Bassam Jamil Mohd

Orcid: 0000-0002-9805-1740

According to our database1, Bassam Jamil Mohd authored at least 40 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study.
Intell. Serv. Robotics, July, 2024

2023
A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives.
Wirel. Pers. Commun., April, 2023

2022
Quantitative impact analysis of application-level attacks on a robotic platform.
Int. J. Electron. Secur. Digit. Forensics, 2022

2021
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm.
Int. J. Circuit Theory Appl., 2021

Performance evaluation of the SM4 cipher based on field-programmable gate array implementation.
IET Circuits Devices Syst., 2021

An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices.
Clust. Comput., 2021

2020
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks".
Secur. Commun. Networks, 2020

2019
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
Sensors, 2019

Secure and efficient data delivery for fog-assisted wireless body area networks.
Peer-to-Peer Netw. Appl., 2019

Hardware Security in IoT Devices with Emphasis on Hardware Trojans.
J. Sens. Actuator Networks, 2019

Implementation of speech feature extraction for low-resource devices.
IET Circuits Devices Syst., 2019

2018
Analyzing Cyber-Physical Threats on Robotic Platforms.
Sensors, 2018

Security Vulnerabilities in Bluetooth Technology as Used in IoT.
J. Sens. Actuator Networks, 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Gener. Comput. Syst., 2018

Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques.
IEEE Access, 2018

2017
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Syst. J., 2017

Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap.
Sensors, 2017

2016
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Sensors, 2016

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Secur. Commun. Networks, 2016

A comparative study of steganography designs based on multiple FPGA platforms.
Int. J. Electron. Secur. Digit. Forensics, 2016

2015
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Netw. Comput. Appl., 2015

Security Issues in WSNs with Cooperative Communication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
MPLS technology in wireless networks.
Wirel. Networks, 2014

An energy-efficient and security aware route selection protocol for wireless sensor networks.
Secur. Commun. Networks, 2014

QoS-Aware Health Monitoring System Using Cloud-Based WBANs.
J. Medical Syst., 2014

Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
J. Circuits Syst. Comput., 2014

Software comprehension based on database relational algebra.
Int. J. Inf. Commun. Technol., 2014

Public-Key Authentication for Cloud-based WBANs.
Proceedings of the 9th International Conference on Body Area Networks, 2014

2013
Hierarchical steganography using novel optimum quantization technique.
Signal Image Video Process., 2013

An Efficient Backup Technique for Database Systems Based on Threshold Sharing.
J. Comput., 2013

Wavelet-transform steganography: algorithm and hardware implementation.
Int. J. Electron. Secur. Digit. Forensics, 2013

2012
Low power Wallace multiplier design based on wide counters.
Int. J. Circuit Theory Appl., 2012

A novel approach to enhance distributed virtual memory.
Comput. Electr. Eng., 2012

2011
Image Steganography Optimization Technique.
Proceedings of the Signal Processing and Information Technology, 2011

2009
A Power-Scalable Switch-Based Multi-processor FFT.
Proceedings of the 20th IEEE International Conference on Application-Specific Systems, 2009

2007
The Hazard-Free Superscalar Pipeline Fast Fourier Transform Architecture and Algorithm.
Proceedings of the VLSI-SoC: Advanced Topics on Systems on a Chip, 2007

The hazard-free superscalar pipeline fast fourier transform algorithm and architecture.
Proceedings of the IFIP VLSI-SoC 2007, 2007

Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine.
Proceedings of the 25th International Conference on Computer Design, 2007

2002
Constructing reusable testbenches.
Proceedings of the Seventh IEEE International High-Level Design Validation and Test Workshop 2002, 2002


  Loading...