Faculty Research Areas
Faculty | Research interest |
Mohammad Al-Rousan Professor | Wireless Sensor Networks, Artificial Intelligent Systems, Nanotechnology Systems, Cloud Computing, Web-based applications. |
Fahed Awad Professor | Wireless Sensor Networks, Mobile Ad Hoc Networks, Wireless Location Identification, Mobile Robot Applications. |
Basheer Al-Duwairi Professor | DDoS attacks, Botnets, Smartgrid Security, SDN networks. |
Eyad Taqieddin Professor | WSN, RFID Ultralightweight Security, Cryptography, Embedded Systems. |
Moad Mowafi Associate Professor | Multimedia Networking, Wireless Sensor Networks, Security. |
Monther Aldwairi Associate Professor | Network Security, Pattern Matching, Cloud Computing, Computer Architecture, Parallel Computing and/or Programming. |
Omar Banimelhem Associate Professor | Wireless Sensor Networks, Artificial Intelligence Applications, Image Processing. |
Read Bani-Hani Associate Professor | Network Security, Key Management and Distribution, Network Performance, IPsec Architecture, Embedded Systems, and Wireless Sensor Networks with emphasis on Secure routing, location verification, and energy consumption. |
Mohammad Al-Shurman Professor | Wireless Ad hoc Networks Routing Protocols, Security and key management of wireless Ad Hoc networks, Wireless Sensor Networks, Network Coding, Wireless Communication and Mobile Networks, Software Defined Networks, Cognitive Radio, WiMAX, 4G and 5G Technologies. |
Ahmad Al-Hammouri Associate Professor | Computer Communication Networks and Distributed Systems with emphasis on the intersection of networks and control theory. Particular subjects include Cyber-Physical Systems (also known as Networked Control Systems), Smart power grid, Congestion control, and Middleware for real-time applications. |
Baha' Alsaify Associate Professor | Radio Frequency Identification (RFID), Wireless Sensor Networks (WSN), Privacy in Computing, Internet of Things (IoT). |
Abdallah Alma'aitah Associate Professor
| Wireless Communications and Smart Environments. In particular, embedded systems power optimization, large scale deployment of RFID systems and wireless sensors networks in harsh environments, and wireless power transfer for internet of things (IoT). |
Research Grants and Funding
Current
· "The Impact of localization Error on Location-based Routing in Wireless Sensor Networks," Deanship of Scientific Research, Jordan University of Science and Technology, 2016, JOD 4,900, (PI: Fahed Awad).
· "Promotion of Innovation Culture in the Higher Education in Jordan (INVENT)," Education, Audiovisual and Culture Executive Agency (EACEA), European Union, the ERASMUS+ Program, 2015, EUR 880,000, (Co-PI: Fahed Awad).
· "Improving Higher Education Quality in Jordan using Mobile Technologies for Better Integration of Disadvantaged Groups to Socio-economic Diversity (mEQUITY)," Education, Audiovisual and Culture Executive Agency (EACEA), European Union, the ERASMUS+ Program, 2015, EUR 786,000, (Co-PI: Fahed Awad).
· "Excellence of Nanoscience Education for MENA Region, XNEM," European Union (EU), 2014-2016, €250,000, (Co-PI: Mohammad Al-Rousan).
Past
· "3-D Automated Miniaturized Manipulator," Royal Hashemite Court, 2013, JOD 141,000, (Co-PI: Fahed Awad).
· "Distributed and seamless location identification system for mobile devices," Deanship of Scientific Research, Jordan University of Science and Technology, 2013, JOD 12,500, (PI: Fahed Awad).
· "Automatic Multilevel Thresholding Methods for Image Segmentation using Memetic Algorithm and Wavelet Transform," Deanship of Scientific Research, Jordan University of Science and Technology, 2013, JOD 5,000, (Moad Mowafi (PI), Omar Banimelhem).
· "Fuzzy Logic-Based Sink Positioning in Large-Scale Wireless Sensor Networks," Deanship of Scientific Research, Jordan University of Science and Technology, 2013, (PI: Omar Banimelhem).
· "Seed Germination Using Carbon Nano Tube', JUST, US12,000, 2013, (PI: Mohammad Al-Rousan).
· "Cisco activities", UN Women, Jordan, $30,000, 2013, (PI: Mohammad Al-Rousan).
· "Improving the Functionality of LEACH Protocol Using Computational Intelligence Methods," Deanship of Scientific Research, Jordan University of Science and Technology, 2012, JOD 6,000, (Omar Banimelhem (PI), Eyad Taqieddin, Fahed Awad, Moad Mowafi).
· "Energy-Efficient Correlation-Aware Visual Information Processing for WMSNs", World Federation of Scientists, 2012, (PI: Moad Mowafi).
· "Characterization and detection of SMS commanded and controlled mobile botnets," Deanship of Research, Jordan University of Science and Technology, 2012, (Basheer Al-Duwairi (PI), Natheer Khasawneh, Mohammad Fraiwan).
· "Investigating the application of data mining prefetching based algorithm to improve the performance of hybrid storage systems", IBM Shared University Research Grant, 2012, $35,000, (PI: Monther Aldwairi).
· "Accelerated H/W Wu-Manber for IDS", Deanship of Research, Jordan University of Science and Technology, 2012, $9,040, (PI: Monther Aldwairi).
· "Cisco activities", UN Women, Jordan, $36,000, 2012, (PI: Mohammad Al-Rousan).
· "Characterization and Detection of Fast Flux Networks," Deanship of Research, Jordan University of Science and Technology, 2011-2013, JOD 14,700, (Basheer Al-Duwairi (PI), Ahmad Al-Hammouri, Monther Aldwairi).
· "SOA-Based Implementation of JUST Enterprise System in the Cloud," IBM Faculty Award, 2011, (Basheer Al-Duwairi).
· "FFN characterization and detection", Deanship of Research, Jordan University of Science and Technology, 2011, $20,622, (Co-PI: Monther Aldwairi).
· "justTV project", International Media Support (IMS), Denmark, 2011, $21,368, (PI: Monther Aldwairi).
· "Vision-based Nano Manipulator", Royal Court-Jordan, $319142, 2011-2014, (PI: Mohammad Al-Rousan).
· "Design Nano Robot", Royal Court-Jordan, $3,094,857, 2011-2013, (Co-PI: Mohammad Al-Rousan).
· "Experimental Performance Evaluation for Mobile Wireless Multimedia Sensor Networks," Deanship of Scientific Research, Jordan University of Science and Technology, 2010, JOD 12,400, (Fahed Awad (PI), Moad Mowafi, Omar Banimelhem, Eyad Taqieddin).
· "Efficient Cryptographic Processor for Internet and Wireless Security Based on Elliptic Curve Cryptography", Ministry of Higher Education, Jordan, $79,578, 2009-2011, (Co-PI: Mohammad Al-Rousan).
· "A Novel Biological Nano-Engineering Robot as Self-Detector for Cancer Cells", Jordan University of Science and Technology, JOD 145,300, 2008-2012, (Co-PI: Mohammad Al-Rousan).
· "QoS Routing for Industrial Wireless Sensor Networks," Deanship of Scientific Research, Jordan University of Science and Technology, 2005, JOD 1,500, (PI: Fahed Awad).
· "Mediterranean Virtual University (MVU)," European Union (EU), €221,018, 2002-2006, (Co-PI: Mohammad Al-Rousan).
Recent Publications
· Mohammad AL-Rousan, Elham AL-Shara, and Yaser Jararweh. "AMCC: Ad-hoc based Mobile Cloud Computing Modeling." Procedia Computer Science 56 (2015): 580-585.
· Omar Banimelhem, Eyad Taqieddin, Moad Mowafi, Fahed Awad, Feda' Al-Ma'aqbeh, "Fuzzy Logic-Based Cluster Heads Percentage Calculation for Improving the Performance of the LEACH Protocol,", International Journal of Fuzzy System Applications (IJFSA), vol. 4, no. 4, pp. 100-118, October 2015.
· Fahed H. Awad, "Wireless Location Estimation Using Virtual Forces.", In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), Liverpool, United Kingdom, October 2015.
· Fahed H. Awad, Moad Y. Mowafi, Walid A. Aljoby, "Correlation Model for Randomly Deployed Heterogeneous Cameras in Wireless Multimedia Sensor Networks," In Proceedings of the 16th International Conference on Computer as a Tool (The IEEE Region 8 EUROCON'2015), Salamanca, Spain, September 2015.
· Basheer Al-Duwairi, Ahmad Al-Hammouri, Monther Aldwairi, Vern Paxson, "GFlux: A Google-Based System for Fast Flux Detection", IEEE Conference on Communications and Network Security (IEEE-CNS 2015), Florence, Italy, 27-29 Sept 2015.
· Monther Aldwairi, and Koloud Al-Khamaiseh. "Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters." In Web Applications and Networking (WSWAN), 2015 2nd World Symposium on, pp. 1-6. IEEE, 2015.
· Zaid Alali, Basheer Al-Duwairi and Ahmad Al-Hammouri, ''Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events'', The 2nd IEEE International Conference on Cyber Security and Cloud Computing IEEE CSCloud 2015, NewYork, USA, Nov. 2015.
· Omar Banimelhem, Moad Mowafi, Oduy Alzoubi. "Multilevel Thresholding Image Segmentation using Memetic Algorithm", In Proceedings of the 6th International Conference on Information and Communication Systems (ICICS 2015), IEEE, April 2015, pp. 119-123.
· Eyad Taqieddin, Ola Abu-Rjei, Khaldoon Mhaidat, Raed Bani-Hani, " Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining," The 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015), pp. 8-15, 27 – 30 Sept. 2015.
· Osama Al-Khaleel, Zakaria Al-Qudah, Mohammad Al-Khaleel, Raed Bani-Hani, Christos Papachristou, and Francis Wolff, " Efficient Binary-to-BCD Conversion Designs for Decimal Multiplication,", Journal of Circuits, Systems and Computers (ISI-indexed), Volume 24, Issue 02, February 2015.
· Mamoun F. Al‐Mistarihi, Rami Mohaisen, Ashraf Sharaqa, Mohammad M. Shurman, and Khalid A. Darabkh. "Performance evaluation of multiuser diversity in multiuser two‐hop cooperative multi‐relay wireless networks using maximal ratio combining over Rayleigh fading channels."International Journal of Communication Systems, vol. 28, no. 1 (2015): 71-90.
· Mohammad Al-Rousan, and Rana AlQurem. "Low power receiver for wireless sensor network implemented by Nano-Scale CMOS process." In Information and Communication Systems (ICICS), 2014 5th International Conference on, pp. 1-6. IEEE, 2014.
· Moad Y. Mowafi, Fahed H. Awad, Walid A. Aljoby, "A novel approach for extracting spatial correlation of visual information in heterogeneous wireless multimedia sensor networks," Computer Networks, vol. 71, no. 4, pp. 31-47, October 2014.
· Eyad Taqieddin, Fahed Awad, Sally Abdallah, "Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks," Journal of Ad Hoc & Sensor Wireless Networks (AHSWN), vol. 21, no. 3-4, pp. 237-257, February 2014.
· Fahed Awad, Eyad Taqieddin, Moad Mowafi, Omar Banimelhem, Amani AbuQdais, "A Simulation Testbed to Jointly Exploit Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks," In Proceedings of the 11th International Symposium of Wireless Communication Systems (ISWCS'2014), Barcelona, Spain, August 2014.
· Omar Banimelhem, Moad Mowafi, Eyad Taqieddin, Fahed Awad, Manar Al Rawabdeh, "An Efficient Clustering Approach using Genetic Algorithm and Node Mobility in Wireless Sensor Networks," In Proceedings of the 11th International Symposium of Wireless Communication Systems (ISWCS'2014), Barcelona, Spain, August 2014.
· Monther Aldwairi, Bashar Al-Hajasad, Yaser Khamayseh, "A Classifier System for Predicting RNA Secondary Structure", International Journal of Bioinformatics Research and Applications, vol. 10, no. 3 (2014): 307-320.
· Basheer Al-Duwairi and Ahmad Al-Hammouri, "Fast Flux Watch: A Mechanism for Online Detection of Fast Flux Netwoks", Journal of Advanced Research, no. 4 (2014): 473-479.
· Zakaria Al-Qudah, Basheer Al-Duwairi, and Osama Al-Khaleel, "DDoS Protection as a Service: Hiding Behind the Giants", International Journal of Computational Science and Engineering, no. 4 (2014): 292-300.
· Raed Bani-Hani, Salah Harb, Khaldoon Mhaidat, Eyad Taqieddin, "High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES)," Circuits and Systems, vol. 5, pp. 45 – 56, March 2014.
· Haifeng Niu, Jagannathan, Sarangapani, Eyad Taqieddin, "A Gen2v2 Compliant RFID Authentication and Ownership Management Protocol," IEEE 39th Conference on Local Computer Networks (LCN), pp. 331,336, 8-11 Sept. 2014
· Raed Bani-Hani, Yarub Wahsha, Mohammad Al-Sarhan "Secure QR Code System," In Proceedings of the 10th International Conference on Innovations in Information Technology(IIT'14), November 9-11, 2014. Al Ain, UAE
· Mikel Armendariz, Moustafa Chenine, Ahmad Al-Hammouri, and Lars Nordström. A co-simulation platform for medium/low voltage monitoring and control applications. In IEEE Conference on Innovative Smart Grid Technologies (ISGT 2014), Washington, D.C., USA, February 2014.
· Baha A. Alsaify, Dale R. Thompson, and Jia Di, "Exploiting hidden Markov Models in identifying passive UHF RFID tags," in Proc. IEEE Radio and Wireless Symposium (RWS), Newport Beach, California, Jan. 19-22, 2014, pp. 259-261.
· A. Alma'aitah, H. S. Hassanein, M. Ibnkahla, "Tag Modulation Silencing: Design and Application in RFID Anti-collision Protocols," IEEE Transactions on Communications, vol. PP, no.99, 2014, pp.1,1 doi: 10.1109/TCOMM.2014.2356581.
· W. Alsalih, A. Alma'aitah, W. Alkhater. "RFID Localization using Angle of Arrival Cluster Forming," International Journal of Distributed Sensor Networks, vol. 2014, Article ID 269596, 8 pages, 2014. doi:10.1155/2014/269596.
· A. Alma'aitah, H.S. Hassanein, "Utilizing Sprouts WSN platform for equipment detection and localization in harsh environments," In IEEE 39th Conference on Local Computer Networks Workshops (LCN Workshops), pp.777-783, 2014.
· L. Eslim, H.S. Hassanein, W. Ibrahim, A. Alma'aitah, "A cooperative localization scheme using RFID crowdsourcing and time-shifted multilateration," In IEEE 39th Conference on Local Computer Networks (LCN), pp.185-192, 2014.
· A. Elkouche, H. S. Hassanein, A. Alma'aitah, "Conguring a UHF antenna for sensor nodes in harsh environments," In IEEE 27th Queen's Biennial Symposium on Communications (QBSC), pp.66-70, 2014.
· Mohammad Shurman, Zaid Alomari, "An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks", Jornal of wireless Engineering and Technology, Vol.5, 2014.
· Mohammad Shurman, Noor Awad, Mamoun Al-Mistarihi, and Khalid Darabkh. "LEACH enhancements for wireless sensor networks based on energy model." In Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International, pp. 1-4. IEEE, 2014.
· Mohammad Shurman, Mohammad Alfawares, Mamoun Al-Mistarihi, and Khalid Darabkh. "A collaborative reputation approach to avoid misbehaving nodes in MANETs." In Multi-Conference on Systems, Signals & Devices (SSD), 2014 11th International, pp. 1-4. IEEE, 2014.
· Fahed Awad, Mohamed Alsheakhali, "Traffic-Aware and Low-Overhead Routing Protocol for Mobile Ad Hoc Networks," International Journal of Communication Networks and Distributed Systems (IJCNDS), vol. 10, no. 3, pp. 303-315, April 2013.
· Moad Mowafi, Fahed Awad, Mohammed Al-Batati, "Opportunistic Network Coding for Real-Time Transmission over Wireless Networks," Journal of Network Protocols and Algorithms (NPA), vol. 5, no. 1, pp. 1-19, March 2013.
· Eyad Taqieddin, Moad Mowafi, Fahed Awad, Omar Banimelhem, Hani Maher, "An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks," International Journal of IT and Web Engineering (IJITWE), vol. 8, pp. 50-63, January 2013.
· Moad Mowafi, Fahed Awad, Walid Aljoby, "Spatial Correlation Model for Heterogeneous Cameras in Wireless Multimedia Sensor Networks," In Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM 2013), Madrid, Spain, June 4-7, 2013.
· Basheer Al-Duwairi, Zakaria Al-Qudah, and Manimaran Govindarasu,"A Novel Scheme for Mitigating Botnet-Based DDoS Attacks", Journal of Networks, Vol 8, No. 2 (2013) pp (297-306).
· Moad Mowafi and Walid Aljoby, "Lightweight Target Classification for Wireless Multimedia Sensor Networks," International Journal of Image and Data Fusion, vol. 4, no. 4, 2013, pp. 293–307.
· Lo'ai Tawalbeh, Moad Mowafi, and Walid Aljoby, "Use of Elliptic Curve Cryptography for Multimedia Encryption," IET Information Security, vol. 7, no. 2, 2013, pp. 67–74.
· Omar Banimelhem, Lo'ai Tawalbeh, Moad Mowafi, and Mohammed Al-Batati, "A More Secure Image Hiding Scheme using Pixel Adjustment and Genetic Algorithm," International Journal of Information Security and Privacy, vol. 7, no. 3, 2013, pp. 1–15.
· Omar Banimelhem, Moad Mowafi, and Walid Aljoby, "Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks," Communications and Network, vol. 5, no. 4, 2013, pp. 273–279.
· Omar Banimelhem, Eyad Taqieddin, and Feda' Al-Ma'awbeh, "A New Approach for Target Coverage in Wireless Sensor Networks using Fuzzy Logic," in Proceedings of the 2013 IEEE International Conference on Networking, Sensing and Control, Paris-France, 2013.pp. 837–842.
· Eyad Taqieddin, Omar Banimelhem, and Ibrahim Shatnawi, "A Path Generation Algorithm for Mobile Sinks in Wireless Sensor Networks", in Proceedings of the 2013 International Conference on Innovation in Information Technology (IIT), Al Ain, UAE, March 17-19, 2013.pp. 164-168.
· Raed M. Bani-Hani and Abdalraheem A. Ijjeh, "A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks," Journal of Communications, vol. 8, no. 3, pp. 192-206, 2013. DOI: 10.12720/jcm.8.3.192-206
· Raed Bani-Hani, Zaid Al-Ali, "SYN Flooding Attack: A survey," In Proceedings of the 4th International Conference on Information and Communication Systems (ICICS13), Irbid, Jordan, April 2013.
· Isra' Al-Qasem, Sumaya Al-Qasem, and Ahmad T. Al-Hammouri. Leveraging online social networks for a real-time malware alerting system. In IEEE Conference on Local Computer Networks (LCN 2013), Sydney, AUSTRALIA, October 2013.
· Kun Zhu, Samarth Deo, Ahmad T. Al-Hammouri, Nicholas Honeth, Moustafa Chenine, Davood Babazadeh, and Lars Nordström. Test platform for synchrophasor based wide-area monitoring and control applications. In IEEE Power and Energy Society General Meeting (PES GM 2013), Vancouver, British Columbia, CANADA, July 2013.
· Davood Babazadeh, Moustafa Chenine, Kun Zhu, Lars Nordström, and Ahmad T. Al-Hammouri. A platform for wide area monitoring and control system ICT analysis and development. In IEEE PowerTech Grenoble (PowerTech 2013), Grenoble, FRANCE, June 2013.
· A. Alma'aitah, H. S. Hassanein, M. Ibnkahla, "Rapid Tag Collision Resolution Using Enhanced Continuous Wave Absence Detection" In IEEE 38th Conference on Local Computer Networks Workshops (LCN Workshops), pp.861-867, 2013.
· A. Elkouche, A. Alma'aitah, H.S. Hassanein, K. Obaia "Monitoring operational mining equipment using Sprouts Wireless Sensor Network platform," In the 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp.1388-1393, 2013.
· Mohammad Shurman, Mamoun F. Al-Mistarihi, Zaid Alomari,"MAC layer Back-off Algorithm for Adhoc Networks, "MIPRO 2013", Opatija, Croatia May 2013.
· Mohammad M. Al-Shurman, Mamoun F. Al-Mistarihi, Khalid Drabkh," Merging Dynamic Address Autoconfiguration and Security Key Protocols in Mobile Ad Hoc Networks, "MIPRO 2013", Opatija, Croatia May 2013.
· Nadia Al-Rousan, Mohammad Al-Rousan, Adnan Shareiah, and H. Al-Najjar. "Choosing the efficient tracking method for real time tracking system in Jordan and its neighbors to get maximum gained power based on experimental data." In Renewable Energy Research and Applications (ICRERA), 2012 International Conference on, pp. 1-6. IEEE, 2012.
· Nadia Al-Rousan, Mohammad Al-Rousan, and Adnan Shareiah. "A fuzzy logic model of a tracking system for solar panels in northern Jordan based on experimental data." In Renewable Energy Research and Applications (ICRERA), 2012 International Conference on, pp. 1-6. IEEE, 2012.
· Mohammad AL-Rousan, and Ahamd Nawasrah. "Adaptive FEC Technique for Multimedia Applications over the Internet." Journal of emerging technologies in web intelligence, vol. 4, no. 2 (2012): 142-147.
· Fahed Awad, Eyad Taqieddin, Asmaa Seyam, "Energy-Efficient and Coverage-Aware Clustering in Wireless Sensor Networks," Wireless Engineering and Technology (WET) Journal, vol.3, no.3, pp. 142-141, July 2012.
· Moad Mowafi, Fahed Awad, Eyad Taqieddin, Omar Banimelhem, "A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks," Journal of Communications (JCM), vol. 7, no. 4, pp. 309-320, April 2012.
· Asmaa Seyam, Fahed Awad, Eyad Taqieddin, "Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using the Virtual Field Force," In Proceedings of the 5th International Conference on New Technologies Mobility and Security (NTMS'12), Istanbul, Turkey, May 2012.
· Fahed Awad, Firas Daghmash, "Enhanced Guaranteed Time Slot Algorithm for the IEEE 802.15.4 Standard." In Proceedings of the 3rd International Conference on Information and Communication Systems (ICICS12), Irbid, Jordan, April 2012.
· Feda' Al-Ma'aqbeh, Omar Banimelhem, Eyad Taqieddin, Fahed Awad, Moad Mowafi, "Fuzzy Logic Based Energy Efficient Adaptive Clustering Protocol." In Proceedings of the 3rd International Conference on Information and Communication Systems (ICICS12), Irbid, Jordan, April 2012.
· Monther Aldwairi, Yaser Khamayseh, and Mohammad Al‐Masri. "Application of artificial bee colony for intrusion detection systems." Security and Communication Networks (2012).
· Monther Aldwairi, Rami Alsalman, "MALURLS: A lightweight Malicious Website Classification Based on URL Features", Journal of Emerging Technologies in Web Intelligence (JETWI), Vol. 4, No. 2, pp.128-133, 2012.
· Mazen Kharbutli, Monther Aldwairi, Abdullah Mughrabi, "Function and Data Parallelization of Wu-Manber Pattern Matching for Intrusion Detection Systems", Network Protocols and Algorithms, Vol. 4, No. 3, pp. 46–61, 2012.
· Monther Aldwairi, Haitham Noman, "A Zero-day Attach Exploiting a Yahoo Messenger Vulnerability". International Journal of Scientific & Engineering Research, Vol. 3, No. 8, 2012.
· Monther Aldwairi, Yahya Flaifel, "Baeza-Yates and Navarro Approximate String Matching for Spam Filtering", In Proc. of the Second International Conference on Innovative Computing Technology (INTECH 2012), Rabat, Morocco, September 18-20, 2012.
· Monther Aldwairi, Haitham Noman, "A Zero-day Attach Exploiting a Yahoo Messenger Vulnerability", In Proc. of the 2012 Global Conference for Academic Research (GCAR), Kuala Lumpur, Malaysia, Jun 8-11, 2012.
· Basheer Al-Duwairi, Ismail Khater, and Omar Al-Jarrah, "Detecting Image Spam Using texture Features", International Journal for Information Security Research (IJISR), Volume 2, Issues 3/4, September/December 2012, pp 344-353.
· Basheer Al-Duwairi, Mohammad Marei, Malek Ireksossi, and Belal Rehani, "ConTest: A GUI-Based Tool toManage Internet-Scale Experiments over PlanetLab", In Proc. JETWI - Journal of Emerging Technologies in Web Intelligence. Vol 4, No 2 (2012), 164-171.
· Omar Al-Jarrah, Ismail Khater, and Basheer Al-Duwairi, "Identifying Potentially useful header features for email spam filtering". In Proc. of the Sixth International Conference on Digital Society (ICDS 2012), Valencia, Spain, Feb. 2012.
· Moad Mowafi, Mamoun Al-Mistarihi, and Mohammad Marei, "Cognitive Radio Based Bandwidth Allocation Scheme for WiMAX Networks," Journal of Communications, vol. 7, no. 10, 2012, pp. 758–764.
· Moad Mowafi, Lo'ai Tawalbeh, Walid Aljoby, and Mohammad Al-Rousan, "C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol," Journal of Information Security, vol. 3, no. 4, 2012, pp. 272–280.
· Moad Mowafi, Mamoun Al-Mistarihi, and Mohammad Marei, "A Dual Usage of Cognitive Radio in Managing the WiMAX Bandwidth," In Proceedings of the 35th International Convention on Information Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, May 2012, pp. 548–551.
· Mamoun Al-Mistarihi, Moad Mowafi, and Mohammad Marei, "An Optimum Scheme for WiMAX Bandwidth Management using Dynamic Channel Allocation," In Proceedings of the 35th International Convention on Information Communication Technology, Electronics and Microelectronics (MIPRO), IEEE, May 2012, pp. 538–541.
· Lo'ai Tawalbeh, Omar Banimelhem and Mohammed Al-Batati, "A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and Optical Pixel Adjustment Process," Information Security Journal: A Global Perspective. 21(5). pp. 256-268, 2012.
· Omar Banimelhem and Samer Khasawneh, "GMCAR: Grid-based Multipath with Congestion Avoidance Routing Protocol in Wireless Sensor Networks," Ad Hoc Networks. 10(7), pp. 1346-1361, 2012.
· Eyad Taqieddin, Jagannathan Sarangapani, "Vulnerability Analysis of Two Ultra-Lightweight RFID Authentication Protocols: RAPP and Gossamer," In Proceedings of the 2012 International Conference for Internet Technology And Secured Transactions (ICITST'12), pp. 80-86, London, UK, December 2012.
· Ahmad T. Al-Hammouri. A comprehensive co-simulation platform for cyber-physical systems. Computer Communications, 36(1):8–19, 2012.
· Natheer Khasawneh, Rami Al-Salman, Ahmad T. Al-Hammouri, and Stefan Conrad. A generic framework for collecting and mining client paradata for web applications. Journal of Emerging Technologies in Web Intelligence, 4(4):324–332, 2012.
· Kun Zhu, Ahmad T. Al-Hammouri, and Lars Nordström. Examination of data delay and packet loss for wide-area monitoring and control systems. In IEEE International Energy Conference and Exhibition (EnergyCon2012), Florence, ITALY, September 2012.
· Ahmad T. Al-Hammouri, Lars Nordström, Moustafa Chenine, Luigi Vanfretti, Nicholas Honeth, and Rujiroj Leelaruji. Virtualization of synchronized phasor measurement units within real-time simulators for smart grid applications. In IEEE Power and Energy Society General Meeting (PES GM 2012), San Diego, California, USA, July 2012.
· Kun Zhu, Ahmad T. Al-Hammouri, and Lars Nordström. To concentrate or not to concentrate: Performance analysis of ICT system with data concentrations for wide-area monitoring and control systems. In IEEE Power and Energy Society General Meeting (PES GM 2012), San Diego, California, USA, July 2012.
· Baha' A. Alsaify, Dale R. Thompson, and Jia Di, "Identifying passive UHF RFID tags using signal features at different Tari durations," 5th Annual IEEE International Conference on RFID, April 2012.
· A. Al-Fagih; A.E. Kouche, S. Oteafy, A. Alma'aitah, "Utilizing RFID-WSNs for reducing the footprint of the Oil Sands industry," IEEE Globecom Workshops (GC Wkshps),pp.374,379, 3-7 Dec. 2012.
· A. Alma'aitah, H.S. Hassanein, M. Ibnkahla, "RFID tags authentication by unique hash sequence detection," IEEE 37th Conference on Local Computer Networks Workshops,pp.775,781, 22-25 Oct. 2012.
· A. Alma'aitah, H.S. Hassanein, M. Ibnkahla, "Efficient and anonymous RFID tag counting and estimation using Modulation Silencing," Wireless Communications and Mobile Computing Conference (IWCMC), 2012 8th International , pp.515,520, 27-31 Aug. 2012.
· A. Alma'aitah A., H.S. Hassanein, M. Ibnkahla, "Modulation silencing: Novel RFID anti-collision resolution for passive tags," RFID (RFID), 2012 IEEE International Conference on, pp.81-88, 3-5 April 2012.
· Mohammad Shurman, Mamoun F. Al-Mistarihi, Shehab Nasser,"Hard Handover Optimization in Mobile WiMAX Networks", 5th International Conference on Communications, Computers and Applications (MIC-CCA 2012),Istanbul, Turkey, Oct. 2012.
· Khalid A.Darabkh, Shereen S.Ismail, Mohammad Al-Shurman, Iyad F.Jafar, Eman Alkhader, Mamoun F.Al-Mistarihi, "Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks," Journal of Network and Computer Applications, vol. 35, no. 6, November 2012.
· Mohammad M. Al-Shurman, Mamoun F. Al-Mistarihi, Salah Harb, "An Energy-Efficient Coverage Aware Clustering Mechanism for Wireless Sensor Networks",5th International Conference on Communications, Computers and Applications (MIC-CCA 2012), Istanbul, Turkey, Oct. 2012.
· Mohamed Al-Fandi, Mohammad Jaradat, Mohammad Al-Rousan, and Saied Jaradat. "A living biological nano robot as self-navigator sensor for diseases." In Biomedical Engineering (MECBME), 2011 1st Middle East Conference on, pp. 176-179. IEEE, 2011.
· Mohammad Jaradat, Mohammad Al-Rousan, and Lara Quadan. "Reinforcement based mobile robot navigation in dynamic environment." Robotics and Computer-Integrated Manufacturing, vol. 27, no. 1 (2011): 135-149.
· M. Al-Rousan and K. Assaleh. "A wavelet-and neural network-based voice system for a smart wheelchair control." Journal of the Franklin Institute, vol. 348, no. 1 (2011): 90-100.
· Fahed Awad, Omar Banimelhem, Nadia Al-Rousan, "The Potential of Using Network Coding with Geographical Forwarding Routing for Wireless Multimedia Sensor Networks." In Proceedings of the 11th IEEE International Conference on Computer and Information Technology (CIT '11), Paphos, Cyprus, pp. 9-14, August 2011.
· Moad Mowafi, Fahed Awad, Eyad Taqieddin, Omar Banimelhem, "Experimental Evaluation of Image Compression and Transmission for TinyOS-based Imote2 Platform." In Proceedings of the International Conference on Innovations in Information Technology 2011 (IIT), pp.173-178, 25-27 April 2011.
· Monther Aldwairi, Niveen Yaser, "Hybrid Pattern Matching Algorithm for Intrusion Detection Systems", Journal of Information Assurance and Security, Vol. 6, No. 6, pp.512–521, 2011.
· Monther Aldwairi, Duaa AL-ansari, "Exscind: Fast pattern matching for intrusion detection using exclusion and inclusion filters", 7th International Conference on Next Generation Web Services Practices (NWeSP), pp.24-30, 19-21 Oct. 2011. doi: 10.1109/NWeSP.2011.6088148
· Basheer Al-Duwairi, Ismail Khater, and Omar Al-Jarrah, "Texture Analysis Based Image Spam Filtering". In Proc. the 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, Dec. 2011.
· Omar Banimelhem and Yahya Ahmed Yahya, "Multi-Thresholding Image Segmentation using Genetic Algorithm," in Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition (IPCV'11), Las Vegas, Nevada, USA, July 18-21, 2011, pp. 1009-1014.
· Eyad Taqieddin, Ann Miller, Jagannathan Sarangapani, "Survivability and Reliability Analysis of the Trusted Link State Protocol for Wireless Ad Hoc Networks," International Journal of Wireless and Mobile Networks, vol. 3, no. 2, pp. 77-89, April 2011.
· Eyad Taqieddin, Maciej Zawodniok, Jagannathan Sarangapani, Ann Miller, "Hardware Implementation of the Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks," In Proceedings of the International Conference on Wireless Networks, pp. 223- 229, Las Vegas, USA, July 2011.
· Vincenzo Liberatore and Ahmad T. Al-Hammouri. Smart grid communication and co-simulation. In IEEE EnergyTech 2011, Cleveland, OH, USA, May 2011.
· Baha' A. Alsaify and Haying Shen. Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice. IGI Global, February 2010, ch. Power Conservation Techniques in Wireless Sensor Networks, p. 20.
· Baha' A. Alsaify and Dale R. Thompson, "Pendulum: An energy efficient protocol for wireless sensor networks," in Sensors Applications Symposium (SAS), 2010 IEEE, February 2010, pp. 273-277.
· A. Alma'aitah and Z.E. Abid, "Transistor Level Optimization of Sub-Pipelined AES Design in CMOS 65nm," IEEE 23rd International Conference on Microelectronics (ICM), Dec. 2011.
· Mamoun F. Al-Mistarihi, Mohammad Al-Shurman, Ahmad Qudaimat: "Tree based dynamic address autoconfiguration in mobile ad hoc networks", Journal of Computer Networks, vol. 55, No. 8: 2011.