default search action
Jacques Bou Abdo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Olufunsho I. Falowo, Jacques Bou Abdo:
2019-2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques. IEEE Access 12: 26759-26772 (2024) - [j25]Olufunsho I. Falowo, Murat Ozer, Chengcheng Li, Jacques Bou Abdo:
Evolving Malware and DDoS Attacks: Decadal Longitudinal Study. IEEE Access 12: 39221-39237 (2024) - [j24]Basheer Qolomany, Tristan J. Calay, Liaquat Hossain, Aos Mulahuwaish, Jacques Bou Abdo:
CCTFv2: Modeling Cyber Competitions. Entropy 26(5): 384 (2024) - [j23]Jacques Bou Abdo, Sherali Zeadally:
Disposable identities: Solving web tracking. J. Inf. Secur. Appl. 84: 103821 (2024) - [j22]Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
Group Validation in Recommender Systems: Framework for Multi-layer Performance Evaluation. Trans. Recomm. Syst. 2(1): 8:1-8:25 (2024) - 2023
- [j21]Suzan Hajj, Joseph Azar, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul, Dominique Ginhac:
Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems. Sensors 23(16): 7038 (2023) - [c34]Serge Sandakly, Charbel Salem, Khalil Challita, Shuvalaxmi Dass, Joseph Azar, Jacques Bou Abdo, Jacques Demerjian:
XorshiftH128+: A hybrid random number generator for lightweight IoT. AIBThings 2023: 1-5 - [c33]Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
Exploring the Power of Weak Ties on Serendipity in Recommender Systems. COMPLEX NETWORKS (4) 2023: 205-216 - [c32]Jacques Bou Abdo, Liaquat Hossain:
Modeling the Invisible Internet. COMPLEX NETWORKS (3) 2023: 359-370 - [c31]Jacques Bou Abdo, Shuvalaxmi Dass, Basheer Qolomany, Liaquat Hossain:
Modeling the Dynamics of Bitcoin Overlay Network. COMPLEX NETWORKS (3) 2023: 371-383 - [c30]Suzan Hajj, Joseph Azar, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul, Dominique Ginhac:
Cross-layer Federated Heterogeneous Ensemble Learning for Lightweight IoT Intrusion Detection System. DSAA 2023: 1-10 - [c29]Tristan J. Calay, Basheer Qolomany, Aos Mulahuwaish, Liaquat Hossain, Jacques Bou Abdo:
CCTFv1: Computational Modeling of Cyber Team Formation Strategies. SBP-BRiMS 2023: 199-208 - [c28]Jordan Schnell, Shuvalaxmi Dass, Jacques Bou Abdo, Moitrayee Chatterjee:
Cultivating Inclusivity: A Journey Towards Democratizing Cybersecurity Education. TALE 2023: 1-4 - [i6]Tristan J. Calay, Basheer Qolomany, Aos Mulahuwaish, Liaquat Hossain, Jacques Bou Abdo:
CCTFv1: Computational Modeling of Cyber Team Formation Strategies. CoRR abs/2307.10258 (2023) - 2022
- [j20]Esther Nehme, Rayane El Sibai, Jacques Bou Abdo, A. Ross Taylor, Jacques Demerjian:
Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI Ethics 2(1): 129-143 (2022) - [j19]Jacques Bou Abdo, Sherali Zeadally:
Multi-utility framework: blockchain exchange platform for sustainable development. Int. J. Pervasive Comput. Commun. 18(4): 388-406 (2022) - [c27]Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
Strategic Attacks on Recommender Systems: An Obfuscation Scenario. AICCSA 2022: 1-8 - [i5]Jacques Bou Abdo, Shuvalaxmi Dass, Basheer Qolomany, Liaquat Hossain:
Evolutionary Random Graph for Bitcoin Overlay and Blockchain Mining Networks. CoRR abs/2206.09011 (2022) - [i4]Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
Group Validation in Recommender Systems: Framework for Multi-layer Performance Evaluation. CoRR abs/2207.09320 (2022) - 2021
- [j18]Suzan Hajj, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul, Dominique Ginhac:
A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks. IEEE Access 9: 138903-138938 (2021) - [j17]Jacques Bou Abdo, Rayane El Sibai, Jacques Demerjian:
Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionless blockchains. Trans. Emerg. Telecommun. Technol. 32(1) (2021) - [j16]Suzan Hajj, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul, Christophe Guyeux:
Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets. Trans. Emerg. Telecommun. Technol. 32(4) (2021) - [j15]Jacques Bou Abdo, Sherali Zeadally:
Neural network-based blockchain decision scheme. Inf. Secur. J. A Glob. Perspect. 30(3): 173-187 (2021) - [j14]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
An optimal cluster-based routing algorithm for UCBSNs. Internet Technol. Lett. 4(2) (2021) - [j13]Wissam Al Jurdi, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
Critique on Natural Noise in Recommender Systems. ACM Trans. Knowl. Discov. Data 15(5): 75:1-75:30 (2021) - [i3]Jacques Bou Abdo:
Efficient and Secure Mobile Cloud Networking. CoRR abs/2102.09051 (2021) - 2020
- [j12]Rayane El Sibai, Nader Gemayel, Jacques Bou Abdo, Jacques Demerjian:
A survey on access control mechanisms for cloud computing. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j11]Nadine Boudargham, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Toward fast and accurate emergency cases detection in BSNs. IET Wirel. Sens. Syst. 10(1): 47-60 (2020) - [j10]Christophe Guyeux, Jean-Claude Charr, Jacques Bou Abdo, Jacques Demerjian:
Advances in the enumeration of foldable self-avoiding walks. Int. J. Comput. Sci. Eng. 22(4): 365-375 (2020) - [j9]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul, Christophe Guyeux:
Mobility aware and traffic adaptive hybrid MAC protocol for collaborative body sensor networks. Int. J. Sens. Networks 32(3): 182-196 (2020) - [j8]Jacques Bou Abdo, Rayane El Sibai, Krishna Kambhampaty, Jacques Demerjian:
Permissionless reputation-based consensus algorithm for blockchain. Internet Technol. Lett. 3(3) (2020) - [j7]Rayane El Sibai, Jacques Bou Abdo, Chady Abou Jaoude, Jacques Demerjian, Joseph Assaker, Abdallah Makhoul:
Efficient anomaly detection on sampled data streams with contaminated phase I data. Internet Technol. Lett. 3(5) (2020) - [j6]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Performance of low level protocols in high traffic wireless body sensor networks. Peer-to-Peer Netw. Appl. 13(3): 850-871 (2020) - [c26]Rayane El Sibai, Jacques Bou Abdo, Chady Abou Jaoude, Jacques Demerjian, Yousra Chabchoub, Raja Chiky:
A cloud-based foundational infrastructure for water management ecosystem. Cloudtech 2020: 1-7 - [i2]Jacques Bou Abdo, Sherali Zeadally:
Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development. CoRR abs/2007.07096 (2020)
2010 – 2019
- 2019
- [j5]Sherali Zeadally, Jacques Bou Abdo:
Blockchain: Trends and future opportunities. Internet Technol. Lett. 2(6) (2019) - [c25]Miriam El Khoury Badran, Jacques Bou Abdo, Wissam Al Jurdi, Jacques Demerjian:
Adaptive Serendipity for Recommender Systems: Let It Find You. ICAART (2) 2019: 739-745 - [c24]Wissam Al Jurdi, Chady Abou Jaoude, Miriam El Khoury Badran, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul:
SCCF Parameter and Similarity Measure Optimization and Evaluation. KSEM (1) 2019: 118-127 - [c23]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Efficient Cluster based Routing Protocol for Collaborative Body Sensor Networks. SENSORNETS 2019: 94-101 - [c22]Joseph Merhej, Jacques Demerjian, Karla Fares, Jacques Bou Abdo, Abdallah Makhoul:
Geolocalization in Smart Environment. SENSORNETS 2019: 108-115 - 2018
- [j4]Nadine Bou Dargham, Abdallah Makhoul, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux:
Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks. Sensors 18(10): 3572 (2018) - [c21]Wissam Al Jurdi, Jacques Bou Abdo:
DCS - Securing Short-Range Wireless Communication. BlackSeaCom 2018: 1-5 - [c20]Georges Chaaya, Jacques Bou Abdo, Elisabeth Métais, Raja Chiky, Jacques Demerjian, Kablan Barbar:
Comparison of the Non-personalized Active Learning Strategies Used in Recommender Systems. EMCIS 2018: 443-456 - [c19]E.-J. Maalouf, N. Marina, Jacques Bou Abdo, Alain Aoun, Mustapha Hamad, Abdallah Kassem:
Asthma Irritant Monitoring. ICM 2018: 120-123 - [c18]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Talar Atéchian:
Efficient cluster-based routing algorithm for body sensor networks. MENACOMM 2018: 1-6 - [c17]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Collaborative body sensor networks: Taxonomy and open challenges. MENACOMM 2018: 1-6 - [c16]Georges Chaaya, Jacques Bou Abdo, Jacques Demerjian, Raja Chiky, Elisabeth Métais, Kablan Barbar:
An improved non-personalized combined-heuristic strategy for collaborative filtering recommender systems. MENACOMM 2018: 1-6 - [c15]Lamis Al Hassanieh, Chadi Abou Jaoudeh, Jacques Bou Abdo, Jacques Demerjian:
Similarity measures for collaborative filtering recommender systems. MENACOMM 2018: 1-5 - [c14]Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Yousra Chabchoub, Raja Chiky, Kablan Barbar:
Information technology infrastructure for data streams native filtering. MENACOMM 2018: 1-6 - 2017
- [j3]Khodor Hamandi, Jacques Bou Abdo, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
A privacy-enhanced computationally-efficient and comprehensive LTE-AKA. Comput. Commun. 98: 20-30 (2017) - [j2]Jacques Bou Abdo, Jacques Demerjian:
Evaluation of mobile cloud architectures. Pervasive Mob. Comput. 39: 284-303 (2017) - [c13]Wissam Al Jurdi, Jacques Bou Abdo:
Dual channel security. ECBS 2017: 20:1-20:2 - [c12]Jacques Bou Abdo:
Authentication proxy as a service. FMEC 2017: 45-49 - [c11]Georges Chaaya, Elisabeth Métais, Jacques Bou Abdo, Raja Chiky, Jacques Demerjian, Kablan Barbar:
Evaluating Non-personalized Single-Heuristic Active Learning Strategies for Collaborative Filtering Recommender Systems. ICMLA 2017: 593-600 - 2016
- [j1]Jacques Bou Abdo, Thomas Bourgeau, Jacques Demerjian, Hakima Chaouchi:
Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing. Mob. Inf. Syst. 2016: 7867206:1-7867206:13 (2016) - [c10]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Investigating low level protocols for Wireless Body Sensor Networks. AICCSA 2016: 1-6 - [c9]Jacques Bou Abdo, Rabih Jreish, Jacques Demerjian, Talar Atéchian:
Optimizing Radio Resource Allocation in Multicast Mobile Networks. CSE/EUC/DCABES 2016: 329-334 - [i1]Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Investigating Low Level Protocols for Wireless Body Sensor Networks. CoRR abs/1611.08401 (2016) - 2015
- [c8]Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atéchian, Carole Bassil:
Privacy using mobile cloud computing. DICTAP 2015: 178-182 - [c7]Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Talar Atéchian:
Enhanced Revenue Optimizing SLA-Based Admission Control for IaaS Cloud Networks. FiCloud 2015: 225-230 - [c6]Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Rami Yared, Talar Atéchian:
Micro-economy effect on cloud federation. GSCIT 2015: 1-4 - [c5]Rayane El Sibaï, Talar Atéchian, Jacques Bou Abdo, Jacques Demerjian, Rami Tawil:
A new software-based service provision approach for vehicular cloud. GSCIT 2015: 1-6 - 2014
- [c4]Jacques Bou Abdo, Imad Sarji, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
Application-Aware Fast Dormancy in LTE. AINA 2014: 194-201 - [c3]Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle, Talar Atéchian:
Cloud Federation? We Are Not Ready Yet. HPCC/CSS/ICESS 2014: 831-834 - [c2]Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle:
Operator centric mobile cloud architecture. WCNC 2014: 2982-2987 - 2013
- [c1]Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle:
Broker-based Cross-Cloud Federation Manager. ICITST 2013: 244-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint