Follow
Samer Moein
Title
Cited by
Cited by
Year
Water monitoring system using Wireless Sensor Network (WSN): Case study of Kuwait beaches
A Alkandari, Y Alabduljader, SM Moein
2012 Second International Conference on Digital Information Processing and …, 2012
602012
Implementation of monitoring system for air quality using raspberry PI: Experimental study
AA Alkandari, S Moein
Indonesian Journal of Electrical Engineering and Computer Science 10 (1), 43-49, 2018
382018
A New Characterization of Hardware Trojans
S Moein, TA Gulliver, F Gebali, A Alkandari
IEEE Access 4, 2721 - 2731, 2016
372016
Classification of hardware trojan detection techniques
S Moein, J Subramnian, TA Gulliver, F Gebali, MW El-Kharashi
2015 Tenth International Conference on Computer Engineering & Systems (ICCES …, 2015
362015
An attribute based classification of hardware trojans
S Moein, S Khan, TA Gulliver, F Gebali, MW El-Kharashi
2015 Tenth International Conference on Computer Engineering & Systems (ICCES …, 2015
252015
Wireless sensor network (WSN) for water monitoring system: Case study of Kuwait beaches
A Alkandari, M Alnasheet, Y Alabduljader, SM Moein
242012
Analysis of covert hardware attacks
S Moein, F Gebali, I Traore
Journal of Convergence 5 (3), 2014
202014
Hardware Attack Mitigation Techniques Analysis
S Moein, TA Gulliver, F Gebali, A Alkandari
International Journal on Cryptography and Information Security 7 (1), 9-28, 2017
112017
Quantifying overt hardware attacks: Using ART schema
S Moein, F Gebali
Computer Science and its Applications, 511-516, 2015
92015
Quantifying Covert Hardware Attacks: Using ART Schema
S Moein, F Gebali
in Advances in Information Science and Computer Engineering, 2015
92015
Modeling attacks
S Al-Fedaghi, S Moein
International journal of safety and security engineering 4 (2), 97-115, 2014
92014
A formal methodology for quantifying overt hardware attacks
S Moein, F Gebali
Proc. Adv. in Inform. Science and Computer Eng, 63-69, 2015
82015
Hardware attack risk assessment
S Moein, F Gebali, TA Gulliver, MW El-Kharashi
2015 Tenth International Conference on Computer Engineering & Systems (ICCES …, 2015
72015
Hardware attacks: an algebraic approach
S Moein, F Gebali, TA Gulliver
Journal of Cryptographic Engineering 6, 325-337, 2016
62016
Medical care reminder for infants using android application
A Alkandari, D Aladem, S Asaad, S Moein
Journal Of Advanced Computer Science AndTechnologyResearch 7 (2), 57-66, 2017
32017
Survey on Nano Technology
A Alfoudery, A Alkandari, S Moein
Indonesian Journal of Electrical Engineering and Computer Science 10 (2 …, 2018
22018
Nanotechnology Applications: an Analytic Comparison
A Alkandari, Z Almesri, S Moein
Journal of Advanced Computer Science and Technology Research 7 (2), 67-80, 2017
22017
Hardware Trojan Identification and Detection
S Moein, F Gebali, TA Gulliver, A Alkandari
International Journal on Cryptography and Information Security 2 (2), 1-20, 2017
22017
Systematic analysis and methodologies for hardware security
S Moein
22015
Vehicle Accident Report Application for Solving Traffic Problems and Reduce the Ratio of Pollution using Case Study: Kuwait City
A Alkandari, S Moein
Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20