Healthcare blockchain system using smart contracts for secure automated remote patient monitoring KN Griggs, O Ossipova, CP Kohlios, AN Baccarini, EA Howson, ... Journal of medical systems 42, 1-7, 2018 | 1027 | 2018 |
Smartphone and smartwatch-based biometrics using activities of daily living GM Weiss, K Yoneda, T Hayajneh Ieee Access 7, 133190-133202, 2019 | 365 | 2019 |
Security vulnerabilities in Bluetooth technology as used in IoT AM Lonzetta, P Cope, J Campbell, BJ Mohd, T Hayajneh Journal of Sensor and Actuator Networks 7 (3), 28, 2018 | 235 | 2018 |
Secured data collection with hardware-based ciphers for IoT-based healthcare H Tao, MZA Bhuiyan, AN Abdalla, MM Hassan, JM Zain, T Hayajneh IEEE Internet of Things Journal 6 (1), 410-420, 2018 | 234 | 2018 |
A survey of wireless technologies coexistence in WBAN: analysis and open research issues T Hayajneh, G Almashaqbeh, S Ullah, AV Vasilakos Wireless Networks 20, 2165-2199, 2014 | 234 | 2014 |
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues BJ Mohd, T Hayajneh, AV Vasilakos Journal of Network and Computer Applications 58, 73-93, 2015 | 229 | 2015 |
Security and privacy issues with IoT in healthcare A Chacko, T Hayajneh EAI Endorsed Transactions on Pervasive Health and Technology 4 (14), 2018 | 187 | 2018 |
Penetration testing: Concepts, attack methods, and defense strategies M Denis, C Zena, T Hayajneh 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016 | 180 | 2016 |
Preserving balance between privacy and data integrity in edge-assisted Internet of Things T Wang, MZA Bhuiyan, G Wang, L Qi, J Wu, T Hayajneh IEEE Internet of Things Journal 7 (4), 2679-2689, 2019 | 124 | 2019 |
Hardware security in IoT devices with emphasis on hardware trojans S Sidhu, BJ Mohd, T Hayajneh Journal of Sensor and Actuator Networks 8 (3), 42, 2019 | 114 | 2019 |
Lightweight block ciphers for IoT: Energy optimization and survivability techniques BJ Mohd, T Hayajneh IEEE Access 6, 35966-35978, 2018 | 111 | 2018 |
Cyber security in social media: challenges and the way forward K Thakur, T Hayajneh, J Tseng IT Professional 21 (2), 41-49, 2019 | 107 | 2019 |
QoS-aware health monitoring system using cloud-based WBANs G Almashaqbeh, T Hayajneh, AV Vasilakos, BJ Mohd Journal of medical systems 38, 1-20, 2014 | 89 | 2014 |
Secure authentication for remote patient monitoring with wireless medical sensor networks T Hayajneh, BJ Mohd, M Imran, G Almashaqbeh, AV Vasilakos Sensors 16 (4), 424, 2016 | 88 | 2016 |
TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system H Tao, MZA Bhuiyan, MA Rahman, T Wang, J Wu, SQ Salih, Y Li, ... IEEE Transactions on Industrial Informatics 16 (5), 3311-3321, 2019 | 85 | 2019 |
A comprehensive attack flow model and security analysis for Wi-Fi and WPA3 CP Kohlios, T Hayajneh Electronics 7 (11), 284, 2018 | 82 | 2018 |
Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks T Hayajneh, P Krishnamurthy, D Tipper, T Kim 2009 IEEE International Conference on Communications, 1-6, 2009 | 73 | 2009 |
A biometric-secure e-voting system for election processes M Khasawneh, M Malkawi, O Al-Jarrah, L Barakat, TS Hayajneh, ... 2008 5th international symposium on mechatronics and its applications, 1-8, 2008 | 73 | 2008 |
An investigation of Bluetooth security vulnerabilities P Cope, J Campbell, T Hayajneh 2017 IEEE 7th annual computing and communication workshop and conference …, 2017 | 72 | 2017 |
Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks T Hayajneh, P Krishnamurthy, D Tipper 2009 Third International Conference on Network and System Security, 73-80, 2009 | 61 | 2009 |