Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis (03/2024). Creating a Security Enforcement Environment for a Vehicular Platform. 2023 IEEE Conference on Standards for Communications and Networking (IEEE CSCN). Link: https://ieeexplore.ieee.org/document/10453176
Zain A. H. Hammadeh, Monowar Hasan, Mohammad Hamad (06/2024). Securing Real-Time Systems using Schedule Reconfiguration. 2024 IEEE 27th International Symposium on Real-Time Distributed Computing (ISORC). Link: https://zenodo.org/records/14806788
N. Basheer, B. Pranggono, S. Islam, S.Papastergiou, H. Mouratidis (06/2024). Enhancing Malware Detection through Machine Learning using XAI with SHAP Framework. 20th AIAI (Artificial Intelligence Applications and Innovations). Link: https://zenodo.org/records/14832484
A. A. Khaled, Md M. Hasan, S. Islam, S. Papastergiou, H. Mouratidis (06/2024). Synthetic Data Generation and Impact Analysis of Machine Learning Models for Enhanced Credit Card Fraud Detection. 20th AIAI (Artificial Intelligence Applications and Innovations). Link: https://zenodo.org/records/14832599
Christian Lübben, Marc-Oliver Pahl (07/2024). Similarity-Based Selective Federated Learning for Distributed Device-Specific Anomaly Detection. IEEE Network Operations and Management Symposium (NOMS 2024). Link: https://ieeexplore.ieee.org/abstract/document/10575258
Lars Wustrich, Sebastian Gallenmuller, Stephan Gunther, Georg Carle, Marc-Oliver Pahl (07/2024). Shells Bells: Cyber-Physical Anomaly Detection in Data Centers. NOMS 2024 – IEEE Network Operations and Management Symposium. Link: https://zenodo.org/records/14807181
Sherin Kalli Valappil, Lars Vogela, Mohammad Hamad, Sebastian Steinhorst (07/2024). Advanced IDPS Architecture for Connected and Autonomous Vehicles. 35th IEEE Intelligent Vehicles Symposium (IEEE IV). Link: https://zenodo.org/records/14806852
Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, and Sebastian Steinhorst (08/2024). PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. IEEE International Conference on Computer Communications (IEEE INFOCOM 2024). Link: https://zenodo.org/records/14806692
Mohammad Hamad, Andreas Finkenzeller, Monowar Hasan, Marc-Oliver Pahl, Sebastian Steinhorst (01/2025) A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights. Secure IT Systems: 29th Nordic Conference, NordSec 2024 Link: https://dl.acm.org/doi/10.1007/978-3-031-79007-2_9
Mohammad Hamad, Michael Kühr, Haralambos Mouratidis, Eleni-Maria Kalogeraki, Christos Gizelis, Dimitris Papanikas (05/2025). Multi-Partner Project: CyberSecDome – Framework for Secure, Collaborative, and Privacy-Aware Incident Handling for Digital Infrastructure. 2025 Design, Automation & Test in Europe Conference (DATE). Link: https://ieeexplore.ieee.org/document/10992768
Mohammad Hamad, Christian Prehofer, Mikael Asplund, Tobias Löhr, Lucas Bublitz, Alexander Zeh (05/2025). Cybersecurity Challenges of Autonomous Systems 2025 Design, Automation & Test in Europe Conference (DATE) Link: https://ieeexplore.ieee.org/abstract/document/10992708
Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei, Shareeful Islam, A. K. M. Najmul Islam (09/2023). Federated Learning-based Personalized Recommendation Systems: An Overview on Security and Privacy Challenges.
IEEE Transactions on Consumer Electronics.
Link: https://zenodo.org/records/10598308
Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi (10/2023). Cyber threat assessment and management for securing healthcare ecosystems using natural language processing.
International Journal of Information Security, 23, pages 31–50.
Link: https://zenodo.org/records/13242578
Randhir Kumar, Ahamed Aljuhani, Danish Javeed, Prabhat Kumar, Shareeful Islam, A.K.M. Najmul Islam (02/2024). Digital twins-enabled zero-touch network: A smart contract and explainable AI integrated cybersecurity framework.
Future Generation Computer Systems (Τ. 156, July 2024, pp. 191–205).
Link: https://zenodo.org/records/11074335
Shareeful Islam, Danish Javeed, Muhammad Shahid Saeed, Prabhat Kumar, Alireza Jolfaei & A. K. M. Najmul Islam (06/2024). Generative AI and Cognitive Computing-Driven Intrusion Detection System in Industrial CPS.
Cognitive Computing (>V. 16, pages 2611–2625).
Link: https://zenodo.org/records/13254989
Panagiotis Katrakazas, Spyros Papastergiou (06/2024). A Stakeholder Needs Analysis in Cybersecurity: A Systemic Approach to Enhancing Digital Infrastructure Resilience.
Businesses 2024, 4(2), 225-240;
Link: https://zenodo.org/records/13254710
Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst (07/2024). REACT: Autonomous intrusion response system for intelligent vehicles.
Computers & Security (V. 145).
Link:https://zenodo.org/records/13255072
Nihala Basheer, Shareeful Islam, Mohammed K. S. Alwaheidi and Spyridon Papastergiou (07/2024). Adoption of deep-learning models for managing threats in API calls with transparency obligation practice for overall resilience. Sensors, 24(15), 4859.
Link: https://zenodo.org/records/14806311
Jean Haurogné, Nihala Basheer, Shareeful Islam (11/2024). Vulnerability detection using BERT-based LLM model with transparency obligation practice towards trustworthy AI.
Machine Learning with Applications
Link: https://zenodo.org/records/14806381
Zain A. H. Hammadeh, Monowar Hasan, Mohammad Hamad (08/2025). RESCUE: A Reconfigurable Scheduling Framework for Securing Multi-Core Real-Time Systems.
ACM Transactions on Cyber-Physical Systems
Link: https://zenodo.org/records/17293964
Andreas Finkenzeller, Arne Fucks, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst (08/2025). Securing the Precision Time Protocol with SDN-enabled Cyclic Path Asymmetry Analysis.
ACM Transactions on Cyber-Physical Systems
Link: https://zenodo.org/records/17294266