Professional Summary
Jacques Bou Abdo is an interdisciplinary researcher with expertise in complex systems, cybersecurity, cyber warfare, computational economics, and network economics. Dr. Bou Abdo is interested in the universality of laws governing networks and systems. His research has multiple applications such as: cyber and strategic deterrence, flow of information and disinformation in irregular warfare, flow of cyberattacks and network resiliency in cyber warfare, flow of infectious diseases in biological warfare and resilience of supply chains. Dr. Bou Abdo currently serves as assistant professor at the School of Information Technology at the University of Cincinnati.
Education
PhD in Management Sciences: Paris-Saclay University Paris, France, 2021 (Network Economics, Competition & Complexity Economics)
PhD in Computer Science: Sorbonne University Paris, France, 2014 (Cybersecurity)
ME in Telecommunication Networks: Saint Joseph University Beirut, Lebanon, 2011
BBA in Management: Lebanese University Beirut, Lebanon, 2010
Diplôme d'Ingénieur in Electrical and Electronics Engineering: Lebanese University Roumieh, Lebanon, 2009
Positions and Work Experience
06-2023 -07-2023 Visiting Professor, Northern Arizona University, Flagstaff, AZ
10-2021 -07-2023 Fellow, National Strategic Research Institute, Omaha, NE
01-2021 -06-2023 Assistant Professor, University of Nebraska, Kearney, NE
09-2015 -12-2020 NTT Assistant Professor, Notre Dame University, Lebanon
11-2020 -12-2020 Visiting Lecturer, ITMO University, Russia
05-2018 -09-2018 Fulbright Visiting Scholar, University of Kentucky, Lexinton, KY
01-2010 -07-2012 Cluster Support Engineer, Nokia Siemens Networks GmbH & Co. KG, Beirut, Lebanon
Research Support
Investigators:Dustin White, Christopher Yeaw, Jacques Bou Abdo 08-2022 -06-2023 National Strategic Research Institute Nuclear Deterrence Theory for a Multi-polar World Role:Co-PI 30000 Completed Type:Grant
Investigators:Jacques Bou Abdo 05-2018 -09-2018 U.S. Department of State Fulbright visiting scholar Role:Fellow Active Type:Fellowship
Publications
Peer Reviewed Publications
Bou Abdo J.; Zeadally S. (07-25-2022. ) Multi-utility framework: blockchain exchange platform for sustainable development.International Journal of Pervasive Computing and Communications, , 18 (4 ) ,388-406 More Information
El Sibai R.; Challita K.; Bou Abdo J.; Demerjian J. (06-15-2021. ) The impact of blockchain on cybersecurity management.Advances in Cybersecurity Management, , 116-138 More Information
Jurdi W.A.; Abdo J.B.; Demerjian J.; Makhoul A. (06-01-2021. ) Critique on Natural Noise in Recommender Systems.ACM Transactions on Knowledge Discovery from Data, , 15 (5 ) , More Information
Hajj S.; El Sibai R.; Bou Abdo J.; Demerjian J.; Makhoul A.; Guyeux C. (04-01-2021. ) Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets.Transactions on Emerging Telecommunications Technologies, , 32 (4 ) , More Information
Boudargham N.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (03-01-2021. ) An optimal cluster-based routing algorithm for UCBSNs.Internet Technology Letters, , 4 (2 ) , More Information
Sibai R.E.; Challita K.; Abdo J.B.; Demerjian J. (03-01-2021. ) A new user-based incentive strategy for improving bike sharing systems’ performance.Sustainability (Switzerland), , 13 (5 ) ,1-18 More Information
Hajj S.; Sibai R.E.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A.; Ginhac D. (01-01-2021. ) A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks.IEEE Access, , 9 ,138903-138938 More Information
Challita K.; Abdo J.B. (01-01-2021. ) The Maximum (k, m)-Subsets Problem is in the Class NEXP .IAENG International Journal of Computer Science, , 48 (2 ) ,1-5
Bou Abdo J.; El Sibai R.; Demerjian J. (01-01-2021. ) Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionle.Transactions on Emerging Telecommunications Technologies, , 32 (1 ) , More Information
Abdo J.B.; Zeadally S. (01-01-2021. ) Neural network-based blockchain decision scheme.Information Security Journal, , 30 (3 ) ,173-187 More Information
El Sibai R.; Bou Abdo J.; Abou Jaoude C.; Demerjian J.; Chabchoub Y.; Chiky R. (11-24-2020. ) A cloud-based foundational infrastructure for water management ecosystem.Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020, , More Information
El Sibai R.; Bou Abdo J.; Abou Jaoude C.; Demerjian J.; Assaker J.; Makhoul A. (09-01-2020. ) Efficient anomaly detection on sampled data streams with contaminated phase I data.Internet Technology Letters, , 3 (5 ) , More Information
Bou Abdo J.; El Sibai R.; Kambhampaty K.; Demerjian J. (05-01-2020. ) Permissionless reputation-based consensus algorithm for blockchain.Internet Technology Letters, , 3 (3 ) , More Information
Boudargham N.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (05-01-2020. ) Performance of low level protocols in high traffic wireless body sensor networks.Peer-to-Peer Networking and Applications, , 13 (3 ) ,850-871 More Information
Boudargham N.; Sibai R.E.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (02-01-2020. ) Toward fast and accurate emergency cases detection in BSNs.IET Wireless Sensor Systems, , 10 (1 ) ,47-60 More Information
El Sibai R.; Gemayel N.; Bou Abdo J.; Demerjian J. (02-01-2020. ) A survey on access control mechanisms for cloud computing.Transactions on Emerging Telecommunications Technologies, , 31 (2 ) , More Information
Guyeux C.; Charr J.C.; Abdo J.B.; Demerjian J. (01-01-2020. ) Advances in the enumeration of foldable self-avoiding walks.International Journal of Computational Science and Engineering, , 22 (4 ) ,365-375 More Information
Boudargham N.; Abdo J.B.; Demerjian J.; Makhoul A.; Guyeux C. (01-01-2020. ) Mobility aware and traffic adaptive hybrid MAC protocol for collaborative body sensor networks.International Journal of Sensor Networks, , 32 (3 ) ,182-196 More Information
Al Jurdi W.; Jaoude C.A.; Badran M.E.K.; Abdo J.B.; Demerjian J.; Makhoul A. (01-01-2019. ) SCCF Parameter and Similarity Measure Optimization and Evaluation.Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), , 11775 LNAI ,118-127 More Information
El Khoury Badran M.; Abdo J.B.; Jurdi W.; Demerjian J. (01-01-2019. ) Adaptive serendipity for recommender systems: Let it find you.ICAART 2019 - Proceedings of the 11th International Conference on Agents and Artificial Intelligence, , 2 ,739-745 More Information
Merhej J.; Demerjian J.; Fares K.; Abdo J.B.; Makhoul A. (01-01-2019. ) Geolocalization in smart environment.SENSORNETS 2019 - Proceedings of the 8th International Conference on Sensor Networks, , 108-115 More Information
Boudargham N.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (01-01-2019. ) Efficient cluster based routing protocol for collaborative body sensor networks.SENSORNETS 2019 - Proceedings of the 8th International Conference on Sensor Networks, , 94-101 More Information
Chaaya G.; Abdo J.B.; Métais E.; Chiky R.; Demerjian J.; Barbar K. (01-01-2019. ) Comparison of the non-personalized active learning strategies used in recommender systems.Lecture Notes in Business Information Processing, , 341 ,443-456 More Information
Dargham N.B.; Makhoul A.; Abdo J.B.; Demerjian J.; Guyeux C. (10-22-2018. ) Efficient hybrid emergency aware MAC protocol for wireless body sensor networks.Sensors (Switzerland), , 18 (10 ) , More Information
Al Jurdi W.; Bou Abdo J. (08-10-2018. ) DCS - Securing Short-Range Wireless Communication.2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2018, , More Information
Hassanieh L.A.; Jaoudeh C.A.; Abdo J.B.; Demerjian J. (06-01-2018. ) Similarity measures for collaborative filtering recommender systems.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-5 More Information
Boudargham N.; Abdo J.; Demerjian J.; Guyeux C.; Atechian T. (06-01-2018. ) Efficient cluster-based routing algorithm for body sensor networks.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Sibai R.E.; Abdo J.B.; Demerjian J.; Chabchoub Y.; Chiky R.; Barbar K. (06-01-2018. ) Information technology infrastructure for data streams native filtering.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Chaaya G.; Abdo J.B.; Demerjian J.; Chiky R.; Metais E.; Barbar K. (06-01-2018. ) An improved non-personalized combined-heuristic strategy for collaborative filtering recommender sys.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Boudargham N.; Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (06-01-2018. ) Collaborative body sensor networks: Taxonomy and open challenges.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Abdo J.B.; Jreish R.; Demerjian J. (01-01-2018. ) Extended optimisation mechanism for radio resource allocation in multicast mobile networks.International Journal of Mobile Network Design and Innovation, , 8 (3 ) ,157-167 More Information
Jurdi W.; Abdo J. (08-31-2017. ) Dual channel security.ACM International Conference Proceeding Series, , Part F130524 , More Information
Bou Abdo J.; Demerjian J. (08-01-2017. ) Evaluation of mobile cloud architectures.Pervasive and Mobile Computing, , 39 ,284-303 More Information
Abdo J.B.; Jreish R.; Demerjian J.; Atechian T. (07-14-2017. ) Optimizing Radio Resource Allocation in Multicast Mobile Networks.Proceedings - 19th IEEE International Conference on Computational Science and Engineering, 14th IEEE International Conference on Embedded and Ubiquitous Computing and 15th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, CSE-EUC-DCABES 2016, , 329-334 More Information
Abdo J.B. (06-12-2017. ) Authentication proxy as a service.2017 2nd International Conference on Fog and Mobile Edge Computing, FMEC 2017, , 45-49 More Information
Hamandi K.; Bou Abdo J.; Elhajj I.; Kayssi A.; Chehab A. (01-15-2017. ) A privacy-enhanced computationally-efficient and comprehensive LTE-AKA.Computer Communications, , 98 ,20-30 More Information
Chaaya G.; Metais E.; Abdo J.B.; Chiky R.; Demerjian J.; Barbar K. (01-01-2017. ) Evaluating non-personalized single-heuristic active learning strategies for collaborative filtering .Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017, , 2017-December ,593-600 More Information
Boudargham N.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (07-02-2016. ) Investigating low level protocols for Wireless Body Sensor Networks.Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, , 0 , More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (04-03-2016. ) Operator centric mobile cloud architecture.IEEE Wireless Communications and Networking Conference, WCNC, , 2982-2987 More Information
Abdo J.B.; Bourgeau T.; Demerjian J.; Chaouchi H. (01-01-2016. ) Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing.Mobile Information Systems, , 2016 , More Information
El Sibaï R.; Atéchian T.; Abdo J.; Demerjian J.; Tawil R. (12-11-2015. ) A new software-based service provision approach for vehicular cloud.GSCIT 2015 - Global Summit on Computer and Information Technology - Proceedings, , More Information
El Sibaï R.; Atéchian T.; Abdo J.; Tawil R.; Demerjian J. (11-24-2015. ) Connectivity-aware service provision in vehicular cloud.Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, , More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Atechian T. (10-19-2015. ) Enhanced Revenue Optimizing SLA-Based Admission Control for IaaS Cloud Networks.Proceedings - 2015 International Conference on Future Internet of Things and Cloud, FiCloud 2015 and 2015 International Conference on Open and Big Data, OBD 2015, , 225-230 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Atechian T.; Bassil C. (05-26-2015. ) Privacy using mobile cloud computing.2015 5th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2015, , 178-182 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (12-17-2014. ) Cloud federation means cash.2014 3rd International Conference on e-Technologies and Networks for Development, ICeND 2014, , 39-42 More Information
Abdo J.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G.; Atechian T. (03-09-2014. ) Cloud federation? We are not ready yet.Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014, , 831-834 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (01-01-2014. ) Single-Sign-On in operator centric mobile cloud architecture.Proceedings of the Mediterranean Electrotechnical Conference - MELECON, , 151-155 More Information
Abdo J.; Sarji I.; Elhajj I.; Chehab A.; Kayssi A. (01-01-2014. ) Application-aware fast dormancy in LTE.Proceedings - International Conference on Advanced Information Networking and Applications, AINA, , 194-201 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Pujolle G. (07-12-2013. ) EC-AKA2 a revolutionary AKA protocol.International Conference on Computer Applications Technology, ICCAT 2013, , More Information
Abdo J.B.; Demerjian J.; Ahmad K.; Chaouchi H.; Pujolle G. (04-12-2013. ) EPS mutual authentication and crypt-analyzing SPAKA.2013 International Conference on Computing, Management and Telecommunications, ComManTel 2013, , 303-308 More Information
Abdo J.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (01-01-2013. ) Broker-based cross-cloud federation manager.2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, , 244-251 More Information
Bou Abdo J.; Chaouchi H.; Aoude M. (08-15-2012. ) Ensured confidentiality authentication and key agreement protocol for EPS.2012 Symposium on Broadband Networks and Fast Internet, RELABIRA 2012, , 73-77 More Information
Mulahuwaish A.; Qolomany B.; Gyorick K.; Abdo J.B.; Aledhari M.; Qadir J.; Carley K.; Al-Fuqaha A. (05-01-2025. ) A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and futu.Computers in Human Behavior Reports, , 18 , More Information
Mattar C.; Bou Abdo J.; Demerjian J.; Makhoul A. (04-01-2025. ) Network Diffusion Algorithms and Simulators in IoT and Space IoT: A Systematic Review.Journal of Sensor and Actuator Networks, , 14 (2 ) , More Information
Mulahuwaish A.; El-Khoury M.; Qolomany B.; Bou Abdo J.; Zeadally S. (02-14-2025. ) Does AI need guardrails?.International Journal of Pervasive Computing and Communications, , 21 (2 ) ,177-186 More Information
Azar J.; Tahir M.A.; Bou Abdo J.; Demerjian J.; Akkari N. (01-01-2025. ) Federated Sampling for Privacy-Preserving and Efficient Data Sharing in IoT Networks.5th IEEE Middle East and North Africa Communications Conference Breaking Boundaries Pioneering the Next Era of Communication Menacomm 2025, , More Information
Bou Abdo J.; Zeadally S. (08-01-2024. ) Disposable identities: Solving web tracking.Journal of Information Security and Applications, , 84 , More Information
Abdo J.B.; Zeadally S.; Demerjian J. (07-01-2024. ) Compartmentalization-by-Design: Usability-Aware Web Privacy.Computer, , 57 (7 ) ,39-52 More Information
Qolomany B.; Calay T.J.; Hossain L.; Mulahuwaish A.; Bou Abdo J. (05-01-2024. ) CCTFv2: Modeling Cyber Competitions.Entropy, , 26 (5 ) , More Information
Falowo O.I.; Abdo J.B. (01-01-2024. ) 2019-2023 in Review: Projecting DDoS Threats With ARIMA and ETS Forecasting Techniques.IEEE Access, , 12 ,26759-26772 More Information
Abdo J.B.; Hossain L. (01-01-2024. ) Modeling the Invisible Internet.Studies in Computational Intelligence, , 1143 SCI ,359-370 More Information
Bou Abdo J.; Dass S.; Qolomany B.; Hossain L. (01-01-2024. ) Modeling the Dynamics of Bitcoin Overlay Network.Studies in Computational Intelligence, , 1143 SCI ,371-383 More Information
Al Jurdi W.; Bou Abdo J.; Demerjian J.; Makhoul A. (01-01-2024. ) Exploring the Power of Weak Ties on Serendipity in Recommender Systems.Studies in Computational Intelligence, , 1144 SCI ,205-216 More Information
Falowo O.I.; Ozer M.; Li C.; Abdo J.B. (01-01-2024. ) Evolving Malware and DDoS Attacks: Decadal Longitudinal Study.IEEE Access, , 12 ,39221-39237 More Information
Hajj S.; Azar J.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A.; Ginhac D. (08-01-2023. ) Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems.Sensors, , 23 (16 ) , More Information
Schnell J.; Dass S.; Abdo J.B.; Chatterjee M. (01-01-2023. ) Cultivating Inclusivity: A Journey Towards Democratizing Cybersecurity Education.2023 IEEE International Conference on Teaching Assessment and Learning for Engineering Tale 2023 Conference Proceedings, , More Information
Calay T.J.; Qolomany B.; Mulahuwaish A.; Hossain L.; Abdo J.B. (01-01-2023. ) CCTFv1: Computational Modeling of Cyber Team Formation Strategies.Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, , 14161 LNCS ,199-208 More Information
Hajj S.; Azar J.; Abdo J.B.; Demerjian J.; Makhoul A.; Ginhac D. (01-01-2023. ) Cross-layer Federated Heterogeneous Ensemble Learning for Lightweight IoT Intrusion Detection System.2023 IEEE 10th International Conference on Data Science and Advanced Analytics Dsaa 2023 Proceedings, , More Information
Sandakly S.; Salem C.; Challita K.; Dass S.; Azar J.; Abdo J.B.; Demerjian J. (01-01-2023. ) XorshiftH128+: A hybrid random number generator for lightweight IoT.2023 IEEE International Conference on Artificial Intelligence Blockchain and Internet of Things Aibthings 2023 Proceedings, , More Information
Al Jurdi W.; Abdo J.B.; Demerjian J.; Makhoul A. (01-01-2022. ) Strategic Attacks on Recommender Systems: An Obfuscation Scenario.Proceedings of IEEE ACS International Conference on Computer Systems and Applications Aiccsa, , 2022-December , More Information
Challita K.; Abdo J.B.; Farhat H.; Makary M. (01-01-2022. ) A Polynomial-time Solution for the Maximum Subsets Problem .Iaeng International Journal of Computer Science, , 49 (4 ) ,
Nehme E.; Salloum H.; Bou Abdo J.; Taylor R. (09-02-2021. ) Ai, IoT, and blockchain: Business models, ethical issues, and legal perspectives.Internet of Things Artificial Intelligence and Blockchain Technology, , 67-88 More Information
Daoud O.; Abdo J.B.; Demerjian J. (01-01-2021. ) Implications of smartphone addiction on university students in urban, suburban and rural areas.International Journal of Education Economics and Development, , 12 (1 ) ,17-26 More Information
Zeadally S.; Abdo J.B. (11-01-2019. ) Blockchain: Trends and future opportunities.Internet Technology Letters, , 2 (6 ) , More Information
Maalouf E.J.; Marina N.; Abdo J.B.; Aoun A.; Hamad M.; Kassem A. (07-02-2018. ) Asthma Irritant Monitoring.Proceedings of the International Conference on Microelectronics Icm, , 2018-December ,120-123 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Yared R.; Atechian T. (12-11-2015. ) Micro-economy effect on cloud federation.Gscit 2015 Global Summit on Computer and Information Technology Proceedings, , More Information
Post Graduate Training and Education
09-2022 Wargaming: Constructing Simulations and Competitive Strategy Exercises, Center of Strategic & International Studies, , Washington D.C.
05-2021 Senior Executives in National and International Security, Harvard Kennedy School, , Cambridge, MA
Contact Information
Academic - bouabdjs@ucmail.uc.edu