SAVTA: A hybrid vehicular threat model: Overview and case study M Hamad, V Prevelakis Information 11 (5), 273, 2020 | 23 | 2020 |
Attack-tree-based Threat Modeling of Medical Implants MA Siddiqi, RM Seepers, M Hamad, V Prevelakis, C Strydis 7th International Workshop on Security Proofs for Embedded Systems (PROOFS), 2018 | 23 | 2018 |
Prediction of abnormal temporal behavior in real-time systems M Hamad, ZAH Hammadeh, S Saidi, V Prevelakis, R Ernst Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 359-367, 2018 | 22 | 2018 |
Towards Comprehensive Threat Modeling for Vehicles M Hamad, M Nolte, V Prevelakis 1st Workshop on Security and Dependability of Critical Embedded Real-Time …, 2016 | 21 | 2016 |
A communication framework for distributed access control in microkernel-based systems M Hamad, J Schlatow, V Prevelakis, R Ernst 12th Annual Workshop on Operating Systems Platforms for Embedded Real-Time …, 2016 | 20 | 2016 |
Red-Zone: Towards an Intrusion Response Framework for Intra-Vehicle System M Hamad, T Marinos, V Prevelakis 5th International Conference on Vehicle Technology and Intelligent Transport …, 2019 | 18 | 2019 |
SEEMQTT: secure end-to-end MQTT-based communication for mobile IoT systems using secret sharing and trust delegation M Hamad, A Finkenzeller, H Liu, J Lauinger, V Prevelakis, S Steinhorst IEEE Internet of Things Journal 10 (4), 3384-3406, 2022 | 17 | 2022 |
A framework for policy based secure intra vehicle communication M Hamad, M Nolte, V Prevelakis 2017 IEEE Vehicular Networking Conference (VNC), 1-8, 2017 | 15 | 2017 |
Implementation and performance evaluation of embedded ipsec in microkernel os M Hamad, V Prevelakis 2015 World Symposium on Computer Networks and Information Security (WSCNIS), 1-7, 2015 | 14 | 2015 |
Intrusion response system for vehicles: Challenges and vision M Hamad, M Tsantekidis, V Prevelakis International Conference on Smart Cities and Green ICT Systems, 321-341, 2019 | 10 | 2019 |
A policy-based communications architecture for vehicles V Prevelakis, M Hamad 2015 International Conference on Information Systems Security and Privacy …, 2015 | 10 | 2015 |
A-poa: Anonymous proof of authorization for decentralized identity management J Lauinger, J Ernstberger, E Regnath, M Hamad, S Steinhorst 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2021 | 9 | 2021 |
Feasible time delay attacks against the precision time protocol A Finkenzeller, T Wakim, M Hamad, S Steinhorst GLOBECOM 2022-2022 IEEE Global Communications Conference, 3375-3380, 2022 | 6 | 2022 |
Attack Data Generation Framework for Autonomous Vehicle Sensors J Lauinger, A Finkenzeller, H Lautebach, M Hamad, S Steinhorst Proceedings of the Conference on Design, Automation and Test in Europe (DATE …, 2022 | 6 | 2022 |
Towards an increased detection sensitivity of time-delay attacks on precision time protocol L Schönberger, M Hamad, JV Gomez, S Steinhorst, S Saidi IEEE access 9, 157398-157410, 2021 | 6 | 2021 |
SPPS: Secure policy-based publish/subscribe system for V2C communication M Hamad, E Regnath, J Lauinger, V Prevelakis, S Steinhorst 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 529-534, 2021 | 6 | 2021 |
A Multilayer Secure Framework for Vehicular Systems M Hamad TU Braunschweig, 2020 | 6 | 2020 |
Simutack-an attack simulation framework for connected and autonomous vehicles A Finkenzeller, A Mathur, J Lauinger, M Hamad, S Steinhorst 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), 1-7, 2023 | 4 | 2023 |
Extending the Operational Envelope of Applications V Prevelakis, M Hamad 8th International Conference on Trust & Trustworthy Computing (TRUST 2015), 2015 | 4 | 2015 |
Quantitative system-level security verification of the IoV infrastructure J Lauinger, M Aslam, M Hamad, S Raza, S Steinhorst arXiv preprint arXiv:2101.06137, 2021 | 3 | 2021 |