الأبحاث المنشورة


عنوان البحثاسم المجلةموضوع البحثسنة النشرDOIالرابط الالكتروني
Automated Vulnerability Exploitation Using Deep Reinforcement LearningApplied SciencesCybersecurity2024  زيارة الرابط
Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study Intelligent Service RoboticsPersonal assistant robot · DARWIN-OP2 · Office ergonomics · Reinforcement learning2024  زيارة الرابط
Quantization-Based Optimization Algorithm for Hardware Implementation of Convolution Neural NetworksElectronicsMachine Learning, Neural Networks, Hardware Design2024  زيارة الرابط
A Review on Blockchain and IoT Integration from Energy, Security and Hardware PerspectivesWireless Personal CommunicationsBlockchain, IoT, Energy, Security and Hardware2023  زيارة الرابط
POSIT vs. Floating Point in Implementing IIR Notch Filter by Enhancing Radix-4 Modified Booth MultiplierElectronicsVLSI, FPGA, Algorithms2022  زيارة الرابط
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devicesCluster Computingsecurity, resource-constrained devices, lightweight hash functions, blockchain2021  زيارة الرابط
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithmInternational journal of circuit theory and applicationssecurity, resource-constrained devices, lightweight ciphers, FPGA2021  زيارة الرابط
Performance evaluation of the SM4 cipher based on field-programmable gate array implementationIET Circuits, Devices and Systemshardware security2021  زيارة الرابط
Quantitative Impact Analysis of Application-level Attacks on a Robotic PlatformInternational Journal of Electronic Security and Digital Forensicscyber-physical security; robot availability; attacks; vulnerability; risk assessment; PeopleBot2021  زيارة الرابط
Secure and efficient data delivery for fog-assisted wireless body area networksPeer-to-Peer Networking and ApplicationsSecurity and networking2019  زيارة الرابط
FPGA Modeling and Optimization of a SIMON Lightweight Block CipherSensorsHardware , security2019  زيارة الرابط
FPGA Modeling and Optimization of a SIMON Lightweight Block CipherSensorsHardware Security, Ciphers, FPGA2019  زيارة الرابط
Hardware Security in IoT Devices with Emphasis on Hardware TrojansJournal of sensor and Actuator NetworksHardware security, Trojans2019  زيارة الرابط
Implementation of Speech Feature Extraction For Low-Resource DevicesIET Circuits, Devices & SystemsSpeech, Algorithms, VLSI2019  زيارة الرابط
Run-time Monitoring and Validation using Reverse Function (RMVRF) for Hardware Trojans DetectionIEEE Transactions on Dependable and Secure ComputingHardware security, Trojan, Security, FPGA2019  زيارة الرابط
Analyzing Cyber-Physical Threats on Robotic PlatformsSensorsSecurity and Robotics2018  زيارة الرابط
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability TechniquesIEEE AccessImplementation of Lightweight Cryptography2018  زيارة الرابط
Security Vulnerabilities in Bluetooth Technology as Used in IoTJournal of Sensor and Actuator NetworksSecurity in IoT2018  زيارة الرابط
Semi-Quantitative Security Risk Assessment of Robotic SystemsJordanian Journal of Computers and Information TechnologySecurity and Robotics2018  زيارة الرابط
Semi-Quantitative Security Risk Assessment of Robotic Systems Jordanian Journal OF Computers and Information Technology (JJCIT)Robotics Security, Cyber-physical systems security2018  زيارة الرابط
Extrinsic Calibration of Camera and 2D Laser Sensors without OverlapSensorssensors, robotics, algorithms2017  زيارة الرابط
Hardware design and modeling of lightweight block ciphers for secure communicationsFuture Generation Computer SystemsSecurity, Design2017  زيارة الرابط
A comparative study of steganography designs based on multiple FPGA platformsInternational Journal of Electronic Security and Digital Forensics Security, Steganography, FPGA2016  زيارة الرابط
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementationSecurity and Communication NetworksSecurity, FPGA2016  زيارة الرابط
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor NetworksSensors Security2016  زيارة الرابط
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issuesJournal of Network and Computer ApplicationsSecurity/FPGA2015  زيارة الرابط
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications IEEE systems journalSecurity/FPGA2015  زيارة الرابط
An energy-efficient and security aware route selection protocol for wireless sensor networksSecurity and Communication NetworksSecurity2014  زيارة الرابط
Analysis and Modeling of FPGA Implementations of Spatial Steganography MethodsJournal of Circuits, Systems and ComputersStecurity, Steganography, FPGA2014  زيارة الرابط
QoS-aware health monitoring system using cloud-based WBANsJournal of medical systemsSecurity/WBAN2014  زيارة الرابط
Software comprehension based on database relational algebraInternational Journal of Information and Communication TechnologyCommunication and information systems2014  زيارة الرابط
Wavelet-Transform Steganography: Algorithm and Hardware ImplementationInternational Journal of Electronic Security and Digital Forensicssecurity, steganography, FPGA2014  زيارة الرابط
An Efficient Backup Technique for Database Systems Based on Threshold SharingJournal of Computers (JCP)Database security2013  زيارة الرابط
Classification of Ischemic Optic Neuropathy Using Custom Image Processing Algorithm – Statistical Based AnalysisInternational Journal of Digital Content Technology and its Applications(JDCTA)Image processing2013  زيارة الرابط
MPLS technology in wireless networksWireless Networkswireless networks2013  زيارة الرابط
Performance and Information Security Evaluation with FirewallsInternational Journal of Security and Its Applications, Publishersecurity2013  زيارة الرابط
Carry-based reduction parallel counterInternational Journal of ElectronicsVLSI2012  زيارة الرابط
Hierarchical steganography using novel optimum quantization techniqueSignal, Image and Video Processing DSP2012  زيارة الرابط
Low power Wallace multiplier design based on wide countersInternational Journal of Circuit Theory and ApplicationsVLSI2012  زيارة الرابط
A novel approach to enhance distributed virtual memoryComputers and Electrical EngineeringComputer Architecture2011  زيارة الرابط