Recently Published Papers

A. Secure Resilient Edge Cloud Network
  1. T. Saadawi, A. Kawaguchi, M. Lee, A. Mowshowitz; "Secure Resilient Edge Cloud Designed Network" IEICE Transactions on Communications, Japan, Vol.E103-B, No.4, pp.292-301, paper no: 2019NRI0002, April 2020
B. Blockchain in Cybersecurity
  1. O. Ajayi and T. Saadawi, “Blockchain-based Architecture for Secured Cyber-Attack features Exchange” Submitted to Elsevier Journal of Computer Communications. May 25, 2020.

  2. Oluwaseyi Ajayi; Melvin Cherian; Tarek Saadawi, "Secured Cyber-Attack Signatures Distribution using Blockchain Technology". 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE. International Conference on Embedded and Ubiquitous Computing (EUC)

  3. Oluwaseyi Ajayi; Obinna Igbe; Tarek Saadawi, “Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution” 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)

C. Blockchain in eHealth
  1. O. Ajayi, M. Abouali, and T. Saadawi, “Blockchain Architecture for Secured Inter-Healthcare Electronic Health Records Exchange” accepted for oral presentation at the 12th International workshop on information Network and Design (WIND 2020), August 31- September 2, 2020. University of Victoria, Victoria, Canada.

D. Intrusion Detection System (IDS)


Blockchain Technology Protecting Cybersecurity

Blockchain Technology Protecting Cybersecurity Patent

Digital Immune System for Intrusion Detection on Data Processing Systems and Networks

A method for detecting the intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.

Letters Patent