Professor Mohammad Hammoudeh is the Head of the MMU IoT Laboratory and a Chair in Cyber Security with the Department of Computing and Mathematics, Manchester Metropolitan University. He has been a researcher and publisher in the field of big sensory data mining and visualization. He is a highly proficient, experienced, and professionally certified cybersecurity professional, specializing in threat analysis, and information and network security management. His research interests include highly decentralized algorithms, communication, and cross-layered solutions to Internet of Things, and wireless sensor networks.
He has been an active member of the technical program committee on many international conferences and journals. Hammoudeh is regularly invited to talk at international conferences and workshops. He is External Examiner for the BSc (Hons) Computer Security and Forensics at the University of Bedfordshire. He is also External examiner for the MSc Computer Networks and Security and MSc Cloud Computing awards at the Staffordshire University. He is the HEA Institutional Representative (Information and Computer Sciences Subject).
He is a highly proficient, experienced, and professionally certified cyber security professional, specialising in: Threat analysis; Information and network security management; Internet investigations; Penetration testing Cyber and insider investigations; Breach assessments and incident response; Forensic and crisis readiness planning; and Translation of technical concepts to non-specialists. He has intensive experience in cyber defence course development and instruction; cyber range platform and attack scenario design and execution. Many of his security skills evolved from his wider expertise in information extraction/mining, data visualisation as well as computer networks and communications skills. He is a reviewer to many international conferences and journals specialising the cyber security.
His teaching experience includes leading second and third year undergraduate courses in Computer Networks, Management and Security.
He has been an active member of the technical program committee on many international conferences and journals. Hammoudeh is regularly invited to talk at international conferences and workshops. He is External Examiner for the BSc (Hons) Computer Security and Forensics at the University of Bedfordshire. He is also External examiner for the MSc Computer Networks and Security and MSc Cloud Computing awards at the Staffordshire University. He is the HEA Institutional Representative (Information and Computer Sciences Subject).
PhD, MSc, PGCAP, BSc(Hons), DipCompSci, CEH, CNDA, CCNA, FHEA, MBCS, CITP.
In progress
Completed
I'm an External examiner for the MSc Computer Networks and Security and MSc Cloud Computing awards at the Staffordshire University.
I was the External Examiner for the BSc (Hons) Computer Security and Forensics at the University of Bedfordshire.
My research interests cover several areas in computer science, including algorithm design and analysis, communication and concurrency, performance optimisation, and wireless networking. My current research is experimentally led and it explores the application of these areas to distributed computing environments. My central research focuses on optimising performance and energy consumption in ad-hoc wireless and mobile networks; resource allocation, data collection and routing, information extraction, visualisation, and distributed storage. I’m also interested in logic and model theory, and there application to solve real-world network problems.
S. Kumar, AK. Pal, SKH. Islam, M. Hammoudeh (2023). Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Computing and Applications. 35(7), pp.4855-4880.
A. Bounceur, M. Bezoui, M. Hammoudeh, L. Lagadec, R. Euler (2022). Finding the polygon hull of a network without conditions on the starting vertex. Transactions on Emerging Telecommunications Technologies. 33(3), pp.e3696-e3696.
D. Unal, M. Hammoudeh, MA. Khan, A. Abuarqoub, G. Epiphaniou, et al. R. Hamila. (2021). Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Computers & Security. 109, pp.102393-102393.
S. Jabbar, H. Lloyd, M. Hammoudeh, B. Adebisi, U. Raza (2021). Blockchain-enabled supply chain: analysis, challenges, and future directions. Multimedia Systems. 27(4), pp.787-806.
G. Epiphaniou, P. Pillai, M. Bottarelli, H. Al-Khateeb, M. Hammoudesh, et al. C. Maple. (2020). Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Transactions on Engineering Management. 67(4), pp.1059-1073.
AC. Roy, MS. Arefin, ASM. Kayes, M. Hammoudeh, K. Ahmed (2020). An empirical recommendation framework to support location-based services. Future Internet. 12(9),
N. Kadjouh, A. Bounceur, M. Bezoui, ME. Khanouche, R. Euler, et al. M. Hammoudeh, L. Lagadec, S. Jabbar, F. Al-Turjman. (2020). A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. Mobile Networks and Applications.
G. Epiphaniou, P. Pillai, M. Bottarelli, H. Al-Khateeb, M. Hammoudeh, et al. C. Maple. (2020). Erratum: Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security (IEEE Transactions on Engineering Management DOI: 10.1109/TEM.2020.2965991). IEEE Transactions on Engineering Management. 67(3), pp.979-979.
T. Baker, M. Asim, Á. MacDermott, F. Iqbal, F. Kamoun, et al. B. Shah, O. Alfandi, M. Hammoudeh. (2020). A secure fog-based platform for SCADA-based IoT critical infrastructure. Software - Practice and Experience. 50(5), pp.503-518.
S. Walker-Roberts, M. Hammoudeh, O. Aldabbas, M. Aydin, A. Dehghantanha (2019). Threats on the horizon: understanding security threats in the era of cyber-physical systems. Journal of Supercomputing. 76,
M. Walshe, G. Epiphaniou, H. Al-Khateeb, M. Hammoudeh, V. Katos, et al. A. Dehghantanha. (2019). Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks. 95,
R. Ande, B. Adebisi, M. Hammoudeh, J. Saleem (2019). Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society. 54,
D. Unal, M. Hammoudeh, MS. Kiraz (2019). Policy specification and verification for blockchain and smart contracts in 5G networks. ICT Express.
F. Al Fayez, M. Hammoudeh, B. Adebisi, KN. Abdul Sattar (2019). Assessing the effectiveness of flying ad hoc networks for international border surveillance. International Journal of Distributed Sensor Networks. 15(7), pp.155014771986040-155014771986040.
S. Belguith, N. Kaaniche, M. Hammoudeh (2019). Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies.
DCPJ. Taylor, H. Mwiki, A. Dehghantanha, A. Akibini, KKR. Choo, et al. M. Hammoudeh, R. Parizi. (2019). Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study. Sci Justice. 59(3), pp.337-348.
AAA. Ateya, A. Muthanna, R. Kirichek, M. Hammoudeh, A. Koucheryavy (2019). Energy- and Latency-Aware Hybrid Offloading Algorithm for UAVs. IEEE Access. 7, pp.37587-37600.
A. Bounceur, M. Bezoui, L. Lagadec, R. Euler, L. Abdelkader, et al. M. Hammoudeh. (2019). DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp.42-53.
I. Ghafir, V. Prenosil, M. Hammoudeh, T. Baker, S. Jabbar, et al. S. Khalid, S. Jaf. (2018). BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access. 6, pp.38947-38958.
A. Benzerbadj, B. Kechar, A. Bounceur, M. Hammoudeh (2018). Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. Journal of Network and Computer Applications. 112, pp.41-52.
I. Ghafir, J. Saleem, MH. Hammoudeh, H. Faour, V. Prenosil, et al. S. Jaf, S. Jabbar, T. Baker. (2018). Security threats to critical infrastructure: the human factor. The Journal of Supercomputing. 74(10), pp.4986-5002.
S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha (2018). A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access. 6, pp.25167-25177.
M. Farhan, S. Jabbar, M. Aslam, S. Khalid, MH. Hammoudeh, et al. M. Khan, K. Han. (2018). IoT-based students interaction framework using attention-scoring assessment in eLearning. Future Generation Computer Systems. 79(3), pp.909-919.
J. Saleem, M. Hammoudeh (2017). Defense methods against social engineering attacks. K. Daimi. In: Computer and Network Security Essentials. Springer, pp.603-618.
M. Hammoudeh, R. Newman, C. Dennett, S. Mount, O. Aldabbas (2015). Map as a service: a framework for visualising and maximising information return from multi-modal wireless sensor networks. Sensors. 15(9), pp.22970-23003.
Z. Xu, KKR. Choo, A. Dehghantanha, R. Parizi, M. Hammoudeh (2020). Preface.
A. Alzu'bi, A. Alomar, S. Alkhaza'leh, A. Abuarqoub, M. Hammoudeh (2024). A Review of Privacy and Security of Edge Computing in Smart Healthcare Systems: Issues, Challenges, and Research Directions. Tsinghua Science and Technology. 29(4), pp.1152-1180.
D. Vasan, M. Hammoudeh, M. Alazab (2024). Broad learning: A GPU-free image-based malware classification. Applied Soft Computing. 154, pp.111401-111401.
S. Alyami, H. Luqman, M. Hammoudeh (2024). Isolated Arabic Sign Language Recognition Using a Transformer-based Model and Landmark Keypoints. ACM Transactions on Asian and Low-Resource Language Information Processing. 23(1), pp.1-19.
M. Adam, M. Hammoudeh, R. Alrawashdeh, B. Alsulaimy (2024). A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems. IEEE Access. pp.1-1.
EA. Alhamad, MSA. Logmani, ATA. Essa, M. Hammoudeh (2024). A minutiae-based method to store and compare fingerprints. International Journal of Biometrics. 16(2), pp.176-194.
T. Gaber, JB. Awotunde, M. Torky, SA. Ajagbe, M. Hammoudeh, et al. W. Li. (2023). Metaverse-IDS: Deep learning-based intrusion detection system for Metaverse-IoT networks. Internet of Things. 24, pp.100977-100977.
C. Berdjouh, MCE. Meftah, A. Laouid, M. Hammoudeh, A. Kumar (2023). Pelican Gorilla Troop Optimization Based on Deep Feed Forward Neural Network for Human Activity Abnormality Detection in Smart Spaces. IEEE Internet of Things Journal. 10(21), pp.18495-18504.
A. Alzu’bi, L. Bani Younis, A. Abuarqoub, M. Hammoudeh (2023). Multimodal Deep Learning with Discriminant Descriptors for Offensive Memes Detection. Journal of Data and Information Quality. 15(3), pp.1-16.
O. Nnamonu, M. Hammoudeh, T. Dargahi (2023). Digital Forensic Investigation of Web-Based Virtual Reality Worlds: Decentraland as a Case Study. IEEE Communications Magazine. 61(9), pp.72-78.
M. Rahman, S. Chowdhury, M. Shorfuzzaman, MK. Hossain, M. Hammoudeh (2023). Peer-to-Peer Power Energy Trading in Blockchain Using Efficient Machine Learning Model. Sustainability. 15(18), pp.13640-13640.
A. Berhoum, MCE. Meftah, A. Laouid, M. Hammoudeh (2023). An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks. ACM Transactions on Asian and Low-Resource Language Information Processing. 22(5), pp.1-20.
S. Kumar, AK. Pal, SKH. Islam, M. Hammoudeh (2023). Secure and efficient image retrieval through invariant features selection in insecure cloud environments. Neural Computing and Applications. 35(7), pp.4855-4880.
M. Kara, A. Laouid, A. Bounceur, M. Hammoudeh, M. Alshaikh (2023). Perfect Confidentiality through Unconditionally Secure Homomorphic Encryption Using OTP With a Single Pre-Shared Key. Journal of Information Science and Engineering. 39(1), pp.183-195.
J. Hu, K. Kaur, H. Lin, X. Wang, MM. Hassan, et al. I. Razzak, M. Hammoudeh. (2023). Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems. IEEE Transactions on Intelligent Transportation Systems. 24(2), pp.1-10.
D. Unal, FO. Catak, MT. Houkan, M. Mudassir, M. Hammoudeh (2023). Towards robust autonomous driving systems through adversarial test set generation. ISA Trans. 132, pp.69-79.
B. Esmaeili, A. Azmoodeh, A. Dehghantanha, H. Karimipour, B. Zolfaghari, et al. M. Hammoudeh. (2022). IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection. IEEE Transactions on Industrial Informatics. 18(12), pp.8477-8486.
A. Yazdinejad, A. Dehghantanha, RM. Parizi, M. Hammoudeh, H. Karimipour, et al. G. Srivastava. (2022). Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-Based IIoT Networks. IEEE Transactions on Industrial Informatics. 18(11), pp.8356-8366.
M. Kara, A. Laouid, M. Hammoudeh, M. AlShaikh, A. Bounceur (2022). Proof of Chance: A Lightweight Consensus Algorithm for the Internet of Things. IEEE Transactions on Industrial Informatics. 18(11), pp.8336-8345.
K-KR. Choo, M. Hammoudeh (2022). Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice. Distributed Ledger Technologies: Research and Practice. 1(1), pp.1-4.
D. Taha, A. Alzu’bi, A. Abuarqoub, M. Hammoudeh, M. Elhoseny (2022). Automated Colorectal Polyp Classification Using Deep Neural Networks with Colonoscopy Images. International Journal of Fuzzy Systems. 24(5), pp.2525-2537.
M. Kara, A. Laouid, MA. Yagoub, R. Euler, S. Medileh, et al. M. Hammoudeh, A. Eleyan, A. Bounceur. (2022). A fully homomorphic encryption based on magic number fragmentation and
A. Bounceur, M. Bezoui, M. Hammoudeh, L. Lagadec, R. Euler (2022). Finding the polygon hull of a network without conditions on the starting vertex. Transactions on Emerging Telecommunications Technologies. 33(3), pp.e3696-e3696.
M. Hammoudeh (2021). Deep Learning Methods for Physical-Layer Wireless Communications - Recent Advances and Future Trends. Physical Communication. 49, pp.101546-101546.
D. Unal, M. Hammoudeh, MA. Khan, A. Abuarqoub, G. Epiphaniou, et al. R. Hamila. (2021). Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Computers & Security. 109, pp.102393-102393.
IA. Elgendy, A. Muthanna, M. Hammoudeh, H. Shaiba, D. Unal, et al. M. Khayyat. (2021). Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing. Big Data. 9(4), pp.265-278.
S. Jabbar, H. Lloyd, M. Hammoudeh, B. Adebisi, U. Raza (2021). Blockchain-enabled supply chain: analysis, challenges, and future directions. Multimedia Systems. 27(4), pp.787-806.
AG. Yisa, T. Dargahi, S. Belguith, M. Hammoudeh (2021). Security challenges of Internet of Underwater Things: A systematic literature review. Transactions on Emerging Telecommunications Technologies. 32(3),
MSA. Ahsan, MS. Arefin, ASM. Kayes, M. Hammoudeh, O. Aldabbas (2020). A Framework for Identifying Influential People by Analyzing Social Media Data. Applied Sciences. 10(24), pp.8773-8773.
G. Epiphaniou, P. Pillai, M. Bottarelli, H. Al-Khateeb, M. Hammoudesh, et al. C. Maple. (2020). Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security. IEEE Transactions on Engineering Management. 67(4), pp.1059-1073.
M. Elhoseny, RS. Rajan, M. Hammoudeh, K. Shankar, O. Aldabbas (2020). Swarm intelligence–based energy efficient clustering with multihop routing protocol for sustainable wireless sensor networks. International Journal of Distributed Sensor Networks. 16(9),
AC. Roy, MS. Arefin, ASM. Kayes, M. Hammoudeh, K. Ahmed (2020). An empirical recommendation framework to support location-based services. Future Internet. 12(9),
N. Kadjouh, A. Bounceur, M. Bezoui, ME. Khanouche, R. Euler, et al. M. Hammoudeh, L. Lagadec, S. Jabbar, F. Al-Turjman. (2020). A Dominating Tree Based Leader Election Algorithm for Smart Cities IoT Infrastructure. Mobile Networks and Applications.
G. Epiphaniou, P. Pillai, M. Bottarelli, H. Al-Khateeb, M. Hammoudeh, et al. C. Maple. (2020). Erratum: Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security (IEEE Transactions on Engineering Management DOI: 10.1109/TEM.2020.2965991). IEEE Transactions on Engineering Management. 67(3), pp.979-979.
A. Muthanna, R. Shamilova, AA. Ateya, A. Paramonov, M. Hammoudeh A mobile edge computing/software-defined networking-enabled architecture for vehicular networks. Internet Technology Letters. pp.e109-e109.
T. Baker, M. Asim, Á. MacDermott, F. Iqbal, F. Kamoun, et al. B. Shah, O. Alfandi, M. Hammoudeh. (2020). A secure fog-based platform for SCADA-based IoT critical infrastructure. Software - Practice and Experience. 50(5), pp.503-518.
MAA. Hammoudeh (2020). Policy model for sharing network slices in 5g core network. Journal of Information Technology Management. 12(2), pp.79-89.
S. Walker-Roberts, M. Hammoudeh, O. Aldabbas, M. Aydin, A. Dehghantanha (2019). Threats on the horizon: understanding security threats in the era of cyber-physical systems. Journal of Supercomputing. 76,
O. Jogunola, B. Adebisi, K. Anoh, A. Ikpehai, M. Hammoudeh (2019). Adaptive Routing Algorithm for Information Management in Distributed Microgrids in Smart Grid. IFAC-PapersOnLine. 52(4), pp.336-341.
M. Walshe, G. Epiphaniou, H. Al-Khateeb, M. Hammoudeh, V. Katos, et al. A. Dehghantanha. (2019). Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments. Ad Hoc Networks. 95,
R. Ande, B. Adebisi, M. Hammoudeh, J. Saleem (2019). Internet of Things: Evolution and technologies from a security perspective. Sustainable Cities and Society. 54,
D. Unal, M. Hammoudeh, MS. Kiraz (2019). Policy specification and verification for blockchain and smart contracts in 5G networks. ICT Express.
F. Al Fayez, M. Hammoudeh, B. Adebisi, KN. Abdul Sattar (2019). Assessing the effectiveness of flying ad hoc networks for international border surveillance. International Journal of Distributed Sensor Networks. 15(7), pp.155014771986040-155014771986040.
S. Belguith, N. Kaaniche, M. Hammoudeh (2019). Analysis of attribute-based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies.
DCPJ. Taylor, H. Mwiki, A. Dehghantanha, A. Akibini, KKR. Choo, et al. M. Hammoudeh, R. Parizi. (2019). Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study. Sci Justice. 59(3), pp.337-348.
AAA. Ateya, A. Muthanna, R. Kirichek, M. Hammoudeh, A. Koucheryavy (2019). Energy- and Latency-Aware Hybrid Offloading Algorithm for UAVs. IEEE Access. 7, pp.37587-37600.
I. Ghafir, V. Prenosil, M. Hammoudeh, T. Baker, S. Jabbar, et al. S. Khalid, S. Jaf. (2018). BotDet: A System for Real Time Botnet Command and Control Traffic Detection. IEEE Access. 6, pp.38947-38958.
A. Benzerbadj, B. Kechar, A. Bounceur, M. Hammoudeh (2018). Surveillance of sensitive fenced areas using duty-cycled wireless sensor networks with asymmetrical links. Journal of Network and Computer Applications. 112, pp.41-52.
I. Ghafir, M. Hammoudeh, V. Prenosil (2018). Defending against the advanced persistent threat: Detection of disguised executable files. PeerJ Computer Science.
I. Ghafir, M. Hammoudeh, V. Prenosil (2018). Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat. Proceedings of the 2nd International Conference on Future Networks and Distributed Systems.
I. Ghafir, J. Saleem, MH. Hammoudeh, H. Faour, V. Prenosil, et al. S. Jaf, S. Jabbar, T. Baker. (2018). Security threats to critical infrastructure: the human factor. The Journal of Supercomputing. 74(10), pp.4986-5002.
S. Walker-Roberts, M. Hammoudeh, A. Dehghantanha (2018). A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure. IEEE Access. 6, pp.25167-25177.
M. Hammoudeh, M. Arioua (2018). Sensors and actuators in smart cities. Journal of Sensor and Actuator Networks. 7(1),
M. Farhan, S. Jabbar, M. Aslam, S. Khalid, MH. Hammoudeh, et al. M. Khan, K. Han. (2018). IoT-based students interaction framework using attention-scoring assessment in eLearning. Future Generation Computer Systems. 79(3), pp.909-919.
AS. Al-Ajlan, MAA. Hammoudeh (2016). Enhancing E-Learning System in Qassim University by Implementing Moodle as a Tool. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY. 16(9), pp.7-14.
O. Aldabbas, A. Abuarqoub, M. Hammoudeh, U. Raza, A. Bounceur (2016). Unmanned Ground Vehicle for Data Collection in Wireless Sensor Networks: Mobility-aware Sink Selection. The Open Automation and Control Systems Journal. 8, pp.35-46.
M. Hammoudeh, R. Newman, C. Dennett, S. Mount, O. Aldabbas (2015). Map as a service: a framework for visualising and maximising information return from multi-modal wireless sensor networks. Sensors. 15(9), pp.22970-23003.
M. Hammoudeh, R. Newman (2015). Information extraction from sensor networks using the Watershed transform algorithm. Information Fusion. 22, pp.3-15.
A. Carlin, M. Hammoudeh, O. Aldabbas (2015). Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges. International Journal of Advanced Computer Science and Applications. 6(6),
M. Hammoudeh, R. Newman (2015). Information extraction from sensor networks using the Watershed transform algorithm. Information Fusion. 22, pp.39-49.
M. Hammoudeh, R. Newman (2015). Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance. Information Fusion. 22, pp.3-15.
A. Abuarqoub, M. Hammoudeh (2013). Self-stabilizing algorithm for information extraction from mobile wireless sensor networks. Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013.
F. Al-Fayez, A. Abuarqoub, M. Hammoudeh, A. Nisbet (2013). Wireless Sensor Network Simulation: The Current State and Simulation Tools. Sensors and Transducers. 18(SPEC.ISS.1), pp.145-155.
M. Hammoudeh, R. Newman, C. Dennett, S. Mount (2013). Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wireless Communications and Mobile Computing. 13(9), pp.809-827.
M. Hammoudeh, R. Newman (2013). Information extraction from sensor networks using the Watershed transform algorithm. Information Fusion.
M. Hammoudeh, R. Newman (2013). Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance. Information Fusion.
H. Faour, M. Hammoudeh, AA. Ghamdi (2012). Enhancing student learning experience and satisfaction using Virtual Learning Environments. 2012 International Conference on Education and e-Learning Innovations, ICEELI 2012.
T. Alsboui, A. Abuarqoub, M. Hammoudeh, Z. Bandar, A. Nisbet (2012). Information extraction from wireless sensor networks: System and approaches. Sensors and Transducers. 14(SPEC. 2), pp.1-17.
T. Alsboui, M. Hammoudeh, A. Abuarqoub (2012). A service-centric stack for collaborative data sharing and processing. Communications in Computer and Information Science. 338 CCIS, pp.320-327.
A. Abuarqoub, M. Hammoudeh, T. Alsboui (2012). An overview of information extraction from mobile wireless sensor networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7469 LNCS, pp.95-106.
M. Hammoudeh, R. Newman, C. Dennett, S. Mount (2011). Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wireless Communications and Mobile Computing.
M. Hammoudeh, O. Aldabbas, S. Mount, S. Abuzour, M. Alfawair, et al. S. Alratrout. (2010). Algorithmic construction of optimal and load balanced clusters in wireless sensor networks. 2010 7th International Multi-Conference on Systems, Signals and Devices, SSD-10.
M. Hammoudeh, S. Mount, O. Aldabbas, M. Stanton (2010). Clinic: A service-oriented approach for fault tolerance in Wireless Sensor Networks. Proceedings - 4th International Conference on Sensor Technologies and Applications, SENSORCOMM 2010. pp.625-631.
M. Hammoudeh, R. Newman, S. Mount, C. Dennett (2009). A combined inductive and deductive sense data extraction and visualisation service. ICPS'09 - Proceedings of the 2009 International Conference on Pervasive Services and Co-located Workshops. pp.159-168.
M. Hammoudeh, R. Newman, C. Dennett, S. Mount (2009). Inductive as a support of deductive data visualisation in wireless sensor networks. Proceedings - 2009 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM 2009. pp.480-485.
M. Hammoudeh, J. Shuttleworth, R. Newman, S. Mount (2008). Experimental applications of hierarchical mapping services in wireless sensor networks. Proceedings - 2nd Int. Conf. Sensor Technol. Appl., SENSORCOMM 2008, Includes: MESH 2008 Conf. Mesh Networks; ENOPT 2008 Energy Optim. Wireless Sensors Networks, UNWAT 2008 Under Water Sensors Systems. pp.36-43.
M. Hammoudeh, RM. Newman, S. Mount (2008). Modelling Clustering of Wireless Sensor Networks with Synchronised Hyperedge Replacement. Electron. Commun. Eur. Assoc. Softw. Sci. Technol.. 16,
J. Shuttleworth, M. Hammoudeh, E. Gaura, R. Newman (2007). Experimental applications of mapping services in wireless sensor networks. 4th International Conference on Networked Sensing Systems, INSS. pp.154-158.
M. Hammoudeh, A. Kurz, E. Gaura (2007). MuMHR: Multi-path, multi-hop hierarchical routing. 2007 International Conference on Sensor Technologies and Applications, SENSORCOMM 2007, Proceedings. pp.140-145.
RE. Ulfath, IH. Sarker, MJM. Chowdhury, M. Hammoudeh (2022). Detecting Smishing Attacks Using Feature Extraction and Classification Techniques. In: Lecture Notes on Data Engineering and Communications Technologies. Springer Singapore, pp.677-689.
N. Mosharrat, IH. Sarker, MM. Anwar, MN. Islam, P. Watters, et al. M. Hammoudeh. (2022). Automatic Malware Categorization Based on K-Means Clustering Technique. In: Lecture Notes on Data Engineering and Communications Technologies. Springer Singapore, pp.653-664.
H. Egerton, M. Hammoudeh, D. Unal, B. Adebisi (2021). Applying Zero Trust Security Principles to Defence Mechanisms Against Data Exfiltration Attacks. In: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications. Wiley, pp.57-89.
J. Saleem, M. Hammoudeh (2017). Defense methods against social engineering attacks. K. Daimi. In: Computer and Network Security Essentials. Springer, pp.603-618.
MM. Islam, MK. Islam, M. Hammoudeh (2023). High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks. In: 2023 Fifth International Conference on Blockchain Computing and Applications (BCCA). 24/10/2023. pp.97-103.
O. Nnamonu, M. Hammoudeh, T. Dargahi (2023). Metaverse Cybersecurity Threats and Risks Analysis: The case of Virtual Reality Towards Security Testing and Guidance Framework. In: 2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom). 26/6/2023. pp.94-98.
S. Holm, M. Hammoudeh (2022). A Comparative Analysis of IoT Protocols for Resource Constraint Devices and Networks. In: Proceedings of the 6th International Conference on Future Networks & Distributed Systems. pp.616-625.
H. Ngadi, A. Bounceur, M. Hammoudeh, S. Ouchani, M. Bezoui, et al. R. Euler, A. Laouid. (2022). From Simulation to Digital Twins, the Case of Internet of Things Research and Tools. In: Proceedings of the 6th International Conference on Future Networks & Distributed Systems. pp.657-666.
A. Abuarqoub, A. Alzu'bi, M. Hammoudeh, A. Ahmad, B. Al-Shargabi (2022). A Survey on Vehicular Ad hoc Networks Security Attacks and Countermeasures. In: Proceedings of the 6th International Conference on Future Networks & Distributed Systems. pp.701-707.
O. Jogunola, B. Adebisi, H. Gacanin, M. Hammoudeh, G. Gui (2022). Optimal Dynamic Multi-source Multi-community Power Schedule and Trading. In: 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). 25/10/2022. pp.110-115.
M. Kara, A. Laouid, A. Bounceur, M. Hammoudeh, M. Alshaikh, et al. R. Kebache. (2021). Semi-Decentralized Model for Drone Collaboration on Secure Measurement of Positions. In: The 5th International Conference on Future Networks & Distributed Systems. pp.64-69.
E. Rabieinejad, A. Yazdinejad, T. Hasani, M. Hammoudeh (2021). Blockchain-based E-commerce for the COVID-19 economic crisis. In: The 5th International Conference on Future Networks & Distributed Systems. pp.105-112.
RE. Ulfath, H. Alqahtani, M. Hammoudeh, IH. Sarker (2021). Hybrid CNN-GRU Framework with Integrated Pre-trained Language Transformer for SMS Phishing Detection. In: The 5th International Conference on Future Networks & Distributed Systems. pp.244-251.
M. Hammoudeh, B. Adebisi, D. Unal, A. Laouid (2021). Bringing Coordination Languages Back to the Future Using Blockchain Smart Contracts. In: The 5th International Conference on Future Networks & Distributed Systems. pp.299-304.
E. Rabieinejad, A. Yazdinejad, T. Hasani, RM. Parizi, M. Hammoudeh (2021). An Efficient DeFi-based Data Warehousing Approach in Supply Chain Finance. In: The 5th International Conference on Future Networks & Distributed Systems. pp.177-185.
M. Kara, A. Laouid, R. Euler, MA. Yagoub, A. Bounceur, et al. M. Hammoudeh, S. Medileh. (2020). A Homomorphic Digit Fragmentation Encryption Scheme Based on the Polynomial Reconstruction Problem. In: The 4th International Conference on Future Networks and Distributed Systems (ICFNDS).
SS. Guia, A. Laouid, R. Euler, MA. Yagoub, A. Bounceur, et al. M. Hammoudeh. (2020). A Salient Object Detection Technique Based on Color Divergence. In: The 4th International Conference on Future Networks and Distributed Systems (ICFNDS).
O. Jogunola, M. Hammoudeh, K. Anoh, B. Adebisi (2020). Distributed Ledger Technologies for Peer-to-Peer Energy Trading. In: 2020 IEEE Electric Power and Energy Conference (EPEC). Edmonton, CANADA, 9/11/2020.
ASM. Kayes, M. Hammoudeh, S. Badsha, PA. Watters, A. Ng, et al. F. Mohammed, M. Islam. (2020). Responsibility Attribution Against Data Breaches. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT). 2/2/2020. pp.498-503.
M. Hammoudeh, I. Ghafir, A. Bounceur, T. Rawlinson (2019). Continuous Monitoring in Mission-Critical Applications Using the Internet of Things and Blockchain. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems.
M. AlShaikh, L. Laouamer, A. Laouid, A. Bounceur, M. Hammoudeh (2019). Robust and Imperceptible Medical Image Watermarking Based on Dijkstra Algorithm. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems.
M. Alkhawatrah, Y. Gong, O. Aldabbas, M. Hammoudeh (2019). Buffer-Aided 5G Cooperative Networks. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems.
O. Jogunola, M. Hammoudeh, B. Adebisi, KOO. Anoh (2019). Demonstrating Blockchain-Enabled Peer-to-Peer Energy Trading and Sharing. In: CCECE. 5/5/2019. pp.1-4.
A. Bounceur, M. Bezoui, L. Lagadec, R. Euler, L. Abdelkader, et al. M. Hammoudeh. (2019). DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). pp.42-53.
J. Saleem, M. Hammoudeh, U. Raza, B. Adebisi, R. Ande (2018). IoT standardisation. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. Amman, JORDAN, 26/6/2018.
M. Bezoui, A. Bounceur, L. Lagadec, R. Euler, M. Hammoudeh, et al. A. Laouid, A. Tari. (2018). Detecting gaps and voids in WSNs and IoT networks. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. Amman, JORDAN, 26/6/2018.
D. Kelly, M. Hammoudeh (2018). Optimisation of the public key encryption infrastructure for the internet of things. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. Amman, JORDAN, 26/6/2018.
M. Hammoudeh, S. Murad, M. Arioua (2018). ICFNDS 2018-message from the program co-chairs. In: ACM International Conference Proceeding Series.
A. Kuszyk, M. Hammoudeh (2018). Contemporary alternatives to traditional processor design in the post Moore's law era. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems. Amman, JORDAN, 26/6/2018.
L. Farhan, L. Alzubaidi, M. Abdulsalam, AJ. Abboud, M. Hammoudeh, et al. R. Kharel. (2018). An efficient data packet scheduling scheme for Internet of Things networks. In: 2018 1st International Scientific Conference of Engineering Sciences - 3rd Scientific Conference of Engineering Science (ISCES). 10/1/2018. pp.1-6.
A. Bounceur, M. Bezoui, U. Noreen, R. Euler, F. Lalem, et al. M. Hammoudeh, S. Jabbar. (2018). LOGO: A New Distributed Leader Election Algorithm in WSNs with Low Energy Consumption. In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST. pp.1-16.
L. Farhan, AE. Alissa, ST. Shukur, M. Hammoudeh, R. Kharel (2017). An Energy Efficient Long Hop (LH) First Scheduling Algorithm for Scalable Internet of Things (IoT) Networks. In: 2017 ELEVENTH INTERNATIONAL CONFERENCE ON SENSING TECHNOLOGY (ICST). Sydney, AUSTRALIA, 4/12/2017. pp.298-303.
KG. Holmes, A. Coates, M. Hammoudeh (2017). Motion capture using the internet of things technology: A tutorial. In: ACM International Conference Proceeding Series. Cambridge, UK, 19/7/2017.
M. Hammoudeh, R. Newman (2017). ICFNDS 2017-Message from the general chairs. In: ACM International Conference Proceeding Series.
SK. Ghalem, B. Kechar, A. Bounceur, R. Euler, M. Hammoudeh, et al. F. Lalem. (2017). A copula based approach for measurement validity verification in wireless sensor networks. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. Univ Cambridge, Churchill Coll, Cambridge, ENGLAND, 22/3/2017.
F. Lalem, A. Bounceur, R. Euler, M. Hammoudeh, R. Kacimi, et al. SK. Ghalem. (2017). Distributed faulty sensor node detection in wireless sensor networks based on copula theory. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing. Univ Cambridge, Churchill Coll, Cambridge, ENGLAND, 22/3/2017.
U. Raza, R. Kharel, M. Hammoudeh, B. Whiteside, SUNDAY. EKPO (2016). A Wireless Sensor Network and Service Orientated Architecture Based High Value-Added Manufacturing Process Monitoring Architecture. Praque, Czech Republic,, 20/7/2016.
U. Raza, R. Kharel, M. Hammoudeh, S. Ekpo, BR. Whiteside (2016). A service based wireless sensor networks architecture for high value-added process monitoring. In: 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). Prague, CZECH REPUBLIC, 20/7/2016.
MH. Hammoudeh (2016). Putting the lab on the map: A wireless sensor network system for border security and surveillance. Cambridge, UK, 22/3/2016.
A. Carlin, M. Hammoudeh, O. Aldabbas (2015). Defence for Distributed Denial of Service Attacks in Cloud Computing. In: Procedia Computer Science. Natl Sch Engineers Sousse, TUNISIA, 5/10/2015. pp.490-497.
F. Alfayez, M. Hammoudeh, A. Abuarqoub (2015). A Survey on MAC Protocols for Duty-cycled Wireless Sensor Networks. In: Procedia Computer Science. Natl Sch Engineers Sousse, TUNISIA, 5/10/2015. pp.482-489.
M. Hammoudeh, L. Han (2015). Message from the General Chairs. In: 2015 European Intelligence and Security Informatics Conference. 7/9/2015.
LA. Holt, M. Hammoudeh (2013). Cloud Forensics: A Technical Approach to Virtual Machine Acquisition. In: 2013 European Intelligence and Security Informatics Conference. 12/8/2013.
P. Dibb, M. Hammoudeh (2013). Forensic Data Recovery from Android OS Devices: An Open Source Toolkit. In: 2013 European Intelligence and Security Informatics Conference. 12/8/2013.
TAA. Alsboui, M. Hammoudeh, Z. Bandar, A. Nisbet (2011). An Overview and Classification of Approaches to Information Extraction in Wireless Sensor Networks. In: PROCEEDINGS OF SENSORCOMM 2011, THE FIFTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS. Nice, FRANCE, 21/8/2011. pp.255-260.
M. Hammoudeh, TAA. Alsboui (2011). Building Programming Abstractions for Wireless Sensor Networks Using Watershed Segmentation. In: NEW2AN. pp.587-597.
M. Hammoudeh, RM. Newman, C. Dennett, S. Mount (2009). Inductive as a support of deductive data visualisation in Wireless Sensor Networks. In: ISCC. pp.277-280.
M. Hammoudeh, RM. Newman, C. Dennett, S. Mount (2009). Application Domain Driven Data Visualisation Framework for Wireless Sensor Networks. In: UIC. pp.150-162.
S. Mount, M. Hammoudeh, S. Wilson, RM. Newman (2009). CSP as a Domain-Specific Language Embedded in Python and Jython. In: CPA. pp.293-309.
M. Hammoudeh, RM. Newman, S. Mount (2009). An Approach to Data Extraction and Visualisation for Wireless Sensor Networks. In: ICN. pp.156-161.
M. Hammoudeh (2008). Modelling Clustering of Sensor Networks with Synchronised Hyperedge Replacement. In: ICGT. pp.490-492.
RM. Newman, M. Hammoudeh (2008). Pennies from Heaven: A Retrospective on the Use of Wireless Sensor Networks for Planetary Exploration. In: AHS. pp.263-270.