default search action
Bassam Jamil Mohd
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Khalil M. Ahmad Yousef, Bassam Jamil Mohd, Omar Barham, Ahmad Al-Najjar, Mohammad Abu-Diab, Anas AlMajali:
Personal assistant robot using reinforcement learning: DARWIN-OP2 as a case study. Intell. Serv. Robotics 17(4): 815-831 (2024) - 2023
- [j31]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd:
A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives. Wirel. Pers. Commun. 129(3): 2079-2122 (2023) - 2022
- [j30]Khalil M. Ahmad Yousef, Anas AlMajali, Bassam Jamil Mohd, Salah Abu Ghalyon:
Quantitative impact analysis of application-level attacks on a robotic platform. Int. J. Electron. Secur. Digit. Forensics 14(4): 388-412 (2022) - 2021
- [j29]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Clust. Comput. 24(4): 3065-3084 (2021) - [j28]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji:
Performance evaluation of the SM4 cipher based on field-programmable gate array implementation. IET Circuits Devices Syst. 15(2): 121-135 (2021) - [j27]Sa'ed Abed, Bassam Jamil Mohd, Thaier Hayajneh, Mohammad H. Alshayeji:
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int. J. Circuit Theory Appl. 49(11): 3607-3629 (2021) - [j26]Bassam Jamil Mohd, Sa'ed Abed, Thaier Hayajneh, Mohammad H. Alshayeji:
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 18(6): 2689-2704 (2021) - 2020
- [j25]Thaier Hayajneh, Razvi Doomun, Ghada Almashaqbeh, Bassam Jamil Mohd:
Erratum to "An Energy-Efficient and Security Aware Route Selection Protocol for Wireless Sensor Networks". Secur. Commun. Networks 2020: 4093210:1-4093210:1 (2020)
2010 – 2019
- 2019
- [j24]Sa'ed Abed, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
Implementation of speech feature extraction for low-resource devices. IET Circuits Devices Syst. 13(6): 863-872 (2019) - [j23]Simranjeet Sidhu, Bassam Jamil Mohd, Thaier Hayajneh:
Hardware Security in IoT Devices with Emphasis on Hardware Trojans. J. Sens. Actuator Networks 8(3): 42 (2019) - [j22]Thaier Hayajneh, Kristen N. Griggs, Muhammad Imran, Bassam Jamil Mohd:
Secure and efficient data delivery for fog-assisted wireless body area networks. Peer-to-Peer Netw. Appl. 12(5): 1289-1307 (2019) - [j21]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji:
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. Sensors 19(4): 913 (2019) - 2018
- [j20]Bassam Jamil Mohd, Thaier Hayajneh:
Lightweight Block Ciphers for IoT: Energy Optimization and Survivability Techniques. IEEE Access 6: 35966-35978 (2018) - [j19]Bassam Jamil Mohd, Thaier Hayajneh, Khalil Mustafa Ahmad Yousef, Zaid Abu Khalaf, Md. Zakirul Alam Bhuiyan:
Hardware design and modeling of lightweight block ciphers for secure communications. Future Gener. Comput. Syst. 83: 510-521 (2018) - [j18]Angela M. Lonzetta, Peter Cope, Joseph Campbell, Bassam Jamil Mohd, Thaier Hayajneh:
Security Vulnerabilities in Bluetooth Technology as Used in IoT. J. Sens. Actuator Networks 7(3): 28 (2018) - [j17]Khalil M. Ahmad Yousef, Anas AlMajali, Salah Abu Ghalyon, Waleed Dweik, Bassam Jamil Mohd:
Analyzing Cyber-Physical Threats on Robotic Platforms. Sensors 18(5): 1643 (2018) - 2017
- [j16]Khalil Mustafa Ahmad Yousef, Bassam Jamil Mohd, Khalid Al-Widyan, Thaier Hayajneh:
Extrinsic Calibration of Camera and 2D Laser Sensors without Overlap. Sensors 17(10): 2346 (2017) - [j15]Thaier Hayajneh, Sana Ullah, Bassam Jamil Mohd, Kiran S. Balagani:
An Enhanced WLAN Security System With FPGA Implementation for Multimedia Applications. IEEE Syst. J. 11(4): 2536-2545 (2017) - 2016
- [j14]Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Athanasios V. Vasilakos:
A comparative study of steganography designs based on multiple FPGA platforms. Int. J. Electron. Secur. Digit. Forensics 8(2): 164-190 (2016) - [j13]Bassam Jamil Mohd, Thaier Hayajneh, Zaid Abu Khalaf, Khalil Mustafa Ahmad Yousef:
Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation. Secur. Commun. Networks 9(13): 2200-2216 (2016) - [j12]Thaier Hayajneh, Bassam Jamil Mohd, Muhammad Imran, Ghada Almashaqbeh, Athanasios V. Vasilakos:
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. Sensors 16(4): 424 (2016) - 2015
- [j11]Bassam Jamil Mohd, Thaier Hayajneh, Athanasios V. Vasilakos:
A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues. J. Netw. Comput. Appl. 58: 73-93 (2015) - [c8]Thaier Hayajneh, Tao Zhang, Bassam Jamil Mohd:
Security Issues in WSNs with Cooperative Communication. CSCloud 2015: 451-456 - 2014
- [j10]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Ahmad Al-Khasawneh:
Software comprehension based on database relational algebra. Int. J. Inf. Commun. Technol. 6(1): 58-70 (2014) - [j9]Bassam Jamil Mohd, Thaier Hayajneh, Sa'ed Abed, Awni Itradat:
Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods. J. Circuits Syst. Comput. 23(2) (2014) - [j8]Ghada A. Al-Mashaqbeh, Thaier Hayajneh, Athanasios V. Vasilakos, Bassam Jamil Mohd:
QoS-Aware Health Monitoring System Using Cloud-Based WBANs. J. Medical Syst. 38(10): 121 (2014) - [j7]Thaier Hayajneh, Razvi Doomun, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd:
An energy-efficient and security aware route selection protocol for wireless sensor networks. Secur. Commun. Networks 7(11): 2015-2038 (2014) - [j6]Sahel Alouneh, Sa'ed Abed, Mazen Kharbutli, Bassam Jamil Mohd:
MPLS technology in wireless networks. Wirel. Networks 20(5): 1037-1051 (2014) - [c7]Thaier Hayajneh, Athanasios V. Vasilakos, Ghada A. Al-Mashaqbeh, Bassam Jamil Mohd, Muhammad Ali Imran, Muhammad Zeeshan Shakir, Khalid A. Qaraqe:
Public-Key Authentication for Cloud-based WBANs. BODYNETS 2014 - 2013
- [j5]Bassam Jamil Mohd, Thaier Hayajneh, Ahmad Nahar Quttoum:
Wavelet-transform steganography: algorithm and hardware implementation. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 241-256 (2013) - [j4]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Mazen Kharbutli:
An Efficient Backup Technique for Database Systems Based on Threshold Sharing. J. Comput. 8(11): 2980-2989 (2013) - [j3]Bassam Jamil Mohd, Sa'ed Abed, Bassam Na'ami, Thaier Hayajneh:
Hierarchical steganography using novel optimum quantization technique. Signal Image Video Process. 7(6): 1029-1040 (2013) - 2012
- [j2]Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd:
A novel approach to enhance distributed virtual memory. Comput. Electr. Eng. 38(2): 388-398 (2012) - [j1]Sa'ed Abed, Bassam Jamil Mohd, Zaid Al-bayati, Sahel Alouneh:
Low power Wallace multiplier design based on wide counters. Int. J. Circuit Theory Appl. 40(11): 1175-1185 (2012) - 2011
- [c6]Bassam Jamil Mohd, Sa'ed Abed, Bassam Al-Naami, Sahel Alouneh:
Image Steganography Optimization Technique. SPIT/IPC 2011: 205-209
2000 – 2009
- 2009
- [c5]Bassam Jamil Mohd, Earl E. Swartzlander Jr.:
A Power-Scalable Switch-Based Multi-processor FFT. ASAP 2009: 114-120 - 2007
- [c4]Hani H. Saleh, Bassam Jamil Mohd, Adnan Aziz, Earl E. Swartzlander Jr.:
Contention-free switch-based implementation of 1024-point Radix-2 Fourier Transform Engine. ICCD 2007: 7-12 - [c3]Bassam Jamil Mohd, Earl E. Swartzlander Jr., Adnan Aziz:
The Hazard-Free Superscalar Pipeline Fast Fourier Transform Architecture and Algorithm. VLSI-SoC (Selected Papers) 2007: 1-22 - [c2]Bassam Jamil Mohd, Adnan Aziz, Earl E. Swartzlander Jr.:
The hazard-free superscalar pipeline fast fourier transform algorithm and architecture. VLSI-SoC 2007: 194-199 - 2002
- [c1]Alex Wakefield, Bassam Jamil Mohd:
Constructing reusable testbenches. HLDVT 2002: 151-155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint