CSCN)
Link: https://zenodo.org/records/10282180
-
Securing Real-Time Systems using Schedule Reconfiguration
Zain A. H. Hammadeh, Monowar Hasan, Mohammad Hamad (06/2024)
2024 IEEE 27th International Symposium on Real-Time Distributed Computing (ISORC)
Link: https://zenodo.org/records/14806788
-
Enhancing Malware Detection through Machine Learning using XAI with SHAP Framework
N. Basheer, B. Pranggono, S. Islam, S.Papastergiou, H. Mouratidis (06/2024)
20th AIAI (Artificial Intelligence Applications and Innovations)
Link: https://zenodo.org/records/14832484
-
Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection
A. A. Khaled, Md M. Hasan, S. Islam, S. Papastergiou, H. Mouratidis (06/2024)
20th AIAI (Artificial Intelligence Applications and Innovations)
Link: https://zenodo.org/records/14832599
-
Similarity-Based Selective Federated Learning for Distributed Device-Specific Anomaly Detection
Christian Lübben, Marc-Oliver Pahl (07/2024)
IEEE Network Operations and Management Symposium (NOMS 2024)
Link: https://zenodo.org/records/17413566
-
Shells Bells: Cyber-Physical Anomaly Detection in Data Centers
Lars Wustrich, Sebastian Gallenmuller, Stephan Gunther, Georg Carle, Marc-Oliver Pahl (07/2024)
NOMS 2024 – IEEE Network Operations and Management Symposium
Link: https://zenodo.org/records/14807181
-
Advanced IDPS Architecture for Connected and Autonomous Vehicles
Sherin Kalli Valappil, Lars Vogela, Mohammad Hamad, Sebastian Steinhorst (07/2024)
35th IEEE Intelligent Vehicles Symposium (IEEE IV)
Link: https://zenodo.org/records/14806852
-
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis
Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst (08/2024)
IEEE International Conference on Computer Communications (IEEE INFOCOM 2024)
Link: https://zenodo.org/records/14806692
-
A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights
Mohammad Hamad, Andreas Finkenzeller, Monowar Hasan, Marc-Oliver Pahl, Sebastian Steinhorst (01/2025)
Secure IT Systems: 29th Nordic Conference, NordSec 2024
Link: https://zenodo.org/records/17413094
-
Multi-Partner Project: CyberSecDome – Framework for Secure, Collaborative, and Privacy-Aware Incident Handling for Digital Infrastructure
Mohammad Hamad, Michael Kühr, Haralambos Mouratidis, Eleni-Maria Kalogeraki, Christos Gizelis, Dimitris Papanikas (05/2025)
2025 Design, Automation & Test in Europe Conference (DATE)
Link: https://zenodo.org/records/17413298
-
Cybersecurity Challenges of Autonomous Systems
Mohammad Hamad, Christian Prehofer, Mikael Asplund, Tobias Löhr, Lucas Bublitz, Alexander Zeh (05/2025)
2025 Design, Automation & Test in Europe Conference (DATE)
Link: https://zenodo.org/records/17413463
-
Analysis of Autonomous Driving Software to Low-Level Sensor Cyber Attacks
Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Raivo Sell, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst (06/2025)
20th International Conference on Software Engineering for Adaptive and Self-Managing Systems
Link: https://zenodo.org/records/17769909
-
Sensor Fusion Desynchronization Attacks
Andreas Finkenzeller, Andrew Roberts, Mauro Bellone, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst (07/2025)
Euromicro Conference on Real-Time Systems (ECRTS 2025)
Link: https://zenodo.org/records/17294590
-
Dredging the River Styx: Fortifying the Web through Robust and Real-Time Script Attribution
Kostas Drakonakis, Sotiris Ioannidis, Jason Polakis (08/2025)
2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P)
Link: https://zenodo.org/records/17770342
-
CATI – An Open-Source Framework to Evaluate Attacks on Cameras for Autonomous Vehicles
Michael Kühr, Maximilian Mittmann, Mohammad Hamad, Sebastian Steinhorst (12/2025)
28th Euromicro Conference Series on Digital System Design (DSD) 2025
Link: https://zenodo.org/records/18467252
-
SoK: Security of the Image Processing Pipeline for Camera-based Sensing in Autonomous Vehicles
Michael Kühr, Mohammad Hamad, Sebastian Steinhorst (08/2025)
The 21st ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2026)
ACCEPTED
-
Federated Learning-based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges
Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, Shareeful Islam, A. K. M. Najmul Islam (09/2023)
IEEE Transactions on Consumer Electronics.
Link: https://zenodo.org/records/10598308
-
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing
Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi (10/2023)
International Journal of Information Security, 23, pages 31–50.
Link: https://zenodo.org/records/10211760
-
Digital twins-enabled zero-touch network: A smart contract and explainable AI integrated cybersecurity framework
Randhir Kumar, Ahamed Aljuhani, Danish Javeed, Prabhat Kumar, Shareeful Islam, A.K.M. Najmul Islam (02/2024)
Future Generation Computer Systems (Τ. 156, July 2024, pp. 191–205).
Link: https://zenodo.org/records/11074335
-
Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS
Shareeful Islam, Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei & A. K. M. Najmul Islam (06/2024)
Cognitive Computing (>V. 16, pages 2611–2625).
Link: https://zenodo.org/records/13254989
-
A Stakeholder Needs Analysis in Cybersecurity: A Systemic Approach to Enhancing Digital Infrastructure Resilience
Panagiotis Katrakazas, Spyros Papastergiou (06/2024)
Businesses 2024, 4(2), 225-240;
Link: https://zenodo.org/records/13254710
-
REACT: Autonomous intrusion response system for intelligent vehicles
Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst (07/2024)
Computers & Security (V. 145).
Link:https://zenodo.org/records/13255072
-
Adoption of deep-learning models for managing threats in API calls with transparency obligation practice for overall resilience
Nihala Basheer, Shareeful Islam, Mohammed K. S. Alwaheidi and Spyridon Papastergiou (07/2024)
Sensors, 24(15), 4859.
Link: https://zenodo.org/records/14806311
-
Vulnerability detection using BERT-based LLM model with transparency obligation practice towards trustworthy AI
Jean Haurogné, Nihala Basheer, Shareeful Islam (11/2024)
Machine Learning with Applications
Link: https://zenodo.org/records/14806381
-
RESCUE: A Reconfigurable Scheduling Framework for Securing Multi-Core Real-Time Systems
Zain A. H. Hammadeh, Monowar Hasan, Mohammad Hamad (08/2025)
ACM Transactions on Cyber-Physical Systems
Link: https://zenodo.org/records/17293964
-
Securing the Precision Time Protocol with SDN-enabled Cyclic Path Asymmetry Analysis
Andreas Finkenzeller, Arne Fucks, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst (08/2025)
ACM Transactions on Cyber-Physical Systems
Link: https://zenodo.org/records/17294266
-
Enhancing Security Through Task Migration in Software-Defined Vehicles
Mohammad Hamad, Zain A. H. Hammadeh, Davide Alessi, Monowar Hasan, Mert Pese, Daniel Luedtke, Sebastian Steinhorst (09/2025)
IEEE Internet of Things Journal
Link: https://zenodo.org/records/18401165