Professional Summary
Jacques Bou Abdo is an interdisciplinary researcher with expertise in complex systems, cybersecurity, cyber warfare, computational economics, and network economics. Dr. Bou Abdo is interested in the universality of laws governing networks and systems. His research has multiple applications such as: cyber and strategic deterrence, flow of information and disinformation in irregular warfare, flow of cyberattacks and network resiliency in cyber warfare, flow of infectious diseases in biological warfare and resilience of supply chains. Dr. Bou Abdo currently serves as assistant professor at the School of Information Technology at the University of Cincinnati.
Education
PhD in Management Sciences: Paris-Saclay University Paris, France, 2021 (Network Economics, Competition & Complexity Economics)
PhD in Computer Science: Sorbonne University Paris, France, 2014 (Cybersecurity)
ME in Telecommunication Networks: Saint Joseph University Beirut, Lebanon, 2011
BBA in Management: Lebanese University Beirut, Lebanon, 2010
Diplôme d'Ingénieur in Electrical and Electronics Engineering: Lebanese University Roumieh, Lebanon, 2009
Positions and Work Experience
06-2023 -07-2023 Visiting Professor, Northern Arizona University, Flagstaff, AZ
10-2021 -07-2023 Fellow, National Strategic Research Institute, Omaha, NE
01-2021 -06-2023 Assistant Professor, University of Nebraska, Kearney, NE
09-2015 -12-2020 NTT Assistant Professor, Notre Dame University, Lebanon
11-2020 -12-2020 Visiting Lecturer, ITMO University, Russia
05-2018 -09-2018 Fulbright Visiting Scholar, University of Kentucky, Lexinton, KY
01-2010 -07-2012 Cluster Support Engineer, Nokia Siemens Networks GmbH & Co. KG, Beirut, Lebanon
Research Support
Investigators:Dustin White, Christopher Yeaw, Jacques Bou Abdo 08-2022 -06-2023 National Strategic Research Institute Nuclear Deterrence Theory for a Multi-polar World Role:Co-PI 30000 Completed Type:Grant
Investigators:Jacques Bou Abdo 05-2018 -09-2018 U.S. Department of State Fulbright visiting scholar Role:Fellow Active Type:Fellowship
Publications
Peer Reviewed Publications
Bou Abdo J.; Zeadally S. (07-25-2022. ) Multi-utility framework: blockchain exchange platform for sustainable development.International Journal of Pervasive Computing and Communications, , 18 (4 ) ,388-406 More Information
El Sibai R.; Challita K.; Bou Abdo J.; Demerjian J. (06-15-2021. ) The impact of blockchain on cybersecurity management.Advances in Cybersecurity Management, , 116-138 More Information
Jurdi W.A.; Abdo J.B.; Demerjian J.; Makhoul A. (06-01-2021. ) Critique on Natural Noise in Recommender Systems.ACM Transactions on Knowledge Discovery from Data, , 15 (5 ) , More Information
Hajj S.; El Sibai R.; Bou Abdo J.; Demerjian J.; Makhoul A.; Guyeux C. (04-01-2021. ) Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets.Transactions on Emerging Telecommunications Technologies, , 32 (4 ) , More Information
Boudargham N.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (03-01-2021. ) An optimal cluster-based routing algorithm for UCBSNs.Internet Technology Letters, , 4 (2 ) , More Information
Sibai R.E.; Challita K.; Abdo J.B.; Demerjian J. (03-01-2021. ) A new user-based incentive strategy for improving bike sharing systems’ performance.Sustainability (Switzerland), , 13 (5 ) ,1-18 More Information
Hajj S.; Sibai R.E.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A.; Ginhac D. (01-01-2021. ) A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks.IEEE Access, , 9 ,138903-138938 More Information
Challita K.; Abdo J.B. (01-01-2021. ) The Maximum (k, m)-Subsets Problem is in the Class NEXP .IAENG International Journal of Computer Science, , 48 (2 ) ,1-5
Bou Abdo J.; El Sibai R.; Demerjian J. (01-01-2021. ) Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionle.Transactions on Emerging Telecommunications Technologies, , 32 (1 ) , More Information
Abdo J.B.; Zeadally S. (01-01-2021. ) Neural network-based blockchain decision scheme.Information Security Journal, , 30 (3 ) ,173-187 More Information
El Sibai R.; Bou Abdo J.; Abou Jaoude C.; Demerjian J.; Chabchoub Y.; Chiky R. (11-24-2020. ) A cloud-based foundational infrastructure for water management ecosystem.Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020, , More Information
El Sibai R.; Bou Abdo J.; Abou Jaoude C.; Demerjian J.; Assaker J.; Makhoul A. (09-01-2020. ) Efficient anomaly detection on sampled data streams with contaminated phase I data.Internet Technology Letters, , 3 (5 ) , More Information
Bou Abdo J.; El Sibai R.; Kambhampaty K.; Demerjian J. (05-01-2020. ) Permissionless reputation-based consensus algorithm for blockchain.Internet Technology Letters, , 3 (3 ) , More Information
Boudargham N.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (05-01-2020. ) Performance of low level protocols in high traffic wireless body sensor networks.Peer-to-Peer Networking and Applications, , 13 (3 ) ,850-871 More Information
Boudargham N.; Sibai R.E.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (02-01-2020. ) Toward fast and accurate emergency cases detection in BSNs.IET Wireless Sensor Systems, , 10 (1 ) ,47-60 More Information
El Sibai R.; Gemayel N.; Bou Abdo J.; Demerjian J. (02-01-2020. ) A survey on access control mechanisms for cloud computing.Transactions on Emerging Telecommunications Technologies, , 31 (2 ) , More Information
Guyeux C.; Charr J.C.; Abdo J.B.; Demerjian J. (01-01-2020. ) Advances in the enumeration of foldable self-avoiding walks.International Journal of Computational Science and Engineering, , 22 (4 ) ,365-375 More Information
Boudargham N.; Abdo J.B.; Demerjian J.; Makhoul A.; Guyeux C. (01-01-2020. ) Mobility aware and traffic adaptive hybrid MAC protocol for collaborative body sensor networks.International Journal of Sensor Networks, , 32 (3 ) ,182-196 More Information
Al Jurdi W.; Jaoude C.A.; Badran M.E.K.; Abdo J.B.; Demerjian J.; Makhoul A. (01-01-2019. ) SCCF Parameter and Similarity Measure Optimization and Evaluation.Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), , 11775 LNAI ,118-127 More Information
El Khoury Badran M.; Abdo J.B.; Jurdi W.; Demerjian J. (01-01-2019. ) Adaptive serendipity for recommender systems: Let it find you.ICAART 2019 - Proceedings of the 11th International Conference on Agents and Artificial Intelligence, , 2 ,739-745 More Information
Merhej J.; Demerjian J.; Fares K.; Abdo J.B.; Makhoul A. (01-01-2019. ) Geolocalization in smart environment.SENSORNETS 2019 - Proceedings of the 8th International Conference on Sensor Networks, , 108-115 More Information
Boudargham N.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (01-01-2019. ) Efficient cluster based routing protocol for collaborative body sensor networks.SENSORNETS 2019 - Proceedings of the 8th International Conference on Sensor Networks, , 94-101 More Information
Chaaya G.; Abdo J.B.; Métais E.; Chiky R.; Demerjian J.; Barbar K. (01-01-2019. ) Comparison of the non-personalized active learning strategies used in recommender systems.Lecture Notes in Business Information Processing, , 341 ,443-456 More Information
Dargham N.B.; Makhoul A.; Abdo J.B.; Demerjian J.; Guyeux C. (10-22-2018. ) Efficient hybrid emergency aware MAC protocol for wireless body sensor networks.Sensors (Switzerland), , 18 (10 ) , More Information
Al Jurdi W.; Bou Abdo J. (08-10-2018. ) DCS - Securing Short-Range Wireless Communication.2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2018, , More Information
Hassanieh L.A.; Jaoudeh C.A.; Abdo J.B.; Demerjian J. (06-01-2018. ) Similarity measures for collaborative filtering recommender systems.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-5 More Information
Boudargham N.; Abdo J.; Demerjian J.; Guyeux C.; Atechian T. (06-01-2018. ) Efficient cluster-based routing algorithm for body sensor networks.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Sibai R.E.; Abdo J.B.; Demerjian J.; Chabchoub Y.; Chiky R.; Barbar K. (06-01-2018. ) Information technology infrastructure for data streams native filtering.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Chaaya G.; Abdo J.B.; Demerjian J.; Chiky R.; Metais E.; Barbar K. (06-01-2018. ) An improved non-personalized combined-heuristic strategy for collaborative filtering recommender sys.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Boudargham N.; Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (06-01-2018. ) Collaborative body sensor networks: Taxonomy and open challenges.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information
Abdo J.B.; Jreish R.; Demerjian J. (01-01-2018. ) Extended optimisation mechanism for radio resource allocation in multicast mobile networks.International Journal of Mobile Network Design and Innovation, , 8 (3 ) ,157-167 More Information
Jurdi W.; Abdo J. (08-31-2017. ) Dual channel security.ACM International Conference Proceeding Series, , Part F130524 , More Information
Bou Abdo J.; Demerjian J. (08-01-2017. ) Evaluation of mobile cloud architectures.Pervasive and Mobile Computing, , 39 ,284-303 More Information
Abdo J.B.; Jreish R.; Demerjian J.; Atechian T. (07-14-2017. ) Optimizing Radio Resource Allocation in Multicast Mobile Networks.Proceedings - 19th IEEE International Conference on Computational Science and Engineering, 14th IEEE International Conference on Embedded and Ubiquitous Computing and 15th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, CSE-EUC-DCABES 2016, , 329-334 More Information
Abdo J.B. (06-12-2017. ) Authentication proxy as a service.2017 2nd International Conference on Fog and Mobile Edge Computing, FMEC 2017, , 45-49 More Information
Hamandi K.; Bou Abdo J.; Elhajj I.; Kayssi A.; Chehab A. (01-15-2017. ) A privacy-enhanced computationally-efficient and comprehensive LTE-AKA.Computer Communications, , 98 ,20-30 More Information
Chaaya G.; Metais E.; Abdo J.B.; Chiky R.; Demerjian J.; Barbar K. (01-01-2017. ) Evaluating non-personalized single-heuristic active learning strategies for collaborative filtering .Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017, , 2017-December ,593-600 More Information
Boudargham N.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (07-02-2016. ) Investigating low level protocols for Wireless Body Sensor Networks.Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, , 0 , More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (04-03-2016. ) Operator centric mobile cloud architecture.IEEE Wireless Communications and Networking Conference, WCNC, , 2982-2987 More Information
Abdo J.B.; Bourgeau T.; Demerjian J.; Chaouchi H. (01-01-2016. ) Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing.Mobile Information Systems, , 2016 , More Information
El Sibaï R.; Atéchian T.; Abdo J.; Demerjian J.; Tawil R. (12-11-2015. ) A new software-based service provision approach for vehicular cloud.GSCIT 2015 - Global Summit on Computer and Information Technology - Proceedings, , More Information
El Sibaï R.; Atéchian T.; Abdo J.; Tawil R.; Demerjian J. (11-24-2015. ) Connectivity-aware service provision in vehicular cloud.Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, , More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Atechian T. (10-19-2015. ) Enhanced Revenue Optimizing SLA-Based Admission Control for IaaS Cloud Networks.Proceedings - 2015 International Conference on Future Internet of Things and Cloud, FiCloud 2015 and 2015 International Conference on Open and Big Data, OBD 2015, , 225-230 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Atechian T.; Bassil C. (05-26-2015. ) Privacy using mobile cloud computing.2015 5th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2015, , 178-182 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (12-17-2014. ) Cloud federation means cash.2014 3rd International Conference on e-Technologies and Networks for Development, ICeND 2014, , 39-42 More Information
Abdo J.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G.; Atechian T. (03-09-2014. ) Cloud federation? We are not ready yet.Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014, , 831-834 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (01-01-2014. ) Single-Sign-On in operator centric mobile cloud architecture.Proceedings of the Mediterranean Electrotechnical Conference - MELECON, , 151-155 More Information
Abdo J.; Sarji I.; Elhajj I.; Chehab A.; Kayssi A. (01-01-2014. ) Application-aware fast dormancy in LTE.Proceedings - International Conference on Advanced Information Networking and Applications, AINA, , 194-201 More Information
Abdo J.B.; Demerjian J.; Chaouchi H.; Pujolle G. (07-12-2013. ) EC-AKA2 a revolutionary AKA protocol.International Conference on Computer Applications Technology, ICCAT 2013, , More Information
Abdo J.B.; Demerjian J.; Ahmad K.; Chaouchi H.; Pujolle G. (04-12-2013. ) EPS mutual authentication and crypt-analyzing SPAKA.2013 International Conference on Computing, Management and Telecommunications, ComManTel 2013, , 303-308 More Information
Abdo J.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (01-01-2013. ) Broker-based cross-cloud federation manager.2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, , 244-251 More Information
Bou Abdo J.; Chaouchi H.; Aoude M. (08-15-2012. ) Ensured confidentiality authentication and key agreement protocol for EPS.2012 Symposium on Broadband Networks and Fast Internet, RELABIRA 2012, , 73-77 More Information
Post Graduate Training and Education
09-2022 Wargaming: Constructing Simulations and Competitive Strategy Exercises, Center of Strategic & International Studies, , Washington D.C.
05-2021 Senior Executives in National and International Security, Harvard Kennedy School, , Cambridge, MA
Contact Information
Academic - bouabdjs@ucmail.uc.edu