default search action
Eyad Salah Taqieddin
Person information
- affiliation: Jordan University of Science and Technology, Irbid, Jordan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Wafaa Al-Kahla, Eyad Taqieddin, Ahmed S. Shatnawi, Rami Al-ouran:
Malware Detection and Classification in Android Application Using Simhash-Based Feature Extraction and Machine Learning. IEEE Access 12: 174255-174273 (2024) - 2023
- [j16]Ahmed S. Shatnawi, Mahmoud M. Almazari, Zakarea AlShara, Eyad Taqieddin, Dheya Mustafa:
RSA cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem. J. Inf. Secur. Appl. 78: 103614 (2023) - [c13]Dheya Mustafa, Safaa M. Khabour, Ahmed S. Shatnawi, Eyad Taqieddin:
Arabic Sentiment Analysis of Food Delivery Services Reviews. ISNCC 2023: 1-6 - [c12]Aya Jaradat, Moad Mowafi, Eyad Taqieddin:
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps. LCN 2023: 1-4 - 2021
- [j15]Moad Mowafi, Eyad Taqieddin, Hiba Al-Dahoud:
Energy efficient fuzzy-based DASH adaptation algorithm. Digit. Commun. Networks 7(1): 113-119 (2021) - [j14]Omar Banimelhem, Eyad Taqieddin, Ibrahim Shatnawi:
An Efficient Path Generation Algorithm Using Principle Component Analysis for Mobile Sinks in Wireless Sensor Networks. J. Sens. Actuator Networks 10(4): 69 (2021) - [j13]Aya Jaradat, Eyad Taqieddin, Moad Mowafi:
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization. Secur. Commun. Networks 2021: 6679284:1-6679284:11 (2021)
2010 – 2019
- 2019
- [j12]Hala Abu Dhailah, Eyad Taqieddin, Abdallah Y. Alma'aitah:
An Enhanced and Resource-Aware RFID Multitag Grouping Protocol. Secur. Commun. Networks 2019: 6862052:1-6862052:15 (2019) - [j11]Abdulmughni Y. Hamzah, Mohammad Shurman, Omar M. Al-Jarrah, Eyad Taqieddin:
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors 19(3): 561 (2019) - [c11]Moad Mowafi, Omar Oudat, Eyad Taqieddin, Omar Banimelhem:
Image Steganography using YCbCr Color Space and Matrix Pattern. ICSPIS 2019: 1-4 - 2018
- [j10]Eyad Taqieddin, Hiba Al-Dahoud, Haifeng Niu, Jagannathan Sarangapani:
Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges. IEEE Access 6: 32117-32155 (2018) - [c10]Fida'a Al-Quran, Abdallah Y. Alma'aitah, Moad Mowafi, Eyad Taqieddin:
Energy-Efficient and QoS-Aware Multi-Path Geographic Routing Protocol for WMSN. GLOBECOM Workshops 2018: 1-6 - 2017
- [j9]Eyad Salah Taqieddin:
On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols. Int. J. Commun. Networks Inf. Secur. 9(2) (2017) - [j8]Eyad Taqieddin, Fahed Awad, Hani Ahmad:
Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(4): 37-59 (2017) - [c9]Eyad Taqieddin, Hiba Al-Dahoud, Moad Mowafi, Omar Banimelhem:
An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol. LCN 2017: 683-689 - 2016
- [j7]Haifeng Niu, Eyad Taqieddin, Sarangapani Jagannathan:
EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol. IEEE Trans. Mob. Comput. 15(1): 137-149 (2016) - [c8]Eyad Salah Taqieddin, Yarub A. Wahsheh:
IEFP: An application layer protocol for Islamic electronic fatawa management and security. IIT 2016: 1-5 - 2015
- [j6]Omar Banimelhem, Eyad Salah Taqieddin, Moad Yassin Mowafi, Fahed Hasan Awad, Feda Al-Ma'aqbeh:
Fuzzy Logic-Based Cluster Heads Percentage Calculation for Improving the Performance of the LEACH Protocol. Int. J. Fuzzy Syst. Appl. 4(4): 100-118 (2015) - [c7]Eyad Taqieddin, Ola Abu-Rjei, Khaldoon Mhaidat, Raed Bani-Hani:
Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining. EUSPN/ICTH 2015: 8-15 - 2014
- [j5]Eyad Salah Taqieddin, Fahed Hasan Awad, Sally M. Abdullah:
Transitive Location Verification Algorithm in Location-Based Routing for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 21(3-4): 237-257 (2014) - [c6]Omar Banimelhem, Moad Yassin Mowafi, Eyad Salah Taqieddin, Fahed Hasan Awad, Manar Al Rawabdeh:
An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks. ISWCS 2014: 858-862 - [c5]Fahed Hasan Awad, Eyad Salah Taqieddin, Moad Yassin Mowafi, Omar Banimelhem, Amani AbuQdais:
A simulation testbed to jointly exploit multiple image compression techniques for wireless multimedia sensor networks. ISWCS 2014: 905-911 - [c4]Haifeng Niu, Sarangapani Jagannathan, Eyad Salah Taqieddin:
A Gen2v2 compliant RFID authentication and ownership management protocol. LCN 2014: 331-336 - 2013
- [j4]Eyad Salah Taqieddin, Moad Mowafi, Fahed Awad, Omar Banimelhem, Hani Maher:
An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks. Int. J. Inf. Technol. Web Eng. 8(3): 50-63 (2013) - [c3]Omar Qasem Banimelhem, Eyad Salah Taqieddin, Feda Al-Ma'aqbeh:
A new approach for target coverage in wireless sensor networks using fuzzy logic. ICNSC 2013: 837-842 - 2012
- [j3]Natheer Khasawneh, Stefan Conrad, Luay Fraiwan, Eyad Taqieddin, Basheer Khasawneh:
Combining decision trees classifiers: a case study of automatic sleep stage scoring. Int. J. Knowl. Eng. Data Min. 2(1): 60-75 (2012) - [j2]Moad Yassin Mowafi, Fahed Hasan Awad, Eyad Salah Taqieddin, Omar Qasem Banimelhem:
A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks. J. Commun. 7(4): 309-320 (2012) - [c2]Eyad Taqieddin, Jagannathan Sarangapani:
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer. ICITST 2012: 80-86 - [c1]Asmaa Seyam, Fahed Hasan Awad, Eyad Salah Taqieddin:
Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using the Virtual Field Force. NTMS 2012: 1-5
2000 – 2009
- 2008
- [j1]Eyad Taqieddin, Sarangapani Jagannathan, Ann Miller:
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks. Int. J. Netw. Secur. 7(2): 207-217 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint