default search action
Thaier Hayajneh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Collins Chimezie Obidiagha, Mohamed Rahouti, Thaier Hayajneh:
DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware Detection. IEEE Access 12: 156285-156306 (2024) - 2023
- [c28]Alexander Plaza, Thaier Hayajneh:
Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst. UEMCON 2023: 192-199 - 2022
- [j36]Jiwei Zhang, Md. Zakirul Alam Bhuiyan, Yang Xu, Tian Wang, Xuesong Xu, Thaier Hayajneh, Faiza Khan:
AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT. IEEE Internet Things J. 9(22): 22184-22193 (2022) - 2021
- [j35]Sa'ed Abed, Bassam Jamil Mohd, Thaier Hayajneh, Mohammad H. Alshayeji:
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int. J. Circuit Theory Appl. 49(11): 3607-3629 (2021) - [j34]Angela M. Lonzetta, Thaier Hayajneh:
Challenges of Complying with Data Protection and Privacy Regulations. EAI Endorsed Trans. Scalable Inf. Syst. 8(30): e4 (2021) - [j33]Bassam Jamil Mohd, Sa'ed Abed, Thaier Hayajneh, Mohammad H. Alshayeji:
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 18(6): 2689-2704 (2021) - 2020
- [j32]Louis Edward Papa, Thaier Hayajneh:
A Survey of Defensive Measures for Digital Persecution in the Global South. Future Internet 12(10): 166 (2020) - [j31]Tian Wang, Md. Zakirul Alam Bhuiyan, Guojun Wang, Lianyong Qi, Jie Wu, Thaier Hayajneh:
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things. IEEE Internet Things J. 7(4): 2679-2689 (2020) - [j30]Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh, Bassam Jamil Mohd:
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks". Secur. Commun. Networks 2020: 4093210:1-4093210:1 (2020) - [j29]Md. Zakirul Alam Bhuiyan, Jie Wu, Gary M. Weiss, Thaier Hayajneh, Tian Wang, Guojun Wang:
Event Detection Through Differential Pattern Mining in Cyber-Physical Systems. IEEE Trans. Big Data 6(4): 652-665 (2020) - [j28]Hai Tao, Md. Zakirul Alam Bhuiyan, Md. Arafatur Rahman, Tian Wang, Jie Wu, Sinan Q. Salih, Yafeng Li, Thaier Hayajneh:
TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System. IEEE Trans. Ind. Informatics 16(5): 3311-3321 (2020)
2010 – 2019
- 2019
- [j27]Gary M. Weiss, Kenichi Yoneda, Thaier Hayajneh:
Smartphone and Smartwatch-Based Biometrics Using Activities of Daily Living. IEEE Access 7: 133190-133202 (2019) - [j26]Hai Tao, Md. Zakirul Alam Bhuiyan, Ahmed N. Abdalla, Mohammad Mehedi Hassan, Jasni Mohamad Zain, Thaier Hayajneh:
Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare. IEEE Internet Things J. 6(1): 410-420 (2019) - [j25]Kutub Thakur, Thaier Hayajneh, Jason Tseng:
Cyber Security in Social Media: Challenges and the Way Forward. IT Prof. 21(2): 41-49 (2019) - [j24]Simranjeet Sidhu, Bassam Jamil Mohd, Thaier Hayajneh:
Hardware Security in IoT Devices with Emphasis on Hardware Trojans. J. Sens. Actuator Networks 8(3): 42 (2019) - [j23]Thaier Hayajneh, Kristen N. Griggs, Muhammad Imran, Bassam Jamil Mohd:
Secure and efficient data delivery for fog-assisted wireless body area networks. Peer-to-Peer Netw. Appl. 12(5): 1289-1307 (2019) - [c27]Alessandro N. Baccarini, Thaier Hayajneh:
Evolution of Format Preserving Encryption on IoT Devices: FF1+. HICSS 2019: 1-10 - 2018
- [j22]Bassam Jamil Mohd, Thaier Hayajneh:
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques. IEEE Access 6: 35966-35978 (2018) - [j21]Mary Grace Galterio, Simi Angelic Shavit, Thaier Hayajneh:
A Review of Facial Biometrics Security for Smart Devices. Comput. 7(3): 37 (2018) - [j20]Bassam Jamil Mohd, Thaier Hayajneh, Khalil Mustafa Ahmad Yousef, Zaid Abu Khalaf, Md. Zakirul Alam Bhuiyan:
Hardware design and modeling of lightweight block ciphers for secure communications. Future Gener. Comput. Syst. 83: 510-521 (2018) - [j19]Kristen N. Griggs, Olya Ossipova, Christopher P. Kohlios, Alessandro N. Baccarini, Emily A. Howson, Thaier Hayajneh:
Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring. J. Medical Syst. 42(7): 130:1-130:7 (2018) - [j18]Angela M. Lonzetta, Peter Cope, Joseph Campbell, Bassam Jamil Mohd, Thaier Hayajneh:
Security Vulnerabilities in Bluetooth Technology as Used in IoT. J. Sens. Actuator Networks 7(3): 28 (2018) - [j17]Anil Chacko, Thaier Hayajneh:
Security and Privacy Issues with IoT in Healthcare. EAI Endorsed Trans. Pervasive Health Technol. 4(14): e2 (2018) - [c26]Edren Dacaymat, Jun Zhang, Qi Wang, M. D. Alam Bhuiyan, Thaier Hayajneh:
Exploring Problems with Virtualization in Cloud Computing. DASC/PiCom/DataCom/CyberSciTech 2018: 673-680 - [c25]Ralph Restituyo, Thaier Hayajneh:
Vulnerabilities and Attacks Analysis for Military and Commercial IoT Drones. UEMCON 2018: 26-32 - [c24]Joel Varghese, Thaier Hayajneh:
A Framework to Identify Security and Privacy Issues of Smart Home Devices. UEMCON 2018: 135-143 - [c23]Abdullah Alhayajneh, Alessandro N. Baccarini, Thaier Hayajneh:
Quality of Service Analysis of VoIP Services. UEMCON 2018: 812-818 - 2017
- [j16]Khalil Mustafa Ahmad Yousef, Bassam Jamil Mohd, Khalid Al-Widyan, Thaier Hayajneh:
Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap. Sensors 17(10): 2346 (2017) - [j15]Thaier Hayajneh, Sana Ullah, Bassam Jamil Mohd, Kiran S. Balagani:
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications. IEEE Syst. J. 11(4): 2536-2545 (2017) - [c22]Peter Cope, Joseph Campbell, Thaier Hayajneh:
An investigation of Bluetooth security vulnerabilities. CCWC 2017: 1-7 - [c21]Kyle McHugh, Walter Akpedeye, Thaier Hayajneh:
Next generation wireless-LAN: Security issues and performance analysis. CCWC 2017: 1-7 - [c20]Richard Ciancioso, Danvers Budhwa, Thaier Hayajneh:
A Framework for Zero Day Exploit Detection and Containment. DASC/PiCom/DataCom/CyberSciTech 2017: 663-668 - [c19]Damianos Pinou, Rien Chy, Thaier Hayajneh:
Electromagnetic Warfare and the Cybersecurity Threat. DASC/PiCom/DataCom/CyberSciTech 2017: 669-674 - [c18]Md. Zakirul Alam Bhuiyan, Tian Wang, Thaier Hayajneh, Gary M. Weiss:
Maintaining the Balance between Privacy and Data Integrity in Internet of Things. ICMSS 2017: 177-182 - [c17]Jake Berkowsky, Neha A. Rana, Thaier Hayajneh:
CAre: Certificate Authority Rescue Engine for Proactive Security. ISPAN-FCST-ISCC 2017: 79-86 - [c16]Jeffrey Haynes, Maribette Ramirez, Thaier Hayajneh, Md. Zakirul Alam Bhuiyan:
A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration. SpaCCS Workshops 2017: 581-592 - [c15]Marc Capellupo, Jimmy Liranzo, Md. Zakirul Alam Bhuiyan, Thaier Hayajneh, Guojun Wang:
Security and Attack Vector Analysis of IoT Devices. SpaCCS Workshops 2017: 593-606 - [c14]Jake Berkowsky, Thaier Hayajneh:
Security issues with certificate authorities. UEMCON 2017: 449-455 - [c13]Neha A. Rana, Thaier Hayajneh:
Reevaluating the effectiveness of visual cues for website security. UEMCON 2017: 451-457 - [c12]Jimmy Liranzo, Thaier Hayajneh:
Security and privacy issues affecting cloud-based IP camera. UEMCON 2017: 458-465 - [c11]Daniel Gonzalez, Thaier Hayajneh:
Detection and prevention of crypto-ransomware. UEMCON 2017: 472-478 - [c10]Darshanie Sukhram, Thaier Hayajneh:
KeyStroke logs: Are strong passwords enough? UEMCON 2017: 619-625 - 2016
- [j14]Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Athanasios V. Vasilakos:
A comparative study of steganography designs based on multiple FPGA platforms. Int. J. Electron. Secur. Digit. Forensics 8(2): 164-190 (2016) - [j13]Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef:
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation. Secur. Commun. Networks 9(13): 2200-2216 (2016) - [j12]Thaier Hayajneh, Bassam Jamil Mohd, Muhammad Imran, Ghada Almashaqbeh, Athanasios V. Vasilakos:
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 16(4): 424 (2016) - [c9]Christine Atwell, Thomas Blasi, Thaier Hayajneh:
Reverse TCP and Social Engineering Attacks in the Era of Big Data. BigDataSecurity/HPSC/IDS 2016: 90-95 - 2015
- [j11]Bassam Jamil Mohd, Thaier Hayajneh, Athanasios V. Vasilakos:
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. J. Netw. Comput. Appl. 58: 73-93 (2015) - [j10]Thaier Hayajneh, Ghada A. Al-Mashaqbeh, Sana Ullah:
A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks. Mob. Networks Appl. 20(5): 623-635 (2015) - [c8]Thaier Hayajneh, Tao Zhang, Bassam Jamil Mohd:
Security Issues in WSNs with Cooperative Communication. CSCloud 2015: 451-456 - 2014
- [j9]Bassam Jamil Mohd, Thaier Hayajneh, Sa'ed Abed, Awni Itradat:
Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods. J. Circuits Syst. Comput. 23(2) (2014) - [j8]Thaier Hayajneh, Samer Khasawneh:
Analysis and Evaluation of Random Placement Strategies in Wireless Sensor Networks. J. Circuits Syst. Comput. 23(10) (2014) - [j7]Ghada A. Al-Mashaqbeh, Thaier Hayajneh, Athanasios V. Vasilakos, Bassam Jamil Mohd:
QoS-Aware Health Monitoring System Using Cloud-Based WBANs. J. Medical Syst. 38(10): 121 (2014) - [j6]Thaier Hayajneh, Razvi Doomun, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd:
An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Networks 7(11): 2015-2038 (2014) - [j5]Thaier Hayajneh, Ghada A. Al-Mashaqbeh, Sana Ullah, Athanasios V. Vasilakos:
A survey of wireless technologies coexistence in WBAN: analysis and open research issues. Wirel. Networks 20(8): 2165-2199 (2014) - [c7]Thaier Hayajneh, Athanasios V. Vasilakos, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd, Muhammad Ali Imran, Muhammad Zeeshan Shakir, Khalid A. Qaraqe:
Public-Key Authentication for Cloud-based WBANs. BODYNETS 2014 - [c6]Ghada A. Al-Mashaqbeh, Thaier Hayajneh, Athanasios V. Vasilakos:
A cloud-based interference-aware remote health monitoring system for non-hospitalized patients. GLOBECOM 2014: 2436-2441 - 2013
- [j4]Bassam Jamil Mohd, Thaier Hayajneh, Ahmad Nahar Quttoum:
Wavelet-transform steganography: algorithm and hardware implementation. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 241-256 (2013) - [j3]Bassam Jamil Mohd, Sa'ed Abed, Bassam Na'ami, Thaier Hayajneh:
Hierarchical steganography using novel optimum quantization technique. Signal Image Video Process. 7(6): 1029-1040 (2013) - 2012
- [j2]Thaier Hayajneh, Prashant Krishnamurthy, David Tipper, Anh Le:
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies. Mob. Networks Appl. 17(3): 415-430 (2012) - 2011
- [j1]Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy, David Tipper:
Source - destination obfuscation in wireless ad hocnetworks. Secur. Commun. Networks 4(8): 888-901 (2011)
2000 – 2009
- 2009
- [c5]Thaier Hayajneh, Prashant Krishnamurthy, David Tipper:
SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks. CollaborateCom 2009: 1-10 - [c4]Thaier Hayajneh, Prashant Krishnamurthy, David Tipper, Tae-Hoon Kim:
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks. ICC 2009: 1-6 - [c3]Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper:
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. ISCC 2009: 361-367 - [c2]Korporn Panyim, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper:
On limited-range strategic/random jamming attacks in wireless ad hoc networks. LCN 2009: 922-929 - [c1]Thaier Hayajneh, Prashant Krishnamurthy, David Tipper:
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks. NSS 2009: 73-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint