publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2024

  1. MitM Attacks on Intellectual Property and Integrity of Additive Manufacturing Systems: A Security Analysis
    Hamza Alkofahi, Heba Alawneh, and Anthony Skjellum
    Computers & Security, 2024

2023

    2022

    1. Discovering Conditional Business Rules in Web Applications Using Process Mining
      Hamza Alkofahi, David Umphress, and Heba Alawneh
      In International Conference on Information Integration and Web, 2022
    2. Discovering Authorization Business Rules toward Detecting Web Applications Logic Flaws
      Hamza Alkofahi, David Umphress, and Heba Alawneh
      In 2022 International Arab Conference on Information Technology (ACIT), 2022
    3. Preparing HTTP traffic for process mining
      Hamza Alkofahi, David Umphress, and Heba Alawneh
      In 2022 13th International Conference on Information and Communication Systems (ICICS), 2022

    2016

    1. POODLEs, more POODLEs, FREAK attacks too: how server administrators responded to three serious web vulnerabilities
      Benjamin Fogel, Shane Farmer, Hamza Alkofahi, and 2 more authors
      In International Symposium on Engineering Secure Software and Systems, 2016

    2015

    1. A Kinect-based system for Arabic sign language to speech translation
      Mohammad Fraiwan, Natheer Khasawneh, Hosam Ershedat, and 2 more authors
      International Journal of Computer Applications in Technology, 2015

    2011

    1. An arabic sign language computer interface using the xbox kinect
      Hosam Ershaed, Ibrahim Al-Alali, Hamza Alkofahi, and 2 more authors
      In Annual Undergraduate Research Conf. on Applied Computing, 2011