This page has only limited features, please log in for full access.
The convergence of AI, IoT, and blockchain as the next disruptive technology is inevitable. Studying the ethics of these converged technologies is crucial for the steady development and adoption of the applications. Even though this topic is crucial, it is still not yet touched in the literature. This work is the first attempt to tackle this issue by developing a conceptual ethics framework for converged AI, IoT, and blockchain. The framework is based on a systematic literature review and categorizes the ethical issues into three layers namely micro (ethical issue involving the technology itself), meso (ethical issue involving the applications), and macro (ethical issue involving the society and institutions).
Esther Nehme; Rayane El Sibai; Jacques Bou Abdo; A. Ross Taylor; Jacques Demerjian. Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI and Ethics 2021, 1 -15.
AMA StyleEsther Nehme, Rayane El Sibai, Jacques Bou Abdo, A. Ross Taylor, Jacques Demerjian. Converged AI, IoT, and blockchain technologies: a conceptual ethics framework. AI and Ethics. 2021; ():1-15.
Chicago/Turabian StyleEsther Nehme; Rayane El Sibai; Jacques Bou Abdo; A. Ross Taylor; Jacques Demerjian. 2021. "Converged AI, IoT, and blockchain technologies: a conceptual ethics framework." AI and Ethics , no. : 1-15.
With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article covers the full scope needed by researchers and practitioners alike when studying AIDS. The scope ranges from the intrusion detection techniques to attacks forms and passing through the relevant attack features, most‐used datasets, challenges, and potential solutions. This article provides an exhaustive review of IDSs and discusses their requirements and performance metrics in deep. It presents a taxonomy of IDSs based on four criteria: information source, detection strategy, detection mode, and architecture. Then, in‐depth analysis and a comparison of network intrusion detection approaches based on anomaly detection techniques are given. The article also introduces a classification of computer network attacks, along with their different forms and the relevant network traffic features to detect them, as well as a summary of the popular datasets used by the researchers to evaluate the IDSs. Finally, the article highlights several research challenges and the possible solutions to deal with them.
Suzan Hajj; Rayane El Sibai; Jacques Bou Abdo; Jacques Demerjian; Abdallah Makhoul; Christophe Guyeux. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets. Transactions on Emerging Telecommunications Technologies 2021, 32, e4240 .
AMA StyleSuzan Hajj, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Abdallah Makhoul, Christophe Guyeux. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets. Transactions on Emerging Telecommunications Technologies. 2021; 32 (4):e4240.
Chicago/Turabian StyleSuzan Hajj; Rayane El Sibai; Jacques Bou Abdo; Jacques Demerjian; Abdallah Makhoul; Christophe Guyeux. 2021. "Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets." Transactions on Emerging Telecommunications Technologies 32, no. 4: e4240.
The benefits of having a Bike Sharing System (BSS) in a city are numerous. Among other advantages, it promotes a cleaner environment with less traffic and pollution. One major problem the users of such services encounter is that of full or empty stations, causing user dissatisfaction. The objective of this work is to propose a new user-based incentive method to enhance BSS performance. The proposed method relies on a spatial outlier detection algorithm. It consists of adapting the departure and arrival stations of the users to the BSS state by stimulating the users to change their journeys in view of minimizing the number of full and empty stations. Experiments are carried out to compare our proposed method to some existing methods for enhancing the resource availability of BSSs, and they are performed on a real dataset issued from a well-known BSS called Velib. The results show that the proposed strategy improves the availability of BSS resources, even when the collaboration of users is partial.
Rayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance. Sustainability 2021, 13, 2780 .
AMA StyleRayane El Sibai, Khalil Challita, Jacques Bou Abdo, Jacques Demerjian. A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance. Sustainability. 2021; 13 (5):2780.
Chicago/Turabian StyleRayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. 2021. "A New User-Based Incentive Strategy for Improving Bike Sharing Systems’ Performance." Sustainability 13, no. 5: 2780.
Blockchain is a disruptive technology that impacted businesses, industries, and economies. Blockchain’s success is mainly due to its multi-role technology that can be applied to a wide variety of fields, such as in data storage services, financial services, and security services. In the security domain, it poses new challenges that should be faced by cybersecurity managers and exposes new attack footprints that must be addressed to maintain a secure computer network. On the other side, blockchain offers a breakthrough that solves many cybersecurity issues that were open for years. In this chapter, we introduce blockchain’s impact on each of the cybersecurity domains and recommend directions to be followed by cybersecurity managers.
Rayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. The Impact of Blockchain on Cybersecurity Management. Advances in Cybersecurity Management 2021, 117 -138.
AMA StyleRayane El Sibai, Khalil Challita, Jacques Bou Abdo, Jacques Demerjian. The Impact of Blockchain on Cybersecurity Management. Advances in Cybersecurity Management. 2021; ():117-138.
Chicago/Turabian StyleRayane El Sibai; Khalil Challita; Jacques Bou Abdo; Jacques Demerjian. 2021. "The Impact of Blockchain on Cybersecurity Management." Advances in Cybersecurity Management , no. : 117-138.
Over the past years, blockchain technology has become more and more interesting since its ability to carry out transactions without any mediator. To ensure the transactions' reliability, consensus algorithms are adopted by blockchain technology. However, due to the failure of consensus algorithms in managing nodes' identities, blockchain technology is considered inappropriate for many applications. In this article, we propose the permissionless proof‐of‐reputation‐X (PL‐PoRX) that upgrades an existing consensus algorithm, the proof‐of‐reputation‐X (PoRX). PL‐PoRX replaces the trusted identity database in PoRX with a new admission process to make the algorithm suitable for permissionless blockchains, while maintaining PoRX's reputation mechanism. Several experiments are conducted to show the efficiency of our approach under different scenarios. We also debate the security model of the new protocol and study its time complexity. The results show that PL‐PoRX decreases the number of blocks issued by malicious miners, and help benign miners build reputation faster.
Jacques Bou Abdo; Rayane El Sibai; Jacques Demerjian. Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies 2020, 32, 1 .
AMA StyleJacques Bou Abdo, Rayane El Sibai, Jacques Demerjian. Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains. Transactions on Emerging Telecommunications Technologies. 2020; 32 (1):1.
Chicago/Turabian StyleJacques Bou Abdo; Rayane El Sibai; Jacques Demerjian. 2020. "Permissionless proof‐of‐reputation‐X: A hybrid reputation‐based consensus algorithm for permissionless blockchains." Transactions on Emerging Telecommunications Technologies 32, no. 1: 1.
Control chart algorithms aim to monitor a process over time. This process consists of two phases. Phase I, also called the learning phase, estimates the normal process parameters, then in Phase II, anomalies are detected. However, the learning phase itself can contain contaminated data such as outliers. If left undetected, they can jeopardize the accuracy of the whole chart by affecting the computed parameters, which leads to faulty classifications and defective data analysis results. This problem becomes more severe when the analysis is done on a sample of the data rather than the whole data. To avoid such a situation, Phase I quality must be guaranteed. The purpose of this paper is to introduce a new approach for applying EWMA chart to obtain accurate anomaly detection results over sampled data even if contaminations exist in Phase I. The new chart is applied to a real dataset, and its performance is evaluated on both sampled and not sampled data according to several criteria. This article is protected by copyright. All rights reserved.
Rayane El Sibai; Jacques Bou Abdo; Chady Abou Jaoude; Jacques Demerjian; Joseph Assaker; Abdallah Makhoul. Efficient anomaly detection on sampled data streams with contaminated phase I data. Internet Technology Letters 2020, 3, 1 .
AMA StyleRayane El Sibai, Jacques Bou Abdo, Chady Abou Jaoude, Jacques Demerjian, Joseph Assaker, Abdallah Makhoul. Efficient anomaly detection on sampled data streams with contaminated phase I data. Internet Technology Letters. 2020; 3 (5):1.
Chicago/Turabian StyleRayane El Sibai; Jacques Bou Abdo; Chady Abou Jaoude; Jacques Demerjian; Joseph Assaker; Abdallah Makhoul. 2020. "Efficient anomaly detection on sampled data streams with contaminated phase I data." Internet Technology Letters 3, no. 5: 1.
Reputation‐based consensus algorithms are one of the most promising, but least investigated types of consensus algorithms. Its limitation to persmissioned node identity management shades its potential and causes many applications to find blockchain unsuitable. In this paper, we upgrade PoRX, an existing consensus algorithm, into becoming the first permissionless pure reputation‐based consensus algorithm. This upgrade is highly potential since it only affects the admission process and doesn't intervene with the consensus process, thus can be extended into other types of consensus algorithms. This article is protected by copyright. All rights reserved.
Jacques Bou Abdo; Rayane El Sibai; Krishna Kambhampaty; Jacques Demerjian. Permissionless reputation‐based consensus algorithm for blockchain. Internet Technology Letters 2020, 3, 1 .
AMA StyleJacques Bou Abdo, Rayane El Sibai, Krishna Kambhampaty, Jacques Demerjian. Permissionless reputation‐based consensus algorithm for blockchain. Internet Technology Letters. 2020; 3 (3):1.
Chicago/Turabian StyleJacques Bou Abdo; Rayane El Sibai; Krishna Kambhampaty; Jacques Demerjian. 2020. "Permissionless reputation‐based consensus algorithm for blockchain." Internet Technology Letters 3, no. 3: 1.
In body sensor networks (BSNs), medical sensors capture physiological data from the human body and send them to the coordinator who act as a gateway to health care. The main aim of BSNs is to save peoples’ lives. Therefore, fast and correct detection of emergencies while maintaining low-energy consumption of sensors is essential requirement of BSNs. In this study, the authors propose a new adaptive data sampling approach, where the sampling ratio is adapted based on the sensed data variation. The idea is to use the modified version of the cumulative sum (CUSUM) algorithm (modified CUSUM) that they previously proposed for wireless sensor networks to monitor the data variability, and adapt the sampling rate accordingly. Modified CUSUM is then applied to the adaptively sampled data to detect anomalies, and the correlation property between physiological parameters will be used to identify emergency cases from false alarms. Several experiments are performed and compared to evaluate the efficiency of their approach, and different parameters are considered.
Nadine Boudargham; Rayane El Sibai; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. Toward fast and accurate emergency cases detection in BSNs. IET Wireless Sensor Systems 2020, 10, 47 -60.
AMA StyleNadine Boudargham, Rayane El Sibai, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul. Toward fast and accurate emergency cases detection in BSNs. IET Wireless Sensor Systems. 2020; 10 (1):47-60.
Chicago/Turabian StyleNadine Boudargham; Rayane El Sibai; Jacques Bou Abdo; Jacques Demerjian; Christophe Guyeux; Abdallah Makhoul. 2020. "Toward fast and accurate emergency cases detection in BSNs." IET Wireless Sensor Systems 10, no. 1: 47-60.
Rayane El Sibai; Nader Gemayel; Jacques Bou Abdo; Jacques Demerjian. A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies 2019, 31, 1 .
AMA StyleRayane El Sibai, Nader Gemayel, Jacques Bou Abdo, Jacques Demerjian. A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies. 2019; 31 (2):1.
Chicago/Turabian StyleRayane El Sibai; Nader Gemayel; Jacques Bou Abdo; Jacques Demerjian. 2019. "A survey on access control mechanisms for cloud computing." Transactions on Emerging Telecommunications Technologies 31, no. 2: 1.