Thaier Hayajneh

Orcid: 0000-0002-8952-1499

According to our database1, Thaier Hayajneh authored at least 65 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DeepImageDroid: A Hybrid Framework Leveraging Visual Transformers and Convolutional Neural Networks for Robust Android Malware Detection.
IEEE Access, 2024

2023
Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

2022
AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT.
IEEE Internet Things J., 2022

2021
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Challenges of Complying with Data Protection and Privacy Regulations.
EAI Endorsed Trans. Scalable Inf. Syst., 2021

Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm.
Int. J. Circuit Theory Appl., 2021

2020
TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System.
IEEE Trans. Ind. Informatics, 2020

Event Detection Through Differential Pattern Mining in Cyber-Physical Systems.
IEEE Trans. Big Data, 2020

Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks".
Secur. Commun. Networks, 2020

Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things.
IEEE Internet Things J., 2020

A Survey of Defensive Measures for Digital Persecution in the Global South.
Future Internet, 2020

2019
Secure and efficient data delivery for fog-assisted wireless body area networks.
Peer-to-Peer Netw. Appl., 2019

Hardware Security in IoT Devices with Emphasis on Hardware Trojans.
J. Sens. Actuator Networks, 2019

Cyber Security in Social Media: Challenges and the Way Forward.
IT Prof., 2019

Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare.
IEEE Internet Things J., 2019

Smartphone and Smartwatch-Based Biometrics Using Activities of Daily Living.
IEEE Access, 2019

Evolution of Format Preserving Encryption on IoT Devices: FF1+.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Security and Privacy Issues with IoT in Healthcare.
EAI Endorsed Trans. Pervasive Health Technol., 2018

Security Vulnerabilities in Bluetooth Technology as Used in IoT.
J. Sens. Actuator Networks, 2018

Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring.
J. Medical Syst., 2018

Hardware design and modeling of lightweight block ciphers for secure communications.
Future Gener. Comput. Syst., 2018

A Review of Facial Biometrics Security for Smart Devices.
Comput., 2018

Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques.
IEEE Access, 2018

A Framework to Identify Security and Privacy Issues of Smart Home Devices.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Vulnerabilities and Attacks Analysis for Military and Commercial IoT Drones.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Quality of Service Analysis of VoIP Services.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Exploring Problems with Virtualization in Cloud Computing.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications.
IEEE Syst. J., 2017

Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap.
Sensors, 2017

KeyStroke logs: Are strong passwords enough?
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Reevaluating the effectiveness of visual cues for website security.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Security and privacy issues affecting cloud-based IP camera.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Detection and prevention of crypto-ransomware.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Security issues with certificate authorities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security and Attack Vector Analysis of IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

CAre: Certificate Authority Rescue Engine for Proactive Security.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Maintaining the Balance between Privacy and Data Integrity in Internet of Things.
Proceedings of the 2017 International Conference on Management Engineering, 2017

Electromagnetic Warfare and the Cybersecurity Threat.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

A Framework for Zero Day Exploit Detection and Containment.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Next generation wireless-LAN: Security issues and performance analysis.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

An investigation of Bluetooth security vulnerabilities.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Sensors, 2016

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation.
Secur. Commun. Networks, 2016

A comparative study of steganography designs based on multiple FPGA platforms.
Int. J. Electron. Secur. Digit. Forensics, 2016

Reverse TCP and Social Engineering Attacks in the Era of Big Data.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks.
Mob. Networks Appl., 2015

A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues.
J. Netw. Comput. Appl., 2015

Security Issues in WSNs with Cooperative Communication.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A survey of wireless technologies coexistence in WBAN: analysis and open research issues.
Wirel. Networks, 2014

An energy-efficient and security aware route selection protocol for wireless sensor networks.
Secur. Commun. Networks, 2014

QoS-Aware Health Monitoring System Using Cloud-Based WBANs.
J. Medical Syst., 2014

Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
J. Circuits Syst. Comput., 2014

Analysis and Evaluation of Random Placement Strategies in Wireless Sensor Networks.
J. Circuits Syst. Comput., 2014

A cloud-based interference-aware remote health monitoring system for non-hospitalized patients.
Proceedings of the IEEE Global Communications Conference, 2014

Public-Key Authentication for Cloud-based WBANs.
Proceedings of the 9th International Conference on Body Area Networks, 2014

2013
Hierarchical steganography using novel optimum quantization technique.
Signal Image Video Process., 2013

Wavelet-transform steganography: algorithm and hardware implementation.
Int. J. Electron. Secur. Digit. Forensics, 2013

2012
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies.
Mob. Networks Appl., 2012

2011
Source - destination obfuscation in wireless <i>ad hoc</i>networks.
Secur. Commun. Networks, 2011

2009
DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the Third International Conference on Network and System Security, 2009

On limited-range strategic/random jamming attacks in wireless ad hoc networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009


  Loading...