


default search action
Mohammad Hamad
Person information
- affiliation: Technical University of Munich (TUM), Germany
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j10]Andreas Finkenzeller, Andrew Roberts, Mauro Bellone, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
Sensor Fusion Desynchronization Attacks (Artifact). Dagstuhl Artifacts Ser. 11(1): 1:1-1:3 (2025)
[j9]Mohammad Hamad
, Zain Alabedin Haj Hammadeh
, Davide Alessi, Monowar Hasan
, Mert D. Pesé
, Daniel Lüdtke
, Sebastian Steinhorst
:
Enhancing Security Through Task Migration in Software-Defined Vehicles. IEEE Internet Things J. 12(24): 52521-52535 (2025)
[j8]Zain Alabedin Haj Hammadeh
, Monowar Hasan
, Mohammad Hamad
:
RESCUE: A Reconfigurable Scheduling Framework for Securing Multi-Core Real-Time Systems. ACM Trans. Cyber Phys. Syst. 9(3): 28:1-28:23 (2025)
[j7]Andreas Finkenzeller
, Arne Fucks
, Emanuel Regnath
, Mohammad Hamad
, Sebastian Steinhorst
:
Securing the Precision Time Protocol with SDN-enabled Cyclic Path Asymmetry Analysis. ACM Trans. Cyber Phys. Syst. 9(3): 33:1-33:25 (2025)
[c32]Mohammad Hamad, Michael Kühr, Haralambos Mouratidis, Eleni-Maria Kalogeraki, Christos A. Gizelis, Dimitrios Papanikas, Athanasios Bountioukos-Spinaris, Charilaos Skandylas, Evangelos Raptis, Andreas Alexopoulos, Grigorios Chrysos, Mina Marmpena, Sevasti Politi, Konstantinos Lieros, Nikolaos Papagiannopoulos, Iordanis Xanthopoulos, Spyros Papastergiou, Sotiris Ioannidis, Mikael Asplund, Marc-Oliver Pahl, Sebastian Steinhorst:
Multi-Partner Project: CyberSecDome - Framework for Secure, Collaborative, and Privacy-Aware Incident Handling for Digital Infrastructure. DATE 2025: 1-7
[c31]Mohammad Hamad, Christian Prehofer, Mikael Asplund, Tobias Löhr, Lucas Bublitz, Alexander Zeh, Mridula Singh, Sebastian Steinhorst:
Cybersecurity Challenges of Autonomous Systems. DATE 2025: 1-10
[c30]Zain Alabedin Haj Hammadeh
, Mohammad Hamad, Andrzej Olchawa, Milenko Starcik, Ricardo Fradique, Stefan Langhammer, Manuel Hoffmann, Florian Göhler, Daniel Lüdtke
, Michael Felderer
, Sebastian Steinhorst:
Designing Secure Space Systems. DATE 2025: 1-10
[c29]Michael Kühr, Maximilian Mittmann, Mohammad Hamad, Sebastian Steinhorst:
Cati - An Open-Source Framework to Evaluate Attacks on Cameras for Autonomous Vehicles. DSD 2025: 523-530
[c28]Mert D. Pesé, Bulut Gözübüyük, Eric Andrechek
, Habeeb Olufowobi
, Mohammad Hamad, Kang G. Shin:
MichiCAN: Spoofing and Denial-of-Service Protection using Integrated CAN Controllers. DSN 2025: 443-456
[c27]Andreas Finkenzeller, Andrew Roberts, Mauro Bellone, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
Sensor Fusion Desynchronization Attacks. ECRTS 2025: 6:1-6:22
[c26]Johan Mattias Juul, Andrew James Roberts, Mohammad Hamad, Adrian Nicholas Venables, Rain Ottis:
Applying Machine Learning for Electronic Warfare Activity Detection at a National Scale. MILCOM 2025: 1-6
[c25]Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Raivo Sell, Olaf Maennel
, Mohammad Hamad, Sebastian Steinhorst:
Analysis of Autonomous Driving Software to Low-Level Sensor Cyber Attacks. SEAMS@ICSE 2025: 122-132
[c24]Andrew Roberts, Jingyue Cheng, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
ADSecLang: a Domain-Specific Language for Cybersecurity Testing of Autonomous Vehicles. VTC2025-Spring 2025: 1-6
[c23]Andrew Roberts, Mohsen Malayjerdi, Mauro Bellone, Raivo Sell, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
Adsecdata Platform: An Open-Source Data Platform for Autonomous Driving Cybersecurity. VTC2025-Spring 2025: 1-7
[i10]Andrew Roberts, Lorenz Teply, Mert D. Pesé, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
FuzzSense: Towards A Modular Fuzzing Framework for Autonomous Driving Software. CoRR abs/2504.10717 (2025)
[i9]Mohammad Fakhruddin Babar, Zain Alabedin Haj Hammadeh, Mohammad Hamad, Monowar Hasan:
Investigating Timing-Based Information Leakage in Data Flow-Driven Real-Time Systems. CoRR abs/2506.01991 (2025)
[i8]Pedram MohajerAnsari, Amir Salarpour, Michael Kühr, Siyu Huang
, Mohammad Hamad, Sebastian Steinhorst, Habeeb Olufowobi
, Mert D. Pesé:
On the Natural Robustness of Vision-Language Models Against Visual Perception Attacks in Autonomous Driving. CoRR abs/2506.11472 (2025)- 2024
[j6]Mohammad Hamad
, Andreas Finkenzeller, Michael Kühr, Andrew Roberts
, Olaf Maennel
, Vassilis Prevelakis, Sebastian Steinhorst
:
REACT: Autonomous intrusion response system for intelligent vehicles. Comput. Secur. 145: 104008 (2024)
[j5]Firas Hamila, Mohammad Hamad
, Daniel Costa Salgado, Sebastian Steinhorst
:
Enhancing security in Fiat-Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication. Int. J. Inf. Sec. 23(2): 1131-1148 (2024)
[c22]Andrew Roberts, Mohammad Reza Heidari Iman, Mauro Bellone, Tara Ghasempouri, Jaan Raik, Olaf Maennel, Mohammad Hamad, Sebastian Steinhorst:
ADAssure: Debugging Methodology for Autonomous Driving Control Algorithms. DATE 2024: 1-6
[c21]Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath
, Mohammad Hamad, Sebastian Steinhorst:
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. INFOCOM 2024: 461-470
[c20]Zain Alabedin Haj Hammadeh
, Monowar Hasan
, Mohammad Hamad:
Securing Real-Time Systems using Schedule Reconfiguration. ISORC 2024: 1-10
[c19]Sherin Kalli Valappil, Lars Vogel, Mohammad Hamad, Sebastian Steinhorst:
Advanced IDPS Architecture for Connected and Autonomous Vehicles. IV 2024: 1779-1785
[c18]Mohammad Hamad
, Andreas Finkenzeller
, Monowar Hasan
, Marc-Oliver Pahl
, Sebastian Steinhorst
:
A Gamified Learning Approach for IoT Security Education Using Capture-the-Flag Competitions: Architecture and Insights. NordSec 2024: 161-175
[i7]Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst:
REACT: Autonomous Intrusion Response System for Intelligent Vehicles. CoRR abs/2401.04792 (2024)
[i6]Andreas Finkenzeller, Oliver Butowski, Emanuel Regnath, Mohammad Hamad, Sebastian Steinhorst:
PTPsec: Securing the Precision Time Protocol Against Time Delay Attacks Using Cyclic Path Asymmetry Analysis. CoRR abs/2401.10664 (2024)
[i5]Michael Kühr, Mohammad Hamad, Pedram MohajerAnsari, Mert D. Pesé, Sebastian Steinhorst:
SoK: Security of the Image Processing Pipeline in Autonomous Vehicles. CoRR abs/2409.01234 (2024)
[i4]Pedram MohajerAnsari, Alkim Domeke, Jan de Voor, Arkajyoti Mitra, Grace Johnson, Amir Salarpour, Habeeb Olufowobi
, Mohammad Hamad, Mert D. Pesé:
Discovering New Shadow Patterns for Black-Box Attacks on Lane Detection of Autonomous Vehicles. CoRR abs/2409.18248 (2024)
[i3]Marco De Vincenzi, Mert D. Pesé, Chiara Bodei, Ilaria Matteucci, Richard R. Brooks, Monowar Hasan, Andrea Saracino, Mohammad Hamad, Sebastian Steinhorst:
Contextualizing Security and Privacy of Software-Defined Vehicles: State of the Art and Industry Perspectives. CoRR abs/2411.10612 (2024)- 2023
[j4]Mohammad Hamad
, Andreas Finkenzeller
, Hangmao Liu
, Jan Lauinger
, Vassilis Prevelakis, Sebastian Steinhorst
:
SEEMQTT: Secure End-to-End MQTT-Based Communication for Mobile IoT Systems Using Secret Sharing and Trust Delegation. IEEE Internet Things J. 10(4): 3384-3406 (2023)
[c17]Marinos Tsantekidis, Souleima Abdelghani, Mohammad Hamad, Vassilis Prevelakis:
Creating a Security Enforcement Environment for a Vehicular Platform. CSCN 2023: 278-283
[c16]Borna Blazevic, Michael Peter, Mohammad Hamad
, Sebastian Steinhorst
:
TEEVseL4: Trusted Execution Environment for Virtualized seL4-Based Systems. RTCSA 2023: 67-76
[c15]Andreas Finkenzeller, Anshu Mathur, Jan Lauinger, Mohammad Hamad
, Sebastian Steinhorst:
Simutack - An Attack Simulation Framework for Connected and Autonomous Vehicles. VTC2023-Spring 2023: 1-7
[i2]Mohammad Hamad, Sebastian Steinhorst:
Security Challenges in Autonomous Systems Design. CoRR abs/2312.00018 (2023)- 2022
[c14]Jan Lauinger, Andreas Finkenzeller, Henrik Lautebach, Mohammad Hamad
, Sebastian Steinhorst:
Attack Data Generation Framework for Autonomous Vehicle Sensors. DATE 2022: 128-131
[c13]Wenxuan Ye, Xueli An, Xueqiang Yan, Mohammad Hamad
, Sebastian Steinhorst
:
FLaaS6G: Federated Learning as a Service in 6G Using Distributed Data Management Architecture. GLOBECOM 2022: 1247-1252
[c12]Andreas Finkenzeller, Thomas Wakim, Mohammad Hamad
, Sebastian Steinhorst
:
Feasible Time Delay Attacks Against the Precision Time Protocol. GLOBECOM 2022: 3375-3380
[c11]Jan Lauinger, Mohammad Hamad
, Sebastian Steinhorst
:
Toward a Multi-Layer Intrusion Response System for Connected Vehicles. VTC Fall 2022: 1-2- 2021
[j3]Lea Schönberger
, Mohammad Hamad
, Javier Velasquez Gomez, Sebastian Steinhorst
, Selma Saidi:
Towards an Increased Detection Sensitivity of Time-Delay Attacks on Precision Time Protocol. IEEE Access 9: 157398-157410 (2021)
[c10]Mohammad Hamad
, Emanuel Regnath
, Jan Lauinger, Vassilis Prevelakis, Sebastian Steinhorst
:
SPPS: Secure Policy-based Publish/Subscribe System for V2C Communication. DATE 2021: 529-534
[c9]Jan Lauinger, Jens Ernstberger, Emanuel Regnath
, Mohammad Hamad
, Sebastian Steinhorst
:
A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management. IEEE ICBC 2021: 1-9
[i1]Jan Lauinger, Mudassar Aslam, Mohammad Hamad, Shahid Raza, Sebastian Steinhorst:
Quantitative System-Level Security Verification of the IoV Infrastructure. CoRR abs/2101.06137 (2021)- 2020
[b1]Mohammad Hamad
:
A Multilayer Secure Framework for Vehicular Systems (Ein mehrschichtiges sicheres Framework für Fahrzeugsysteme). Braunschweig University of Technology, Germany, 2020
[j2]Mohammad Hamad
, Vassilis Prevelakis
:
SAVTA: A Hybrid Vehicular Threat Model: Overview and Case Study. Inf. 11(5): 273 (2020)
[j1]Mohammad Hamad
, Zain Alabedin Haj Hammadeh
, Selma Saidi, Vassilis Prevelakis:
Temporal-based intrusion detection for IoV. it Inf. Technol. 62(5-6): 227-239 (2020)
2010 – 2019
- 2019
[c8]Mohammad Hamad
, Marinos Tsantekidis
, Vassilis Prevelakis
:
Intrusion Response System for Vehicles: Challenges and Vision. SMARTGREENS/VEHITS (Selected Papers) 2019: 321-341
[c7]Mohammad Hamad, Marinos Tsantekidis
, Vassilis Prevelakis:
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System. VEHITS 2019: 148-158- 2018
[c6]Muhammad Ali Siddiqi, Robert M. Seepers, Mohammad Hamad, Vassilis Prevelakis, Christos Strydis:
Attack-tree-based Threat Modeling of Medical Implants. PROOFS 2018: 32-49
[c5]Mohammad Hamad
, Zain Alabedin Haj Hammadeh
, Selma Saidi, Vassilis Prevelakis, Rolf Ernst:
Prediction of abnormal temporal behavior in real-time systems. SAC 2018: 359-367
[c4]Mohammad Hamad
, Mustafa R. Agha, Vassilis Prevelakis:
ProSEV: Proxy-Based Secure and Efficient Vehicular Communication. VNC 2018: 1-8- 2017
[c3]Mohammad Hamad
, Vassilis Prevelakis:
Secure APIs for Applications in Microkernel-based Systems. ICISSP 2017: 553-558
[c2]Mohammad Hamad
, Marcus Nolte, Vassilis Prevelakis:
A framework for policy based secure intra vehicle communication. VNC 2017: 1-8- 2015
[c1]Vassilis Prevelakis, Mohammad Hamad
:
A Policy-based Communications Architecture for Vehicles. ICISSP 2015: 155-162
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-12 03:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







