Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL |
Automated Vulnerability Exploitation Using Deep Reinforcement Learning | Applied Sciences | Cybersecurity | 2024 | |
Visit URL
|
Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study | Intelligent Service Robotics | Personal assistant robot · DARWIN-OP2 · Office ergonomics · Reinforcement learning | 2024 | |
Visit URL
|
Quantization-Based Optimization Algorithm for Hardware Implementation of Convolution Neural Networks | Electronics | Machine Learning, Neural Networks, Hardware Design | 2024 | |
Visit URL
|
A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives | Wireless Personal Communications | Blockchain, IoT, Energy, Security and Hardware | 2023 | |
Visit URL
|
POSIT vs. Floating Point in Implementing IIR Notch Filter by Enhancing Radix-4 Modified Booth Multiplier | Electronics | VLSI, FPGA, Algorithms | 2022 | |
Visit URL
|
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices | Cluster Computing | security, resource-constrained devices, lightweight hash functions, blockchain | 2021 | |
Visit URL
|
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm | International journal of circuit theory and applications | security, resource-constrained devices, lightweight ciphers, FPGA | 2021 | |
Visit URL
|
Performance evaluation of the SM4 cipher based on field-programmable gate array implementation | IET Circuits, Devices and Systems | hardware security | 2021 | |
Visit URL
|
Quantitative Impact Analysis of Application-level Attacks on a Robotic Platform | International Journal of Electronic Security and Digital Forensics | cyber-physical security; robot availability; attacks; vulnerability; risk assessment; PeopleBot | 2021 | |
Visit URL
|
Secure and efficient data delivery for fog-assisted wireless body area networks | Peer-to-Peer Networking and Applications | Security and networking | 2019 | |
Visit URL
|
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher | Sensors | Hardware , security | 2019 | |
Visit URL
|
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher | Sensors | Hardware Security, Ciphers, FPGA | 2019 | |
Visit URL
|
Hardware Security in IoT Devices with Emphasis on Hardware Trojans | Journal of sensor and Actuator Networks | Hardware security, Trojans | 2019 | |
Visit URL
|
Implementation of Speech Feature Extraction For Low-Resource Devices | IET Circuits, Devices & Systems | Speech, Algorithms, VLSI | 2019 | |
Visit URL
|
Run-time Monitoring and Validation using Reverse Function (RMVRF) for Hardware Trojans Detection | IEEE Transactions on Dependable and Secure Computing | Hardware security, Trojan, Security, FPGA | 2019 | |
Visit URL
|
Analyzing Cyber-Physical Threats on Robotic Platforms | Sensors | Security and Robotics | 2018 | |
Visit URL
|
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques | IEEE Access | Implementation of Lightweight Cryptography | 2018 | |
Visit URL
|
Security Vulnerabilities in Bluetooth Technology as Used in IoT | Journal of Sensor and Actuator Networks | Security in IoT | 2018 | |
Visit URL
|
Semi-Quantitative Security Risk Assessment of Robotic Systems | Jordanian Journal of Computers and Information Technology | Security and Robotics | 2018 | |
Visit URL
|
Semi-Quantitative Security Risk Assessment of Robotic Systems | Jordanian Journal OF Computers and Information Technology (JJCIT) | Robotics Security, Cyber-physical systems security | 2018 | |
Visit URL
|
Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap | Sensors | sensors, robotics, algorithms | 2017 | |
Visit URL
|
Hardware design and modeling of lightweight block ciphers for secure communications | Future Generation Computer Systems | Security, Design | 2017 | |
Visit URL
|
A comparative study of steganography designs based on multiple FPGA platforms | International Journal of Electronic Security and Digital Forensics | Security, Steganography, FPGA | 2016 | |
Visit URL
|
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation | Security and Communication Networks | Security, FPGA | 2016 | |
Visit URL
|
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks | Sensors | Security | 2016 | |
Visit URL
|
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues | Journal of Network and Computer Applications | Security/FPGA | 2015 | |
Visit URL
|
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications | IEEE systems journal | Security/FPGA | 2015 | |
Visit URL
|
An energy-efficient and security aware route selection protocol for wireless sensor networks | Security and Communication Networks | Security | 2014 | |
Visit URL
|
Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods | Journal of Circuits, Systems and Computers | Stecurity, Steganography, FPGA | 2014 | |
Visit URL
|
QoS-aware health monitoring system using cloud-based WBANs | Journal of medical systems | Security/WBAN | 2014 | |
Visit URL
|
Software comprehension based on database relational algebra | International Journal of Information and Communication Technology | Communication and information systems | 2014 | |
Visit URL
|
Wavelet-Transform Steganography: Algorithm and Hardware Implementation | International Journal of Electronic Security and Digital Forensics | security, steganography, FPGA | 2014 | |
Visit URL
|
An Efficient Backup Technique for Database Systems Based on Threshold Sharing | Journal of Computers (JCP) | Database security | 2013 | |
Visit URL
|
Classification of Ischemic Optic Neuropathy Using Custom Image Processing Algorithm – Statistical Based Analysis | International Journal of Digital Content Technology and its Applications(JDCTA) | Image processing | 2013 | |
Visit URL
|
MPLS technology in wireless networks | Wireless Networks | wireless networks | 2013 | |
Visit URL
|
Performance and Information Security Evaluation with Firewalls | International Journal of Security and Its Applications, Publisher | security | 2013 | |
Visit URL
|
Carry-based reduction parallel counter | International Journal of Electronics | VLSI | 2012 | |
Visit URL
|
Hierarchical steganography using novel optimum quantization technique | Signal, Image and Video Processing | DSP | 2012 | |
Visit URL
|
Low power Wallace multiplier design based on wide counters | International Journal of Circuit Theory and Applications | VLSI | 2012 | |
Visit URL
|
A novel approach to enhance distributed virtual memory | Computers and Electrical Engineering | Computer Architecture | 2011 | |
Visit URL
|