Water monitoring system using Wireless Sensor Network (WSN): Case study of Kuwait beaches A Alkandari, Y Alabduljader, SM Moein 2012 Second International Conference on Digital Information Processing and …, 2012 | 62 | 2012 |
A New Characterization of Hardware Trojans S Moein, TA Gulliver, F Gebali, A Alkandari IEEE Access 4, 2721 - 2731, 2016 | 42 | 2016 |
Implementation of monitoring system for air quality using raspberry PI: Experimental study AA Alkandari, S Moein Indonesian Journal of Electrical Engineering and Computer Science 10 (1), 43-49, 2018 | 40 | 2018 |
Classification of hardware trojan detection techniques S Moein, J Subramnian, TA Gulliver, F Gebali, MW El-Kharashi 2015 Tenth International Conference on Computer Engineering & Systems (ICCES …, 2015 | 38 | 2015 |
An attribute based classification of hardware trojans S Moein, S Khan, TA Gulliver, F Gebali, MW El-Kharashi 2015 Tenth International Conference on Computer Engineering & Systems (ICCES …, 2015 | 27 | 2015 |
Wireless sensor network (WSN) for water monitoring system: Case study of Kuwait beaches A Alkandari, M Alnasheet, Y Alabduljader, SM Moein | 25 | 2012 |
Analysis of covert hardware attacks S Moein, F Gebali, I Traore Journal of Convergence 5 (3), 2014 | 21 | 2014 |
Hardware Attack Mitigation Techniques Analysis S Moein, TA Gulliver, F Gebali, A Alkandari International Journal on Cryptography and Information Security 7 (1), 9-28, 2017 | 12 | 2017 |
Modeling attacks S Al-Fedaghi, S Moein International journal of safety and security engineering 4 (2), 97-115, 2014 | 10 | 2014 |
Quantifying overt hardware attacks: Using ART schema S Moein, F Gebali Computer Science and its Applications, 511-516, 2015 | 9 | 2015 |
Quantifying Covert Hardware Attacks: Using ART Schema S Moein, F Gebali in Advances in Information Science and Computer Engineering, 2015 | 9 | 2015 |
Hardware attack risk assessment S Moein, F Gebali, TA Gulliver, MW El-Kharashi 2015 Tenth International Conference on Computer Engineering & Systems (ICCES …, 2015 | 7 | 2015 |
A formal methodology for quantifying overt hardware attacks S Moein, F Gebali Proc. Adv. in Inform. Science and Computer Eng, 63-69, 2015 | 7 | 2015 |
Hardware attacks: an algebraic approach S Moein, F Gebali, TA Gulliver Journal of Cryptographic Engineering 6, 325-337, 2016 | 6 | 2016 |
Medical care reminder for infants using android application A Alkandari, D Aladem, S Asaad, S Moein Journal Of Advanced Computer Science AndTechnologyResearch 7 (2), 57-66, 2017 | 3 | 2017 |
Survey on Nano Technology A Alfoudery, A Alkandari, S Moein Indonesian Journal of Electrical Engineering and Computer Science 10 (2 …, 2018 | 2 | 2018 |
Nanotechnology Applications: an Analytic Comparison A Alkandari, Z Almesri, S Moein Journal of Advanced Computer Science and Technology Research 7 (2), 67-80, 2017 | 2 | 2017 |
Hardware Trojan Identification and Detection S Moein, F Gebali, TA Gulliver, A Alkandari International Journal on Cryptography and Information Security 2 (2), 1-20, 2017 | 2 | 2017 |
Systematic analysis and methodologies for hardware security S Moein | 2 | 2015 |
Vehicle Accident Report Application for Solving Traffic Problems and Reduce the Ratio of Pollution using Case Study: Kuwait City A Alkandari, S Moein Indonesian Journal of Electrical Engineering and Computer Science 10 (1 …, 2018 | 1 | 2018 |