cv sep12 2013 - feaapps.aub.edu.lb ·...
TRANSCRIPT
Ayman Kayssi Department of Electrical and Computer Engineering
American University of Beirut Phone: +961 1 374 444 ext. 3499
Cell: +961 3 965 258 E-‐mail: [email protected] Website: aub.edu/~ayman
Education PhD (May 1993)
§ Electrical Engineering – University of Michigan – Ann Arbor, MI, USA
MSE (December 1989)
§ Electrical Engineering – University of Michigan – Ann Arbor, MI, USA
BE with Distinction (July 1987)
§ Electrical Engineering – American University of Beirut, Lebanon
Experience Professor (October 2004 – Present)
§ Department of Electrical and Computer Engineering, American University of Beirut, Lebanon
Chairman (September 2004 – August 2007)
§ Department of Electrical and Computer Engineering, American University of Beirut, Lebanon
Associate Professor (July 1998 – September 2004)
§ Department of Electrical and Computer Engineering, American University of Beirut, Lebanon
Chief Technology Officer (July 1999 – February 2000)
§ Transmog Inc. (Cyberia), Beirut, Lebanon
Assistant Professor (January 1993 – June 1998)
§ Department of Electrical and Computer Engineering, American University of Beirut, Lebanon
Research Assistant (January 1989 – December 1992)
§ EECS Department, University of Michigan – Ann Arbor, MI, USA
Research Interests § Information Security and Trust § Internet and Telecom Technologies § Digital System Design and Test § Low-‐Power Circuits and Systems
Curriculum Vitae: Ayman Kayssi
Page 2 | http://www.aub.edu.lb/~ayman
Journal Publications and Book Chapters § Wassim Itani, Ayman Kayssi, and Ali Chehab, “Efficient Healthcare Integrity Assurance in the Cloud with
Incremental Cryptography and Trusted Computing,” in Cloud Computing Applications for Quality Health Care Delivery, in press.
§ Faisal Hamady, Ayman Kayssi, Ali Chehab, and Nitin Gupte, “Effects of workload variation on the energy distribution in a mobile platform,” Elsevier Microprocessors and Microsystems, in press.
§ Jalal Awed, Imad H Elhajj, Ali Chehab, Ayman Kayssi, “Perception-‐aware Packet-‐loss Resilient Compression for Networked Haptic Systems”, Elsevier Journal of Computer Communications, Accepted June 30, 2013.
§ Alaa Atassi, Imad H. Elhajj, Ali Chehab, Ayman Kayssi, “Intrusion Detection for SCADA Systems,” The State of the Art in Intrusion Prevention and Detection", Book by CRC Press, Editor: Al-‐Sakib Khan Pathan, Accepted April 2013.
§ Wassim Itani, Cezar Ghali, Ayman kayssi, and Ali Chehab, "Reputation as a Service: A Secure and Accountable Reputation System for Ranking Service Providers in Cloud Computing Architectures", Security, Privacy and trust in Cloud Systems, Springer Book, Editors: Surya Nepal and Mukaddim Pathan, Accepted February 17, 2013.
§ Faisal Hamady, Ayman Kayssi, Ali Chehab, and Mohammad Mansour, "Evaluation of Low-‐Power Computing when Operating on Subsets of Multicore Processors", Journal of Signal Processing Systems, Springer, Vol. 70, Issue 2, pp. 193-‐208, February 2013.
§ W. Itani, A. Kayssi, and A. Chehab, “SNUAGE: a Platform as a Service Security Framework for Protecting Network Communication in Cloud Computing,” Journal of Cluster Computing, accepted June 27, 2012.
§ W. Itani, C. Ghali, R. Bassil, A. Kayssi, and A. Chehab, “ServBGP: BGP-‐Inspired Autonomic Service Routing for Multi-‐Provider Collaborative Architectures in the Cloud,” Future Generation Computer Systems, available online June 1, 2012, DOI: http://dx.doi.org/10.1016/j.future.2012.05.013.
§ W. Itani, A. Kayssi, and Ali Chehab, “Hardware-‐Based Security for Ensuring Data Privacy in the Cloud,” in Security Engineering for Cloud Computing: Approaches and Tools, David G. Rosado, Daniel Mellado, Eduardo Fernandez-‐Medina, and Mario Piatini, Editors, IGI Global, pp. 147-‐170, September 2012.
§ S. Saab, W. Itani, A. Kayssi, A. Chehab, and C. Ghali, “Secure Cryptographic Mechanisms for Safeguarding Citizen Communications in the Presence of Tyranny”, International Journal for Information Security Research, vol. 2, no. 1/2, pp. 274-‐284, March/June 2012.
§ R. Bassil, W. El-‐Beaino, W. Itani, A. Kayssi, and A. Chehab, “PUMAP: A PUF-‐Based Ultra-‐Lightweight Mutual-‐Authentication RFID Protocol”, International Journal of RFID Security and Cryptography (IJRFIDSC), vol. 1, no. 1/2, pp. 58-‐66, March/June 2012.
§ M. Dabbagh, H. Hajj, W. El-‐Hajj, M. Mansour, A. Kayssi, and A. Chehab, “An Energy-‐Aware Design Methodology Based on Kernel Optimizations”, International Journal of Autonomous and Adaptive Communications Systems, accepted February 2012.
§ E. Abou Charanek , H. Dermanilian , I. Elhajj , A. Kayssi , and A. Chehab, “E2VoIP2: Energy Efficient Voice over IP Privacy,” Computers & Security, vol. 30, no. 8, pp. 815-‐829, November 2011.
§ W. Itani, A. Kayssi, and A. Chehab, “Security and Privacy in Body Sensor Networks: Challenges, Solutions and Research Directions,” in E-‐Healthcare Systems and Wireless Communications: Current and Future Challenges, ed. M. Watfa, IGI Global, pp. 100-‐127, October 2011.
§ A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, “Fuzzy Reputation-‐Based Trust Model,” Applied Soft Computing, vol. 11, no. 1, January 2011.
§ R. Deghaili, A. Chehab, A. Kayssi, and W. Itani, “STRIDE: A Secure Framework for Modeling Trust-‐Privacy Tradeoffs in Distributed Computing Environments,” International Journal of Dependable and Trustworthy Information Systems (IJDTIS), vol. 1, no. 1, pp. 60-‐81, January-‐March 2010.
§ W. Itani, A. Kayssi, and A. Chehab, “PLEDGE: A Policy-‐Based Security Protocol For Protecting Content Addressable Storage Architectures,” International Journal of Network Security & Its Applications (IJNSA), vol. 2, no. 1, pp 98 – 115, January 2010.
§ W. Itani, A. Kayssi, and A. Chehab, “Smart Encryption Channels for Securing Virtual Machine-‐Based Networked Applications,” Security and Communication Networks, vol. 2, no. 6, pp. 507 – 518, November/December 2009.
§ R. Deghaili, A. Chehab, and A. Kayssi, “Trust-‐Privacy Tradeoffs in Distributed Computing,” in Collaborative Computer Security and Trust Management, eds. J. M. Seigneur and A. Slagell, pp. 216 – 225, IGI Global, December 2009.
§ Z. Radwan, C. Gaspard, A. Kayssi, and A. Chehab, “Policy-‐Driven and Content-‐Based Web Services Security Gateway,” International Journal of Network Security, vol. 8, no. 2, pp. 253 – 265, May 2009.
Curriculum Vitae: Ayman Kayssi
Page 3 | [email protected]
§ R. Wehbi, A. Kayssi, A. Chehab, and Z. Dawy, “Network Setup for Secure Routing in Inter-‐Vehicle Communication Networks,” in Breakthrough Perspectives in Network and Data Communications Security, Design and Applications, ed. I. Bose, pp. 272 – 285, Information Science Reference, December 2008.
§ T. Hassan, A. Kayssi, and A. Chehab, “Ring of Masters (ROM): A New Ring Structure for Bluetooth Scatternets with Dynamic Routing and Adaptive Scheduling Schemes,” Pervasive and Mobile Computing, vol. 4, no. 4, pp. 546 – 561, August 2008.
§ A. Nazer, A. Chehab, and A. Kayssi, “Dynamic Current Testing For CMOS Domino Circuits,” International Journal of Electronics, vol. 95, no. 6, pp. 577 – 592, June 2008.
§ M. Eid, H. Artail, A. Kayssi, and A. Chehab, “LAMAIDS: A Lightweight Adaptive Mobile Agent-‐based Intrusion Detection System,” International Journal of Network Security, vol. 6, no. 2, pp. 145 – 157, March 2008.
§ W. Itani, A. Kayssi, and A. Chehab, “Policy-‐Based Security for M-‐Commerce Networks,” in Global Mobile Commerce: Strategies, Implementation and Case Studies, eds. W. Huang, Y. Wang and J. Day, Idea Group Publishing, September 2007.
§ A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, “PATROL -‐ A Comprehensive Reputation-‐Based Trust Model,” International Journal of Internet Technology and Secured Transactions, vol. 1, no. 1/2, pp. 108 – 131, 2007.
§ S. Hanna, A. Chehab, A. Kayssi, and H. Artail, “Lighter Weight Mobile Agent System,” International Journal of Computers and their Applications, vol. 14, no. 3, pp. 170 – 187, Sep. 2007.
§ A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, “PATROL-‐F -‐ A Comprehensive Reputation-‐Based Trust Model with Fuzzy Subsystems,” Lecture Notes in Computer Science (LNCS 4158), pp. 205 – 216, Springer-‐Verlag, 2006.
§ R. Wehbi, A. Kayssi, A. Chehab, and Z. Dawy, “Network Setup for Secure Routing in Inter-‐Vehicle Communication Networks,” International Journal of Business Data Communications and Networking, vol. 2, no. 4, pp. 1 – 17, 2006.
§ W. Itani, A. Kayssi, A. Chehab, and C. Gaspard, “A Policy-‐Driven, Content-‐Based Security Protocol for Protecting Audit Logs on Wireless Devices,” International Journal of Network Security, vol. 3, no. 2, pp. 146 – 157, 2006.
§ G. Derbas, A. Kayssi, A. Chehab, and H. Artail, “A Trust Model For Distributed Systems Based On Reputation,” International Journal of Web and Grid Services, vol. 1, nos. 3/4, pp. 416 – 447, 2005.
§ M. Eid, H. Artail, A. Kayssi and A. Chehab, “Trends in Mobile Agent Applications,” Journal of Research and Practice in Information Technology, vol. 37, no. 4, pp. 323 – 351, 2005.
§ S. Karaki, A. Kayssi, and H. Karaki, “Capacitor Placement for Switching Noise Reduction Using Genetic Algorithms and Distributed Computing,” Springer-‐Verlag Electrical Engineering Research Journal, vol. 87, no. 1, pp. 11 – 18, January 2005.
§ W. Itani and A. Kayssi, “SPECSA: a Scalable, Policy-‐Driven, Extensible, and Customizable Security Architecture for Wireless Enterprise Applications,” Computer Communications, vol. 27, no. 18, pp. 1825 – 1839, December 2004.
§ A. Kayssi, “The Average Capacitor Current Method for Delay Calculation in MOS Circuits,” IEEE Transactions on Education, vol. 47, no. 3, pp. 330 – 339, August 2004.
§ A. Kayssi, S. Sharafeddine, and H. Karaki, “Computer-‐Based Laboratory for Data Communications and Networking,” Wiley Computer Applications in Engineering Education, vol. 12, no. 2, pp. 84 – 97, July 2004.
§ W. Itani and A. Kayssi, “J2ME Application-‐Layer End-‐to-‐End Security for M-‐Commerce,” Elsevier Journal of Network and Computer Applications, vol. 27, no. 1, pp. 13 – 32, January 2004.
§ A. Kayssi, “Delay Modeling of CMOS Clock Drivers,” Springer-‐Verlag Electrical Engineering Research Journal, vol. 85, no. 5, pp. 247 – 253, November 2003.
§ A. Kayssi, “Analytical Transient Response of MOS Current Mirrors,” Wiley International Journal of Circuit Theory and Applications, vol. 31, no. 5, pp. 453 – 464, September/October 2003.
§ J. Samaha, A. Kayssi, R. Achkar, and M. Azar, “G3: GPS-‐GSM-‐GIS,” IEEE Computer, vol. 33, no. 10, pp. 107 – 110, October 2000.
§ J. Liu, R. Makki, and A. Kayssi, “Dynamic Power Supply Current Testing of CMOS SRAMs,” Kluwer Journal of Electronic Testing Theory and Applications (JETTA), vol. 16, no. 5, pp. 499 – 511, October 2000.
§ A. Kayssi, A. El-‐Hajj, M. Al-‐Assir, and R. Sayyid, “Web-‐Based Tutoring and Testing in a Computer Networks Course,” Wiley Computer Applications in Engineering Education, vol. 7, no. 1, pp. 1 – 7, January 1999.
§ A. I. Kayssi, “Macromodel Construction and Verification,” IEEE Circuits and Devices, vol. 14, no. 3, pp. 34 – 39, May 1998.
§ A. I. Kayssi and K. A. Sakallah, “Timing Models for Gallium Arsenide Direct-‐Coupled FET Logic Circuits,” IEEE Transactions on Computer-‐Aided, vol. 14, no. 3, pp. 384 – 393, March 1995.
Curriculum Vitae: Ayman Kayssi
Page 4 | http://www.aub.edu.lb/~ayman
§ A. I. Kayssi and K. A. Sakallah, “Delay Macromodels for Point-‐to-‐Point MCM Interconnections,” IEEE Transactions on Components, Packaging, and Manufacturing Technology -‐ Part B, vol. 17, no. 2, pp. 147 – 152, May 1994.
§ A. I. Kayssi, K. A. Sakallah, and T. N. Mudge, “The Impact of Signal Transition Time on Path Delay Computation,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, vol. 40, no. 5, pp. 302 – 309, May 1993.
§ A. I. Kayssi, K. A. Sakallah, and T. M. Burks, “Analytical Transient Response of CMOS Inverters,” IEEE Transactions on Circuits and Systems, vol. 39, no. 1, pp. 42 – 45, January 1992.
§ T. N. Mudge, R. B. Brown, W. P. Birmingham, J. A. Dykstra, A. I. Kayssi, R. J. Lomax, O. A. Olukotun, K. A. Sakallah and R. Milano, “The Design of a Microsupercomputer,” IEEE Computer, vol. 24, no. 1, pp. 57 – 64, January 1991.
Conference Publications § Faisal Hamady, Ali Chehab, Imad Elhajj, Ayman Kayssi, “User Experience-‐Based Mechanism for Preserving
Energy in Graphics-‐Intensive Applications”, in Proc. IEEE 11th International NEWCAS Conference, June 16-‐19, 2013, Paris, France.
§ Wassim Itani, Cesar Ghali, Ali Chehab, Ayman Kayssi, Imad Elhajj, “Accountable Energy Monitoring for Green Service Routing in the Cloud,” in Proc. Third International Conference on Communications and Information Technology (ICCIT), June 19-‐21, 2013, Beirut, Lebanon.
§ Alaa Atassi, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman Kayssi, “Low-‐Overhead Anonymous Routing,” in Proc. Third International Conference on Communications and Information Technology (ICCIT), June 19-‐21, 2013, Beirut, Lebanon.
§ Naoum Sayegh, Ali Chehab, Imad H. Elhajj, Ayman Kayssi, “Internal Security Attacks on SCADA Systems,” in Proc. Third International Conference on Communications and Information Technology (ICCIT), June 19-‐21, 2013, Beirut, Lebanon.
§ Ramzi Bassil, Imad H. Elhajj, Ali Chehab, Ayman Kayssi, “A Resource Reservation Attack against LTE Networks,” in Proc. Third International Conference on Communications and Information Technology (ICCIT), June 19-‐21, 2013, Beirut, Lebanon.
§ K. Baraka, M. Ghobril, S. Malek, R. Kanj, and A. Kayssi, “Low-‐Cost Arduino/Android-‐Based Energy-‐Efficient Home Automation System with Smart Task,” in Proc. 5th International Conference on Computational Intelligence, Communication Systems and Networks, June 5-‐7, Madrid, Spain.
§ Khodor Hamandi, Imad Sarji, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi, “W-‐AKA: Privacy-‐Enhanced LTE-‐AKA Using Secured Channel over Wi-‐Fi”, in Proc. 12th Annual Wireless Telecommunications Symposium (WTS 2013), April 17-‐29, 2013, Phoenix, Arizona, USA.
§ R. Bassil, I. H. Elhajj, A. Chehab, and A. Kayssi, “Effects of Signaling Attacks on LTE Networks,” in Proc. Ninth International Workshop on Heterogeneous Wireless Networks (HWISE), Barcelona, Spain, March 25-‐28, 2013.
§ A. Atassi, N. Sayegh, I. Elhajj, A. Chehab, and A. Kayssi, “Malicious Node Detection in Wireless Sensor Networks,” in Proc. Ninth International Workshop on Heterogeneous Wireless Networks (HWISE), Barcelona, Spain, March 25-‐28, 2013.
§ K. Hamandi, I. Sarji, A. Chehab, I. H. Elhajj, and A. Kayssi, “Privacy Enhanced and Computationally Efficient HSK-‐AKA LTE Scheme,” in Proc. Ninth International Symposium on Frontiers of Information Systems and Network Applications (FINA), Barcelona, Spain, March 25-‐28, 2013.
§ K. Hamandi, A. Kayssi, A. Chehab, and I. H. Elhajj, “Android SMS Malwares: Vulnerability and Mitigation,” in Proc. Ninth International Symposium on Frontiers of Information Systems and Network Applications (FINA), Barcelona, Spain, March 25-‐28, 2013.
§ S. Abdallah, A. Chehab, I. Elhajj, and A. Kayssi, “Stochastic Hardware Architectures: A Survey,” in Proc. International Conference on Energy Aware Computing, North Cyprus, December 3-‐5, 2012.
§ F. Saab, I. Elhajj, A. Chehab, and A. Kayssi, “Energy Efficient JPEG Using Stochastic Processing,” in Proc. International Conference on Energy Aware Computing, North Cyprus, December 3-‐5, 2012.
§ K. Hamandi, I. H. Elhajj, A. Chehab, and A. Kayssi, “Android SMS Botnet: A New Perspective,” in Proc. 10th ACM International Symposium on Mobility Management and Wireless Access (MOBIWAC), pp. 125-‐129, Paphos, Cyprus Island, October 21-‐25, 2012.
Curriculum Vitae: Ayman Kayssi
Page 5 | [email protected]
§ R. Bassil, A. Chehab, I. H. Elhajj, and A. Kayssi, “Signaling Oriented Denial of Service on LTE Networks,” in Proc. 10th ACM International Symposium on Mobility Management and Wireless Access (MOBIWAC), pp. 153-‐157, Paphos, Cyprus Island, October 21-‐25, 2012.
§ A. Tajeddine, A. Chehab, and A. Kayssi, “CENTER: A Centralized Trust-‐Based Efficient Routing Protocol for Wireless Sensor Networks,” in Proc. 10th Annual Conference on Privacy, Security and Trust (PST 2012), July 16-‐18, 2012, Paris, France.
§ K. Hamandi, F. Saab, and A. Kayssi, “Enhanced Multi-‐rate Multicast for Optimal User Satisfaction and Efficient Bandwidth Utilization,” in Proc. 11th IEEE International Conference on Ubiquitous Computing and Communications, June 25-‐27, 2012, Liverpool, UK.
§ S. Abdallah, E. Najjar, and A. Kayssi, “A Round Robin Load Balancing and Redundancy Protocol for Network Routers,” in Proc. 11th IEEE International Conference on Ubiquitous Computing and Communications, June 25-‐27, 2012, Liverpool, UK.
§ M. Dabbagh, N. Sayegh, and A. Kayssi, “Efficient Internet Mapping in the Presence of Network Load Balancers,” in Proc. 11th IEEE International Conference on Ubiquitous Computing and Communications, June 25-‐27, 2012, Liverpool, UK.
§ R. Bassil, R. Hobeica, W. Itani, C. Ghali, A. Kayssi, and A. Chehab, “Security Analysis and Solution for Thwarting Cache Poisoning Attacks in the Domain Name System,” in Proc. 19th International Conference on Telecommunications (ICT), Jounieh, Lebanon, April 23-‐25, 2012.
§ M. Dikmak, Z. Sabra, A. Kayssi, and A. Chehab, “Optimized Conditional Privacy Preservation in VANETs,” in Proc. 19th International Conference on Telecommunications (ICT), Jounieh, Lebanon, April 23-‐25, 2012.
§ W. Itani, C. Ghali. R. Bassil, A. Kayssi, and A. Chehab, “BGP-‐Inspired Autonomic Service Routing for the Cloud,” in Proc. ACM SAC 2012, March 26-‐30, 2012, Trento, Italy.
§ A. Fawaz, A. Jaber, A. Kassem, A. Chehab, and A. Kayssi, “Assessing Testing Techniques for Resistive-‐Open Defects in Nanometer CMOS Adders,” in Proc. IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2011), December 11-‐14, 2011, Beirut, Lebanon.
§ L. Hamieh, N. Mehdi, G. Omeirat, A. Chehab, and A. Kayssi, “The Effectiveness of Delay and IDDT Tests in Detecting Resistive Open Defects for Nanometer CMOS Adder Circuits,” in Proc. 6th International IEEE Design and Test Workshop (IDT 2011), December 11-‐14, 2011, Beirut, Lebanon.
§ R. Bassil, W. El-‐Beaino, A. Kayssi, and A. Chehab, “A PUF-‐Based Ultra-‐Lightweight Mutual-‐Authentication RFID Protocol,” in Proc. 6th International Conference for Internet Technology and Secured Transactions (ICITST-‐2011), December 11-‐14, 2011, Abu Dhabi, UAE.
§ S. A. Saab, A. Kayssi, and A. Chehab, “A Decentralized Energy-‐Aware Key Management Scheme for Wireless Sensor Networks,” in Proc. 6th International Conference for Internet Technology and Secured Transactions (ICITST-‐2011), December 11-‐14, 2011, Abu Dhabi, UAE.
§ S. Saab, W. Itani, A. Kayssi, A. Chehab, and C. Ghali, “Secure Delay-‐Tolerant Communications in the Presence of Oppressive Governments,” in Proc. 6th International Conference for Internet Technology and Secured Transactions (ICITST-‐2011), December 11-‐14, 2011, Abu Dhabi, UAE.
§ F. Hamady, A. Chehab, and A. Kayssi, “Energy Consumption Breakdown of a Modern Mobile Platform under Various Workloads,” in Proc. Second Annual International Conference on Energy Aware Computing (ICEAC 2011), Organized by the Middle East Energy Efficiency Research Center (MER), November 30 -‐ December 2, 2011, Istanbul, Turkey.
§ W. Itani, A. Chehab, and A. Kayssi, “Energy-‐Efficient Platform-‐as-‐a-‐Service Security Provisioning in the Cloud,” in Proc. Second Annual International Conference on Energy Aware Computing (ICEAC 2011), Organized by the Middle East Energy Efficiency Research Center (MER), November 30 -‐ December 2, 2011, Istanbul, Turkey.
§ Z. Moudallal, I. Issa, M. Mansour, A. Chehab, and A. Kayssi, “A Low-‐Power Methodology for Configurable Wide Kogge-‐Stone Adders,” in Proc. Second Annual International Conference on Energy Aware Computing (ICEAC 2011), Organized by the Middle East Energy Efficiency Research Center (MER), November 30 -‐ December 2, 2011, Istanbul, Turkey.
§ S. A. Saab, A. Chehab, and A. Kayssi, “Energy Efficiency in Mobile Cloud Computing: Total Offloading Selectively Works. Does Selective Offloading Totally Work?” in Proc. Second Annual International Conference on Energy Aware Computing (ICEAC 2011), Organized by the Middle East Energy Efficiency Research Center (MER), November 30 -‐ December 2, 2011, Istanbul, Turkey.
Curriculum Vitae: Ayman Kayssi
Page 6 | http://www.aub.edu.lb/~ayman
§ I. Sarji, C. Ghali, A. Chehab, and A. Kayssi, “CloudESE: Energy Efficiency Model for Cloud Computing Environments,” in Proc. Second Annual International Conference on Energy Aware Computing (ICEAC 2011), Organized by the Middle East Energy Efficiency Research Center (MER), November 30 -‐ December 2, 2011, Istanbul, Turkey.
§ A. Tajeddine, A. Chehab, and A. Kayssi, “H-‐TRACE: A Hybrid Energy-‐Aware Routing Scheme for Mobile Ad Hoc Networks,” in Proc. Second Annual International Conference on Energy Aware Computing (ICEAC 2011), Organized by the Middle East Energy Efficiency Research Center (MER), November 30 -‐ December 2, 2011, Istanbul, Turkey.
§ I. Nahlus, L. Shaer, A. Chehab, A. Kayssi, and M. Mansour, “Low-‐Power Adder Design Techniques for Noise-‐Tolerant Applications,” in Proc. IEEE Workshop on Signal Processing Systems (SiPS 2011), October 4-‐7, 2011, Beirut, Lebanon.
§ W. Itani, A. Kayssi, and A. Chehab, “Policy-‐Based Security Channels for Protecting Network Communication in Mobile Cloud Computing,” in Proc. International Workshop on Model-‐Based and Policy-‐Based Engineering in Information Security (MPEIS 2011), July 18-‐21, 2011, Seville, Spain.
§ C. Ghali, F. Hamady, I. Elhajj, and A. Kayssi, “Matryoshka: Tunneled Packets Breaking the Rules,” in Proc. IEEE International Wireless Communications and Mobile Computing Conference (IWCMC 2011), July 5-‐8, 2011, Istanbul, Turkey.
§ A. Tajeddine, A. Kayssi, and A. Chehab, “TRACE: A Centralized Trust and Competence-‐Based Energy-‐Efficient Routing Scheme for Wireless Sensor Networks,” in Proc. IEEE International Wireless Communications and Mobile Computing Conference (IWCMC 2011), July 5-‐8, 2011, Istanbul, Turkey.
§ M. Dabbagh, H. Hajj, A. Chehab, W. El Hajj, A. Kayssi, and M. Mansour, “A Design Methodology for Energy Aware Neural Networks,” in Proc. IEEE International Wireless Communications and Mobile Computing Conference (IWCMC 2011), July 5-‐8, 2011, Istanbul, Turkey.
§ F. Hamady, N. Bisher, A. Kayssi, and C. Ghali, “MAConf: Passive Layer-‐2 Detection Mechanism for Mobile Wireless Sensor Networks,” in Proc. Second International Workshop on Interconnections of Wireless Sensor Networks (IWSN 2011), June 29, 2011, Barcelona, Spain.
§ W. Itani, C. Ghali, A. Kayssi, and A. Chehab, “Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing,” in Proc. International Conference on Cloud Computing and Services Science (CLOSER 2011), May 7-‐9, 2011, Noordwijkerhout, The Netherlands.
§ S. Khaddaj, K. Joujou, A. Kayssi, and K. Kabalan, “DSP Experiments and Design Project in an Introduction to ECE Course at the American University of Beirut,” in Proc. 2011 IEEE 14th DSP Workshop & 6th SPE Workshop, January 4-‐7, 2011, Sedona, AZ.
§ F. Yahya, M. Mansour, A. Kayssi, and H. Hajj, “Using BIST Circuitry to Measure DRV of Large SRAM Arrays,” in Proc. First Annual International Conference on Energy Aware Computing (ICEAC 2010), Organized by the Middle East Energy Efficiency Research Center (MER), December 16-‐18, 2010, Cairo, Egypt.
§ M. Kassem, M. Mansour, A. Chehab, and A. Kayssi, “Low-‐Power Design of SRAM Based PUFs,” in Proc. First Annual International Conference on Energy Aware Computing (ICEAC 2010), Organized by the Middle East Energy Efficiency Research Center (MER), December 16-‐18, 2010, Cairo, Egypt.
§ F. Hamady, M. Sabra, Z. Sabra, A. Kayssi, A. Chehab, and M. Mansour, “Enhancement of the SMAC Protocol for Wireless Sensor Networks,” in Proc. First Annual International Conference on Energy Aware Computing (ICEAC 2010), Organized by the Middle East Energy Efficiency Research Center (MER), December 16-‐18, 2010, Cairo, Egypt.
§ A. Tajeddine, A. Kayssi, and A. Chehab, “A Centralized Energy-‐Aware Trust-‐Based Routing Scheme for Wireless Sensor Networks,” in Proc. First Annual International Conference on Energy Aware Computing (ICEAC 2010), Organized by the Middle East Energy Efficiency Research Center (MER), December 16-‐18, 2010, Cairo, Egypt.
§ W. Itani, A. Kayssi, and A. Chehab, “Energy-‐Efficient Incremental Integrity for Securing Storage in Mobile Cloud Computing,” in Proc. First Annual International Conference on Energy Aware Computing (ICEAC 2010), Organized by the Middle East Energy Efficiency Research Center (MER), December 16-‐18, 2010, Cairo, Egypt.
§ M. Fawaz, N. Kobrosli, J. Rizkallah, M. Mansour, A. Chehab, A. Kayssi, and H. Hajj, “Energy Minimization Feedback Loop for Ripple Carry Adders,” in Proc. First Annual International Conference on Energy Aware Computing (ICEAC 2010), Organized by the Middle East Energy Efficiency Research Center (MER), December 16-‐18, 2010, Cairo, Egypt.
Curriculum Vitae: Ayman Kayssi
Page 7 | [email protected]
§ M. Fawaz, N. Kobrosli, A. Chkeir, A. Chehab, and A. Kayssi, “Transient Current and Delay Analysis for Resistive-‐Open Defects in Future 16 nm CMOS Circuits,” in Proc. IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2010), December 12-‐15, 2010, Athens, Greece.
§ M. Fawaz, N. Kobrosli, A. Chehab, and A. Kayssi “Testing Techniques for Resistive-‐Open Defects in Future CMOS Technologies,” in Proc. IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2010), December 6-‐9, 2010, Kuala Lumpur, Malaysia.
§ W. Itani, A. Tajeddine, A. Kayssi, and A. Chehab, “Slow But Certain Wins the Race: Authenticated Bundle Communication in Delay Tolerant Networks,” in Proc. 6th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, October 17-‐21, 2010, Bodrum, Turkey.
§ W. Itani, C. Ghali, A. El Hajj, A. Kayssi, and A. Chehab, “SinPack: A Security Protocol for Preventing Pollution Attacks in Network-‐Coded Content Distribution Networks, ” in Proc. IEEE Globecom -‐ Communication & Information System Security, December 6-‐10, 2010, Miami, Florida, USA.
§ C. Ghali, A. Kayssi, and A. Chehab, “CATRAC: Context-‐Aware Trust-‐ and Role-‐Based Access Control for Composite Web Services,” in Proc. Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-‐10), June 29-‐July 1, 2010, Bradford, UK.
§ A. Tajeddine, A. Kayssi, and A. Chehab, “A Privacy-‐Preserving Trust Model for VANETs,” in Proc. Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-‐10), June 29-‐July 1, 2010, Bradford, UK.
§ B. R. Saab, B. Tabshouri, M. El Habbal, M. El Moghrabi, O. Monajjed, and A. Kayssi, “An Electronic Gadget for Excisional Biopsies,” in Proc. 19th WONCA World Conference, May 19-‐23, 2010, Cancun, Mexico.
§ S. Wehbi, A. Kayssi, A. Chehab, and I. Elhajj, “Mutual Authentication Scheme for EPC Tags-‐Readers in the Supply Chain,” in Proc. Third International Conference on New Technologies, Mobility and Security (NTMS 2009), December 20-‐23, 2009, Cairo, Egypt.
§ W. Itani, A. Kayssi, and A. Chehab, “Privacy as a Service: Privacy-‐Aware Data Storage and Processing in Cloud Computing Architectures,” in Proc. 2009 International Workshop on Security in Cloud Computing (SCC'09), in conjunction with PICom'09, December 12-‐14, 2009, Chengdu, China.
§ M. Abou Rjeily, A. Chehab, and A. Kayssi, “Transient Current Testing for Future CMOS Technologies,” in Proc. 4th IEEE International Design and Test Workshop, November 15-‐17, Riyadh, Saudi Arabia.
§ A. Ghandour, K. Fawaz, A. Chehab, and A. Kayssi, “Wavelet Transform-‐Based Transient Current Analysis for Detection of Gate-‐Oxide Shorts in CMOS,” in Proc. 4th IEEE International Design and Test Workshop, November 15-‐17, Riyadh, Saudi Arabia.
§ C. Serhal, A. Chehab, and A. Kayssi , “Clustering Techniques for Improving Transient Current Testing,” in Proc. 4th IEEE International Design and Test Workshop, November 15-‐17, Riyadh, Saudi Arabia.
§ S. Chehade, A. Chehab, and A. Kayssi, “Modeling of Gate Oxide Short Defects in MOSFETS,” in Proc. 4th IEEE International Design and Test Workshop, November 15-‐17, Riyadh, Saudi Arabia.
§ W. Itani, A. Kayssi, and A. Chehab, “PETRA: A Secure and Energy-‐Efficient Software Update Protocol for Severely-‐Constrained Network Devices,” in Proc. 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, October 26-‐30, 2009, Tenerife, Spain.
§ M. El Habbal, M. El Moghrabi, O. Monajjed, and A. Kayssi, “Automated Device for Determination of Skin Lesion Regions,” in Proc. ACM SAC 2009, March 8-‐12, 2009, Honolulu, HI.
§ H. Daou, A. Kayssi, and A. Chehab, “RFID Security Protocols,” in Proc. Fifth International Conference on Innovations in Information Technology (IIT'08), December 16-‐18, 2008, Al-‐Ain, UAE.
§ R. Deghaili, A. Chehab, and A. Kayssi, “Trust-‐Privacy Tradeoffs in Distributed Computing,” in Proc. Fifth International Conference on Innovations in Information Technology (IIT'08), December 16-‐18, 2008, Al-‐Ain, UAE.
§ B. Haidar, A. Chehab, and A. Kayssi, “Host Protection in Grid Computing,” in Proc. Fifth International Conference on Innovations in Information Technology (IIT'08), December 16-‐18, 2008, Al-‐Ain, UAE.
§ A. Chehab, A. Kayssi, and A. Ghandour, “Transient Current Testing of Gate-‐Oxide Shorts in CMOS,” in Proc. International Design and Test Workshop, Dec. 16 -‐ 18, 2007, Cairo, Egypt.
§ Z. Radwan, C. Gaspard, A. Kayssi, and A. Chehab, “XPRIDE: Policy-‐Driven Web Services Security Based on XML Content,” in Proc. 50th IEEE GLOBECOM, Nov. 26 -‐ 30, 2007, Washington, DC.
§ W. Itani, A. Kayssi, and A. Chehab, “An Efficient and Scalable Security Protocol for Protecting Fixed-‐Content Objects in Content Addressable Storage Architectures,” in Proc. 3rd International Workshop on the Value of Security through Collaboration (SECOVAL 07), Sep. 17, 2007, Nice, France.
§ L. Srour, A. Kayssi, and A. Chehab, “Personalized Web Page Ranking Using Trust and Similarity,” in Proc. ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), May 13-‐16, 2007, Amman, Jordan.
Curriculum Vitae: Ayman Kayssi
Page 8 | http://www.aub.edu.lb/~ayman
§ C. Gaspard, B. Haidar, A. Kayssi, and A. Chehab, "SmartSSL: Efficient Policy-‐Based Web Security,” in Proc. ACS/IEEE International Conference on Computer Systems and Applications (AICCSA), May 13-‐16, 2007, Amman, Jordan
§ W. Itani, A. Kayssi, and Ali Chehab, “SECERN: A Secure Enterprise Backup and Recovery Protocol for Mission-‐Critical Relational Database Servers,” in Proc. Third International Conference on Innovations in Information Technology (IIT'06), November 19-‐21, 2006, Dubai, UAE.
§ C. Gaspard, A. Kayssi, and A. Chehab, “ODYSSEY: Policy-‐Driven Anonymizer for Handheld Wireless Devices Privacy,” in Proc. Third International Conference on Innovations in Information Technology (IIT'06), November 19-‐21, 2006, Dubai, UAE.
§ W. Itani, C. Gaspard, A. Kayssi, and A. Chehab, “PRIDE: Policy-‐Driven Web Security for Handheld Wireless Devices,” in Proc. 49th IEEE GLOBECOM, Nov. 27 -‐ Dec. 1, 2006, San Francisco, CA.
§ L. Srour, A. Kayssi, and A. Chehab, “Reputation-‐Based Algorithm for Managing Trust in Gnutella Networks,” in Proc. 2nd Workshop on the Value of Security through Collaboration (SECOVAL 06), Sep. 2, 2006, Baltimore, MD.
§ A. Nazer, A. Chehab, and A. Kayssi, “Dynamic Current Testing for CMOS Domino Circuits,” in Proc. 49th IEEE Int'l Midwest Symposium on Circuits Systems (MWSCAS 2006), August 2006, Puerto Rico.
§ W. Itani, A. Kayssi, and A. Chehab, “An Enterprise Policy-‐Based Security Protocol for Protecting Relational Database Network Objects,” in Proc. International Wireless Communications and Mobile Computing Conference -‐ Computer and Network Security Symposium, July 2006, Vancouver, Canada.
§ R. El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy, “DAWWSEN: A Defense Mechanism Against Wormhole Attacks in Wireless Sensor Networks,” in Proc. Second International Conference on Innovations in Information Technology, September 2005, Dubai, UAE.
§ R. Wehbi, A. Kayssi, A. Chehab, and Z. Dawy, “SERVEN: Network Setup for Secure Routing in Inter-‐Vehicle Communication (IVC) Networks,” in Proc. Second International Conference on Innovations in Information Technology, September 2005, Dubai, UAE.
§ Y. Shaer, A. Kayssi, and A. Chehab, “SERAX: Secure Range Extensions in IEEE 802.11i,” in Proc. Second International Conference on Innovations in Information Technology, September 2005, Dubai, UAE.
§ A. Dalghan, A. Chehab, and A. Kayssi, “WiSec: VPN over WLAN 802.11 -‐ Design and Implementation of a Secure Virtual Wireless Environment,” in Proc. Second International Conference on Innovations in Information Technology, September 2005, Dubai, UAE.
§ A. Tajeddine, A. Kayssi, A. Chehab, and H. Artail, “A Comprehensive Reputation-‐Based Trust Model for Distributed Systems,” in Proc. IEEE/CreateNet SECOVAL Workshop, September 2005, Athens, Greece.
§ W. Itani, A. Kayssi, and A. Chehab, “Short Paper: PATRIOT – a Policy-‐Based, Multi-‐level Security Protocol for Safekeeping Audit Logs on Wireless Devices,” in Proc. IEEE/CreateNet First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), September 2005, Athens, Greece.
§ W. Itani, A. Kayssi, and A. Chehab, “SPARTA: a Secure, Policy-‐Driven Architecture for Content Distribution and Storage in Centralized Wireless Networks,” in Proc. Fist International Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing (SecPerU'05), July 2005, Santorini, Greece.
§ A. Nazer, A. Chehab, A. Kayssi, and R. Makki, “Evaluation of iDDT Testing for CMOS Domino Circuits,” in Proc. IEEE International Workshop on Current and Defect Based Testing (DBT 2005), May 2005, Palm Springs, CA.
§ S. Kumar, S. Thomas, R. Makki, A. Chehab and A. Kayssi, “Simulation Modeling and Testing of SRAMs Using Dynamic Current,” in Proc. IEEE International Workshop on Current and Defect Based Testing (DBT 2005), May 2005, Palm Springs, CA.
§ S. Itani, N. Aaraj, D. Abdelahad, and A. Kayssi, “Neighbor Stranger Discrimination: A New Defense Mechanism Against Internet DDoS Attacks,” in Proc. 3rd ACS/IEEE International Conference on Computer Systems and Applications, January 2005, Cairo, Egypt.
§ A. Chehab, A. Kayssi, A. Nazer, and N. Aaraj, “Transient Current Testing of Dynamic CMOS Circuits in the Presence of Leakage and Process Variation,” in Proc. 2004 International Conference on Microelectronics, December 2004, Tunis, Tunisia.
Curriculum Vitae: Ayman Kayssi
Page 9 | [email protected]
§ T. Hassan, A. Kayssi, and A. Chehab, “New Dynamic Routing and Adaptive Scheduling Schemes for Bluetooth Ring Scatternets,” in Proc. 2004 International Research Conference on Innovations in Information Technology, pp. 14 -‐ 22, October 2004, Dubai, UAE.
§ M. Eid, H. Artail, A. Chehab, and A. Kayssi, “An Adaptive Intrusion Detection and Defense System Based on Mobile Agents,” in Proc. 2004 International Research Conference on Innovations in Information Technology, pp. 14 -‐ 22, October 2004, Dubai, UAE.
§ S. Hanna, A. Chehab, A. Kayssi, and H. Artail, “Lighter Weight Mobile Agent System,” in Proc. 2004 International Research Conference on Innovations in Information Technology, pp. 14 -‐ 22, October 2004, Dubai, UAE.
§ A. Fares, A. Khachan, A. Bakri Kasbah, M. Zeidan, and A. Kayssi, “GSM RF Equipment Testing and Performance Analysis,” in Proc. IEEE International Symposium on Communications and Information Technologies 2004, pp. 73 -‐ 77, October 2004, Sapporo, Japan.
§ N. Aaraj, A. Nazer, A. Chehab, and A. Kayssi, “Transient Current Testing of Dynamic CMOS Circuits,” in Proc. IEEE 19th International Symposium on Defect and Fault Tolerance in VLSI Systems, pp. 264 -‐ 271, October 2004, Cannes, France.
§ G. Derbas, A. Kayssi, H. Artail, and A. Chehab, “TRUMMAR -‐ A Trust Model for Mobile Agent Systems Based on Reputation,” in Proc. IEEE/ACS International Conference on Pervasive Services, pp. 95 -‐ 104, July 2004, Beirut, Lebanon.
§ A. Chehab, A. Kayssi, A. Nazer, and R. Makki, “An Improved Method for iDDT Testing in the Presence of Leakage and Process Variation,” in Proc. IEEE International Workshop on Defect Based Testing, pp. 11 -‐ 16, April 2004, Napa, California.
§ W. Itani and A. Kayssi, “SPECSA: a Scalable, Policy-‐driven, Extensible, and Customizable Security Architecture for Wireless Enterprise Applications,” in Proc. IEEE IPCCC Worshop on Information Assurance, pp. 753 -‐ 760, April 2004, Phoenix, Arizona.
§ A. Kayssi and A. El-‐Haj-‐Mahmoud, “EmuNET: A Real-‐Time Network Emulator,” in Proc. 19th ACM Symposium on Applied Computing Special Track on Computer Networks (ACM SAC-‐CN 2004), pp. 357 -‐ 362, March 2004, Nicosia, Cyprus.
§ M. Azarian, N. Knudsen, and A. Kayssi, “Software Linearization of D/A Converters,” in Proc. 46th IEEE Midwest Symposium on Circuits and Systems (MWCAS 2003), December 2003, Cairo, Egypt.
§ T. Hassan and A. Kayssi, “Ring of Masters (ROM): A New Ring Structure for Bluetooth Scatternets,” in Proc. 46th IEEE Midwest Symposium on Circuits and Systems (MWCAS 2003), December 2003, Cairo, Egypt.
§ M. Nizam, M. Hajo, K. Merhi, A. Kayssi, and M. Zeidan, “Bluetooth RF Layer Simulation Using LabVIEW,” in Proc. WNCG First Annual Wireless Networking Symposium, October 2003, Austin, Texas.
§ N. Naoufal, M. Shell, H. Abdelnoor, A. El-‐Haj-‐Mahmoud, A. Kayssi, and A. Chehab, “Distributed Network Emulator with Graphical User Interface,” in Proc. IASTED International Conference on Communication Systems and Networks (CSN 2003), pp. 391 -‐ 395, September 2003, Malaga, Spain.
§ R. Dahrouj, W. Renno, T. Tohme, A. Chehab, and A. Kayssi, “SONET Frame Generator for Test-‐bench Applications,” in Proc. IASTED International Conference on Communication Systems and Networks (CSN 2003), pp. 445 -‐ 449, September 2003, Malaga, Spain.
§ A. Kayssi, H. Karaki, and W. Abu-‐Khraybeh, “RTP-‐Based Caching of Streaming Media,” in Proc. IEEE International Symposium on Computers and Communication (ISCC 2003), pp. 1067 -‐ 1071, June 2003, Kemer-‐Antalya, Turkey.
§ W. Itani and A. Kayssi, “J2ME End-‐to-‐End Security for M-‐Commerce”, in Proc. IEEE Wireless Communications and Networking Conference (WCNC 2003), pp. 2015 -‐ 2020, March 2003, New Orleans, Louisiana.
§ S. Karaki, A. Kayssi, B. Abdouni, and M. Raad, “Capacitor Placement Using Genetic Algorithms to Reduce Switching Noise,” in Proc. 14th International Conference on Microelectronics (ICM 2002), pp. 242 -‐ 246, December 2002, Beirut, Lebanon.
§ L. Harik and A. Kayssi, “FPGA-‐Based Load Balancer for Internet Servers,” in Proc. 14th International Conference on Microelectronics (ICM 2002), pp. 190 -‐ 193, December 2002, Beirut, Lebanon.
Curriculum Vitae: Ayman Kayssi
Page 10 | http://www.aub.edu.lb/~ayman
§ S. Itani and A. Kayssi, “Securing Mobile Banking Transactions Using WAP Application-‐Layer Security,” in Proc. IASTED International Conference on Communication Systems and Networks (CSN 2002), pp. 416 -‐ 420, September 2002, Malaga, Spain.
§ R. Khalaf, A. El-‐Haj-‐Mahmoud, and A. Kayssi, “Performance Comparison of The AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks,” in Proc. IASTED International Conference on Communication Systems and Networks (CSN 2002), pp. 41 -‐ 46, September 2002, Malaga, Spain.
§ A. Kayssi, L. Harik, and R. Ferzli, “FPGA-‐Based Internet Protocol Firewall Chip,” in Proc. IEEE International Conference on Electronics, Circuits, and Systems (ICECS 2000), pp. 316 -‐ 319, vol. 1, December 2000, Kaslik, Lebanon.
§ M. El-‐Helou, A. Kayssi, and M. Badran, “Phinique: An Intelligent Web Agent,” in Proc. Fourth International Conference on Recent Trends in Computer Science Applications and Information Systems, July 1999, Amman, Jordan.
§ M. Badran, S. Louis, F. Khoury, and A. Kayssi, “Modular Distributed Computing,” in Proc. International Conference on Scientific Computation, March 1999, Beirut, Lebanon.
§ J. Liu, R. Z. Makki, and A. Kayssi, “Dynamic Power Supply Current Testing of CMOS SRAMs,” in Proc. Seventh Asian Test Symposium (ATS '98), pp. 348 -‐ 353, December 1998, Singapore.
§ M. Mansour and A. Kayssi, “FPGA-‐Based Internet Protocol Version 6 Router,” in Proc. 1998 International Conference on Computer Design (ICCD '98), pp. 334 -‐ 339, October 1998, Austin, Texas.
§ V. Chandramouli, A. Kayssi, and K. Sakallah, “Signal Delay in Coupled, Distributed RC Lines in the Presence of Temporal Proximity,” in Proc. 17th Conference on Advanced Research in VLSI (ARVLSI ’97), pp. 32 -‐ 46, September 1997, Ann Arbor, Michigan.
§ A. Kassem, A. Kayssi, J. Davidson, J. Houle, and M. Mansour, “Simulation and Implementation of DCT for Image Processing Applications,” in Proc. Second LAAS International Conference on Computer Simulation, pp. 451 -‐ 454, September 1997, Beirut, Lebanon.
§ J. Liu, R. Z. Makki, A. Kayssi, and S. T. Su, “An Economical Method for Detecting Disturb Faults in CMOS SRAMs,” in Proc. Workshop on Economics of Test, International Test Conference (ITC ‘96), pp. 39 -‐ 47, October 1996, Washington, DC.
§ A. Kayssi, “Macromodeling C-‐ and RC-‐Loaded CMOS Inverters for Timing Analysis”, in Proc. Sixth Great Lakes Symposium on VLSI (GLSVLSI ‘96), pp. 272 -‐ 276, March 1996, Ames, Iowa.
§ A. Kayssi and K. A. Sakallah, “Macromodeling and Simulation of RC Interconnection Circuits,” in Proc. First LAAS International Conference on Computer Simulation, pp. 207 -‐ 212, September 1995, Beirut, Lebanon.
§ A. Kayssi and K. A. Sakallah, “Macromodel Simplification Using Dimensional Analysis,” in Proc. IEEE International Symposium on Circuits and Systems (ISCAS '94), vol. 1, pp. 335 -‐ 338, May 1994, London, England.
§ A. Kayssi and K. A. Sakallah, “Delay Modeling for GaAs DCFL Circuits,” in Proc. IEEE GaAs IC Symposium, pp. 67 -‐ 70, October 1993, San Jose, California.
§ R. B. Brown, P. Barker, A. Chandna, T. R. Huff, A. I. Kayssi, R. J. Lomax, T. N. Mudge, D. Nagle, K. A. Sakallah, P. J. Sherhart, R. Uhlig, and M. Upton, “GaAs RISC Processors,” in Proc. IEEE GaAs IC Symposium, pp. 81 -‐ 84, October 1992, Miami Beach, Florida.
§ A. Kayssi and K. A. Sakallah, “Delay Macromodels for the Timing Analysis of GaAs DCFL,” in Proc. European Design Automation Conference (EuroDAC), pp. 142 -‐ 145, September 1992, Hamburg, Germany.
§ A. Kayssi, K. A. Sakallah, R. B. Brown, R. J. Lomax, T. N. Mudge, and T. R. Huff, “The Impact of MCMs on System Performance Optimization,” in Proc. IEEE International Symposium on Circuits and Systems (ISCAS '92), pp. 919 -‐ 922, May 1992, San Diego, California.
§ A. Kayssi and K. A. Sakallah, “Delay Macromodels for Point-‐to-‐Point MCM Interconnections,” in Proc. Multi-‐chip Module Conference (MCMC-‐92), pp. 79 -‐ 82, March 1992, Santa Cruz, California.
§ A. Kayssi, K. A. Sakallah, R. B. Brown, R. J. Lomax, T. N. Mudge and T. R. Huff, “Impact of MCM's on System Performance,” in Proc. MCM Workshop, pp. 58 -‐ 65, March 1991, Santa Cruz, California.
§ T. N. Mudge, R. B. Brown, W. P. Birmingham, J. A. Dykstra, A. I. Kayssi, R. J. Lomax, O. A. Olukotun, and K. A. Sakallah, “The Design of a GaAs Microsupercomputer,” in Proc. 24th Annual Hawaii International Conference on System Sciences, pp. 421 -‐ 432, vol. 1, January 1991, Hawaii.
Curriculum Vitae: Ayman Kayssi
Page 11 | [email protected]
External Grants and Contracts Feb. 2009 – Feb. 2014 Design Methodologies of Power Aware Intel 490,000 USD Software and Hardware Architectures for Parallel Platforms with Profs. H. Akkary, M. Awad, A. Chehab, H. Hajj, and M. Mansour Jun. 2013 – Jun. 2014 Trust Providers for BYOD and Cloud Services TELUS 50,000 USD Enhanced by Crowdsourcing with Prof. I. Elhajj and A. Chehab Jan. 2012 – Dec. 2013 Wireless Signaling: Vulnerabilities, Detection TELUS 100,000 USD and Mitigation with Prof. I. Elhajj and A. Chehab Jul. 2012 – Jun. 2013 CPE Security Scorecard and Evaluation TELUS 30,000 USD with Prof. I. Elhajj and A. Chehab Jan. 2012 – Feb. 2013 BGP-‐Inspired Autonomic Service Routing for Lebanese NCSR 10,500,000 LL Multi-‐Provider Composite SaaS Architectures in Cloud Computing Jan. 2010 – Dec. 2010 Privacy-‐Preserving Trust-‐Based System Lebanese NCSR 9,000,000 LL for VANET Security Oct. 2008 – Sep. 2009 Security Mechanisms for RFID Systems Lebanese NCSR 8,000,000 LL Mar. 2008 – Feb. 2009 Problem-‐Solving Web Forum IEEE Foundation 20,000 USD with Profs. Imad Elhajj and Ali Chehab Jul. 2005 – Jan. 2011 Wireless Security Protocols Sun Microsystems / ACT 10,000 USD with Prof. Ali Chehab Jan. 2006 – Jan. 2008 An Enterprise Policy-‐Based Security Architecture Rathman Foundation 14,500 USD with Prof. Ali Chehab Dec. 2006 – Dec. 2007 IBM Faculty Award IBM 15,000 USD with Profs. Ali El-‐Hajj and Fouad Mrad Dec. 2006 – Nov. 2007 Policy-‐Driven Security Protocol Lebanese NCSR 13,000,000 LL with Prof. Ali Chehab and Prof. Ramzi Haraty (LAU) Sep. 2004 – Aug. 2007 CITPER EU Tempus JEP 494,000 € with a group of seven other ECE faculty members Jan. 2004 – Aug. 2006 Mediterranean Virtual University EUMEDIS Program 291,000 € with a group of four other ECE faculty members Jul. 2005 – Jun. 2006 Trustworthy Distributed Computing Lebanese NCSR 7,000,000 LL with Prof. Ali Chehab Oct. 2000 – Jun. 2005 Various Instrumentation Projects National Instruments 16,000 USD Apr. 2003 – Nov. 2004 Sensors for Testing Embedded Memories NSF 34,000 USD with Prof. Ali Chehab and Profs Makki and Binkley (UNCC)
Curriculum Vitae: Ayman Kayssi
Page 12 | http://www.aub.edu.lb/~ayman
Jul. 2003 – Jun. 2004 Novel Testing Methods for CMOS Random Logic Lebanese NCSR 5,000,000 LL with Prof. Ali Chehab Feb. 2003 – Mar. 2003 Travel Grant to attend IEEE WCNC LibanCell 6,000 USD Nov. 2002 – Dec. 2002 Equipment Grant (10 workstations) Sun Microsystems 25,000 USD Jan. 2001 – Jun. 2002 Lab Development and Graduate Student Support LibanCell 100,000 USD with other ECE faculty members Nov. 2000 – Jun. 2001 Development of a Telecom Planning Tool Nortel Networks 9,450 USD Jul. 1997 – Jun. 1998 Application of SNMP in Automotive Engineering Lebanese NCSR 8,000,000 LL Apr. 1995 – Dec. 1996 Switching Noise in Printed Circuit Boards Lebanese NCSR 6,000,000 LL Jul. 1996 – Sep. 1996 Current Testing of Digital Systems NSF 25,000 USD with Prof. Rafic Makki (UNCC)
Internal Grants (AUB University Research Board) Jul. 2013 – June 2014 Hardware-‐Based Security and Privacy Solutions for Smartphone Vulnerabilities 6,000 USD Jul. 2011 – June 2012 Dynamic Partitioning for Security and Energy Efficiency in Mobile Cloud Computing 6,300 USD Oct. 2010 – Sep. 2011 Privacy-‐Aware Data Storage and Processing in Cloud Computing Architectures 8,500 USD Oct. 2009 – Sep. 2010 Protection Against Script-‐Based attacks in Computer Networks 4,250 USD Oct. 2008 – Sep. 2009 Trust-‐Privacy Trade-‐offs in Security-‐Sensitive Distributed Applications 5,500 USD Oct. 2007 – Sep. 2008 Testing Nanometer-‐Technology CMOS in the Presence of Leakage & Proc. Var. 8,425 USD with Prof. Ali Chehab Oct. 2006 – Sep. 2007 Transient Current Testing of Gate-‐Oxide Shorts in Large CMOS Circuits 10,500 USD with Prof. Ali Chehab Oct. 2005 – Sep. 2006 Transient Current Testing of Dynamic CMOS in the Presence of Leakage 11,000 USD with Prof. Ali Chehab Oct. 2004 – Sep. 2005 Mobile Agent Frameworks for Enhanced Security 13,500 USD with Profs. Ali Chehab and Hassan Artail Oct. 2003 – Sep. 2004 Architecture for Mobile Agents with XML Transport 16,500 USD with Profs. Ali Chehab and Hassan Artail
Curriculum Vitae: Ayman Kayssi
Page 13 | [email protected]
Oct. 2002 – Sep. 2003 Mobile Commerce End-‐to-‐End Security 5,048 USD Oct. 2000 – Sep. 2002 Design and Implementation of an FPGA-‐Based Load Balancer 9,400 USD Jul.1999 – Sep. 2000 Design and Implementation of an FPGA-‐Based IP Firewall 5,687 USD Jul.1998 – Jun. 1999 Link Management of Multilink PPP Connections 3,900 USD Jul.1997 – Jun. 1998 Load Balancing and Resource Reservation over Multilink PPP 3,800 USD Jul.1996 – Jun. 1997 Analytical Transient Response of MOS Current Mirrors 3,700 USD Jul.1995 – Jun. 1996 Processor Performance Estimation Using Artificial Neural Networks 3,600 USD Jul.1994 – Jun. 1995 Timing Macromodels for Linear Interconnection Circuits 4,000 USD Jul.1993 – Jun. 1994 Timing Macromodels for Interconnection Circuits 2,900 USD
Courses Taught or currently teaching the following undergraduate courses § EECE 200 -‐ Introduction to Electrical and Computer Engineering § EECE 310 -‐ Electronics (was EE 022) § EECE 311 -‐ Electronic Circuits (was EE 042) § EECE 350/450 -‐ Computer Networks (was EE 105C) § ELEG 052 -‐ Digital Electronics § ASST 036 -‐ Numerical Analysis § ELEG 066 -‐ Analog Signals and Systems Analysis
Taught or currently teaching the following graduate courses § EECE 651 -‐ Internet Engineering § EECE 657 -‐ Wireless Security § EECE 675C -‐ Client-‐Server Computing § EECE 684S -‐ Introduction to Digital VLSI Systems § ELEG 720S -‐ Circuit Synthesis and Design § ELEG 787S -‐ CAD for VLSI § ELEG 771C -‐ Data Communication Networks
Supervised or currently supervising the following teaching labs § EECE 310L -‐ Circuits Laboratory § EECE 410L – System Integration Laboratory § EECE 413L -‐ Electronics Laboratory (was EE 311L) § EECE 451L -‐ Internetworking Laboratory (also listed as EECE 651L)
Curriculum Vitae: Ayman Kayssi
Page 14 | http://www.aub.edu.lb/~ayman
Final-‐Year Projects Supervised or currently supervising/co-‐supervising seventy four (78) final year projects for ECE and CCE students (classes of 1993 -‐ 2014). The following students received Dean's Awards for Creative Achievement for their work on their final year projects: § Jean Pierre Fahed, Johnny Yaacoub, Pierre Yaacoub (June 2011) § Maria Abou Rjeili, Fouad Aoun, Eric Abi Younes (June 2009) § Maya Moghrabi, Mohamad El-‐Habbal, Omar Monajjed (June 2008) § Khalil El-‐Khoury, Nicolas Debahy, and Fadi Adwan (June 2003) – project was co-‐supervised with Prof. Mazen
Saghir. § Houda Karaki, Jihad Ibrahim, and Hassane Kamal (June 2002) § Ibtissam El-‐Hajjar, Houssam Fathallah, Basil Ayass, and Rami Farhat (June 2001) § Fadi Kaddoum, Rabih Saad, and Fadi Yousuf (June 2000) § Joseph Samaha, Marc Azar, and Ralph Achkar (June 1998) § Mahmoud El-‐Assir (June 1997)
Master of Engineering Theses Supervised/co-‐supervised or currently supervising/co-‐supervising the Master of Engineering theses of the following students: § Joseph Loutfi § Louma Chaddad § Khodor Hamandi § Farah Saab § Sarah Abdallah § Naoum Sayegh § Imad Sargi § Salwa Adriana Saab § Alaa Atassi § Ramzi Bassil § Faisal Hamady § Cesar Ghali § Soulaf Saab § Saleem Wehbi § Mounira Sayour § Hoda Daou § Rima Deghaili § Lara Srour § Zein Radwan § Youssef Chamoun § Camille Gaspard § Rania Wehbi § Rouba El-‐Kaissi § Elias Nahra § Ayman Tajeddine § Ghada Derbas § Tarek Hassan § Samer Bohsali § Wassim Itani § Louis Harik § Salem Itani
Curriculum Vitae: Ayman Kayssi
Page 15 | [email protected]
§ Mona Taouil § Wissam Abou-‐Khraybeh § Sanaa Sharafeddine § Hadi Hazim § Marwan El-‐Helou § Fidaa Farhat § Mohamad Mansour
PhD Students Supervised/co-‐supervised or currently supervising/co-‐supervising the following PhD students: § Hadi Sarieddine § Tarek Bohsali § Raghid Morcel § Ayman Tajeddine § Wassim Itani (graduated in February 2012)
Service to ECE Department § Member, ECE ad-‐hoc committee on CAVC Oct. 2009 – present
§ Member, ECE ad-‐hoc committee on Networks Oct. 2009 – present
§ Chairman, ECE Graduate Committee Sep. 2012 – Aug. 2013
§ ECE website administrator Oct. 2008 – Sep. 2012
§ Chairman, ECE ad-‐hoc committee on Final-‐Year Project Dec. 2009 – May 2010
§ Chairperson of the Department of Sep. 2004 – Aug. 2007
Electrical and Computer Engineering § Chairman, ECE graduate Sep. 2004 – Aug. 2007
committee § Chairman, ECE undergraduate affairs Sep. 2004 – Aug. 2007
and ABET committee § Member, ad-‐hoc committee on minor in Dec. 2003 – Sep. 2004
biomedical engineering § Member, ad-‐hoc committee on Oct. 2003 – Jun. 2004
final-‐year projects § Member, ad-‐hoc committee on circuits Sep. 2002 – Nov. 2003
and electronics § Faculty mentor for new faculty members 2002 – 2003
the ECE department § Member, ad-‐hoc committees on technical Jan. 2003
electives and summer teaching § Member, ad-‐hoc committee on combined Jan. 2003
BE-‐ME degrees § Member, ad-‐hoc committee on graduate Mar. 2001
EE program § Initiator of LINCE (Laboratory for Information Jun. 2000
technology, Networking, and Communications Engineering) § Co-‐initiator of the bachelor of science May 2000
in information systems (with Prof. Ali El-‐Hajj) § Member, ad hoc committee on EE Apr. 1999 – Mar. 2000
and CCE curricula revisions
Curriculum Vitae: Ayman Kayssi
Page 16 | http://www.aub.edu.lb/~ayman
§ Secretary of the Department of Electrical Apr. 1996 – Jun. 1997 and Computer Engineering
§ Member, ad hoc committee on course requirements Apr. 1995 – Jun. 1995 of ECE graduate programs
§ Chairman, ad-‐hoc committee Nov. 1993 – Jan. 1994 on EE curriculum
Service to FEA § Chairman, FEA Task Force on Cheating Dec. 2012 – Feb. 2013 § Member, FEA ad-‐hoc committee on Website Aug. 2011 – May 2012 § Member, FEA advisory committee Dec. 2009 – Jul. 2012
§ Member, FEA ad-‐hoc committee for Dec. 2011 – May. 2012
IT manager recruitment § Member, ad-‐hoc committee on FEA Dec. 2002 – Jun. 2011
facilities § Member, admissions committee Oct. 2007 – Sep. 2008
§ Member, advisory committee Oct. 2005 – Sep. 2007
§ Member, administrative committee Sep. 2004 – Aug. 2007
§ Member, academic and Jul. 95 – Jun. 98 & Oct. 2001 – Aug. 2007
curriculum committee § Member, ad-‐hoc committee on second and third Jan. 2003 – Jun. 2004
FEA student conferences § Member, ad-‐hoc committee on FEA Feb. 2003 – Jun. 2003
commencement § Member, ad-‐hoc committee on minor Dec. 2002 -‐ May 2003
in information technology § Member, graduate studies Jul. 1998 – Sep. 2002
committee § Member, ad-‐hoc committee on 50th Jan. 2002 – Jun. 2002
anniversary of the FEA § Setup, installation, and administration Jan. 1997 – May 2002
of the FEA internet services § Member, ad-‐hoc committee on Feb. 2000 – Sep. 2000
computer planning § Coordinator of the FEA local area Nov. 1995 – Jul. 1999
network § Director, Multimedia Center and Oct. 1996 – Jul. 1999
co-‐editor, Convergence magazine § Member, student affairs Jul. 1996 – Jun. 1997 § committee
Service to AUB § Member, university senate Sep. 2013 -‐ present
§ Member, institutional review committee Mar. 2011 – Nov. 2012
for the Department of Chemistry § Member, ad-‐hoc committee on Plans B/A Feb. 2010 – Sep. 2011
§ Member, university senate Oct. 2008 – Sep. 2011, Sep. 2012 – Dec. 2012
§ Member, senate committee on faculty affairs Oct. 2008 – Sep. 2011
Curriculum Vitae: Ayman Kayssi
Page 17 | [email protected]
§ Member, Strategic Planning Team 7 May 2009 – Jan. 2011
(Technological Advantage) § Chairman, university IT committee Oct. 2007 – Feb. 2008
§ Member, university admissions Nov. 2004 – Sep. 2007
committee § Member, university strategic planning Dec. 2005 – Dec. 2006
steering committee § Chairman, university IT strategic Nov. 2004 – Dec. 2005
planning committee § Assistant marshall during university 1997, 1998, 2003
commencement exercises
§ Member, university research Jul. 1998 – Jun. 2001 board (URB)
§ Member, ad-‐hoc committee Mar. 1999 – Jun. 1999 on academic computing
§ Member, ad-‐hoc committee (and later sub-‐ Jan .1995 – Mar. 1995 committee) on computing needs
§ Author of the initial implementation of the AUB Feb. 1994 – Apr. 1994 electronic mail system, Imail
Consulting Jan. 2012 – Dec. 2012 American University of Abu Dhabi Abu Dhabi, UAE Administration Implementation Unit Feb. 2007 – Dec. 2009 Prince Fahad University Tabuk, KSA Undergraduate Programs Jan. 2006 – Apr. 2006 Ministry of Culture Beirut, Lebanon National Library Project Jul. 2005 – Dec. 2005 Dar Al-‐Handassah Beirut, Lebanon Jebel-‐Ali Project Jul. 2004 – Aug. 2004 International College Beirut, Lebanon IT Infrastructure Review Feb. 2001 – Jun. 2001 SGBL Bank Sin El-‐Fil, Lebanon Wide-‐Area Network Sep. 1997 – Jun. 1999 BLOM Bank Beirut, Lebanon BLOMNET Wide-‐Area Network May 1997 American University of Sharjah Sharjah, UAE
Audio-‐Visual Equipment
Awards and Honors Recipient of the First AUB Award for Excellence in Teaching, American University of Beirut, June 2003 Academic Excellence Award, (for ranking first among the) AUB Graduating Class of the Faculty of Engineering and Architecture for the year 1987, AUB Alumni Association, 1987 Dean's Honor List, Faculty of Engineering and Architecture, American University of Beirut, 1983 -‐ 1987
Curriculum Vitae: Ayman Kayssi
Page 18 | http://www.aub.edu.lb/~ayman
Professional Associations Senior Member, Institute of Electrical and Electronics Engineers (IEEE) Senior Member, IEEE Communications Society Member, Association for Computing Machinery (ACM) Global Member, Internet Society (ISOC) Member, Order of Engineers and Architects, Beirut