Follow
Thaier Hayajneh, Ph. D., SMIEEE
Thaier Hayajneh, Ph. D., SMIEEE
Fordham Center for Cybersecurity, Fordham University, New York, USA
Verified email at fordham.edu - Homepage
Title
Cited by
Cited by
Year
Healthcare blockchain system using smart contracts for secure automated remote patient monitoring
KN Griggs, O Ossipova, CP Kohlios, AN Baccarini, EA Howson, ...
Journal of medical systems 42, 1-7, 2018
10302018
Smartphone and smartwatch-based biometrics using activities of daily living
GM Weiss, K Yoneda, T Hayajneh
Ieee Access 7, 133190-133202, 2019
3692019
Security vulnerabilities in Bluetooth technology as used in IoT
AM Lonzetta, P Cope, J Campbell, BJ Mohd, T Hayajneh
Journal of Sensor and Actuator Networks 7 (3), 28, 2018
2362018
Secured data collection with hardware-based ciphers for IoT-based healthcare
H Tao, MZA Bhuiyan, AN Abdalla, MM Hassan, JM Zain, T Hayajneh
IEEE Internet of Things Journal 6 (1), 410-420, 2018
2352018
A survey of wireless technologies coexistence in WBAN: analysis and open research issues
T Hayajneh, G Almashaqbeh, S Ullah, AV Vasilakos
Wireless Networks 20, 2165-2199, 2014
2342014
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues
BJ Mohd, T Hayajneh, AV Vasilakos
Journal of Network and Computer Applications 58, 73-93, 2015
2322015
Security and privacy issues with IoT in healthcare
A Chacko, T Hayajneh
EAI Endorsed Transactions on Pervasive Health and Technology 4 (14), 2018
1872018
Penetration testing: Concepts, attack methods, and defense strategies
M Denis, C Zena, T Hayajneh
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016
1832016
Preserving balance between privacy and data integrity in edge-assisted Internet of Things
T Wang, MZA Bhuiyan, G Wang, L Qi, J Wu, T Hayajneh
IEEE Internet of Things Journal 7 (4), 2679-2689, 2019
1252019
Hardware security in IoT devices with emphasis on hardware trojans
S Sidhu, BJ Mohd, T Hayajneh
Journal of Sensor and Actuator Networks 8 (3), 42, 2019
1142019
Lightweight block ciphers for IoT: Energy optimization and survivability techniques
BJ Mohd, T Hayajneh
IEEE Access 6, 35966-35978, 2018
1122018
Cyber security in social media: challenges and the way forward
K Thakur, T Hayajneh, J Tseng
IT Professional 21 (2), 41-49, 2019
1082019
QoS-aware health monitoring system using cloud-based WBANs
G Almashaqbeh, T Hayajneh, AV Vasilakos, BJ Mohd
Journal of medical systems 38, 1-20, 2014
892014
Secure authentication for remote patient monitoring with wireless medical sensor networks
T Hayajneh, BJ Mohd, M Imran, G Almashaqbeh, AV Vasilakos
Sensors 16 (4), 424, 2016
882016
TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system
H Tao, MZA Bhuiyan, MA Rahman, T Wang, J Wu, SQ Salih, Y Li, ...
IEEE Transactions on Industrial Informatics 16 (5), 3311-3321, 2019
862019
A comprehensive attack flow model and security analysis for Wi-Fi and WPA3
CP Kohlios, T Hayajneh
Electronics 7 (11), 284, 2018
822018
Detecting malicious packet dropping in the presence of collisions and channel errors in wireless ad hoc networks
T Hayajneh, P Krishnamurthy, D Tipper, T Kim
2009 IEEE International Conference on Communications, 1-6, 2009
732009
A biometric-secure e-voting system for election processes
M Khasawneh, M Malkawi, O Al-Jarrah, L Barakat, TS Hayajneh, ...
2008 5th international symposium on mechatronics and its applications, 1-8, 2008
732008
An investigation of Bluetooth security vulnerabilities
P Cope, J Campbell, T Hayajneh
2017 IEEE 7th annual computing and communication workshop and conference …, 2017
722017
Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks
T Hayajneh, P Krishnamurthy, D Tipper
2009 Third International Conference on Network and System Security, 73-80, 2009
612009
The system can't perform the operation now. Try again later.
Articles 1–20