Date


Research Areas

Download Available

58 results

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence

Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for sing...

Artificial Intelligence and Blockchain for Future Cybersecurity Applications

Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.)
(2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2
Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications P...

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things

Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021)
Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, https://doi.org/10.1016/j.ijcip.2021.100436
Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been ...

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications

Book
Maleh, Y., Shojaafar, M., Alazab, M., & Romdhani, I. (Eds.)
(2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press (Taylor and Francis Group
Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology...

Delegation of Authentication to the Data Plane in Software-Defined Networks

Conference Proceeding
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2020)
Delegation of Authentication to the Data Plane in Software-Defined Networks. In 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS), (58-65). https://doi.org/10.1109/iucc/dsci/smartcns.2019.00038
OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which ...

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN

Conference Proceeding
Boukria, S., Guerroumi, M., & Romdhani, I. (2020)
BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780
Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global networ...

Cross-Layer Multipath Multichannel MAC protocol for MANETs

Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018)
Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2018.8530886
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018)
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151
In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious in...

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings

Conference Proceeding
(2018)
Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. In I. Romdhani, L. Shu, H. Takahiro, Z. Zhou, T. Gordon, & D. Zeng (Eds.), Collaborative Computing: Networking, Applications and Worksharinghttps://doi.org/10.1007/978-3-030-00916-8
This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, Collabora...

A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT

Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Romdhani, I., Nasser, Y., & Boukerche, A. (2018)
A Novel Adaptive and Efficient Routing Update Scheme for Low-Power Lossy Networks in IoT. IEEE Internet of Things, 5(6), 12. https://doi.org/10.1109/JIOT.2018.2862364
In this paper, we introduce Drizzle, a new algorithm for maintaining routing information in the Low-power and Lossy Networks (LLNs). The aim is to address the limitations of t...