12
( 1 ) Lo’ai A. Tawalbeh, PhD Associate Prof. of Computer Engineering, IEEE SM Department of Computing and Cyber Security; Texas A&M university, San Antonio, TX, 78224 E-mail: [email protected] Web: http://www.tamusa.edu/collegeofbusiness/faculty/loai-tawalbeh.html EDUCATION: December 2004. PhD in Electrical and Computer Engineering, Oregon State University (OSU), Corvallis, OR, USA. GPA= 4.00/4.00. Advisor: Prof. Cetin Koc. Thesis Title : “A Novel Unified Algorithm and Hardware Architecture for Integrated Modular Division and Multiplication in GF(p) and GF(2 n) Suitable for Public-Key Cryptography”. December 2002 MSc in Electrical and Computer Engineering, Oregon State University (OSU), Corvallis, OR, USA. GPA= 4.00/4.00. Advisor: Alexander Tenca. Thesis Title : “Radix-4 ASIC Design of a Scalable Montgomery Modular Multiplier Using Encoding Techniques”. June 2000. BSc in Electrical and Computer Engineering, Jordan University of Science and Technology (JUST), Jordan. GPA: Very Good. Training and Certificates: Certified Ethical Hacker Training (CEH)-2011 DELL-EMC Certified Cloud Infrastructure and Services Professional-Cloud Architect track- Feb 2015 DELL-EMC Big Data Analysis Training- Franklin, MA, USA, June 2017 VMware vSphere: Install, Configure, Manage, ESXi 5.5 and vCenter Server 5.5. March 2015. Key Words: Cyber security, Applied Cryptography, Privacy, Digital Forensics, Computer and Network Security, Cloud Computing Security and Energy optimization, Mobile Cloud Security, Efficient Implementations of Cryptographic Algorithms. Elliptic Curve Cryptography EMPLOYMENT August 2018-Present: Associate Professor, Department of Computing and Cyber Security, Texas A&M University-San Antonio, TX, USA. Jan. 2017-Jan 2018: Visiting Associate Researcher, Department of Computer Science, Koc Security Lab, University of California-Santa Barbara, CA, USA. Conducting research on Cyber security related topics. Sept. 2013- Dec. 2016 : Associate Professor at Computer Engineering Department, Umm Al-Qura University, Saudi Arabia Teaching undergraduate/graduate courses in Cybersecurity including: Computer forensics, information security, cryptography, and Cloud Computing Systems. Also, I am member in many committees such as the ABET and Accreditation committee, MS steering committee, and strategic planning committee. Conducting Research in cyber security and cloud computing management and security.

E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

(1)

Lo’ai A. Tawalbeh, PhD Associate Prof. of Computer Engineering, IEEE SM Department of Computing and Cyber Security;

Texas A&M university, San Antonio, TX, 78224

E-mail: [email protected] Web: http://www.tamusa.edu/collegeofbusiness/faculty/loai-tawalbeh.html

EDUCATI O N:

December 2004. PhD in Electrical and Computer Engineering, Oregon State University (OSU), Corvallis, OR, USA. GPA= 4.00/4.00. Advisor: Prof. Cetin Koc. Thesis Title: “A Novel Unified Algorithm and Hardware Architecture for Integrated Modular Division and Multiplication in GF(p) and GF(2 n) Suitable for Public-Key Cryptography”.

December 2002 MSc in Electrical and Computer Engineering, Oregon State University (OSU), Corvallis, OR, USA. GPA= 4.00/4.00. Advisor: Alexander Tenca. Thesis Title: “Radix-4 ASIC Design of a Scalable Montgomery Modular Multiplier Using Encoding Techniques”.

June 2000. BSc in Electrical and Computer Engineering, Jordan University of Science and Technology (JUST), Jordan. GPA: Very Good.

Training and Certificates:

Certified Ethical Hacker Training (CEH)-2011

DELL-EMC Certified Cloud Infrastructure and Services Professional-Cloud Architect track- Feb 2015

DELL-EMC Big Data Analysis Training- Franklin, MA, USA, June 2017

VMware vSphere: Install, Configure, Manage, ESXi 5.5 and vCenter Server 5.5. March 2015. Key Words: Cyber security, Applied Cryptography, Privacy, Digital Forensics, Computer and Network Security, Cloud Computing Security and Energy optimization, Mobile Cloud Security, Efficient Implementations of Cryptographic Algorithms. Elliptic Curve Cryptography

EMPLOYM ENT August 2018-Present: Associate Professor, Department of Computing and Cyber Security, Texas A&M University-San Antonio, TX, USA. Jan. 2017-Jan 2018: Visiting Associate Researcher, Department of Computer Science, Koc Security Lab, University of California-Santa Barbara, CA, USA.

Conducting research on Cyber security related topics.

Sept. 2013- Dec. 2016: Associate Professor at Computer Engineering Department, Umm Al-Qura

University, Saudi Arabia

Teaching undergraduate/graduate courses in Cybersecurity including: Computer forensics, information security, cryptography, and Cloud Computing Systems. Also, I am member in many committees such as the ABET and Accreditation committee, MS steering committee, and strategic planning committee.

Conducting Research in cyber security and cloud computing management and security.

Page 2: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

Supervising 5 MSc students theses in different topics: cyber security, cloud computing, mobile cloud computing applications, and smart cities. And 1 senior graduation project.

Writing research proposals and grants. Within 3 years I won 4 research grants with an

approximate budget of 1.5 Million US Dollars.

Feb. 2005- August 2013: Full-time Assistant/Associate Professor, Computer Engineering

Department, Jordan University of Science and Technology, Irbid, Jordan.

Teaching graduate and undergraduate courses in information security, cryptography, advanced arithmetic for cryptosystems design and Embedded systems design using FPGA’s.

Supervised 10 MSc students theses in cyber security related topics and supervised 13 senior graduation projects for undergraduate students.

In 2009, I won a research grant for distinguished professors in Jordan. I am the founder and director of research lab (Cryptographic Hardware and Information Security Lab which is among the first few cyber security research labs in Jordan and the region.

Participate in preparing the study plans and course descriptions for the graduate and undergraduate course at computer science and engineering program according to ABET

Served as member and chair in many committees at the department/college and the university, including ABET and Accreditation committee.

Sept. 2011- August 2013: Part-time Adjunct-Assistant/Associate Professor, Princess Sumaya

University for Technology, Amman, Jordan

Teach graduate courses in the MSc Program in Information Systems Security and Digital Criminology. These courses included: Network Security, Digital forensics, and Cryptography.

Supervised successfully 3 MSc students theses during the 2 years I worked there.

April 2005- April 2011: Part-time Adjunct-Assistant Professor, New York Institute of Technology

(NYIT) -Jordan’s Campus (The program was offered from 2001 till 2012).

Teach and develop the curriculum of the courses in the graduate program (MSc program of information, computer and network security). Those courses include: Intrusion Detection, Computer forensics and Digital Evidence, Secure Software Engineering, Operating Systems Security, Information and Network Security, and Cryptography.

Feb. 2007- Feb.2009: Part-time Adjunct-Assistant professor, DePaul University-Jordan’s Campus

Teach courses in the MSc graduate program in wireless networking and security. Those courses included: Cellular and Wireless Communications, Voice and Data Integration, Wireless Systems Engineering and Deployment, Network Security.

Jan. 2002- Jan 2005: Research/Teaching Assistant, Oregon State University, Corvallis, OR

Teach courses/labs at the school of Electrical Engineering and computer science. Work on my graduate study grant and conduct research on areas related to data security,

cryptography, arithmetic algorithms, and FPGA design.

June 2000- March 2001: Full time Software Engineer, One World Software Solutions (now: Estarta)

Develop applications using Java for the company clients in the USA.

FUNDED RESEAR CH PROJ ECTS AN D AW ARDS

Page 3: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

1- (421,253 $ ) January 2015. (PI). “New and Efficient Mobile Cloud Computing Model based on Cloudlet Concept for Intensive Computer Vision and RFID Applications”. Supported by National Science and Technology Innovation Plan (NSTIP)- KSA.

2- (362,570 $) October 2014. (PI), “Promoting Energy as a First Class Metric in Network Simulations”. KACST.

3- (334,118 $) Sept. 2015, Co-I. “CoreSense: A Generic Wireless Sensor Network Platform with Application of Effective Evacuation in Arafat Area of Makkah”.

4- (312,760 $) May 2014, Co-I. “ A Novel Framework for Secure Cryptosystems against Side Channel Attacks”. Supported King AbdulAziz City for Science and Technology (KACST),KSA.

5- (29,041 $) November 2013.” (PI), “A University Secure Cloudlet-based Mobile Cloud Computing Model”. Deanship of scientific research, Umm AlQura University, KSA

6- (31,538 $) Jan. 2016. (PI),” A Mobile Healthcare Cloud for Saudi Arabia”. Deanship of scientific research, Umm AlQura University, KSA.

7- (80,391 $) June 2010, (PI), “Efficient Cryptographic Processor for Internet and Wireless Security Based on Elliptic Curve Cryptography”. Ministry of High Education-Jordan.

8- (300,000$) Jan. 2002, Co-I, National Science Foundation (NSF) grant CCR-0093434- "Computer Arithmetic Algorithms and Scalable Hardware Designs for Cryptographic Applications", Research Assistant Scholarship, Oregon State University, USA, 2002-2004.

9- (94,000$) -2001: National Scholarship from Jordan Government to get Master and PhD degrees at Oregon State University, Corvallis, Oregon, USA.

SE LECTED PUBLI CATI O NS:

Google Scholar: https://scholar.google.com/citations?user=gw17mOoAAAAJ&hl=en

Journal Articles (32): 1. L. A. Tawalbeh, R. Mehmood, E. Benkhelifa, and H. Song. "Mobile Cloud Computing Model and

Big Data Analysis for Healthcare Applications." IEEE Access Journal. (IF=3.24), Vol 4, pp 6171-6180, Sept 2016.

2. Y. Jararweh, M. Al-Ayyoub, M. Al-Quraan, L. A. Tawalbeh and E. Benkhelifa. “ Delay-Aware Power Optimization Model for Mobile Edge Computing Systems”. In the Personal and Ubiquitous Computing Journal, (IF=2.4), Vol 22, Issue 121, pp 1-11.June 2017.

3. E. Benkhelifa, , L. A. Tawalbeh, Y. Jararweh. ”Automated Negotiated User-Profiling Across Distributed Social Mobile-Clouds for Resource Optimisation". In the Concurrency and Computation: Practice and Experience Journal. (IF=1.13), August 2017. In press.

4. L. A. Tawalbeh, A. Basalamah, R. Mehmood, and H. Tawalbeh. “Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption". IEEE Access Journal. (IF=3.24). Vol 4, pp-858-868. March 2016.

5. Y. Jararweh, H. B. Salameh, A. Trainin, L. A. Tawalbeh, and H. Song.“Anomaly-based Framework for Detecting Dynamic Spectrum Access Attacks in Cognitive Radio Networks”. Telecommunication Systems, Springer. (IF=1.54). (65), 172, pp.1-13, May2017

6. E. Benkhelifa, T. Welsh, L. A. Tawalbeh, Y. Jararweh and A. Basalamah. "Energy Optimization for Mobile Device Power Consumption: A Survey and a Unified View of Modeling for a Comprehensive Network Simulation". Mobile Networks and Applications (IF=3.25), Springer, Vol 21, No. 4, pp 575-588. August, 2016.

7. Y. Jararweh, A. Darabseh, L. A. Tawalbeh, M. Al-Ayyoub, and H. Song. “Software Defined Systems Support for Secure Cloud Computing based on Data Classification”. Annals of Telecommunications. (IF=1.41), Vol 71, No. 11, pp 1-11, Nov. 2016. Springer

8. E. Benkhelifa, B. Thomas, Y. Jararweh, L. A. Tawalbeh, ” Framework and a Process for Digital Forensic Analysis on Smart Phones with Multiple Data Logs”. (IJES), (9) (6), 2017. In press.

9. H. Tawalbeh, S. Hashish, L. A. Tawalbeh and A. Aldairi. “Security in Wireless Sensor Networks Using Lightweight Cryptography”. Journal of Information Assurance and Security. Vol (12), Issue 4, pp. 118 – 123. Dynamic Publishers, USA, 2017.

Page 4: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

10. L. A. Tawalbeh, F. Ababneh, Y. Jararweh, F. Dosari. “Trust Delegation based Secure Mobile Cloud Computing Framework”. Int. J. of Information and Computer Security,Vol (8) (3), July 2016.

11. K. Bahwaireth, L. A. Tawalbeh, E. Benkhelifa, Y. Jararweh and M. Tawalbeh. “Experimental Comparison of Simulation Tools for Efficient Cloud and Mobile Cloud Computing Applications”. EURASIP Journal on Information Security. Vol 15. June 2016.

12. L. A. Tawalbeh, Y. Haddad, O. Khamis, E. Benkhelifa Y. Jararweh, and F. AlDosari, “Efficient and Secure Software-Defined Mobile Cloud Computing Infrastructure”. Int. J. of High Performance Computing and Networking. Vol 9, No. 4, pp 328-341, Jan 2016.

13. L. A. Tawalbeh, Y. Jararweh, F. Ababneh and F. Dosari. “Large Scale Cloudlets Deployment for Efficient Mobile Cloud Computing”. Journal of Networks. Vol 10, No 1, 70-76, Feb 2015.

14. Y. Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Network Resources Management in Cloud Computing Data Centers. J of Networks.10(5)May 2015.

15. Y. Jararweh, , O. Al-Sharqawi, N. Abdulla, L. A. Tawalbeh, M. Alhammouri . “High-Throughput Encryption for Cloud Computing Storage System”. Int. J. of Cloud Applications and Computing, IGI Global, USA, Vol 4 No 2, Sept. 2014.

16. L. A. Tawalbeh, M. Mowafi and W. Aljobi ."The Potential of using Elliptic Curve Cryptography for Multimedia Encryption". IET Information Security Journal, (IF=1) Institution of Engineering and Technology, Vol 7, No 2, pp.1-8, UK, June 2013.

17. O. Melhm, L. A. Tawalbeh, M. Mowafi and M. Batati." A More Secure Image Hiding Scheme using Pixel Adjustment and Genetic Algorithm”. International Journal of Information Security and Privacy, Vol 7, No. 3, pp.1-15, IGI Global, USA, Sept. 2013.

18. Y. Jararweh, L. A. Tawalbeh, H. Tawalbeh, and A. Moh'd." 28 Nanometers FPGAs Support for High Throughput and Low Power Cryptographic Applications". Journal of Advances in information Technology, Vol 4, No 2, pp. 84-90, ACADEMY Publisher, Finland, May 2013.

19. L. A. Tawalbeh, O. BaniMelhem and M. Al-Batati. ”A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and Optical Pixel Adjustment Process”. Information Security J.; A Global Perspective. Vol. 21, Issue 5, pp.256-268. Taylor and Francis, USA. Aug 2012.

20. M. Mowafi, L. A. Tawalbeh W. Aljobe and M. Alrousan.” C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol. " J. of Information Security. Vol 7, No.2, pp 272-280, Scientific Research Publisher, USA. October 2012

21. L. A. Tawalbeh, H. Al-Hajsalem, T. Abu Qtaish and A. Khatabeh . “A New efficient symmetric encryption algorithm design and implementation”. J. of Information Assurance and Security, Vol 7, No.2, pp 101-109. Dynamic Publishers, Inc., USA , June 2012.

22. L. A. Tawalbeh, Y. Jararweh and A. Moh’md. “An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications”. The International Arab Journal of Information Technology, Vol. 9, No. 3, pp 284-290, May 2012.

23. Y. Jararweh, L. A. Tawalbeh, H. Tawalbeh, and A. Moh'd. "Hardware Performance Evaluation of SHA-3 Candidate Algorithms". Journal of Information Security. Vol 3 No.2, pp 69-76, Scientific Research Publisher, USA. April 2012.

24. L. A. Tawalbeh and Q. Abu Al-Haija. “Enhanced FPGA Implementations for Doubling Oriented and Jacobi- Quartics Elliptic Curves Cryptography”. Journal of Information Assurance and Security, Vol.6, Issue 3, pp. 167-175, Dynamic Publishers, Inc., USA. 2011.

25. L. A. Tawalbeh, A. Mohammad and A. A. Gutub. “Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations”. Journal of Signal Processing Systems, Vol (59) No. (3), pp. 233-244. Springer, June 2010

26. Q. A. Al-Haija and L. A. Tawalbeh. “Efficient Algorithms and Architectures for Elliptic Curve Crypto-Processor Over GF (P) Using New Projective Coordinates Systems”. J.of Information Assurance and Security, Vol. 6, (1), pp. 63-72. Dynamic Publishers, Inc., USA, Jan. 2011.

27. L. A. Tawalbeh and Saedeh Swaidan.“ Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm”. International Journal of Information Security; A global Perspective, Vol (19) Issue 5, pp. 243-252, Taylor and Francis, January 2010.

Page 5: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

28. F. Muhaya, Q. Alhaija and L. A. Tawalbeh. “Applying Hessian Curves in Parallel to improve Elliptic Curve Scalar Multiplication Hardware”. Int. J. of Security and Its Applications, pp. 27-38, Vol.4. No.2. SERSC. Korea. April 2010.

29. L. A. Tawalbeh, Saed Swedan, A. Gutub “Efficient Modular Squaring Algorithms for Hardware Implementation in GF(p)”. Int. J. of Information Security; A global Perspective, Vol (18) Issue 3, pages 131-138. Taylor and Francis. June 2009.

30. A. F. Tenca, S. Park and L. A. Tawalbeh “Carry-save representation is shift-unsafe: the problem and its solution”. IEEE Transactions on Computers, Vol 55, No 5 pp. 630-636, May 2006.

31. L. A. Tawalbeh, A. F. Tenca, and C. K. Koc. "A radix-4 scalable design". IEEE Potentials Magazine, vol. 24 No.2, pages 16-19, April/May 2005.

32. A. Tenca and L. A. Tawalbeh “An Algorithm for Unified Modular Division in GF(p) and GF(2n) Suitable for Cryptographic Hardware”. IEE Electronics Letters, 40(5),304-306, March 2004.

Conference Papers (41):

1. F. Muheidat, L. A. Tawalbeh, and H. Tyrer. “Context-Aware, Accurate, and Real Time Fall Detection System for Elderly People”. In the proceedings of the 12th IEEE International Conference on Semantic Computing. To appear, Jan 31st 2018, Laguna Hills, California USA.

2. W. Kanakri, L. A. Tawalbeh, and A. AlHarbi. “Dos and Donts Integrated System Based on GPS and Cloud Technologies for Pilgrims”. In the 14th IEEE Mobile Adhoc and Sensor Systems (MASS 2017). 22-25 October, 2017. Orlando, FL, USA

3. A. Dairi and L. A. Tawalbeh . “Cyber Security Attacks on Smart Cities and Associated Mobile Technologies”. In the 8th Int. Conf. on Ambient Systems, Networks and Technologies, May 16-19, 2017, Madeira, Portugal. “Procedia Computer Science 109 (2017): 1086-1091.

4. L. A. Tawalbeh, H. Tawalbeh, H. Song, and Y. Jararweh. “ Intrusion and Attacks over Mobile Networks and Cloud Health Systems”. In the proceedings of the IEEE International conference on computer communications (INFOCOM 2017), 1-4 May, 2017, Atlanta, GA, USA.

5. L. A. Tawalbeh, S. Hashish and H. Tawalbeh. “Quality of Service requirements and Challenges in Generic WSN infrastructures”. In the International Workshop on Smart Cities Systems Engineering. May 16-19, 2017, Madeira, Portugal.

6. L. A Tawalbeh.“Big Data Security at Cloud: Challenges and Solutions” in the 2017 Int. Conference on Intelligent Computing and Big Data (ICICBD '17), Housten, TX. April 7-8, 2017, USA.

7. M. AlOtaibi, L. A. Tawalbeh, and Y. Jararweh, “Integrated Sensors System Based on IoT and Mobile Cloud Computing”. The IEEE International Conference on Computer Systems and Applications, Aghadeer, Dec, 2016.

8. L. A. Tawalbeh, T. Somani, and H. Houssain “Towards Secure Communications: Review of Side Channel Attacks and Countermeasures on ECC”.In the Internet Technology and Secured Transactions (ICITST-2016) December 5-7, 2016, Barcelona, Spain.

9. L. A. Tawabeh , W. Bakhader, R. Mehmood, H. Song, “Cloudlet-based Mobile Cloud Computing for Healthcare Applications" in the IEEE GLOBECOM, Washington D.C, December 4-8, 2016.

10. L. A. Tawabeh and T. Al-Somani, “More Secure Internet of Things Using Robust Encryption Algorithms Against Side Channel Attacks”. In the proceedings of the 13th ACS/IEEE Int. Conf. on Computer Systems and Applications, Morocco, November, 2016.

11. L. A. Tawabeh and W. Bakhader. “A Mobile Cloud System for Different Useful Applications”. The 4th IEEE Int. Conf. on Future IoT and Cloud Workshops 22-24 August, 2016, Vienna, Austria.

12. E. Benkhelifa, Th. Welsh, L. A. Tawalbeh, Y. Jararweh, M. Al-Ayyoub, “Leveraging Software-Defined-Networking for Energy Optimization in Mobile-Cloud-Computing” In the 11th Int. Conf. on Future Networks and Communications (FNC-16), Procedia Computer Science. (94), pp 479-484.Aug, 15-18, 2016, Montreal, Canada.

13. M.Alqoran, M. Al-Ayyoub, Y. Jararweh, L. A. Tawalbeh, E. Benkhelifa.” Power Optimization of Large Scale Mobile Cloud System using Cooperative Cloudlets”, in 4th IEEE Int. Conf. on Future Internet of Things and Cloud Conference (Fi-Cloud 16). August, 22-24, 2016, Vienna, Austria.

14. M. Tawalbeh , A. Eardley, and L. A. Tawalbeh. “Studying the Energy Consumption in Mobile Devices”. In the 13th Int. Conf. on Mobile Systems and Pervasive Computing (MobiSPC 2016). Procedia Computer Science (94), pp 183-189.. August, 15-18, 2016, Montreal, Canada.

Page 6: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

15. L. A. Tawalbeh, W. Bakhader, and H. Song. “A Mobile Cloud Computing Model Using the Cloudlet Scheme for Big Data Applications” 2015 IEEE Conf. on Connected Health: Applications, Systems and Eng. Technologies (CHASE 2016), pp 73-77. 27-29 June 2016 , Washington DC, USA.

16. E. Benkhelifa, T. Welsh, L. A. Tawalbeh and Y. Jararweh, “Framework for Mobile Devices

Analysis”. In the 7th Ambient systems and Networks conference (ANT 2016). Procedia Computer

Science, (83), pp 1188-1193, Spain, May 23-25, 2016.

17. K. Bahwaireth and L. A. Tawalbeh, “Cooperative Models in Cloud Computing and Mobile Cloud

Computing”. In the proceedings of the 23rd IEEE int. Conf. of Telecommunications (ICT2016),

Greece, May 16-18, 2016.

18. E. Benkhelifa, T. Welsh, L. Tawalbeh, A. Khreishah, Y. Jararweh and M. Al-Ayyoub, “GA-Based

Resource Augmentation Negotiation for Energy-Optimised Mobile Ad-hoc Cloud”. In the

proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, Services, and

Engineering (MobileCloud), pp110-116, Oxford, UK, March 28-31, 2016.

19. L. A. Tawalbeh, N. Alassaf, W. Bakheder, and A. Tawalbeh “Resilience Mobile Cloud Computing:

Features, Applications and Challenges”. In the 2015 IEEE International Symposium on Web of

Things and Big Data (WoTBD 2015), in conjunction with 5th IEEE eCONF. pp 280-284,

Bahrain,18-20 October 2015.

20. L. A. Tawalbeh, R. Al-Qassas, N. Darwazeh, Y. Jararweh, and F. Dosari, “ Secure and Efficient

Cloud Computing Framework”. In the Proceedings of the IEEE Int. Conf. on Cloud and

Autonomic computing (Cloud Cyber Security workshop), pp.291-295, MA, USA, Sept., 21-24, 2015.

21. K Bahwaireth, L. A. Tawalbeh, A. Basalamah, Y. Jararweh, and M. Tawalbeh, “Efficient

Techniques for Energy Optimization in Mobile Cloud Computing”. In the 12th ACS/IEEE Int.

Conf. on Computer Systems and Applications-AICCSA, Morocco, pp: 1-8, Nov. 17-20, 2015.

22. M. Al-Ayyoub, Y. Jararweh, L. A. Tawalbeh, E. Benkhelifa and A. Basalamah. “Power

Optimization of Large Scale Mobile Cloud Computing Systems”. In the proceedings of the Future

Internet of Things and Cloud (FiCloud), 2015 3rd IEEE Int. Conf. on,( FiCloud-2015), IEEE

xplore, pp 670-674., Rome, Italy, 24-28 Aug, (2015).

23. L. A. Tawalbeh, F. AlDosari, and W. Bakhader. “ Cloud Security: Challenges and Solutions”. In

the Proceedings of the 3rd Int. IBM Cloud Academy Conf., May 21-23, 2015, Budapest, Hungary.

24. E. Benkhelifa, T. Welsh, L. A. Tawalbeh, Y. Jararweh and A. Basalamah, “User Profiling for

Energy Optimization in Mobile Cloud Computing”. In the 6th Ambient systems and Networks

conference (ANT 2015). Procedia Computer Science 52 (2015) 1159 – 1165, UK, June 2015.

25. L. A. Tawalbeh, N. Darwazeh, R. Al-Qassas, F. Dosari, “ A Secure Cloud Computing Model based

on Data Classification”. In the Int. Workshop on Mobile Cloud Computing Systems, Management,

and Security (MCSMS-2015). Procedia Computer Science, Vol.52, pp 1153–1158, UK. June 2015.

26. L. A. Tawalbeh, Y. Haddad, O. Khamis, F. Dosari, and E. Benkhelifa “Efficient Software-Based

Mobile Cloud Computing Framework”. In the IEEE Int. Conf. on Cloud Engineering (IC2E 2015),

Arizona, USA, March 9-13-2015.

27. Y. Jararwah, L. A. Tawalbeh, F. Ababneh, A. Khreishah and F. Dosari. ” Scalable Cloudlet-based

Mobile Computing Model”. In The 11th Int. Conf. on Mobile Systems and Pervasive Computing-

MobiSPC, ELSEVIER, Procedia Computer Science 34, pp.434 -441, Canada, August 17-20, 2014.

28. Y. Jararwah, L. A. Tawalbeh, F. Ababneh and F. Dosari, “Resource Efficient Mobile Computing

using Cloudlet Infrastructures”. In the Proc. of the IEEE 9th Int. Conference on Mobile Ad-hoc

and Sensor Networks (MSN), IEEE Xplore digital library, pp.373-377, China, Dec. 11- 13, 2013.

29. A. Moh'd, Y. Jararweh and L. A. Tawalbeh. "AES-512: 512-Bit Advanced Encryption Standard

Algorithm Design and Evaluation ". In the Proc. of the 7th IEEE Int. conference on Information

Assurance and Security. IEEE Xplore digital library, pp.292-297, Malacca, Malaysia, Dec. 5-8, 2011.

Page 7: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

30. Y. Jararweh, H. Tawalbeh, L. A. Tawalbeh, and A. Moh'd. "FPGA Performance Evaluation Of

SHA-3 Candidate Algorithms". In the Proc. of the 5th Mosharaka Int. Conference on

Communications, Networking and Information Tech.. Dubai , UAE, Dec. 16-18, 2011.

31. A. Moh’d, N. Aslam, H. Marzi and L. A. Tawalbeh. “Hardware Implementations of Secure

Hashing Functions on FPGAs for WSNs”. In the 3rd International Conference on the Applications

of Digital Information and Web Technologies (ICADIWT 2010), Istanbul, Turkey. July 2010.

32. L. A. Tawalbeh, W. Kanakri and L. Ebbini.” Efficient Random Number Generators (RNG) based

on Nonlinear Feedback Shift Registers (NLFSR). In the Int. Conf. on Inf. and Communication

Systems (ICICS), Jordan, Dec.20-22, 2009.

33. L. A. Tawalbeh, M. Alrousan, and D. Alansari, “Survey of efficient public-key management

schemes for wireless sensor networks” ICPCM 2009, Sydney- Australia. Dec. 12-14, 2009.

34. A. Moh’d, L. A. Tawalbeh and A. Sowe. “A Novel Method to Guarantee QoS during DOS

Attacks for IPTV using SIP”. In the 2nd Int. Conference on the Applications of Digital Information

and Web Technologies (ICADIWT 2009). IEEE , pp.838-842, London, UK. August 2009.

35. M. Alrousan, Khaled Al-Saleh and L. A. Tawalbeh, Smart Voice-Driven Wheel Chair. In The 3rd

AUS-Int. Symposium on Mechatronics. Sharjah, UAE, Sponsored by IEEE, April 18-20, 2006.

36. L. A. Tawalbeh, A. F. Tenca, S. Park, and C. K. Koc. “An efficient hardware architecture of a

scalable elliptic curve crypto-processor over GF(2^m)”. In the Advanced Signal Processing

Algorithms, Architectures, and Implementations XV, Proceedings of SPIE Conference, F. T. Luk,

editor, pages 216-226, Volume 5910, San Diego, California, USA, August 2-4, 2005.

37. A. Rjoub and L. A. Tawalbeh." A Low Power, High Frequency and High Precision Multiplier

Architecture in GF(p)" . International e-Conference of Computer Science (IeCCS). Athens, Greece,

May 19-31, 2005. In Lecture Series on Computer and Computational Sciences, Vol (2), pp. 178-183,

Brill Academic Publishers, Netherlands, 2005.

38. L. A. Tawalbeh and A. F. Tenca “An Algorithm and Hardware Architecture for Integrated

Modular Division and Multiplication in GF(p) and GF(2^n)”. In the IEEE 15th International

Conference on Application-specific Systems, Architectures and Processors (ASAP), Galveston, TX,

USA, IEEE Press, pp.247-257, Sept. 2004.

39. L. A. Tawalbeh, A. F. Tenca, S. Park, and C. K. Koc. ”A dual-field modular division algorithm and

architecture for application specific hardware”. Thirty-Eighth Asilomar Conference on Signals,

Systems, and Computers, Pages 483-487,IEEE Press, Pacific Grove, CA, USA, Nov.7-10, 2004.

40. A. F. Tenca and L. A. Tawalbeh. “An efficient and scalable radix-4 modular multiplier design using

recoding techniques”. Thirty-Seventh Asilomar Conference on Signals, Systems, and Computers,

Pages: 1445-1450, vol.2 IEEE Press, Pacific Grove, California, USA, November 9-12, 2003.

Book Chapters (2):

1. L. A. Tawalbeh and H. Tawalbeh “Ch 12: Lightweight crypto and security”. Book title: Security and Privacy in Cyber-Physical Systems: Foundations and Application. Editors: Houbing Song, Glenn A. Fink, Sabina Jeschke, and Gilad L. Rosner. Wiley Publisher, pp 243-281, June 2017.

2. L. A. Tawalbeh and Cetin K. Koc, Book Chapter (Ch5):” Efficient elliptic curve cryptographic hardware design for wireless security”. Book: Wireless Security and Cryptography. Eds: S. Nicolas, N. Zhang, ISBN: 084938771X, Taylor & Francis Ltd., USA, 2007

TEACHI NG EXPERI ENCE AFTER PHD ( 2005 - NO W ) :

: universitiesUndergraduate courses at 5 more than 25 graduate and /developedI taught

At Jordan University of Science and Technology (JUST)-Full Time Assistant/Associate professor (2005- 2013): Graduate Courses: 1. CPE 776 Computer Networks Security (Fall '11,Fall '10, Fall '08, Summer '06, Summer '05)

Page 8: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

2. CPE 779 Advanced Computer Arithmetic (Fall '12, Spring '08, Spring '06, Fall '05) 3. CPE 746 Embedded Systems Design (Fall '07, Fall '06)

Under-graduate Courses: 4. CPE 552 Computer Design (Summer '13, Spring '11, Spring '10, Spring '09) 5. CPE 542 Cryptography and Network Security (Summer '08, Fall '05, Summer '05) 6. CPE 350 Hardware Description Language Lab (Summer '08) 7. CPE 312 Numerical Engineering Analysis (Spring ’11, Spring '10, Spring '09, Spring '08, Fall

'06, Fall '05, Spring '05) 8. CPE 252 Computer Organization and Design (Fall '12, Summer '11, Fall '10, Fall '09, Summer

'09, Fall '08, Fall '07, Spring '07, Fall '06, Spring '06, Spring '05)

At: Umm Al- Qura University- Saudi Arabia-Full Time Associate Prof. (Fall 2013- Fall 2016) Graduate Courses:

9. CE 513 Digital Forensics and Computer Crimes (Spring ’16, Spring '15, Spring '14) 10. CE 510 Information Security (Fall ’16, Fall ’15, Fall ’14) 11. CE 509 Research Seminar ( Spring ’15, Spring ’14 ) Undergraduate Courses: 12. CE 490 Cloud Infrastructure and Services (Fall ’16, Spring ’16) 13. CE 432 Computer Systems Security (Fall ’15, Fall ’14) 14. CE 381 Numerical Engineering analysis (Fall ’13)

At: New York Institute of Technology ( NYIT) - Amman's Campus-Part Time Adjunct Professor (Spring 2005-Spring 2011): Graduate Courses:

15. INCS 745: Intrusion Detection and Hackers Exploits (Spring '11, Fall ’08, Fall ’07, Spring '07, Winter '07, Fall '06, Summer '06)

16. INCS 712: Computer Forensics (Summer ’09, Summer ’08, Spring ‘07, Fall ‘06, Spring ‘06) 17. INCS 741: Cryptography (Fall '10, Fall ‘07, Summer ‘07)

18. INCS 735: Secure Software Engineering (Summer ‘09) 19. EEN 755: Computer Networks (Summer ‘08) 20. CSCI 620: Operating System Security (Fall ’09, Spring ’09, Fall '08) 21. CSCI 860: Special Topics: Data Security & Cryptography (Spring '05)

At: Princes Sumaya University for Technology-Part Time Adjunct Prof. (Fall 2011 – Fall 2013):

Graduate Courses: 22. Cryptography

23. Network Security At: DePaul University-Amman's Campus- Part Time Adjunct Prof. (Spring 2007-Spring 2009) Graduate Courses:

24. TDC 577: Network Security. (Fall '08) 25. TDC 532: Wireless Systems Engineering and Deployment. (Winter '08) 26. TDC 512: Cellular and Wireless Communications. (Spring '07)

M ASTER STUDENTS THESES SUPERVISED:

1. A. Dairi. Cyber Security Attacks on Smart Cities and Associated Mobile Technologies, Dec. 2016. 2. E. Ahmadoh Smart Phones Security Versus Power Consumption: Study and Analysis, Nov 2016. 3. K. Bahwaireth. Energy Optimization Techniques in Mobile Cloud Computing. Sept.. 2016. 4. W. Bakhader. Efficient Mobile Cloud Computing Model Using The Cloudlet Concept., June 2015. 5. N. Darwazah. A Reliable Confidentiality-based Cloud Storage Framework. January 2014 6. Y. Haddad. Lightweight Provable Data Possession Mobile Cloud Computing Framework. Dec , 2013

Page 9: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

7. M. Abu Maghli, “Design and Implement Secure Integrated Terminal Authentication Protocol in E-passport Inspection Systems ". Nov. 2012.

8. F. Ababneh. Secure Cloudlet-based Mobile Cloud Computing Model. October 2012. 9. A. Mansour. A public –key encryption method implementation for wireless sensor networks. July 2012. 10. H. Tawalbeh, “Hardware Performance Evaluation Of SHA-3 Candidate Algorithms”. June 2012. 11. A. Alkaff,” Hardware Implementation for Elliptic Curve Crypto (ECC) computations”. 2011. 12. W. Kanakri, ” Elliptic Curve Crypto-processor Implementation Using Efficient Calculations of

Modular Multiplicative Inverse”. January 2010. 13. Q. Abu Al-Haija', “Efficient Algorithms for Elliptic Curve Cryptography Using New Coordinates

Systems. Dec. 2009 14. S. F. Swaidan, Modular Squaring Algorithms Suitable for Hardware Implementations in GF(p). 2008 15. Y. Jararwah, A hardware architecture of an Efficient Modular Division Algorithm for Cryptographic

Applications. July 2007. 16. A. Mohammad. An Architecture for Elliptic Curve Cryptoprocessor for Programmable Hardware.2007 17. S. Z. Sweedan, " Hardware Design and Implementation of Elgamal Public-Key Cryptography

Algorithm," Feb. 2007 18. M. Salameh, " A New and Efficient Key Distribution Protocol", Dec. 2006

** No PhD Program in Computer Science and Engineering offered at these Universities

TR AI N I NG AND CONSULTATI O N : 1. Co-Founder and Co-Chair of the IEEE international conference on Mobile and edge

computing http://emergingtechnet.org/FMEC2017/ 2. Founder and Director of the Cryptographic Hardware and Information Security Lab (CHIS) at

Jordan University of Science and Technology (JUST), Jordan in 2010. 3. Founder, Chair and TPC member of many International conferences world wide. 4. Consultant for: Universal Research Solutions Inc., Missouri, USA: Feb 2012-Feb 2013. 5. Taught he cryptography unit to the talented youth in MAWHEBA program (in cooperation

with Johns Hopkins CENTER for TALENTED YOUTH, USA). July 2015 and 2016, KSA. 6. Research Member at the Machine Intelligence Research Lab, USA (started Jan. 2011-Present). 7. Establish an Incubator for a leading regional Software development company called I-

HORIZON at Jordan University of Science and Technology to bridge the gap between industry and the academia, and give the students the hands on needed to involve them in the market and keep them updated with up to date technologies, 2011-present.

8. Coordinate and attend a MENTOR GRAPHICS training in: "FPGA Design and Verification Training Course". 2011.

9. Attended Ethical Hacking Training workshop (CEH)- April 2009. 10. Coordinator of the Mentor Graphics Higher Education Program (HEP) in Jordan, 2007. 11. Attended Specialized workshop on “Creativity and Innovation”. June 2006. 12. Training workshop on “Preparation the Leaders of Information Technology”, Feb. 2006. 13. Training workshop on “ Evaluation of University Examination Methodologies” July,2005. 14. Java Certified Programmer, SUN Microsystems, 2001

M EM BER O F M ASTER STU NDENTS EXAM I NATI O N C O M M I TTEE:

1. L. Qabajeh,” Distributed Secure Routing Protocol for Mobile Ad-Hoc Netwroks”. Aug. 2005. 2. D. Al-Shorman,” Evaluation of Image Edge Detection Using Fuzzy Set Theory and Neural Network to

Detect Brain Cancer. July 2006. 3. A. Nawasrah. Adaptive Forward Error Correction Based on Probability of Loss and Recovery Rates. Oct

2006. 4. R. Saifan. Novel Algorithm for Defending The Denial of Service Attacks in Sensor Networks. Nov 2006. 5. M. Al-Hammouri.”Recognition of Dynamic Gestures in Arabic Sign Language Using HMM”. Dec. 2006. 6. A. Arafat.”Network Intrusion Detection System Using Attack Behavior Classification”. Dec. 2006.

Page 10: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

7. O. Migdadi,” Power Aware Aodv Routing Protocol for Bluetooth Scatternet”. January 2007. 8. M. Alawneh,” Complexity Related Aspects of Face Recognition”. January 2007. 9. M. Shatnawi,” Hardware Implementation of Digital Oscillators Using Advanced Digital Arithmetic.

March 2008. 10. A. Mustafa," Countering P2P-Based Denial of Service Attacks”. May 2008.

SENI O R G RADUATI O N PRO JECTS SUPERVI SED:

1. A. Kado et.al. “Mobile Cloud System for University Applications”, 2014.

2. M. Alqudah and A. Abu-Dalo.” Sixth Sense: The Physical World is Always Connected to The Digital World.” 2010.

3. M. Al-Qahtani and M. Masoud,” Hyper Arabic Computer Interface (HACI)”. 2009

4. D. Mhiedat and H. Rababa’ah. “ Improved IDEA Algorithm”. 2008.

5. H. Ammari, “Blowfish Encryption Algorithm with a Randomly Generated S-boxes”. 2007.

6. A. Almajali and F. As’ad,” IDEAL “ An Improved Symmetric Encryption Algorithm Based on the International Data Encryption Algorithm”. 2007.

7. A. Khatatbeh , T. Abu-Qtaish. New efficient crypto Algorithm design and Implementation (ALT). 2007.

8. Sh. Alzoubi, “Voice Over Internet Protocol (VOIP)”. 2007.

9. A. Mohammad.”CDMA 1x EV-DV Security Layer, Phase 1: Encryption Protocol”. 2006.

10. D. Shatnawi, R. Al-Balawneh and R. Salman.”Hardware Design for Radix-16 Montgomery Multiplication”. 2006.

11. A. Matekri and S. Laban,” CDMA 1x EV-DV Security Layer: Phase 2: Authentication Protocol”. 2006.

12. A. Badarneh, S. Falahat and I. Badarneh.”Hardware Design And Implementation Of BlowFish Cryptographic Algorithm”. 2006.

13. F. Khasawenah and N. Milhim.” RSA Crypto processor” 2006.

14. S. Alhasan.”Bluetooth Control System using The Mobile”. 2006

professional activities: Am a Reviewer many international journals, including: IEEE Transactions on

Computers, IEEE Transactions on VLSI Systems, IET Circuits, Devices and Systems, IET Information Security, IEEE Potentials Magazine, Computer Networks, Annals of Telecommunications, Journal of System Architecture, Integration, the VLSI Journal., Information Security Journal; A global perspective, International

Journal of Modeling and Simulation.

Conferences and workshops activities: Participated in founding, chairing, TPC member of many international conferences world wide

1. Co-Founder and Chair of the International Workshop on Mobile Cloud Computing systems, Management, and Security (MCSMS-2015). London, UK, June 2015.

2. Co-Founder o the international workshop on Smart Cities Engineering. 3. Chairing the Network Track at the ANT 2017 International Conference. 4. Chairing the IEEE Int. Workshop on Software Defined Systems, AZ, USA, March 2015 5. TPC - International Conference on the Applications of Digital Information and Web Technologies

(ICADIWT 2008)-UK (Technical co-sponsored by IEEE UK and RI Region). 6. TPC-The Second International Conference on the Applications of Digital Information and Web

Technologies (ICADIWT 2009)-UK (Technical co-sponsored by IEEE UK and RI Region). 7. TPC- International Conference on Information and Communication Systems (ICICS 2009, 2011, 2012),

Amman, Jordan.

8. TPC-The International Congress on Pervasive Computing and Management - Sydney, Australia.

University Service 1. Master program Coordinator- college of computer and information systems (2013-2016). 2. ABET Accreditation committee 2013, 2014. 3. Higher education and scientific research department committee (2009, 2010, 2011) 4. Students affairs department committee -2008

Page 11: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud

5. Engineering training department committee - 2010 6. Curriculum and courses equivalency department committee -2006, 2007 7. Master degree comprehensive exam department committee (2007-2011) 8. Scholarships department committee-2006 9. Social activities department committee 2009 10. A committee to embed the Computer Aided Design tools in the curriculum-2010 11. Representative of computer engineering department at the COLLEGE council- 2007 12. Conferences and Scientific workshops COLLEGE committee-2008.

Community services selected activities 1. Organize and participate in the first gathering to protect youth form DRUGS and AIDS at

Jordan University of Science and Technology for 5 days. “Youth Protectors”, May 2007. 2. Organize a workshop “ The Role of Universities in protecting students from AIDS and DRUGS”

at Jordan University of Science and Technology. May 2008. 3. Organize and participate in the National gathering about Population and Mothers health: The

road to achieve the Millennium development goals”. Feb 2010.

References

1. Prof. Cetin K. Koc, Professor of Computer Engineering Department of Computer Science

University of California Santa Barbara Santa Barbara, CA 93106

Email: [email protected], Email: [email protected], Cell: +1 805-403-4191. http://koclab.cs.ucsb.edu/koc.html

2. Gokay Saldamli, PhD Assistant professor, Computer Engineering Department, San Jose State University; San Jose, CA 95192 Email: [email protected] Phone: 408-605-3438 Website: https://cmpe.sjsu.edu/profile/gokay-saldamli

3. Yaser Jararweh, PhD Research Associate Professor, Department of Computer Science Carnegie Mellon University, Pittsburgh, PA, USA. Phone: +1 330-322-2126 Email: [email protected] Website: https://www.cs.cmu.edu/directory/jararweh

4. Mazen Kharbatuli; PhD, (Previously Computer engineering department head, Jordan University of

Science and Technology-JUST) Currently: Senior Soft Ware Engineer, Google Inc. 345 Spear Street, San Francisco, CA 94105 Phone: +1 408-797-5305 Email: [email protected]

Page 12: E-mail: Ltawalbeh@tamusa · Jararweha, H. Ababneh, M. Alhammouri, and L. A. Tawalbeh. Energy Efficient Multi-Level Energy Efficient Multi-Level Network Resources Management in Cloud