Mohammad Hammoudeh

8.3k total citations · 1 hit paper
214 papers, 5.2k citations indexed

About

Mohammad Hammoudeh is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Mohammad Hammoudeh has authored 214 papers receiving a total of 5.2k indexed citations (citations by other indexed papers that have themselves been cited), including 122 papers in Computer Networks and Communications, 72 papers in Information Systems and 61 papers in Artificial Intelligence. Recurrent topics in Mohammad Hammoudeh's work include Network Security and Intrusion Detection (40 papers), IoT and Edge/Fog Computing (39 papers) and Advanced Malware Detection Techniques (39 papers). Mohammad Hammoudeh is often cited by papers focused on Network Security and Intrusion Detection (40 papers), IoT and Edge/Fog Computing (39 papers) and Advanced Malware Detection Techniques (39 papers). Mohammad Hammoudeh collaborates with scholars based in United Kingdom, Saudi Arabia and Algeria. Mohammad Hammoudeh's co-authors include Bamidele Adebisi, Ruth Ande, Robert Newman, Ibrahim Ghafir, Segun I. Popoola, Kelvin Anoh, Devrim Ünal, Olamide Jogunola, Haris Gacanin and Václav Přenosil and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and IEEE Communications Magazine.

In The Last Decade

Mohammad Hammoudeh

193 papers receiving 5.0k citations

Hit Papers

Federated Deep Learning for Zero-Day Botnet Attack Detect... 2021 2026 2022 2024 2021 50 100 150 200

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mohammad Hammoudeh United Kingdom 40 3.0k 1.7k 1.5k 1.4k 964 214 5.2k
Thomas Engel Luxembourg 29 2.7k 0.9× 823 0.5× 1.6k 1.1× 1.8k 1.3× 751 0.8× 226 5.0k
Burak Kantarcı Canada 39 2.8k 0.9× 1.2k 0.7× 1.8k 1.2× 1.8k 1.3× 528 0.5× 295 6.1k
Ali Chehab Lebanon 31 2.4k 0.8× 1.2k 0.7× 1.5k 1.0× 1.2k 0.9× 732 0.8× 288 4.5k
Jianhua Li China 38 2.5k 0.8× 1.5k 0.8× 1.6k 1.1× 1.1k 0.8× 409 0.4× 321 4.7k
Klaus Wehrle Germany 35 3.9k 1.3× 1.6k 0.9× 1.5k 1.1× 1.3k 0.9× 662 0.7× 307 6.0k
Mohammad Shojafar United Kingdom 44 4.4k 1.5× 2.5k 1.4× 1.2k 0.9× 2.0k 1.4× 568 0.6× 204 6.5k
Pradip Kumar Sharma United Kingdom 36 2.6k 0.9× 2.4k 1.4× 1.4k 0.9× 926 0.7× 533 0.6× 134 5.2k
Deepak Puthal Australia 38 3.2k 1.1× 2.3k 1.3× 1.1k 0.8× 1.4k 1.0× 418 0.4× 178 5.2k
Rodrigo Román Spain 28 3.6k 1.2× 1.5k 0.9× 970 0.7× 1.6k 1.2× 651 0.7× 80 5.0k
Nadra Guizani United States 38 2.2k 0.7× 1.4k 0.8× 1.2k 0.8× 1.1k 0.8× 392 0.4× 104 4.4k

Countries citing papers authored by Mohammad Hammoudeh

Since Specialization
Citations

This map shows the geographic impact of Mohammad Hammoudeh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mohammad Hammoudeh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mohammad Hammoudeh more than expected).

Fields of papers citing papers by Mohammad Hammoudeh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mohammad Hammoudeh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mohammad Hammoudeh. The network helps show where Mohammad Hammoudeh may publish in the future.

Co-authorship network of co-authors of Mohammad Hammoudeh

This figure shows the co-authorship network connecting the top 25 collaborators of Mohammad Hammoudeh. A scholar is included among the top collaborators of Mohammad Hammoudeh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mohammad Hammoudeh. Mohammad Hammoudeh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kara, Mostefa, et al.. (2025). An encrypted and signed plaintext symmetric cryptosystem. Computers & Electrical Engineering. 123. 110244–110244.
2.
Vasan, Danish, et al.. (2025). An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware. Applied Soft Computing. 173. 112908–112908. 3 indexed citations
3.
Laouid, Abdelkader, et al.. (2025). Enhancing Cybersecurity in Healthcare IoT Systems Using Reinforcement Learning. Transportation research procedia. 84. 113–120. 2 indexed citations
4.
Ünal, Devrim, et al.. (2025). A Novel Genetic Algorithm Optimized Adversarial Attack in Federated Learning for Android-Based Mobile Systems. IEEE Transactions on Consumer Electronics. 71(3). 8512–8520.
5.
Luqman, Hamzah, et al.. (2024). Reviewing 25 years of continuous sign language recognition research: Advances, challenges, and prospects. Information Processing & Management. 61(5). 103774–103774. 15 indexed citations
6.
Alkhnbashi, Omer S., et al.. (2024). Aspect-Based Sentiment Analysis of Patient Feedback Using Large Language Models. Big Data and Cognitive Computing. 8(12). 167–167. 2 indexed citations
8.
Ünal, Devrim, et al.. (2024). AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Networks. 161. 103523–103523. 15 indexed citations
9.
Azzedin, Farag, et al.. (2024). MQTT Based Data Distribution Framework for Digital Twin Networks. 1008–1013.
10.
Epiphaniou, Gregory, Mohammad Hammoudeh, Hu Yuan, Carsten Maple, & Uchenna Ani. (2023). Digital twins in cyber effects modelling of IoT/CPS points of low resilience. Simulation Modelling Practice and Theory. 125. 102744–102744. 26 indexed citations
11.
Shorfuzzaman, Mohammad, et al.. (2023). Peer-to-Peer Power Energy Trading in Blockchain Using Efficient Machine Learning Model. Sustainability. 15(18). 13640–13640. 11 indexed citations
12.
Laouid, Abdelkader, et al.. (2023). A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity. Information. 14(5). 263–263. 18 indexed citations
13.
Pandey, Hari Mohan, et al.. (2022). Global IoT Mobility: A Path Based Forwarding Approach. Journal of Sensor and Actuator Networks. 11(3). 41–41. 2 indexed citations
14.
Elgendy, Ibrahim A., Ammar Muthanna, Mohammad Hammoudeh, et al.. (2021). Advanced Deep Learning for Resource Allocation and Security Aware Data Offloading in Industrial Mobile Edge Computing. Big Data. 9(4). 265–278. 33 indexed citations
15.
Popoola, Segun I., Bamidele Adebisi, Mohammad Hammoudeh, Haris Gacanin, & Guan Gui. (2021). Stacked recurrent neural network for botnet detection in smart homes. Computers & Electrical Engineering. 92. 107039–107039. 38 indexed citations
16.
Kara, Mostefa, Abdelkader Laouid, Reinhardt Euler, et al.. (2021). A fully homomorphic encryption based on magic number fragmentation and El‐Gamal encryption: Smart healthcare use case. Expert Systems. 39(5). 18 indexed citations
17.
Kara, Mostefa, Abdelkader Laouid, Muath AlShaikh, et al.. (2021). A Compute and Wait in PoW (CW-PoW) Consensus Algorithm for Preserving Energy Consumption. Applied Sciences. 11(15). 6750–6750. 19 indexed citations
18.
Epiphaniou, Gregory, Prashant Pillai, Mirko Bottarelli, et al.. (2020). Corrections to “Electronic Regulation of Data Sharing and Processing Using Smart Ledger Technologies for Supply-Chain Security” [doi: 10.1109/TEM.2020.2965991]. IEEE Transactions on Engineering Management. 67(3). 979–979. 2 indexed citations
19.
Ghafir, Ibrahim, Mohammad Hammoudeh, & Václav Přenosil. (2018). Defending against the advanced persistent threat: Detection of disguised executable files. 1 indexed citations
20.
Ghafir, Ibrahim, Mohammad Hammoudeh, & Václav Přenosil. (2017). Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026