Eyad Salah Taqieddin
Orcid: 0000-0002-8520-1965Affiliations:
- Jordan University of Science and Technology, Irbid, Jordan
According to our database1,
Eyad Salah Taqieddin
authored at least 30 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Malware Detection and Classification in Android Application Using Simhash-Based Feature Extraction and Machine Learning.
IEEE Access, 2024
2023
RSA cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem.
J. Inf. Secur. Appl., November, 2023
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
2021
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization.
Secur. Commun. Networks, 2021
An Efficient Path Generation Algorithm Using Principle Component Analysis for Mobile Sinks in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2021
Digit. Commun. Networks, 2021
2019
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks.
Sensors, 2019
Secur. Commun. Networks, 2019
Proceedings of the 2nd International Conference on Signal Processing and Information Security, 2019
2018
Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges.
IEEE Access, 2018
Proceedings of the IEEE Globecom Workshops, 2018
2017
Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols.
Int. J. Commun. Networks Inf. Secur., 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
2016
IEEE Trans. Mob. Comput., 2016
IEFP: An application layer protocol for Islamic electronic fatawa management and security.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016
2015
Fuzzy Logic-Based Cluster Heads Percentage Calculation for Improving the Performance of the LEACH Protocol.
Int. J. Fuzzy Syst. Appl., 2015
Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015
2014
Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014
A simulation testbed to jointly exploit multiple image compression techniques for wireless multimedia sensor networks.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014
2013
Int. J. Inf. Technol. Web Eng., 2013
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013
2012
A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks.
J. Commun., 2012
Int. J. Knowl. Eng. Data Min., 2012
Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using the Virtual Field Force.
Proceedings of the 5th International Conference on New Technologies, 2012
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2008
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks.
Int. J. Netw. Secur., 2008