Follow
Thaier Hayajneh, Ph. D., SMIEEE
Thaier Hayajneh, Ph. D., SMIEEE
Fordham Center for Cybersecurity, Fordham University, New York, USA
Verified email at fordham.edu - Homepage
Title
Cited by
Cited by
Year
Healthcare blockchain system using smart contracts for secure automated remote patient monitoring
KN Griggs, O Ossipova, CP Kohlios, AN Baccarini, EA Howson, ...
Journal of medical systems 42, 1-7, 2018
9262018
Smartphone and smartwatch-based biometrics using activities of daily living
GM Weiss, K Yoneda, T Hayajneh
Ieee Access 7, 133190-133202, 2019
3072019
A survey of wireless technologies coexistence in WBAN: analysis and open research issues
T Hayajneh, G Almashaqbeh, S Ullah, AV Vasilakos
Wireless Networks 20, 2165-2199, 2014
2252014
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
BJ Mohd, T Hayajneh, AV Vasilakos
Journal of Network and Computer Applications 58, 73-93, 2015
2192015
Secured data collection with hardware-based ciphers for IoT-based healthcare
H Tao, MZA Bhuiyan, AN Abdalla, MM Hassan, JM Zain, T Hayajneh
IEEE Internet of Things Journal 6 (1), 410-420, 2018
2062018
Security vulnerabilities in Bluetooth technology as used in IoT
AM Lonzetta, P Cope, J Campbell, BJ Mohd, T Hayajneh
Journal of Sensor and Actuator Networks 7 (3), 28, 2018
2042018
Security and privacy issues with IoT in healthcare
A Chacko, T Hayajneh
EAI Endorsed Transactions on Pervasive Health and Technology 4 (14), 2018
1652018
Penetration testing: Concepts, attack methods, and defense strategies
M Denis, C Zena, T Hayajneh
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016
1592016
Preserving balance between privacy and data integrity in edge-assisted Internet of Things
T Wang, MZA Bhuiyan, G Wang, L Qi, J Wu, T Hayajneh
IEEE Internet of Things Journal 7 (4), 2679-2689, 2019
1132019
Lightweight block ciphers for IoT: Energy optimization and survivability techniques
BJ Mohd, T Hayajneh
IEEE Access 6, 35966-35978, 2018
982018
Hardware security in IoT devices with emphasis on hardware trojans
S Sidhu, BJ Mohd, T Hayajneh
Journal of Sensor and Actuator Networks 8 (3), 42, 2019
952019
QoS-aware health monitoring system using cloud-based WBANs
G Almashaqbeh, T Hayajneh, AV Vasilakos, BJ Mohd
Journal of medical systems 38, 1-20, 2014
872014
Secure authentication for remote patient monitoring with wireless medical sensor networks
T Hayajneh, BJ Mohd, M Imran, G Almashaqbeh, AV Vasilakos
Sensors 16 (4), 424, 2016
862016
TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system
H Tao, MZA Bhuiyan, MA Rahman, T Wang, J Wu, SQ Salih, Y Li, ...
IEEE Transactions on Industrial Informatics 16 (5), 3311-3321, 2019
792019
Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks
T Hayajneh, P Krishnamurthy, D Tipper, T Kim
2009 IEEE International Conference on Communications, 1-6, 2009
732009
A biometric-secure e-voting system for election processes
M Khasawneh, M Malkawi, O Al-Jarrah, L Barakat, TS Hayajneh, ...
2008 5th international symposium on mechatronics and its applications, 1-8, 2008
722008
A comprehensive attack flow model and security analysis for Wi-Fi and WPA3
CP Kohlios, T Hayajneh
Electronics 7 (11), 284, 2018
662018
An investigation of Bluetooth security vulnerabilities
P Cope, J Campbell, T Hayajneh
2017 IEEE 7th annual computing and communication workshop and conference …, 2017
652017
Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks
T Hayajneh, P Krishnamurthy, D Tipper
2009 Third International Conference on Network and System Security, 73-80, 2009
612009
Security and attack vector analysis of IoT devices
M Capellupo, J Liranzo, MZA Bhuiyan, T Hayajneh, G Wang
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017
572017
The system can't perform the operation now. Try again later.
Articles 1–20