Loai Tawalbeh

Loai Tawalbeh
  • PhD in Computer Engineering, Oregon State University, USA, 2004.
  • Professor (Associate) at Texas A&M University – San Antonio

About

149
Publications
152,993
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,427
Citations
Introduction
Am working on Cyber Security, Cloud computing, Big Data, and Cryptographic Hardware. Currently, I have 5 projects in the above research areas. Now, am visiting associate professor at University of California Santa Barbara, USA. I worked as Associate prof at computer engineering department, Jordan University of Science and Technology from 2005-2013. I also worked as Adjunct professor at New York Institute of Technology-Jordan's Campus from 2005-2012.
Current institution
Texas A&M University – San Antonio
Current position
  • Professor (Associate)
Additional affiliations
June 2018 - present
Texas A&M University – San Antonio
Position
  • Professor (Associate)
January 2017 - January 2018
University of California, Santa Barbara
Position
  • Professor
January 2005 - September 2013
Jordan University of Science and Technology
Position
  • Associate Professor, Director of Crystallographic Hardware and Info. Security Lab

Publications

Publications (149)
Article
Full-text available
Data analytics projects span all types of domains and applications. Researchers publish results using certain datasets and classification models. They present results with a summary of the performance metrics of their evaluated classifiers. However, readers and evaluators may not be able to compare results from the different papers for several reas...
Article
Full-text available
Blockchain is a distributed digital ledger consisting of sequence of blocks. These blocks are groups of transactions that make up a sequence where each block contains the cryptographic hash of its prior block. To maintain huge networks, data integrity, and consistency some blockchain deployments uses a distributed communication method known as goss...
Article
The majority of the intrusion detection solutions proposed using machine learning and deep learning approaches are based on known attack classes only. Comprehensive threat detection systems should consider both known and unknown attacks. Rapidly changing network environment and the advanced tools and techniques used by adversaries to launch new sop...
Book
Full-text available
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromised data and sufficient losses. Massive losses and frequent attacks dictate the need for accurate and...
Book
Full-text available
There are many challenges to creating artificial intelligence systems. There are limited resources, insufficient knowledge in the field, feasibility, and many other technical problems on the way to creating AI. Artificial Intelligence currently remains a scientific field related to computer modeling of human intellectual functions. Artificial intel...
Article
Full-text available
The future of industrial systems, as represented principally by Industry 4.0, will be dependent on the convergence of recent research work in the fields of control architectures, cyber-physical systems (CPS), and the Internet of Things (IoT). CPS are sophisticated embedded systems that interact with their surroundings continuously and dynamically....
Article
Full-text available
Background: According to the literature, self-care in persons with heart failure is inadequate. Such inadequate levels of self-care necessitate a thorough investigation of the potential predictors. Purpose: To: (a) determine the level of self-care among persons with heart failure in Jordan; (b) determine the relationship between mindfulness, imp...
Article
Full-text available
Introduction In humanity’s ongoing fight against its common enemy of COVID-19, researchers have been relentless in finding efficient technologies to support mitigation, diagnosis, management, contact tracing, and ultimately vaccination. Objectives Engineers and computer scientists have deployed the potent properties of deep learning models (DLM) i...
Article
Internet of Things (IoT) is getting more attention and popularity these days as they make the place smarter and efficient. Every IoT-enabled device is communicating with one another either directly or through a gateway to the internet. Data transmission brings security challenges and concerns to retain data integrity. In the Healthcare field, it is...
Book
Full-text available
This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book pr...
Article
Blockchain and big data are the emerging technologies that are on the highest agendas of the firms. These are significantly expected to transform the ways in which the business as well as the firm run. These are on the verge of increasing the expectation of the distributed ledgers, which would keep the firms away from struggling challenges. The con...
Chapter
For hackers and many actors in the cyber world, crises can make opportunities. With the continuous spread of Covid-19 pandemics, new waves of cyber-attacks are witnessed. Attackers are taking advantage of possibly increasing vulnerabilities due to lack of awareness of best security practices when using online resources by many new users. While the...
Article
Full-text available
Today, deep learning approaches are widely used to build Intrusion Detection Systems for securing IoT environments. However, the models’ hidden and complex nature raises various concerns, such as trusting the model output and understanding why the model made certain decisions. Researchers generally publish their proposed model’s settings and perfor...
Article
The significance of an intrusion detection system (IDS) in networks security cannot be overstated in detecting and responding to malicious attacks. Failure to detect large-scale attacks like DDoS not only makes the networks vulnerable, but a failure of critical lifesaving medical and industrial equipment can also put human lives at risk. Lack of av...
Book
Full-text available
Presents blockchain techniques and applications for cyber-physical systems Analyzes and presents the state-of-the-art of blockchain technology Highlights and discusses the recent development and emerging trends in blockchain for CPS applications
Book
Full-text available
This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2...
Book
Full-text available
Presents the latest discoveries in the field of machine intelligence and big data Proposes many case studies and applications of computational and Big data Combines theory and practice so that readers of the few books (beginners or experts) Today, the use of machine intelligence, expert systems, and analytical technologies combined with Big Data is...
Article
Full-text available
Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital communication. Modern cryptosystems assist in data sanctuary by utilizing substitution-boxes (S-boxes). This paper presents a modest and novel technique to erect dynamic and key dependent S-b...
Book
Full-text available
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart...
Article
Full-text available
Smart cities and their applications have become attractive research fields birthing numerous technologies. Fifth generation (5G) networks are important components of smart cities where intelligent access control is deployed for identity authentication, online banking, and cyber security. The prevalence of biometrics, such as fingerprints, in authen...
Chapter
The convergence of Artificial Intelligence and Blockchain is growing very fast in everyday applications and industry. In centralized systems and applications like healthcare, data access and processing in real-time among various information systems is a bottleneck. Blockchain’s decentralized database architecture, secure storage, authentication, an...
Chapter
The information technology field remains dominant in terms of adopting modern technologies. Additionally, there is increased adoption of the technologies in diverse realms and industries. One such rapidly emerging technology stands with the advancement of cloud computing. Today, cloud platforms are being sought after by a significant number of user...
Article
Full-text available
Smart cities provide citizens with smart and advanced services to improve their quality of life. However, it has been observed that the collection, storage, processing, and analysis of heterogeneous data that are usually borne by citizens will bear certain difficulties. The development of the Internet of Things, cloud computing, social media, and o...
Conference Paper
Full-text available
Distance learning is the education of students who may not often be physically present. Internet technology has made many possible ways of distance learning by open educational tools and services, such as e-learning and MOOCs. The distance learning technologies are divided into two types of delivery: synchronous learning and asynchronous learning....
Research Proposal
Full-text available
CFP: The International Symposium on Advanced Intelligent Systems for Cybersecurity in conjunction with The 12th International Conference on Information and Communication Systems (ICICS 2021). 24-26 May 2021 Valencia - Spain (Virtual) (Proceeding will be published by IEEE) Workshop link: https://www.just.edu.jo/icics/icics2021/aisc2021.html
Research Proposal
Full-text available
Springer Edited Book: Big Data Intelligence for Smart Applications Publication by Springer and indexed by (Scopus & Web of Science) Call for Chapters: https://sites.google.com/view/bigdatasmart Submission link: https://easychair.org/conferences/? conf=bigdatasmart21 Chapter Submission: June 15, 2021 (Extended Firm)
Research Proposal
Full-text available
CFP: Special Issue on Big Data Analytics and Intelligent Systems for Cybersecurity Journal: Big Data Q1(Impact Factor: *3.644) Call for papers: https://home.liebertpub.com/cfp/special-issue-on-big-data-analytics-and-intelligent-systems-/314/ Deadline for Manuscript Submission: September 15, 2021 Submission Link: https://home.liebertpub.com/publicat...
Chapter
Full-text available
The IoT is providing unlimited opportunities in important sectors, including education, health care, and transportation. This rapid spread of IoT devices among consumers is combined with increased security concerns. With about thirty billion IoT connected devices that can be utilized by hackers to launch attacks, the exposure of personal informatio...
Conference Paper
Full-text available
Distance learning is the education of students who may not often be physically present. Internet technology has made many possible ways of distance learning by open educational tools and services, such as e-learning and MOOCs. The distance learning technologies are divided into two types of delivery: synchronous learning and asynchronous learning....
Chapter
The technological wonders that people have been reading about the various literature relating to science-fiction are today coming into reality. Drawing from 3D-holograms, cell phones, robots, artificial intelligence among other novelties devices of modern engineering, human beings are today enabled to perform many tasks including those which were d...
Article
Full-text available
Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that IoT is facing. In this work, we are exploring the background of IoT systems and security measures, an...
Chapter
Full-text available
In today’s technology dominated world, people everywhere enjoy the benefits of ease of access to networks in office buildings, coffee shops, and even hospitals. Similar to the complicated plumbing systems in many of these places, networks are vast and intricate systems that can span cities and even across countries. Such networks require management...
Chapter
In many systems, there are several components connected to each other. It is vital to understand each component, how they are working together, and how that is related to the information technology (IT) sector. Architecture is generally described as the science of building something. In fact, the Britannica dictionary defines architecture as, “The...
Chapter
Risk Management is an important security measure that organizations take to protect current assets. Since hackers are always looking for new and more practical methods to obtain access to you or your company’s most sensitive data, the practice of risk management is perpetual and evolving. The process of developing a risk management strategy occurs...
Article
Full-text available
The applications and services of Information and Communication Technologies are becoming a very essential part of our daily life. In addition, the spread of advanced technologies including the cloud and mobile cloud computing (MCC), wireless communication, and smart devices made it easy to access the internet and utilize unlimited number of service...
Preprint
Full-text available
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos....
Article
Full-text available
Wireless personal communication devices which, a single generation ago, seemed an incredible technology application found only in science fiction have now become an absolute necessity for how many Americans engineer daily life; equally indispensable in all aspects of human functionality and enabling man's virtually effortless ability to manipulate...
Book
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge a...
Article
Full-text available
With the rapidly aging population, there is a need to detect elderly's activity, monitor their health, alert health care personnel, and provide real-time and long-term access to the generated sensor data. With the advances in sensor technologies, communication protocols, computing power, and cloud and edge services, it is now possible to build smar...
Conference Paper
Recently, cybercrimes are causing huge impact on different cyber systems that might include vital information such as financial transactions and medical records. A better understanding of the accelerating numbers of cybercrimes and their enormous cost could help the global in bridging the gap between their defenses and the escalating numbers cyber...
Article
Full-text available
Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational efficiency. In order to match the performance needs, cloud computing engages with the perils of peer-to-peer (P2P) computing and brings up the P2P cloud systems as an extension for federated c...
Thesis
Full-text available
Obviously, our life is becoming more dependent on using smart phones to conduct variety of useful tasks. There are different mobile applications in many aspects of life including education, health, and transportation, and many others. As a recent example, these smart devices are being used increasingly in the health sector to facilitate the medical...
Thesis
Full-text available
: Healthcare is a very important sector in every nation’s life. During the last few years, the healthcare industry was developed rapidly affected by the advances in the Information and Communication Technology (ICT). ICT is facilitating converged healthcare systems which will allow the healthcare stakeholders to seamlessly organize their activities...
Article
Full-text available
With mobile computing being the number one user paradigm of choice, and cloud computing becoming the chosen supporting infrastructure, the aggregation of these two areas is inevitable. Yet due to their novelty, they suffer from both inherited and new issues. Social computing theory can apply well to this fusion, such as pooling together in a social...
Conference Paper
Full-text available
In this paper, we are presenting the role of diversity and inclusion in forming teams and class groups for the Team-Based Learning teaching strategy. We adopted this teaching strategy for our classes in Electrical and Computer Engineering and Computer Science courses. We experienced the values different students bring to the courses, departments an...
Conference Paper
Full-text available
With all these smart devices around us, and the spread of the Internet and emerging technologies, our life became easier and busier. The uncontrolled excessive use of the mobile applications and social media made many of the people around the world feel they are alone, and socializing with electronic devices rather than human beings. This problem i...
Article
Full-text available
Several new attacks have been identified in CRNs such as primary user emulation, dynamic spectrum access (DSA), and jamming attacks. Such types of attacks can severely impact network performance, specially in terms of the over all achieved network throughput. In response to that, intrusion detection system (IDS) based on anomaly and signature detec...
Article
Full-text available
Wireless Sensor Networks WSNs are showing important roles in several aspects of life such as biometry, environments, optics, physics and gas. Each application utilizing WSN for accomplishing its goals sets trust and reliability requirements that a WSN must provide according to its limited resources. A new paradigm for designing trusted and reliable...
Article
Full-text available
Smart City refer to the city that integrates modern technologies for automated and efficient service providing to enhance citizens’ lifestyle. Latest studies show that like 60 present of the whole world's population will be living in urban environments by the year 2030. This massively growing population in urban environments leads to the need of ad...
Article
Full-text available
Reducing the total power consumption and network delay are among the most interesting issues facing large-scale Mobile Cloud Computing (MCC) systems and their ability to satisfy the Service Level Agreement (SLA). Such systems utilize cloud computing infrastructure to support offloading some of user’s computationally heavy tasks to the cloud’s datac...
Thesis
Full-text available
Smart Cities involve the integration of modern technologies in the city to provide automated and efficient services that will enhance the lifestyle of the citizens. Latest studies show that an approximate of 60 percent of the whole world’s population will be living in urban environments by the year 2030. This massive population growth in urban envi...
Conference Paper
Full-text available
All over the world, the crowd management is a big challenge facing the organizations of any event with large number of people. It is clear that this task is becoming more difficult and complicated when the event is larger. In the recent few years, the there are many new technologies developed that can be utilized in crowed management. Among these n...
Article
Full-text available
Wireless Sensor Networks (WSNs) have multiple uses and applications at the individual and organizations levels. Sensors are integrated in many fields including health, traffic, agriculture, industry, and many others. The use of sensors is associated with using many technologies including wireless communication protocols, Internet of Things, Cloud C...
Thesis
Full-text available
Smart mobile devices became an essential component of our daily life around the globe. The limited processing capacity and battery lifetime of mobile devices are considered as challenges, especially when executing heavy applications. In this research, the cooperative cloudlet model is proposed to overcome these limitations. The cloudlets in this mo...
Book
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and...
Conference Paper
Full-text available
Smart City refer to the city that integrates modern technologies for automated and efficient service providing to enhance citizens' lifestyle. Latest studies show that like 60 present of the whole world's population will be living in urban environments by the year 2030. This massively growing population in urban environments leads to the need of ad...
Thesis
Full-text available
The huge developments in usage of smart phones and their capabilities to perform many useful tasks made them an important part of many people’s life worldwide. The smart phones are used in creating and sharing files, location determination, social networking (facebook and twitter), making video calls, and even in medical applications. However, thes...
Article
Full-text available
There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geog...
Article
Full-text available
Nowadays mobile devices are considered an essential component of our daily lives. The rapid evolution in mobile computing has becomes a frustrating factor for law enforcement and the forensic community at large, because of the lack of industry standard, tools and training. Smartphones are becoming the most difficult to extract evidentiary data from...
Article
Full-text available
Mobile devices are used to perform many useful tasks in our daily life. All around the world, many people are using their smart phones to communicate with others, identify their location, and do online shopping. These useful applications involve sharing personal and sensitive information. Also, the smart devices have many weaknesses, such as: limit...
Article
Full-text available
Nowadays mobile devices are considered an essential component of our daily lives. The smart phones not only keep us connected but also can act as a mobile office, social tool, and an entertainment center. The combination of functionality, processing power, and storage space makes smartphones a prime target for investigators. The rapid evolution in...
Article
Full-text available
Both mobile and cloud computing are two areas which are rapidly expanding in terms of use case and functionality. Whilst mobile computing enables a variety of feature rich functionality for users in a non-fixed location, cloud computing is revolu-tionising the way in which computing resources are being provisioned, used and optimised for both servi...
Article
Full-text available
In the last few years, it is noticed that mobile smart devices are becoming very essential component of our daily life. The smart phones can do a variety of very useful jobs. In addition to make calls, they can be used to create and share multimedia files, run very useful applications and do data processing. But those devices suffer from some limit...
Conference Paper
Full-text available
There are many recent revolutionary technologies and advances in wireless communication and networking that changed the lives of millions of people around us. The wide spread of the Internet and the smart mobile devices which is equipped with wireless technologies to access the Internet, enabled people to contact each other regardless of their geog...
Conference Paper
The smart phones are used in many aspects of our life, shopping on the Internet, and creating and distributing many types of files. But these devices have many limitations including: short battery life time and limited storage and processing. Mobile Cloud Computing technology can help to overcome these limitations. Offloading technique reduces the...
Conference Paper
Full-text available
There are many recent revolutionary advances in information technology that include: wireless communication, the spread of mobile devices, and the Internet-of-Things (IoT). IoT will have an important role in connecting almost everything (mobile devices, cameras, home appliances, healthcare devices, military equipments,…,etc) to the Internet via dif...
Article
The newly emerged Software-Defined Systems (SDSs) promised to reduce computing systems management complexity. This can be achieved by separating the control plane from the data plane. On the other hand, cloud computing usage proliferation creates new challenges for managing user data efficiently. Such challenges include data ownership , data access...
Article
Full-text available
Mobile devices are increasingly becoming an indispensable part of people’s daily life, facilitating to perform a variety of useful tasks. Mobile cloud computing integrates mobile and cloud computing to expand their capabilities and benefits and overcomes their limitations, such as limited memory, CPU power and battery life. Big data analytics techn...
Conference Paper
Full-text available
Enhancements of mobile devices capabilities resulted in an increasing usage of them among people all over the world. These smart devices including the smart phones changed our life style forever, and they are considered by many people as an inseparable part of their daily activities. We are using these mobile devices to do many useful activities su...
Article
Full-text available
The need for the analysis of energy consumption has become greater due to the constrained resources of mobile devices afforded by the increased usage of mobile devices and the environmental footprint of large-scale, distributed systems. Energy usage has previously been modelled for a variety of use cases in order to optimise its consumption, throug...
Conference Paper
Reducing the total power consumption and network delay are among the most interesting issues facing large scale Mobile Cloud Computing (MCC) systems and their ability to satisfy the Service Level Agreement (SLA). Such systems utilize cloudlet based infrastructure to support off-loading some of user's computationally heavy tasks to the cloudlets. Ho...
Article
Full-text available
Cloud computing provides a convenient and on-demand access to virtually unlimited computing resources. Mobile cloud computing (MCC) is an emerging technology that integrates cloud computing technology with mobile devices. MCC provides access to cloud services for mobile devices. With the growing popularity of cloud computing, researchers in this ar...

Network

Cited By