Skip to main content

Research Repository

Advanced Search

All Outputs (96)

Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios (2024)
Presentation / Conference Contribution
Huang, Z., Liu, X., Romdhani, I., & Shih, C. (2024, August). Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios. Presented at The 7th International Conference on Information Science and Systems (ICISS 2024), Edinburgh

This research presents a groundbreaking approach to Building Maintenance Management (BMM) by introducing an Intelligent Process Automation (IPA)-Driven Building Maintenance Management (IBMM) model. This innovative model harnesses the synergies betwee... Read More about Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios.

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Presentation / Conference Contribution
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023, March). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. Presented at 16th IADIS International Conference on Information Systems (IS 2023), Lisbon, Portugal

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023, June). Resolving the Decreased Rank Attack in RPL’s IoT Networks. Presented at 19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT 2023), Pafos, Cyprus

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

Blockchain for Cybersecurity in Cyber-Physical Systems (2023)
Book
Maleh, Y., Alazab, M., & Romdhani, I. (Eds.). (2023). Blockchain for Cybersecurity in Cyber-Physical Systems. Cham: Springer. https://doi.org/10.1007/978-3-031-25506-9

This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems. It presents crucial issues in this field and provides a sample of recent advances and insights into the research pr... Read More about Blockchain for Cybersecurity in Cyber-Physical Systems.

Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (2022)
Book
Maleh, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2022). Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence. Gistrup, Denmark: River Publishers

In recent years, a considerable amount of effort has been devoted to cyber-threat protection of computer systems which is one of the most critical cybersecurity tasks for single users and businesses since even a single attack can result in compromise... Read More about Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence.

Ontology-Based Linked Data to Support Decision Making within Universities (2022)
Journal Article
Ashour, G., Al-Dubai, A., Romdhani, I., & Alghazzawi, D. (2022). Ontology-Based Linked Data to Support Decision Making within Universities. Mathematics, 10(17), Article 3148. https://doi.org/10.3390/math10173148

In recent years, educational institutions worked hard to automate their work using more trending technologies that prove the success in supporting decision-making processes. Most the decisions in educational institutions rely on rating the academic r... Read More about Ontology-Based Linked Data to Support Decision Making within Universities.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Presentation / Conference Contribution
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023, April). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. Presented at 11th World Conference on Information Systems and Technologies (WorldCIST'23), Pisa, Italy

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

Multicast DIS attack mitigation in RPL-based IoT-LLNs (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Multicast DIS attack mitigation in RPL-based IoT-LLNs. Journal of Information Security and Applications, 61, Article 102939. https://doi.org/10.1016/j.jisa.2021.102939

The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was standardised by the IETF ROLL Working Group to address the routing issues in the Internet of Things (IoT) Low-Power and Lossy Networks (LLNs). RPL builds and maintains a Destination... Read More about Multicast DIS attack mitigation in RPL-based IoT-LLNs.

Artificial Intelligence and Blockchain for Future Cybersecurity Applications (2021)
Book
Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., & Romdhani, I. (Eds.). (2021). Artificial Intelligence and Blockchain for Future Cybersecurity Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-74575-2

Presents the state-of-the-art and the latest discoveries in the field of Artificial Intelligence and Blockchain techniques and methods for future cybersecurity applications Proposes new models, practical solutions and technological advances related... Read More about Artificial Intelligence and Blockchain for Future Cybersecurity Applications.

Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things (2021)
Journal Article
Medjek, F., Tandjaoui, D., Djedjig, N., & Romdhani, I. (2021). Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things. International Journal of Critical Infrastructure Protection, 34, Article 100436. https://doi.org/10.1016/j.ijcip.2021.100436

Internet of Things (IoT) has emerged as a key component of all advanced critical infrastructures. However, with the challenging nature of IoT, new security breaches have been introduced, especially against the Routing Protocol for Low-power and Lossy... Read More about Fault-tolerant AI-driven Intrusion Detection System for the Internet of Things.

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

Big data and IoT-based applications in smart environments: A systematic review (2020)
Journal Article
Hajjaji, Y., Boulila, W., Farah, I. R., Romdhani, I., & Hussain, A. (2021). Big data and IoT-based applications in smart environments: A systematic review. Computer Science Review, 39, Article 100318. https://doi.org/10.1016/j.cosrev.2020.100318

This paper reviews big data and Internet of Things (IoT)-based applications in smart environments. The aim is to identify key areas of application, current trends, data architectures, and ongoing challenges in these fields. To the best of our knowled... Read More about Big data and IoT-based applications in smart environments: A systematic review.

Lightweight edge authentication for software defined networks (2020)
Journal Article
Almaini, A., Al-Dubai, A., Romdhani, I., Schramm, M., & Alsarhan, A. (2021). Lightweight edge authentication for software defined networks. Computing, 103, https://doi.org/10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Lightweight edge authentication for software defined networks.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Presentation / Conference Contribution
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020, June). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. Presented at 2020 International Conference Engineering Technologies and Computer Science (EnT), Moscow, Russia

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.

Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications (2020)
Book
Maleh, Y., Shojaafar, M., Alazab, M., & Romdhani, I. (Eds.). (2020). Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications. CRC Press

Blockchain Technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction... Read More about Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications.

Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing (2020)
Journal Article
Kerrouche, A., Lithgow, J., Muhammad, I., & Romdhani, I. (2020). Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing. Applied Sciences, 10(7), Article 2527. https://doi.org/10.3390/app10072527

Waterborne pathogens affect all waters globally and proceed to be an ongoing concern. Previous methods for detection of pathogens consist of a high test time and a high sample consumption, but they are very expensive and require specialist operators.... Read More about Towards the Development of Rapid and Low-Cost Pathogen Detection Systems Using Microfluidic Technology and Optical Image Processing.

Trust-aware and Cooperative Routing Protocol for IoT Security (2020)
Journal Article
Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2020). Trust-aware and Cooperative Routing Protocol for IoT Security. Journal of Information Security and Applications, 52, Article 102467. https://doi.org/10.1016/j.jisa.2020.102467

The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification provides encryption protection to control messages, RPL is still vulnerable to... Read More about Trust-aware and Cooperative Routing Protocol for IoT Security.

Delegation of Authentication to the Data Plane in Software-Defined Networks (2020)
Presentation / Conference Contribution
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2019, October). Delegation of Authentication to the Data Plane in Software-Defined Networks. Presented at 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (SmartCNS), Shenyang, China

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Delegation of Authentication to the Data Plane in Software-Defined Networks.

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN (2020)
Presentation / Conference Contribution
Boukria, S., Guerroumi, M., & Romdhani, I. (2020). BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780

Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global network overview changes the network's characteristics, on term of flexibility, a... Read More about BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018, June). Cross-Layer Multipath Multichannel MAC protocol for MANETs. Presented at The International Symposium on Networks, Computers and Communications (ISNCC), Rome, Italy

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.