Publication


Building Trust and Resilience, Cryptography, AI, and Secure Infrastructures

Journal Papers

    1. Stodt, F., Alshawki, M., Reich, C., Ligeti, P., & Theoleyre, F. (2025). Securing the Future: Lightweight Blockchain Solutions for IIoT and IoT Networks. Security and Privacy, 8(4).
    2. Shareiyat, A., Hussain Al-hashimy, H. N., Hamoud, A. K., & Alshawki, M. (2025). The Effect Of Consumer's Intention And Feedback For The Use Of Mobile NFC Payment Technology. Economic Studies, 34(6).
    3. Alshawki, M. B., Najm, I. A., & Hamoud, A. K. (2024). Congestion Control Prediction Model for 5G Environment Based on Supervised and Unsupervised Machine Learning Approach. IEEE Access, 12, 91127-91139.
    4. Stodt, F., Alshawki, M. B., Reich, C., Theoleyre, F., & Ligeti, P. (2024). Blockchain-based privacy-preserving shop floor auditing architecture. IEEE Access, 12, 26747-26758.
    5. Yan, Y., Alshawki, M. B., Zoltay, M., Gal, M., Hollos, R., Jin, Y., ... & Tenyi, A. (2024). Fedlabx: a practical and privacy-preserving framework for federated learning. Complex & Intelligent Systems, 10(1), 677-690.
    6. Valadares, D. C. G., Perkusich, A., Martins, A. F., Alshawki, M. B., & Seline, C. (2023). Privacy-preserving blockchain technologies. Sensors, 23(16), 7172.
    7. Hamoud, A. K., Alasady, A. S., Awadh, W. A., Dahr, J. M., Alshawki, M. B. M. (2023). A comparative study of supervised/unsupervised machine learning algorithms with feature selection approaches to predict student performance. International Journal of Data Mining, Modelling and Management, 15(4), 393–409.
    8. Hamoud, A. K., Alshwki, M. B., Gaafar, A. S., Alasady, A. S., Humadi, A. M., ... (2022). A prediction model based machine learning algorithms with feature selection approaches over imbalanced dataset. Indonesian Journal of Electrical Engineering and Computer Science, 28(2).
    9. Najm, I. A., Dahr, J. M., Hamoud, A. K., Alasady, A. S., Awadh, W. A., Alshawki, M. B., ... (2022). OLAP Mining with Educational Data Mart to Predict Students’ Performance. Informatica, 46(5).
    10. Alshawki, M. B., Ligeti, P., Nagy, A., & Reich, C. (2022). Distributed Address Table (DAT): A decentralized model for end-to-end communication in IoT. Peer-to-Peer Networking and Applications, 15(1), 178-193.
    11. Alshawki, M. B., Yan, Y., Ligeti, P., & Reich, C. (2021). Attred: Attribute based resource discovery for IoT. Sensors, 21(14), 4721.
    12. Khalaf, A., Dahr, J. M., Najim, I. A., Kamel, M. B., Hashim, A. S., Awadh, W. A., & Humadi, A. M. (2021). Supervised learning algorithms in educational data mining: A systematic review. Southeast Europe Journal of Soft Computing, 10(1), 55-70.
    13. SAAD, H. N., & Alshawki, M. B. (2017). Weight Analysis For Weighted Cluster Algorithms In Mobile Ad-Hoc Network. Journal of Theoretical & Applied Information Technology, 95(15).
    14. Alshawki, M. B., & George, L. E. (2016). Secure Model for SMS Exchange over GSM. International Journal of Computer Network & Information Security, 8(1).
    15. Alshawki, M. B., & George, L. E. (2013). Simple Model for Coding Geographic Location Coordinates. International Journal of Scientific & Engineering Research, 4(7), 2468-2470.
    16. Alshawki, M., & George, L. (2013). Remote patient tracking and monitoring system. International Journal of Computer Science and Mobile Computing, 2(12), 88-94.

Book Chapters

  1. Fadel, M. O., & Alshawki, M. B. (2023, October). Authentication and data access challenges in safeguarding industrial IoT. In Lecture Notes in Electrical Engineering, vol. 1194. Singapore: Springer Nature Singapore.
  2. Alshawki, M. B., Abdullah, W. D., Hamoud, A. K., Valadares, D. C. G., Shareiyat, A., ... (2023). 3l-aodv: Three layer security protocol for grayhole attack mitigation in manet. In Lecture Notes on Networks and Systems, 813–823.
  3. Alshawki, M. B., Ligeti, P., & Reich, C. (2022). D3VN: Decentralized abe-based distributed data validation network. In Lecture Notes on Networks and Systems.
  4. Alshawki, M., Ligeti, P., & Reich, C. (2022). Poster: ODABE: Outsourced Decentralized CP-ABE in Internet of Things. In Lecture Notes in Computer Science, vol. 13285, 611–615.
  5. Alshawki, M. B., Ligeti, P., & Reich, C. (2022). On Security and Performance Requirements of Decentralized Resource Discovery in IoT. In Lecture Notes in Electrical Engineering, 289–302.
  6. Yaseen, M., Kamel, M., & Ligeti, P. (2022). Security Analysis and Deployment Measurement of Transport Layer Security Protocol. In Lecture Notes in Electrical Engineering, 725–739.

Conference Papers

  1. Alshawki, M., Zhou, Y., Laki, S., & Ligeti, P. (2025, September). VITA: Verifieble Decentralized Authentication and Access Control in B5G/6G IoT Environments. In 2025 33rd International Conference on Software, Telecommunications, and Computer Networks (SoftCOM 2025) IEEE.
  2. Isooba, S., Stodt, F., & Alshawki, M. (2025, September). On Homomorphic Encryption Feasibility in Large-Scale Cloud Environment. In 31st Workshop on Information and Communications Technologies Proceedings UoS.
  3. Abdullah, Y., Alshawki, M., Ligeti, P., Soussi, W., & Stiller, B. (2025, July). Byzantine-Resilient Federated Learning: Evaluating MPC Approaches. In 2025 25th International Conference on Distributed Computing Systems Workshops (ICDCSW) IEEE.
  4. Morello, M., Sainio, P., & Alshawki, M. (2024, December). Regulatory Compliance Verification: A Privacy Preserving Approach. In 2024 8th Cyber Security in Networking Conference (CSNet) (pp. 263-267). IEEE.
  5. La, V. H., Mallouli, W., Nguyen, M. D., de Oca, E. M., Cavalli, A., Vörös, P., Alshawki, M., ... & Drosou, A. (2024, November). Enhancing IoT Security in 6G Networks: AI-Based Intrusion Detection, Penetration Testing, and Blockchain-Based Trust Management (Work-in-Progress Paper). In IFIP International Internet of Things Conference (pp. 53-67). Cham: Springer Nature Switzerland.
  6. Birtane, S., Al-Naday, M., Paolucci, F., Bakar, R. A., Lefebvre, V., Passas, V., ... & Gür, G. (2024, November). Footprint-Optimized Orchestration and Management of Secure Complex Services over 6G Continuum. In 2024 IEEE Conference on Standards for Communications and Networking (CSCN) (pp. 383-388). IEEE.
  7. Alshawki, M. B. M., Van Oosterhout, J., Ligeti, P., & Reich, C. (2023). Distributed Cryptography for Lightweight Encryption in Decentralized CP-ABE. In 2023 19th International Conference on Wireless and Mobile Computing.
  8. Rajab, H., Alshawki, M. B., Hamoud, A. K., Farag, H., Cinkler, T., & Ligeti, P. (2022). Cognitive Radio for Smart Grid: A Decentralized Emergency Management Approach. In 2022 32nd International Telecommunication Networks and Applications Conference.
  9. Alshawki, M. B., Yan, Y., Ligeti, P., & Reich, C. (2022). Attribute verifier for internet of things. In 2022 32nd International Telecommunication Networks and Applications Conference.
  10. Bat-Erdene, B., Yan, Y., Alshawki, M. B., & Ligeti, P. (2022). Security verification of key exchange in ciphertext-policy attribute based encryption. In 2022 7th International Conference on Signal and Image Processing (ICSIP).
  11. Alshawki, M., Ligeti, P., & Reich, C. (2022). Sdabe: Efficient encryption in decentralized cp-abe using secret sharing. In 2022 International Conference on Electrical, Computer and Energy Technologies.
  12. Alshawki, M. B., Ligeti, P., & Reich, C. (2021, December). Lada: locality aware distributed addressing for edge/fog computing infrastructures. In 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) (pp. 1-6). IEEE.
  13. Alshawki, M. B., Yan, Y., Ligeti, P., & Reich, C. (2020, October). A decentralized resource discovery using attribute based encryption for internet of things. In 2020 4th Cyber Security in Networking Conference (CSNet) (pp. 1-3). IEEE.
  14. Alshawki, M. B., Wallis, K., Ligeti, P., & Reich, C. (2020, October). Distributed data validation network in IoT: a decentralized validator selection model. In Proceedings of the 10th International Conference on the Internet of Things (pp. 1-8).
  15. Yan, Y., Alshawki, M. B., & Ligeti, P. (2020, August). Attribute-based encryption in cloud computing environment. In 2020 International Conference on Computing, Electronics & Communications Engineering (iCCECE) (pp. 63-68). IEEE.
  16. Alshawki, M. B., Crispo, B., & Ligeti, P. (2019, October). A decentralized and scalable model for resource discovery in IoT network. In 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 1-4). IEEE.
  17. Alshawki, M. B., Ligeti, P., & Nagy, A. (2018, December). Improved approach of address propagation for f2f networks. In 2018 2nd European Conference on Electrical Engineering and Computer Science (EECS) (pp. 604-609). IEEE.
  18. Alshawki, M. B., Alameri, I., & Onaizah, A. N. (2017, March). STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET. In 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 1278-1282). IEEE.

Other Publications

  1. Bat-Erdene, B., Yan, Y., & Alshawki, M. B. (2021). Formal verification of confidentiality in attribute-based encryption through proverif. In Book of Abstracts, 21th Central European Conference on Cryptology (p. 34).
  2. Alshawki, M., Ligeti, P., & Reich, C. (2020, October). "Region-based distributed hash table for fog computing infrastructure" in 13th Joint Conference on Mathematics and Computer Science (MaCS 2020), October 1-3, 2020.

Online Repositories

Google Scholar Google Scholar


Scopus
Scopus


IEEE
IEEE Xplore


DBLP
DBLP


Web of Science
Web of Science


Services