Yousof Al-Hammadi
Yousof Al-Hammadi
Khalifa University of Science and Technology
Verified email at
Cited by
Cited by
DCA for bot detection
Y Al-Hammadi, U Aickelin, J Greensmith
2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on …, 2008
The evolution of distributed systems towards microservices architecture
T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi
2016 11th International Conference for Internet Technology and Secured …, 2016
Multiple access for visible light communications: Research challenges and future trends
SS Bawazir, PC Sofotasios, S Muhaidat, Y Al-Hammadi, ...
Ieee Access 6, 26167-26174, 2018
Deep-structured machine learning model for the recognition of mixed-defect patterns in semiconductor fabrication processes
G Tello, OY Al-Jarrah, PD Yoo, Y Al-Hammadi, S Muhaidat, U Lee
IEEE Transactions on Semiconductor Manufacturing 31 (2), 315-322, 2018
Simplified subspaced regression network for identification of defect patterns in semiconductor wafer maps
F Adly, O Alhussein, PD Yoo, Y Al-Hammadi, K Taha, S Muhaidat, ...
IEEE Transactions on Industrial Informatics 11 (6), 1267-1276, 2015
Performance comparison between container-based and VM-based services
T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN …, 2017
Popularity-based video caching techniques for cache-enabled networks: A survey
HS Goian, OY Al-Jarrah, S Muhaidat, Y Al-Hammadi, P Yoo, M Dianati
IEEE Access 7, 27699-27719, 2019
Detecting bots based on keylogging activities
Y Al-Hammadi, U Aickelin
2008 Third International Conference on Availability, Reliability and …, 2008
Randomized general regression network for identification of defect patterns in semiconductor wafer maps
F Adly, PD Yoo, S Muhaidat, Y Al-Hammadi, U Lee, M Ismail
IEEE Transactions on Semiconductor Manufacturing 28 (2), 145-152, 2015
Semi-supervised multi-layered clustering model for intrusion detection
OY Al-Jarrah, Y Al-Hammdi, PD Yoo, S Muhaidat, M Al-Qutayri
Digital Communications and Networks 4 (4), 277-286, 2018
Multi-layered clustering for power consumption profiling in smart grids
OY Al-Jarrah, Y Al-Hammadi, PD Yoo, S Muhaidat
IEEE Access 5, 18459-18468, 2017
Detecting botnets through log correlation
Y Al-Hammadi, U Aickelin
Available at SSRN 2831379, 2006
Blockchain-based ownership management for medical IoT (MIoT) devices
M Alblooshi, K Salah, Y Alhammadi
2018 International Conference on Innovations in Information Technology (IIT …, 2018
Behavioural correlation for malicious bot detection
YAA Al-Hammadi, A Abdulla
University of Nottingham, 2010
Cache-aided non-orthogonal multiple access for 5G-enabled vehicular networks
S Gurugopinath, PC Sofotasios, Y Al-Hammadi, S Muhaidat
IEEE Transactions on Vehicular Technology 68 (9), 8359-8371, 2019
Secure lightweight ECC-based protocol for multi-agent IoT systems
H Hasan, T Salah, D Shehada, MJ Zemerly, CY Yeun, M Al-Qutayri, ...
2017 IEEE 13th international conference on wireless and mobile computing …, 2017
Behavioural correlation for detecting P2P bots
Y Al-Hammadi, U Aickelin
2010 Second International Conference on Future Networks, 323-327, 2010
Analyzing a co-occurrence gene-interaction network to identify disease-gene association
A Al-Aamri, K Taha, Y Al-Hammadi, M Maalouf, D Homouz
BMC bioinformatics 20 (1), 1-15, 2019
A stackelberg game for street-centric QoS-OLSR protocol in urban vehicular Ad Hoc networks
M Kadadha, H Otrok, H Barada, M Al-Qutayri, Y Al-Hammadi
Vehicular Communications 13, 64-77, 2018
Cooperative based tit-for-tat strategies to retaliate against greedy behavior in VANETs
D Al-Terri, H Otrok, H Barada, M Al-Qutayri, Y Al Hammadi
Computer Communications 104, 108-118, 2017
The system can't perform the operation now. Try again later.
Articles 1–20