Publications

Recently Published Papers

A. Secure Resilient Edge Cloud Network
  1. T. Saadawi, A. Kawaguchi, M. Lee, A. Mowshowitz; "" IEICE Transactions on Communications, Japan, Vol.E103-B, No.4, pp.292-301, paper no: 2019NRI0002, April 2020
B. Blockchain in Cybersecurity
  1. O. Ajayi and T. Saadawi, 鈥溾 Submitted to Elsevier Journal of Computer Communications. May 25, 2020.

  2. Oluwaseyi Ajayi; Melvin Cherian; Tarek Saadawi, "". 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE. International Conference on Embedded and Ubiquitous Computing (EUC)

  3. Oluwaseyi Ajayi; Obinna Igbe; Tarek Saadawi, 鈥溾 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)

C. Blockchain in eHealth
  1. O. Ajayi, M. Abouali, and T. Saadawi, 鈥溾 accepted for oral presentation at the 12th International workshop on information Network and Design (WIND 2020), August 31- September 2, 2020. University of Victoria, Victoria, Canada.

D. Intrusion Detection System (IDS)
  • Virtual Machine Introspection

    1. Huseyn Huseynov; Kenichi Kourai; Tarek Saadawi; Obinna Igbe, "鈥. 2020 IEEE 21st International Conference on High-Performance Switching and Routing (HPSR).
  • Artificial Immune System
    1. Obinna Igbe; Ihab Darwish; Tarek Saadawi, "鈥. 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
  • Game Theory

Ihab Darwish; Obinna Igbe; Tarek Saadawi, 鈥溾.2015 36th IEEE Sarnoff Symposium.

Patents

Blockchain Technology Protecting Cybersecurity

Blockchain Technology Protecting Cybersecurity Patent

Digital Immune System for Intrusion Detection on Data Processing Systems and Networks

A method for detecting the intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.

Last Updated: 01/29/2024 10:11