Yousof Al-Hammadi
Yousof Al-Hammadi
Khalifa University of Science and Technology
Verified email at
Cited by
Cited by
DCA for bot detection
Y Al-Hammadi, U Aickelin, J Greensmith
2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on …, 2008
The evolution of distributed systems towards microservices architecture
T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi
2016 11th International Conference for Internet Technology and Secured …, 2016
Multiple access for visible light communications: Research challenges and future trends
SS Bawazir, PC Sofotasios, S Muhaidat, Y Al-Hammadi, ...
Ieee Access 6, 26167-26174, 2018
Detecting bots based on keylogging activities
Y Al-Hammadi, U Aickelin
2008 Third International Conference on Availability, Reliability and …, 2008
Deep-structured machine learning model for the recognition of mixed-defect patterns in semiconductor fabrication processes
G Tello, OY Al-Jarrah, PD Yoo, Y Al-Hammadi, S Muhaidat, U Lee
IEEE Transactions on Semiconductor Manufacturing 31 (2), 315-322, 2018
Simplified subspaced regression network for identification of defect patterns in semiconductor wafer maps
F Adly, O Alhussein, PD Yoo, Y Al-Hammadi, K Taha, S Muhaidat, ...
IEEE Transactions on Industrial Informatics 11 (6), 1267-1276, 2015
Randomized general regression network for identification of defect patterns in semiconductor wafer maps
F Adly, PD Yoo, S Muhaidat, Y Al-Hammadi, U Lee, M Ismail
IEEE Transactions on Semiconductor Manufacturing 28 (2), 145-152, 2015
Detecting botnets through log correlation
Y Al-Hammadi, U Aickelin
Available at SSRN 2831379, 2006
Performance comparison between container-based and VM-based services
T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN …, 2017
Multi-layered clustering for power consumption profiling in smart grids
OY Al-Jarrah, Y Al-Hammadi, PD Yoo, S Muhaidat
IEEE Access 5, 18459-18468, 2017
Popularity-based video caching techniques for cache-enabled networks: a survey
HS Goian, OY Al-Jarrah, S Muhaidat, Y Al-Hammadi, P Yoo, M Dianati
IEEE Access 7, 27699-27719, 2019
Behavioural correlation for malicious bot detection
Y Al-Hammadi, A Abdulla
University of Nottingham, 2010
Behavioural correlation for detecting P2P bots
Y Al-Hammadi, U Aickelin
2010 Second International Conference on Future Networks, 323-327, 2010
Semi-supervised multi-layered clustering model for intrusion detection
OY Al-Jarrah, Y Al-Hammdi, PD Yoo, S Muhaidat, M Al-Qutayri
Digital Communications and Networks 4 (4), 277-286, 2018
Anomaly detection for Internet worms
Y Al-Hammadi, C Leckie
2005 9th IFIP/IEEE International Symposium on Integrated Network Management …, 2005
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs
D Al-Terri, H Otrok, H Barada, M Al-Qutayri, Y Al Hammadi
Computer Communications 104, 108-118, 2017
BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications
D Shehada, CY Yeun, MJ Zemerly, M Al Qutayri, Y Al Hammadi, ...
Security and Communication Networks 2017, 2017
Blockchain-based ownership management for medical IoT (MIoT) devices
M Alblooshi, K Salah, Y Alhammadi
2018 International Conference on Innovations in Information Technology (IIT …, 2018
Secure lightweight ECC-based protocol for multi-agent IoT systems
H Hasan, T Salah, D Shehada, MJ Zemerly, CY Yeun, M Al-Qutayri, ...
2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017
Analyzing a co-occurrence gene-interaction network to identify disease-gene association
A Al-Aamri, K Taha, Y Al-Hammadi, M Maalouf, D Homouz
BMC bioinformatics 20 (1), 70, 2019
The system can't perform the operation now. Try again later.
Articles 1–20