Остановите войну!
for scientists:
default search action
Thaier Hayajneh
- > Home > Persons > Thaier Hayajneh
Publications
- 2021
- [j35]Sa'ed Abed, Bassam Jamil Mohd, Thaier Hayajneh, Mohammad H. Alshayeji:
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int. J. Circuit Theory Appl. 49(11): 3607-3629 (2021) - [j33]Bassam Jamil Mohd, Sa'ed Abed, Thaier Hayajneh, Mohammad H. Alshayeji:
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 18(6): 2689-2704 (2021) - 2020
- [j30]Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh, Bassam Jamil Mohd:
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks". Secur. Commun. Networks 2020: 4093210:1-4093210:1 (2020) - 2019
- [j24]Simranjeet Sidhu, Bassam Jamil Mohd, Thaier Hayajneh:
Hardware Security in IoT Devices with Emphasis on Hardware Trojans. J. Sens. Actuator Networks 8(3): 42 (2019) - [j23]Thaier Hayajneh, Kristen N. Griggs, Muhammad Imran, Bassam Jamil Mohd:
Secure and efficient data delivery for fog-assisted wireless body area networks. Peer-to-Peer Netw. Appl. 12(5): 1289-1307 (2019) - 2018
- [j22]Bassam Jamil Mohd, Thaier Hayajneh:
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques. IEEE Access 6: 35966-35978 (2018) - [j20]Bassam Jamil Mohd, Thaier Hayajneh, Khalil Mustafa Ahmad Yousef, Zaid Abu Khalaf, Md. Zakirul Alam Bhuiyan:
Hardware design and modeling of lightweight block ciphers for secure communications. Future Gener. Comput. Syst. 83: 510-521 (2018) - [j18]Angela M. Lonzetta, Peter Cope, Joseph Campbell, Bassam Jamil Mohd, Thaier Hayajneh:
Security Vulnerabilities in Bluetooth Technology as Used in IoT. J. Sens. Actuator Networks 7(3): 28 (2018) - 2017
- [j16]Khalil Mustafa Ahmad Yousef, Bassam Jamil Mohd, Khalid Al-Widyan, Thaier Hayajneh:
Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap. Sensors 17(10): 2346 (2017) - [j15]Thaier Hayajneh, Sana Ullah, Bassam Jamil Mohd, Kiran S. Balagani:
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications. IEEE Syst. J. 11(4): 2536-2545 (2017) - 2016
- [j14]Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Athanasios V. Vasilakos:
A comparative study of steganography designs based on multiple FPGA platforms. Int. J. Electron. Secur. Digit. Forensics 8(2): 164-190 (2016) - [j13]Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef:
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation. Secur. Commun. Networks 9(13): 2200-2216 (2016) - [j12]Thaier Hayajneh, Bassam Jamil Mohd, Muhammad Imran, Ghada Almashaqbeh, Athanasios V. Vasilakos:
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 16(4): 424 (2016) - 2015
- [j11]Bassam Jamil Mohd, Thaier Hayajneh, Athanasios V. Vasilakos:
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. J. Netw. Comput. Appl. 58: 73-93 (2015) - [c8]Thaier Hayajneh, Tao Zhang, Bassam Jamil Mohd:
Security Issues in WSNs with Cooperative Communication. CSCloud 2015: 451-456 - 2014
- [j9]Bassam Jamil Mohd, Thaier Hayajneh, Sa'ed Abed, Awni Itradat:
Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods. J. Circuits Syst. Comput. 23(2) (2014) - [j7]Ghada A. Al-Mashaqbeh, Thaier Hayajneh, Athanasios V. Vasilakos, Bassam Jamil Mohd:
QoS-Aware Health Monitoring System Using Cloud-Based WBANs. J. Medical Syst. 38(10): 121 (2014) - [j6]Thaier Hayajneh, Razvi Doomun, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd:
An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Networks 7(11): 2015-2038 (2014) - [c7]Thaier Hayajneh, Athanasios V. Vasilakos, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd, Muhammad Ali Imran, Muhammad Zeeshan Shakir, Khalid A. Qaraqe:
Public-Key Authentication for Cloud-based WBANs. BODYNETS 2014 - 2013
- [j4]Bassam Jamil Mohd, Thaier Hayajneh, Ahmad Nahar Quttoum:
Wavelet-transform steganography: algorithm and hardware implementation. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 241-256 (2013) - [j3]Bassam Jamil Mohd, Sa'ed Abed, Bassam Na'ami, Thaier Hayajneh:
Hierarchical steganography using novel optimum quantization technique. Signal Image Video Process. 7(6): 1029-1040 (2013)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint