Publications


Building Trust, Resilience, and Security

Online Repositories


Detailed Publications

2025

Catch Me If You Can: Rogue AI Detection and Correction at Scale

Stodt, F. , Stodt, J. , Alshawki, M. B. , Sratakhti, J. , Reich, C.
Electronics, 14(20)
πŸ“˜ Journal πŸ₯ˆ Q2 πŸ”— DOI

Blockchain-Enabled GDPR Compliance Enforcement for IIoT Data Access

Isazade, A. , Malik, A. , Alshawki, M. B.
Journal of Cybersecurity and Privacy, 5(4)
πŸ“˜ Journal πŸ₯‡ Q1

Securing Cloud and IoT Identity: An Analysis of Keystone Authentication Mechanisms in Openstack

Alnaddad, O. , Alshawki, M. B.
2025 8th Conference on Cloud and Internet of Things (CIoT)
πŸ“ Conference πŸ”— DOI

Securing the Future: Lightweight Blockchain Solutions for IIoT and IoT Networks

Stodt, F. , Alshawki, M. B. , Reich, C. , Ligeti, P. , Theoleyre, F.
Security and Privacy, 8(4)
πŸ“˜ Journal πŸ₯‡ Q1

The Effect Of Consumer's Intention And Feedback For The Use Of Mobile NFC Payment Technology

Shareiyat, A. , Hussain Al-hashimy, H. N. , Hamoud, A. K. , Alshawki, M. B.
Economic Studies, 34(6)
πŸ“˜ Journal πŸ₯‰ Q3

VITA: Verifieble Decentralized Authentication and Access Control in B5G/6G IoT Environments

Alshawki, M. B. , Zhou, Y. , Laki, S. , Ligeti, P.
2025 33rd International Conference on Software, Telecommunications, and Computer Networks (SoftCOM 2025)
πŸ“ Conference πŸ… B

On Homomorphic Encryption Feasibility in Large-Scale Cloud Environment

Isooba, S. , Stodt, F. , Alshawki, M. B.
31st Workshop on Information and Communications Technologies Proceedings
πŸ“ Conference

Byzantine-Resilient Federated Learning: Evaluating MPC Approaches

Abdullah, Y. , Alshawki, M. B. , Ligeti, P. , Soussi, W. , Stiller, B.
2025 25th International Conference on Distributed Computing Systems Workshops (ICDCSW)
πŸ“ Conference πŸ† A
2024

Congestion Control Prediction Model for 5G Environment Based on Supervised and Unsupervised Machine Learning Approach

Alshawki, M. B. , Najm, I. A. , Hamoud, A. K.
IEEE Access, 12, 91127-91139
πŸ“˜ Journal πŸ₯‡ Q1

Blockchain-based privacy-preserving shop floor auditing architecture

Stodt, F. , Alshawki, M. B. , Reich, C. , Theoleyre, F. , Ligeti, P.
IEEE Access, 12, 26747-26758
πŸ“˜ Journal πŸ₯‡ Q1

Fedlabx: a practical and privacy-preserving framework for federated learning

Yan, Y. , Alshawki, M. B. , Zoltay, M. , Gal, M. , Hollos, R. , Jin, Y. , et al.
Complex & Intelligent Systems, 10(1), 677-690
πŸ“˜ Journal πŸ₯‡ Q1

Regulatory Compliance Verification: A Privacy Preserving Approach

Morello, M. , Sainio, P. , Alshawki, M. B.
2024 8th Cyber Security in Networking Conference (CSNet)
πŸ“ Conference

Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper)

La, V. H. , Mallouli, W. , Nguyen, M. D. , de Oca, E. M. , Cavalli, A. , VΓΆrΓΆs, P. , Alshawki, M. B. , et al.
IFIP International Internet of Things Conference, 53-67
πŸ“ Conference

Footprint-Optimized Orchestration and Management of Secure Complex Services over 6G Continuum

Birtane, S. , Al-Naday, M. , Paolucci, F. , Bakar, R. A. , Lefebvre, V. , Passas, V. , et al.
2024 IEEE Conference on Standards for Communications and Networking (CSCN), 383-388
πŸ“ Conference
2023

Authentication and data access challenges in safeguarding industrial IoT

Fadel, M. O. , Alshawki, M. B.
Lecture Notes in Electrical Engineering, vol. 1194
πŸ“ Book Chapter

3L-AODV: Three layer security protocol for grayhole attack mitigation in MANET

Alshawki, M. B. , Abdullah, W. D. , Hamoud, A. K. , Valadares, D. C. G. , Shareiyat, A. , et al.
Lecture Notes on Networks and Systems, 813-823
πŸ“ Book Chapter πŸ₯‰ Q3

Privacy-preserving blockchain technologies

Valadares, D. C. G. , Perkusich, A. , Martins, A. F. , Alshawki, M. B. , Seline, C.
Sensors, 23(16), 7172
πŸ“˜ Journal πŸ₯‡ Q1

A comparative study of supervised/unsupervised machine learning algorithms with feature selection approaches to predict student performance

Hamoud, A. K. , Alasady, A. S. , Awadh, W. A. , Dahr, J. M. , Alshawki, M. B.
International Journal of Data Mining, Modelling and Management, 15(4), 393-409
πŸ“˜ Journal πŸ₯ˆ Q2

Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE

Alshawki, M. B. , Van Oosterhout, J. , Ligeti, P. , Reich, C.
2023 19th International Conference on Wireless and Mobile Computing
πŸ“ Conference πŸ… B
2022

D3VN: Decentralized abe-based distributed data validation network

Alshawki, M. B. , Ligeti, P. , Reich, C.
Lecture Notes on Networks and Systems
πŸ“ Book Chapter πŸ₯‰ Q3

ODABE: Outsourced Decentralized CP-ABE in Internet of Things

Alshawki, M. B. , Ligeti, P. , Reich, C.
Lecture Notes in Computer Science, vol. 13285, 611-615
πŸ“ Book Chapter πŸ₯‰ Q3

On Security and Performance Requirements of Decentralized Resource Discovery in IoT

Alshawki, M. B. , Ligeti, P. , Reich, C.
Lecture Notes in Electrical Engineering, 289-302
πŸ“ Book Chapter

Security Analysis and Deployment Measurement of Transport Layer Security Protocol

Yaseen, M. , Kamel, M. , Ligeti, P.
Lecture Notes in Electrical Engineering, 725-739
πŸ“ Book Chapter

A prediction model based machine learning algorithms with feature selection approaches over imbalanced dataset

Hamoud, A. K. , Alshwki, M. B. , Gaafar, A. S. , Alasady, A. S. , Humadi, A. M. , et al.
Indonesian Journal of Electrical Engineering and Computer Science, 28(2)
πŸ“˜ Journal

OLAP Mining with Educational Data Mart to Predict Students Performance

Najm, I. A. , Dahr, J. M. , Hamoud, A. K. , Alasady, A. S. , Awadh, W. A. , Alshawki, M. B. , et al.
Informatica, 46(5)
πŸ“˜ Journal πŸ₯ˆ Q2

Distributed Address Table (DAT): A decentralized model for end-to-end communication in IoT

Alshawki, M. B. , Ligeti, P. , Nagy, A. , Reich, C.
Peer-to-Peer Networking and Applications, 15(1), 178-193
πŸ“˜ Journal πŸ₯‡ Q1

Cognitive Radio for Smart Grid: A Decentralized Emergency Management Approach

Rajab, H. , Alshawki, M. B. , Hamoud, A. K. , Farag, H. , Cinkler, T. , Ligeti, P.
2022 32nd International Telecommunication Networks and Applications Conference
πŸ“ Conference πŸ… B

Attribute verifier for internet of things

Alshawki, M. B. , Yan, Y. , Ligeti, P. , Reich, C.
2022 32nd International Telecommunication Networks and Applications Conference
πŸ“ Conference πŸ… B

Security verification of key exchange in ciphertext-policy attribute based encryption

Bat-Erdene, B. , Yan, Y. , Alshawki, M. B. , Ligeti, P.
2022 7th International Conference on Signal and Image Processing (ICSIP)
πŸ“ Conference ⭐ Award Winner

SDABE: Efficient encryption in decentralized cp-abe using secret sharing

Alshawki, M. B. , Ligeti, P. , Reich, C.
2022 International Conference on Electrical, Computer and Energy Technologies
πŸ“ Conference
2021

ATTRED: Attribute based resource discovery for IoT

Alshawki, M. B. , Yan, Y. , Ligeti, P. , Reich, C.
Sensors, 21(14), 4721
πŸ“˜ Journal πŸ₯‡ Q1

Supervised learning algorithms in educational data mining: A systematic review

Khalaf, A. , Dahr, J. M. , Najim, I. A. , Alshawki, M. B. , Hashim, A. S. , Awadh, W. A. , Humadi, A. M.
Southeast Europe Journal of Soft Computing, 10(1), 55-70
πŸ“˜ Journal πŸ₯‰ Q3

LADA: locality aware distributed addressing for edge/fog computing infrastructures

Alshawki, M. B. , Ligeti, P. , Reich, C.
2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), 1-6
πŸ“ Conference

Formal verification of confidentiality in attribute-based encryption through proverif

Bat-Erdene, B. , Yan, Y. , Alshawki, M. B.
21th Central European Conference on Cryptology, 34
πŸ“ Conference
2020

A decentralized resource discovery using attribute based encryption for internet of things

Alshawki, M. B. , Yan, Y. , Ligeti, P. , Reich, C.
2020 4th Cyber Security in Networking Conference (CSNet), 1-3
πŸ“ Conference

Distributed data validation network in IoT: a decentralized validator selection model

Alshawki, M. B. , Wallis, K. , Ligeti, P. , Reich, C.
Proceedings of the 10th International Conference on the Internet of Things, 1-8
πŸ“ Conference

Attribute-based encryption in cloud computing environment

Yan, Y. , Alshawki, M. B. , Ligeti, P.
2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE), 63-68
πŸ“ Conference ⭐ Award Winner

Region-based distributed hash table for fog computing infrastructure

Alshawki, M. B. , Ligeti, P. , Reich, C.
13th Joint Conference on Mathematics and Computer Science (MaCS 2020)
πŸ“ Conference
2019

A decentralized and scalable model for resource discovery in IoT network

Alshawki, M. B. , Crispo, B. , Ligeti, P.
2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 1-4
πŸ“ Conference πŸ… B
2018

Improved approach of address propagation for f2f networks

Alshawki, M. B. , Ligeti, P. , Nagy, A.
2018 2nd European Conference on Electrical Engineering and Computer Science (EECS), 604-609
πŸ“ Conference
2017

STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET

Alshawki, M. B. , Alameri, I. , Onaizah, A. N.
2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 1278-1282
πŸ“ Conference

Weight Analysis For Weighted Cluster Algorithms In Mobile Ad-Hoc Network

SAAD, H. N. , Alshawki, M. B.
Journal of Theoretical & Applied Information Technology, 95(15)
πŸ“˜ Journal πŸ₯‰ Q3
2016

Secure Model for SMS Exchange over GSM

Alshawki, M. B. , George, L. E.
International Journal of Computer Network & Information Security, 8(1)
πŸ“˜ Journal
2013

Simple Model for Coding Geographic Location Coordinates

Alshawki, M. B. , George, L. E.
International Journal of Scientific & Engineering Research, 4(7), 2468-2470
πŸ“˜ Journal

Remote patient tracking and monitoring system

Alshawki, M. B. , George, L.
International Journal of Computer Science and Mobile Computing, 2(12), 88-94
πŸ“˜ Journal

Services