default search action
Amjad Gawanmeh
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Oussama Kerdjidj, Yassine Himeur, Shahab Saquib Sohail, Abbes Amira, Fodil Fadli, Shadi Atalla, Wathiq Mansoor, Abigail Copiaco, Amjad Gawanmeh, Sami Miniaoui, Diana Dawoud:
Uncovering the Potential of Indoor Localization: Role of Deep and Transfer Learning. IEEE Access 12: 73980-74010 (2024) - [j29]Marwa Chendeb El Rai, Muna Darweesh, Aïcha Beya Far, Amjad Gawanmeh:
Multi-Source Attention-Based Fusion for Segmentation of Natural Disasters. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - 2023
- [j28]Salwa Razaulla, Claude Fachkha, Christine Markarian, Amjad Gawanmeh, Wathiq Mansoor, Benjamin C. M. Fung, Chadi Assi:
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions. IEEE Access 11: 40698-40723 (2023) - [j27]Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi:
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework. Ann. des Télécommunications 78(11-12): 703-715 (2023) - [j26]Shadi Atalla, Saed Tarapiah, Amjad Gawanmeh, Mohammad Daradkeh, Husameldin Mukhtar, Yassine Himeur, Wathiq Mansoor, Kamarul Faizal Bin Hashim, Motaz Daadoo:
IoT-Enabled Precision Agriculture: Developing an Ecosystem for Optimized Crop Management. Inf. 14(4): 205 (2023) - [c59]Amjad Gawanmeh, Sa'ed Abed, Sara Abdul Aziz AlAwadh, Wathiq Mansoor, Shadi Atalla, Ahmad Alomari, Eric Yocam:
Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing. ACR 2023: 433-442 - [c58]Jamal N. Al-Karaki, Amjad Gawanmeh, Claude Fachkha:
Blockchain for Email Security: A Perspective on Existing and Potential Solutions for Phishing Attacks. BCCA 2023: 404-411 - [c57]Aisha Almaazmi, Shadi Atalla, Hamzah Ali Alkhazaleh, Wathiq Mansoor, Amjad Gawanmeh:
Predicting Student Dropout in Online Learning Platforms Using Deep Learning Techniques. DASC/PiCom/CBDCom/CyberSciTech 2023: 1107-1114 - [c56]Oussama Kerdjidj, Yassine Himeur, Shadi Atalla, Abigail Copiaco, Shahab Saquib Sohail, Fodil Fadli, Abbes Amira, Wathiq Mansoor, Amjad Gawanmeh:
Exploring 2D Representation and Transfer Learning Techniques for People Identification in Indoor Localization. ICSPIS 2023: 173-177 - 2022
- [j25]Jamal N. Al-Karaki, Amjad Gawanmeh, Islam T. Almalkawi, Omar Alfandi:
Probabilistic analysis of security attacks in cloud environment using hidden Markov models. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j24]Mohammad Daradkeh, Amjad Gawanmeh, Wathiq Mansoor:
Information Adoption Patterns and Online Knowledge Payment Behavior: The Moderating Role of Product Type. Inf. 13(9): 414 (2022) - [j23]Jamal N. Al-Karaki, Amjad Gawanmeh, Sanaa El-Yassami:
GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part A): 3079-3095 (2022) - [j22]Dina Shehada, Amjad Gawanmeh, Chan Yeob Yeun, M. Jamal Zemerly:
Fog-based distributed trust and reputation management system for internet of things. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8637-8646 (2022) - [c55]Meryeme Ayache, Amjad Gawanmeh, Jamal N. Al-Karaki:
DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem. CIoT 2022: 40-47 - [c54]Marwa Chendeb El Rai, Sabina Abdul Hadi, Haitham Abu Damis, Amjad Gawanmeh:
Prediction of Electric Vehicle Charging Stations Distribution Using Machine Learning. ICSPIS 2022: 154-157 - 2021
- [c53]Sara Suleymanova, Amjad Gawanmeh, Wathiq Mansoor:
The Mental Challenges of Emergency Remote Learning: UAE Engineering Students Case Study. CSCI 2021: 947-952 - [c52]Amjad Gawanmeh, Wathiq Mansoor, Sa'ed Abed, Darin Kablaoui, Hala Al-Faisal:
Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems. CSCI 2021: 1794-1799 - 2020
- [j21]Deepa Pavithran, Khaled Shaalan, Jamal N. Al-Karaki, Amjad Gawanmeh:
Towards building a blockchain framework for IoT. Clust. Comput. 23(3): 2089-2103 (2020) - [j20]Thandar Thein, Myint Myat Myo, Sazia Parvin, Amjad Gawanmeh:
Reinforcement learning based methodology for energy-efficient resource allocation in cloud data centers. J. King Saud Univ. Comput. Inf. Sci. 32(10): 1127-1139 (2020) - [c51]Haitham Abu Damis, Dina Shehada, Claude Fachkha, Amjad Gawanmeh, Jamal N. Al-Karaki:
A Microservices Architecture for ADS-B Data Security Using Blockchain. ICSPIS 2020: 1-4 - [c50]Maha Al Hosani, Hamda Al Marzouqi, Shoug Al Junaibi, Amna Al Hmoudi, Jamal N. Al-Karaki, Amjad Gawanmeh:
RAASID: A Multipurpose Crowd Sensing Smart System With Sentimental Analysis. ICSPIS 2020: 1-4 - [c49]Dina Shehada, Amjad Gawanmeh, Claude Fachkha, Haitham Abu Damis:
Performance Evaluation of a Lightweight IoT Authentication Protocol. ICSPIS 2020: 1-4 - [c48]Karl Biron, Wael Bazzaza, Khalid Yaqoob, Amjad Gawanmeh, Claude Fachkha:
A Big Data Fusion to Profile CPS Security Threats Against Operational Technology. WoWMoM 2020: 397-402
2010 – 2019
- 2019
- [j19]Youssef Iraqi, Tajje-eddine Rachidi, Amjad Gawanmeh:
Collision-Prevention Conditions for Wireless Personal Area Networks. IEEE Netw. Lett. 1(1): 22-25 (2019) - [j18]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh, Yousof Al-Hammadi, Ernesto Damiani:
A Novel Protocol for Security of Location Based Services in Multi-agent Systems. Wirel. Pers. Commun. 108(3): 1841-1868 (2019) - [c47]Amjad Gawanmeh, Sazia Parvin, Sitalakshmi Venkatraman, Tony de Souza-Daw, James Jin Kang, Samuel Kaspi, Joanna Jackson:
A Framework for Integrating Big Data Security Into Agricultural Supply Chain. BigDataService 2019: 191-194 - [c46]Jamal N. Al-Karaki, Amjad Gawanmeh:
Security and Privacy Challenges of Integrated Disruptive Technologies. ICSPIS 2019: 1-4 - [c45]Jamal N. Al-Karaki, Amjad Gawanmeh, Meryeme Ayache, Ashraf Mashaleh:
DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain. IWCMC 2019: 330-335 - [c44]Meryeme Ayache, Amjad Gawanmeh, Jamal N. Al-Karaki:
XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud Environments. IWCMC 2019: 1872-1878 - [c43]Amjad Gawanmeh, Swapnoneel Roy, Alain April:
A Distributed Algorithm with Optimum Communication for Cyber Physical Systems: Multi-tank Process Case Study. SysCon 2019: 1-7 - 2018
- [j17]Amjad Gawanmeh, Usman Pervez, Osman Hasan:
Probabliistic analysis of electrocardiogram (ECG) heart signal. Comput. Syst. Sci. Eng. 33(1) (2018) - [j16]Ahmad Alomari, Alain April, Carlos Monsalve, Amjad Gawanmeh:
Integrating a decision tree perspective at the operational-level of BPM+. Comput. Syst. Sci. Eng. 33(3) (2018) - [c42]Pavan Kumar C., Amjad Gawanmeh, Selvakumar R.:
Sensing-as-a-Service Decentralized Data Access Control Mechanism for Cyber Physical Systems. ICC Workshops 2018: 1-5 - [c41]Amjad Gawanmeh, Ahmad Alomari:
Taxonomy Analysis of Security Aspects in Cyber Physical Systems Applications. ICC Workshops 2018: 1-6 - [c40]Sazia Parvin, Amjad Gawanmeh, Sitalakshmi Venkatraman:
Optimised Sensor Based Smart System for Efficient Monitoring of Grain Storage. ICC Workshops 2018: 1-6 - [c39]Negar Mohammadi-Koushki, Amjad Gawanmeh:
Analysis of MAC Protocols for Real-Time Monitoring of Heart and Respiratory Signals. LCN Workshops 2018: 117-123 - 2017
- [j15]Jamal N. Al-Karaki, Amjad Gawanmeh:
The Optimal Deployment, Coverage, and Connectivity Problems in Wireless Sensor Networks: Revisited. IEEE Access 5: 18051-18065 (2017) - [j14]Amjad Gawanmeh, Abdullah Abu Omar, Alain April:
Design and analysis of control strategies for a cyber physical system. Comput. Syst. Sci. Eng. 32(5) (2017) - [j13]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Guided Test Case Generation for Enhanced ECG Bio-Sensors Functional Verification. Int. J. E Health Medical Commun. 8(4): 1-20 (2017) - [j12]Amjad Gawanmeh, Anas Alazzam, Bobby Mathew:
Design and Verification of a Blood Cell Separation Microfluidic Device. Int. J. Online Eng. 13(6): 105-112 (2017) - [j11]Ali Alwadi, Amjad Gawanmeh, Sazia Parvin, Jamal N. Al-Karaki:
Smart Solutions for RFID based Inventory Management Systems: A Survey. Scalable Comput. Pract. Exp. 18(4): 347-360 (2017) - [j10]Amjad Gawanmeh, Kashif Saleem:
Introduction to the Special Issue on Communication, Computing, and Networking in Cyber-Physical Systems. Scalable Comput. Pract. Exp. 18(4): iii (2017) - [j9]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Joonsang Baek, Mahmoud Al-Qutayri:
Lightweight Security Protocol for ECG Bio-Sensors. Wirel. Pers. Commun. 95(4): 5097-5120 (2017) - [c38]Md Sarwar Kamal, Sazia Parvin, Kashif Saleem, Hussam M. N. Al Hamadi, Amjad Gawanmeh:
Efficient low cost supervisory system for Internet of Things enabled smart home. ICC Workshops 2017: 864-869 - [c37]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Lightweight security protocol for health monitoring in Ambient Assisted Living environment. ICC Workshops 2017: 1282-1287 - [c36]Amjad Gawanmeh, Ali Alwadi, Sazia Parvin:
Formal Verification of Control Strategies for a Cyber Physical System. ICDCS Workshops 2017: 91-96 - [c35]Shakila Mahjabin Tonni, Mohammad Zahidur Rahman, Sazia Parvin, Amjad Gawanmeh:
Securing Big Data Efficiently through Microaggregation Technique. ICDCS Workshops 2017: 125-130 - 2016
- [j8]Usman Pervez, Asiah Mahmood, Osman Hasan, Khalid Latif, Amjad Gawanmeh:
Improvement Strategies for Device Interoperability Middleware using Formal Reliability Analysis. Scalable Comput. Pract. Exp. 17(3): 150-170 (2016) - [j7]Amjad Gawanmeh, Anas Alazzam, Bobby Mathew:
Formal Verification of a Microfluidic Device for Blood Cell Separation. Scalable Comput. Pract. Exp. 17(3): 227-236 (2016) - [j6]Kashif Saleem, Amjad Gawanmeh:
Introduction to the Special Issue on Reliability and Security of e-Health Information Systems. Scalable Comput. Pract. Exp. 17(3): iii-iv (2016) - [c34]Amjad Gawanmeh:
Open Issues in Reliability, Safety, and Efficiency of Connected Health. CHASE 2016: 1-6 - [c33]Kashif Saleem, Khan Zeb, Abdelouahid Derhab, Haider Abbas, Jalal Al-Muhtadi, Mehmet A. Orgun, Amjad Gawanmeh:
Survey on cybersecurity issues in wireless mesh networks based eHealthcare. HealthCom 2016: 1-7 - [c32]Amjad Gawanmeh, Youssef Iraqi:
Formal Analysis of Collision Prevention of Two Wireless Personal Area Networks. ICCS 2016: 2362-2366 - [c31]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Simulation Framework for a Security Protocol for Wireless Body Sensor Networks. LCN Workshops 2016: 248-253 - [c30]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Assertion-based verification technique for ECG bio-sensor algorithms. MWSCAS 2016: 1-4 - 2015
- [j5]Amjad Gawanmeh, Ahmad Alomari:
Challenges in Formal Methods for Testing and Verification of Cloud Computing Systems. Scalable Comput. Pract. Exp. 16(3): 321-332 (2015) - [c29]Amjad Gawanmeh, Hussam M. N. Al Hamadi, Mahmoud Al-Qutayri, Shiu-Kai Chin, Kashif Saleem:
Reliability analysis of healthcare information systems: State of the art and future directions. HealthCom 2015: 68-74 - [c28]Usman Pervez, Asiah Mahmood, Osman Hasan, Khalid Latif, Amjad Gawanmeh:
Formal reliability analysis of Device Interoperability Middleware (DIM) based E-health system using PRISM. HealthCom 2015: 108-113 - [c27]Amjad Gawanmeh, Anas Alazzam, Bobby Mathew, Mohammad Abutayeh, Hyung Jin Sung:
Formalizing the movement of microparticles in a continuous flow microfluidic device for field flow fractionation. HealthCom 2015: 114-119 - [c26]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
An automatic ECG generator for testing and evaluating ECG sensor algorithms. IDT 2015: 78-83 - 2014
- [j4]Anis Souari, Amjad Gawanmeh, Sofiène Tahar, Mohamed Lassaad Ammari:
Design and verification of a frequency domain equalizer. Microelectron. J. 45(2): 167-178 (2014) - [c25]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
A verification methodology for a wireless body sensor network functionality. BHI 2014: 635-639 - [c24]Amjad Gawanmeh, Sofiène Tahar:
Real time verification of firewalls with dynamic rulebase update. CCECE 2014: 1-6 - [c23]Anis Souari, Mohamed Lassaad Ammari, Amjad Gawanmeh, Sofiène Tahar:
Performance evaluation of time and frequency domain equalizers. CCECE 2014: 1-6 - [c22]Usman Pervez, Osman Hasan, Khalid Latif, Sofiène Tahar, Amjad Gawanmeh, Mohamed Salah Hamdi:
Formal reliability analysis of a typical FHIR standard based e-Health system using PRISM. Healthcom 2014: 43-48 - [c21]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Formalizing electrocardiogram (ECG) signal behavior in event-B. Healthcom 2014: 55-60 - [c20]Amjad Gawanmeh, Moh'd Alwadi, Ashraf Ghawanmeh:
Understanding traffic: Towards a smart traffic control architecture. ICCVE 2014: 865-866 - [c19]Amjad Gawanmeh, Moh'd Alwadi, Ashraf Ghawanmeh:
Validating connected vehicles architecture. ICCVE 2014: 945-946 - [c18]Amjad Gawanmeh:
Optimizing lifetime of homogeneous wireless sensor networks for vehicular monitoring. ICCVE 2014: 980-985 - [c17]Amjad Gawanmeh:
Automatic Verification of Security Policies in Firewalls with Dynamic Rule Sequence. ITNG 2014: 279-284 - 2013
- [c16]Amjad Gawanmeh:
An axiomatic model for formal specification requirements of ubiquitous healthcare systems. CCNC 2013: 898-902 - [c15]Hussam M. N. Al Hamadi, Amjad Gawanmeh, Mahmoud Al-Qutayri:
Extended abstract: Theorem proving verification of privacy in WBSN for healthcare systems. ICECS 2013: 100-101 - [c14]Ahmed M. AlAdwani, Amjad Gawanmeh, Sebastien Nicolas:
Traffic Shaping and Delay Optimization in Demand Side Management. UKSim 2013: 722-727 - 2012
- [c13]Ahmed M. AlAdwani, Amjad Gawanmeh, Sebastien Nicolas:
A Demand Side Management Traffic Shaping and Scheduling Algorithm. Asia International Conference on Modelling and Simulation 2012: 205-210 - [c12]Amjad Gawanmeh, Sofiène Tahar:
Novel algorithm for detecting conflicts in firewall rules. CCECE 2012: 1-4 - [c11]Anis Souari, Sofiène Tahar, Amjad Gawanmeh:
Formal error analysis and verification of a frequency domain equalizer. NEWCAS 2012: 189-192 - 2011
- [c10]Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh:
Formal modeling and verification of DLK protocol. ICITST 2011: 578-583 - [c9]Amjad Gawanmeh, Sofiène Tahar:
Modeling and verification of firewall configurations using domain restriction method. ICITST 2011: 642-647 - [c8]Amjad Gawanmeh:
Embedding and Verification of ZigBee Protocol Stack in Event-B. ANT/MobiWIS 2011: 736-741
2000 – 2009
- 2009
- [j3]Amjad Gawanmeh, Adel Bouhoula, Sofiène Tahar:
Rank Functions Based Inference System for Group Key Management Protocols Verification. Int. J. Netw. Secur. 8(2): 187-198 (2009) - 2008
- [j2]Amjad Gawanmeh, Sofiène Tahar, Kirsten Winter:
Formal verification of ASMs using MDGs. J. Syst. Archit. 54(1-2): 15-34 (2008) - [c7]Amjad Gawanmeh, Sofiène Tahar, Leila Jemni Ben Ayed:
Event-B based invariant checking of secrecy in group key protocols. LCN 2008: 950-957 - 2007
- [j1]Amjad Gawanmeh, Sofiène Tahar, Haja Moinudeen, Ali Habibi:
A Design for Verification Approach Using an Embedding of PSL in aSML. J. Circuits Syst. Comput. 16(6): 859-881 (2007) - [c6]Amjad Gawanmeh, Sofiène Tahar:
Rank Theorems for Forward Secrecy in Group Key Management Protocols. AINA Workshops (1) 2007: 18-23 - 2005
- [c5]Amjad Gawanmeh, Ali Habibi, Sofiène Tahar:
Embedding and Verification of PSL using AsmL. Abstract State Machines 2005: 201-216 - 2004
- [c4]Amjad Gawanmeh, Ali Habibi, Sofiène Tahar:
Enabling SystemC Verification using Abstract State Machines. FDL 2004: 649-661 - [c3]Ali Habibi, Amjad Gawanmeh, Sofiène Tahar:
Assertion based verification of PSL for SystemC designs. SoC 2004: 177-180 - 2003
- [c2]Amjad Gawanmeh, Sofiène Tahar, Kirsten Winter:
Interfacing ASM with the MDG Tool. Abstract State Machines 2003: 278-292 - [c1]Amjad Gawanmeh, Sofiène Tahar, Kirsten Winter:
Formal Verification of ASM Designs Using the MDG Tool. SEFM 2003: 210-219
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint