Kadhim Hayawi
Kadhim Hayawi
Zayed University / University of Waterloo
Verified email at zu.ac.ae
Cited by
Cited by
Network attacks and defenses: A hands-on approach
Z Trabelsi, K Hayawi, A Al Braiki, SS Mathew
CRC Press, 2012
End-to-end security solutions for WLAN: a performance analysis for the underlying encryption algorithms in the lightweight devices
ES Barka, EE Mohamed, K Hayawi
Proceedings of the 2006 international conference on Wireless communications …, 2006
The limits of the trade-off between query-anonymity and communication-cost in wireless sensor networks
K Hayawi, A Mortezaei, MV Tripunitara
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack
Z Trabelsi, S Zeidan, K Hayawi
IEEE Access 7 (1), 2019
Suitability of Blockchain for Collaborative Intrusion Detection Systems
NA Dawit, SS Mathew, K Hayawi
12th Annual Undergraduate Research Conference on Applied Computing (URC), 2020
Thwarting ICMP Low-rate Attacks against Firewalls while Minimizing Legitimate Traffic Loss
K Hayawi, Z Trabelsi, S Zeidan, M Masud
IEEE ACCESS, 1, 2020
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
K Hayawi, PH Ho, SS Mathew, L Peng
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
Analysis of Java-Based End-to-End Wireless Internet Security
L Hughes, AK Hay'awi
ICWI, 350-358, 2004
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data
M M. Masud, K Hayawi, S Samuel Mathew, A Dirir, M Cheratta
Proceedings of the Australasian Computer Science Week Multiconference, 1-8, 2020
Medication Recommendation for Critical Care Patients Using Patient Similarity in Clinical Records
MM Masud, M Cheratta, K Hayawi
International Journal of Bioscience, Biochemistry and Bioinformatics (IJBBB …, 2020
Cost Analysis of Query-Anonymity on the Internet of Things
K Hayawi
University of Waterloo, 2017
End-to-End Security for Wireless Internet: Java-Based Security solutions
AK Hayawi
VDM Verlag, 2009
Java-Based End-To-End Security For Wireless Internet
K Hayawi
Dalhousie University, 2004
An Adaptive Approach of Pattern Recognition with Application to Computer Vision
K Hayawi
University of Baghdad, 1996
URC2020 Conference Proceedings
T Mikael, R Salem, F Belqasmi, AW Smart, AAS Shehhi, QH Mohammad, ...
List of Authors of URC2020 Special Track Papers
L Ahmad, N Al Hashimi, E Al Neyadi, A Al Shehhi, S Al Shehhi, ...
The system can't perform the operation now. Try again later.
Articles 1–16