Reconfigurable FPGA architectures: A survey and applications

P Babu, E Parthasarathy - Journal of The Institution of Engineers (India) …, 2021 - Springer
Reconfigurable computing is a potential paradigm which has been effectively performing
mostly in the developments of devices likely Field Programmable Gate Arrays (FPGAs). This …

SUCCESSFUL DEPLOYMENT OF SECURE INTELLIGENT CONNECTIVITY FOR LAN AND WLAN

A Yaseen - Journal of Intelligent Connectivity and Emerging …, 2022 - questsquare.org
Abstract The paper explores Secure Intelligent Connectivity (SIC) for enhancing security in
Local Area Networks (LAN) and Wireless Local Area Networks (WLAN). It defines SIC …

Penetration testing: Concepts, attack methods, and defense strategies

M Denis, C Zena, T Hayajneh - 2016 IEEE Long Island Systems …, 2016 - ieeexplore.ieee.org
Penetration testing helps to secure networks, and highlights the security issues. In this paper
investigate different aspects of penetration testing including tools, attack methodologies, and …

Image encryption method based on improved ECC and modified AES algorithm

A Hafsa, A Sghaier, J Malek, M Machhout - Multimedia Tools and …, 2021 - Springer
Currently, embedded systems can be found everywhere in quotidian life. In the development
of embedded systems, information security is one of the important factors. Encryption is an …

Real-time video security system using chaos-improved advanced encryption standard (IAES)

A Hafsa, M Fradi, A Sghaier, J Malek… - Multimedia Tools and …, 2022 - Springer
Real-time multimedia applications are increasingly achieving success in the everyday world.
Thereby, multimedia information relies on security to protect private life. The Advanced …

A review in recent development of network threats and security measures

R Dastres, M Soori - International Journal of Information Sciences and …, 2021 - hal.science
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …

[HTML][HTML] Secure authentication for remote patient monitoring with wireless medical sensor networks

T Hayajneh, BJ Mohd, M Imran, G Almashaqbeh… - Sensors, 2016 - mdpi.com
There is broad consensus that remote health monitoring will benefit all stakeholders in the
healthcare system and that it has the potential to save billions of dollars. Among the major …

[HTML][HTML] FPGA modeling and optimization of a SIMON lightweight block cipher

S Abed, R Jaffal, BJ Mohd, M Alshayeji - Sensors, 2019 - mdpi.com
Security of sensitive data exchanged between devices is essential. Low-resource devices
(LRDs), designed for constrained environments, are increasingly becoming ubiquitous …

An investigation of Bluetooth security vulnerabilities

P Cope, J Campbell, T Hayajneh - 2017 IEEE 7th annual …, 2017 - ieeexplore.ieee.org
As Bluetooth technology has evolved and improved over the years, it has gained
widespread acceptance and is increasingly found in many aspects of everyday life. It's …

Detection and prevention of crypto-ransomware

D Gonzalez, T Hayajneh - 2017 IEEE 8th Annual Ubiquitous …, 2017 - ieeexplore.ieee.org
Crypto-ransomware is a challenging threat that ciphers a user's files while hiding the
decryption key until a ransom is paid by the victim. This type of malware is a lucrative …