eyad salah taqieddin
• Department of Network Engineering and Security - Faculty Member
-
-
-
-
-
- Ph.D. of Computer Engineering from University of Missouri - Roll, 2007
- Msc. of Computer Engineering from University of Missouri - Roll, 2002
- Bsc. of Electrical Engineering from Jordan University of Science and Technology, 1999
Publications
-
Hamzah, Abdulmughni and Shurman, Mohammad and Al-Jarrah, Omar and Taqieddin, Eyad, "Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks," Sensors, vol. 19, no. , pp. 0-0, 2019, Multidisciplinary Digital Publishing Institute
-
Abu Dhailah, Hala and Taqieddin, Eyad and Alma'aitah, Abdallah, "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol," Security and Communication Networks, vol. 2019, no. , pp. 0-0, 2019, Hindawi
-
Taqieddin, Eyad and Al-Dahoud, Hiba and Niu, Haifeng and Sarangapani, Jagannathan, "Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges," IEEE Access, vol. , no. , pp. 0-0, 2018, IEEE
-
Taqieddin, Eyad and Al-Dahoud, Hiba and Khaldoon, Mhaidat, "Security Analysis and Improvement of Reconstruction Based Radio Frequency Identification Authentication Protocol," International Journal on Communications Antenna and Propagation, vol. 8, no. , pp. 221-206, 2018, Praise Worthy Prize
-
Taqieddin, Eyad, "On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols," International Journal of Communication Networks and Information Security, vol. 9, no. , pp. 0-0, 2017, Kohat University of Science and Technology (KUST)
-
Taqieddin, Eyad and Awad, Fahed and Ahmad, Hani, "Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol. 8, no. , pp. 37-59, 2017, Innovative Information Science \& Technology Research Group
-
Niu, Haifeng and Taqieddin, Eyad and Jagannathan, Sarangapani, "EPC Gen2v2 RFID standard authentication and ownership management protocol," IEEE Transactions on Mobile Computing, vol. 15, no. , pp. 137-149, 2015, IEEE
-
Taqieddin, Eyad and Abu-Rjei, Ola and Mhaidat, Khaldoon and Bani-Hani, Raed, "Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining," Procedia Computer Science, vol. 63, no. , pp. 8-15, 2015, Elsevier
-
Bani-Hani, Raed and Harb, Salah and Mhaidat, Khaldoon and Taqieddin, Eyad, "High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES)," Circuits and Systems, vol. 5, no. , pp. 0-0, 2014, Scientific Research Publishing
-
Taqieddin, Eyad S and Awad, Fahed H and Abdullah, Sally M, "Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks.," Adhoc \& Sensor Wireless Networks, vol. 21, no. , pp. 0-0, 2014
-
Taqieddin, Eyad and Mowafi, Moad and Awad, Fahed and Banimelhem, Omar and Maher, Hani, "An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks," International Journal of Information Technology and Web Engineering (IJITWE), vol. 8, no. , pp. 50-63, 2013, IGI Global
-
Awad, Fahed and Taqieddin, Eyad and Seyam, Asmaa, "Energy-efficient and coverage-aware clustering in wireless sensor networks," Wireless Engineering and Technology, vol. 3, no. , pp. 0-0, 2012, Scientific Research Publishing
-
Mowafi, Moad Yassin and Awad, Fahed Hasan and Taqieddin, Eyad Salah and Banimelhem, Omar Qasem, "A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks," Journal of Communications, vol. 7, no. , pp. 309-320, 2012
-
Khasawneh, Natheer and Conrad, Stefan and Fraiwan, Luay and Taqieddin, Eyad and Khasawneh, Basheer, "Combining decision trees classifiers: a case study of automatic sleep stage scoring," International Journal of Knowledge Engineering and Data Mining, vol. 2, no. , pp. 60-75, 2012, Inderscience
-
Awad, Fahed and Banimelhem, Omar and Taqieddin, Eyad and Bani-Hani, Raed, "Undergraduate Program in Network Engineering and Security-A Feasibility Study," International Journal of Modern Education and Computer Science, vol. 4, no. , pp. 0-0, 2012, Modern Education and Computer Science Press
-
Taqieddin, Eyad and Miller, Ann and Jagannathan, S, "Survivability and Reliability Analysis of the Trusted Link State Routing Protocol for Wireless AD HOC Networks," International Journal of Wireless \& Mobile Networks (IJWMN), vol. 3, no. , pp. 77-89, 2011
-
Taqieddin, Eyad and Miller, Ann K and Sarangapani, Jagannathan, "Optimal energy-delay routing protocol with trust levels for wireless ad hoc networks," International Journal of Network Security, vol. , no. , pp. 0-0, 2008, Femto Technology Co.
-
Taqieddin, Eyad, "Energy-aware and secure routing with trust levels for wireless ad hoc and sensor networks," , vol. , no. , pp. 0-0, 2007, University of Missouri--Rolla
-
Soylemezoglu, Ahmet and Birt, Jeffrey and Zawodniok, Maciej Jan and Saygin, Can and Trimble, D and Siegel, T and Taqieddin, Eyad and Mills-Harris, MD and Sarangapani, Jagannathan and Cha, Kainan and others, "A testbed for validation and benchmarking of auto-ID solutions," , vol. , no. , pp. 0-0, 2005, ASM International
-
Banimelhem, Omar and Al-Dahoud, Hiba and Taqieddin, Eyad and Mowafi, Moad, "Genetic-based Key Splitting Algorithm for the Two Layered Protection Scheme," , 2019, pp. 71-76, IEEE
-
Alma'aitah, Abdallah and Mowafi, Moad and Taqieddin, Eyad and others, "Energy-Efficient and QoS-Aware Multi-Path Geographic Routing Protocol for WMSN," , 2018, pp. 1-6, IEEE
-
Taqieddin, Eyad and Al-Dahoud, Hiba and Mowafi, Moad and Banimelhem, Omar, "An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol," , 2017, pp. 683-689, IEEE
-
Taqieddin, Eyad S and Wahsheh, Yarub A, "IEFP: An application layer protocol for Islamic electronic fatawa management and security," , 2016, pp. 1-5, IEEE
-
Awad, Fahed and Taqieddin, Eyad and Mowafi, Moad and Banimelhem, Omar and AbuQdais, Amani, "A simulation testbed to jointly exploit multiple image compression techniques for wireless multimedia sensor networks," , 2014, pp. 905-911, IEEE
-
Niu, Haifeng and Jagannathan, Sarangapani and Taqieddin, Eyad S, "A Gen2v2 compliant RFID authentication and ownership management protocol," , 2014, pp. 331-336, IEEE
-
Banimelhem, Omar and Mowafi, Moad and Taqieddin, Eyad and Awad, Fahed and Al Rawabdeh, Manar, "An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks," , 2014, pp. 858-862, IEEE
-
Banimelhem, Omar and Taqieddin, Eyad and Al-Ma'aqbeh, Feda, "A new approach for target coverage in wireless sensor networks using fuzzy logic," , 2013, pp. 837-842, IEEE
-
Taqieddin, Eyad and Banimelhem, Omar and Shatnawi, Ibrahim, "A path generation algorithm for mobile sinks in wireless sensor networks," , 2013, pp. 164-168, IEEE
-
Taqieddin, Eyad and Sarangapani, Jagannathan, "Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer," , 2012, pp. 80-86, IEEE
-
Seyam, Asmaa and Awad, Fahed and Taqieddin, Eyad, "Energy-efficient clustering algorithm for wireless sensor networks using the virtual field force," , 2012, pp. 1-5, IEEE
-
Al-Ma'aqbeh, Feda' and Banimelhem, Omar and Taqieddin, Eyad and Awad, Fahed and Mowafi, Moad, "Fuzzy logic based energy efficient adaptive clustering protocol," , 2012, pp. 0-0, ACM
-
Mowafi, Moad and Awad, Fahed and Taqieddin, Eyad and Banimelhem, Omar, "Experimental evaluation of image compression and transmission for TinyOS-based imote2 platform," , 2011, pp. 173-178, IEEE
-
Salour, Ali and Trimble, Douglas D and Sarangapani, Jagannathan and Taqieddin, Eyad S, Ultra-lightweight mutual authentication protocol with substitution operation, Google Patents, 2019
-
Banimelhem, Omar and Taqieddin, Eyad and Mowafi, Moad Y and Awad, Fahed and others, Fuzzy logic-based cluster heads percentage calculation for improving the performance of the LEACH protocol, Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017
-
"A High-Capacity Image Steganography Method using Chaotic Particle Swarm Optimization", SECURITY AND COMMUNICATION NETWORKS
-
"An Android Malware Detection Leveraging Machine Learning", Wireless Communications and Mobile Computing
-
"An Enhanced and Resource-Aware RFID Multitag Grouping Protocol", Security and Communication Networks
-
"An evaluation of the RSA private keys and the presence of weak keys", Journal of Discrete Mathematical Sciences and Cryptography
-
"Energy efficient fuzzy-based DASH adaptation algorithm", Digital Communications and Networks
-
"Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks", Sensors
-
"RSA cryptanalysis ? Fermat factorization exact bound and the role of integer sequences in factorization problem", Journal of Information Security and Applications
-
"Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges", IEEE Access
- Vice Dean, Vice Dean, Sep 2020 - Apr 2021
- Vice Dean, Vice Dean, Sep 2019 - Sep 2020
- Deputy Head of Department, Department of Network Engineering and Security, Sep 2017 - Sep 2018
- Deputy Head of Department, Department of Network Engineering and Security, Sep 2016 - Sep 2017
- Faculty Member, Department of Network Engineering and Security, Sep 2009 - Present
- Faculty Member, Department of Computer Engineering, Sep 2007 - Sep 2009
- ADVANCED COMPUTER NETWORKS
- ADVANCED CRYPTOGRAPHY
- COMMUNICATION SKILLS
- COMPUTER NETWORK SECURITY
- COMPUTER NETWORKS LABORATORY
- COMPUTER ORGANIZATION AND DESIGN
- CRYPTOGRAPHY AND NETWORK SECURITY
- DATA COMMUNICATION
- DIGITAL LOGIC DESIGN
- DIGITAL LOGIC DESIGN AND COMPUTER ARCHITECTURE (NON-CIE STUDENTS)
- DIGITAL LOGIC DESIGN LAB
- DIGITAL LOGIC DESIGN LAB (NON-CPE-STUDENTS)
- ENGINEERING COMPUTATIONS
- ENGINEERING COMPUTATIONS LAB
- MICROPROCESSOR INTERFACING LAB
- MICROPROCESSOR SYSTEMS (Non CPE students)
- MICROPROCESSOR SYSTEMS DESIGN
- MICROPROCESSOR SYSTEMS DESIGN LAB
- NETWORK MANAGEMENT
- NETWORK MANAGEMENT AND SECURITY
- NETWORK MANAGEMENT AND SECURITY LAB
- NETWORK SECURITY LABORATORY
- PRACTICAL TRAINING
- PRACTICAL TRAINING (2)
- PRACTICAL TRAINING
- PRACTICAL TRAINING (1)
- PROGRAMMING LAB
- SEMINAR IN NETWORK ENGINEERING AND SECURITY
Professional Memberships
- Institute of Electrical and Electronics Engineers (IEEE), 2013
- Jordan Engineering Association , 1999
|