Recently Published Papers
A. Secure Resilient Edge Cloud Network
- T. Saadawi, A. Kawaguchi, M. Lee, A. Mowshowitz; "" IEICE Transactions on Communications, Japan, Vol.E103-B, No.4, pp.292-301, paper no: 2019NRI0002, April 2020
B. Blockchain in Cybersecurity
-
O. Ajayi and T. Saadawi, 鈥溾 Submitted to Elsevier Journal of Computer Communications. May 25, 2020.
-
Oluwaseyi Ajayi; Melvin Cherian; Tarek Saadawi, "". 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE. International Conference on Embedded and Ubiquitous Computing (EUC)
-
Oluwaseyi Ajayi; Obinna Igbe; Tarek Saadawi, 鈥溾 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
C. Blockchain in eHealth
-
O. Ajayi, M. Abouali, and T. Saadawi, 鈥溾 accepted for oral presentation at the 12th International workshop on information Network and Design (WIND 2020), August 31- September 2, 2020. University of Victoria, Victoria, Canada.
D. Intrusion Detection System (IDS)
-
Virtual Machine Introspection
- Huseyn Huseynov; Kenichi Kourai; Tarek Saadawi; Obinna Igbe, "鈥. 2020 IEEE 21st International Conference on High-Performance Switching and Routing (HPSR).
- Artificial Immune System
- Obinna Igbe; Ihab Darwish; Tarek Saadawi, "鈥. 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
- Game Theory
Ihab Darwish; Obinna Igbe; Tarek Saadawi, 鈥溾.2015 36th IEEE Sarnoff Symposium.
Patents
Blockchain Technology Protecting Cybersecurity
Digital Immune System for Intrusion Detection on Data Processing Systems and Networks
A method for detecting the intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.
Last Updated: 01/29/2024 10:11