Phase-assisted dynamic tag-embedding message authentication for IoT networks
M Qaisi, S Althunibat, M Qaraqe - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Security is a critical issue in Internet of Things (IoT) networks and it has been under investigation
by researchers worldwide. Different from other wireless networks, IoT networks suffer …
by researchers worldwide. Different from other wireless networks, IoT networks suffer …
Performance analysis of tag embedded based message authentication scheme
M Qaisi, S Althunibat, M Qaraqe - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Tag-embedded has been proposed in the literature as an efficient message authentication
scheme due to low spectrum, power and time resources required as compared to the …
scheme due to low spectrum, power and time resources required as compared to the …
AI/ML-Assisted Threat Detection and Mitigation in 6G Networks with Digital Twins: The HORSE Approach
In this paper a novel architectural approach is presented for threat detection and mitigation
via machine learning (ML) in sixth-generation (6G) networks. In this context, due to the vast …
via machine learning (ML) in sixth-generation (6G) networks. In this context, due to the vast …
Comprehensive DFT study of K2TlZI6 (Z= Al, In) double perovskites: Structural stability and potential for optoelectronic and thermoelectric energy harvesting
S Al-Qaisi, N Iram, N Sfina, A Boutramine… - Physica B: Condensed …, 2025 - Elsevier
This research utilizes density functional theory (DFT) to explore the structural, mechanical,
optoelectronic, and transport properties of K 2 TlZI 6 (Z = Al, In). The stability of K 2 TlAlI 6 and …
optoelectronic, and transport properties of K 2 TlZI 6 (Z = Al, In). The stability of K 2 TlAlI 6 and …
Data confidentiality for IoT networks: cryptographic gaps and physical-layer opportunities
…, S Alfalahat, T Alshamaseen, M Qaisi - 2021 IEEE 26th …, 2021 - ieeexplore.ieee.org
The conventional solution for providing data confidentiality is by means of encryption (a
branch of cryptography). However, encryption schemes are generally designed to provide a …
branch of cryptography). However, encryption schemes are generally designed to provide a …
A comprehensive first-principles study on the physical properties of Sr2ScBiO6 for low-cost energy technologies
This paper presents a thorough first-principles investigation of the physical attributes of the
double perovskite (DP) oxide, Sr 2 ScBiO 6 . The calculated lattice constant and the bond …
double perovskite (DP) oxide, Sr 2 ScBiO 6 . The calculated lattice constant and the bond …
First-Principles Calculations of Novel Lead-Free X2GeSnI6 (X = Rb, Cs) Double Perovskite Compounds for Optoelectronic and Energy Exploitations
We investigate the structural, optoelectronic, and thermoelectric properties of halide double
perovskite X 2 GeSnI 6 (X = Rb, Cs) compounds employing the full potential linearized …
perovskite X 2 GeSnI 6 (X = Rb, Cs) compounds employing the full potential linearized …
Bifunctionalized Ammonium-Phenolic Organocatalysts for Co2 Utilization: A First-Time Phenomenon of Anion Shielding Over the Active Site
Recyclable and homogeneous bifunctionalized phenolic-ammonium compounds are
recognized as one-component organocatalysts for the coupling reaction of CO2 with epoxides. …
recognized as one-component organocatalysts for the coupling reaction of CO2 with epoxides. …
A theoretical investigation of the Ba2CePtO6 double perovskite for optoelectronic and thermoelectric applications
In this work, theoretical investigations were performed for the structural, elastic, optoelectronic,
thermodynamic, and thermoelectric characteristics of barium ceroplatinate Ba 2 CePtO 6 …
thermodynamic, and thermoelectric characteristics of barium ceroplatinate Ba 2 CePtO 6 …
First-principles investigations of Ba2NaIO6 double perovskite semiconductor: material for low-cost energy technologies
The investigations on the physical properties of the Ba 2 NaIO 6 double perovskite, in this
work, are presented. These investigations are carried out using WIEN2k computational code …
work, are presented. These investigations are carried out using WIEN2k computational code …