Jacques Bou Abdo

Jacques Bou Abdo

Asst Professor

Email bouabdjs@ucmail.uc.edu

Professional Summary

Jacques Bou Abdo is an interdisciplinary researcher with expertise in complex systems, cybersecurity, cyber warfare, computational economics, and network economics. Dr. Bou Abdo is interested in the universality of laws governing networks and systems. His research has multiple applications such as: cyber and strategic deterrence, flow of information and disinformation in irregular warfare, flow of cyberattacks and network resiliency in cyber warfare, flow of infectious diseases in biological warfare and resilience of supply chains. Dr. Bou Abdo currently serves as assistant professor at the School of Information Technology at the University of Cincinnati.
 

Education

PhD in Management Sciences: Paris-Saclay University Paris, France, 2021 (Network Economics, Competition & Complexity Economics)

PhD in Computer Science: Sorbonne University Paris, France, 2014 (Cybersecurity)

ME in Telecommunication Networks: Saint Joseph University Beirut, Lebanon, 2011

BBA in Management: Lebanese University Beirut, Lebanon, 2010

Diplôme d'Ingénieur in Electrical and Electronics Engineering: Lebanese University Roumieh, Lebanon, 2009

Positions and Work Experience

06-2023 -07-2023 Visiting Professor, Northern Arizona University, Flagstaff, AZ

10-2021 -07-2023 Fellow, National Strategic Research Institute, Omaha, NE

01-2021 -06-2023 Assistant Professor, University of Nebraska, Kearney, NE

09-2015 -12-2020 NTT Assistant Professor, Notre Dame University, Lebanon

11-2020 -12-2020 Visiting Lecturer, ITMO University, Russia

05-2018 -09-2018 Fulbright Visiting Scholar, University of Kentucky, Lexinton, KY

01-2010 -07-2012 Cluster Support Engineer, Nokia Siemens Networks GmbH & Co. KG, Beirut, Lebanon

Research Support

Investigators:Dustin White, Christopher Yeaw, Jacques Bou Abdo 08-2022 -06-2023 National Strategic Research Institute Nuclear Deterrence Theory for a Multi-polar World Role:Co-PI 30000 Completed Type:Grant

Investigators:Jacques Bou Abdo 05-2018 -09-2018 U.S. Department of State Fulbright visiting scholar Role:Fellow Active Type:Fellowship

Publications

Peer Reviewed Publications

Bou Abdo J.; Zeadally S. (07-25-2022. ) Multi-utility framework: blockchain exchange platform for sustainable development.International Journal of Pervasive Computing and Communications, , 18 (4 ) ,388-406 More Information

El Sibai R.; Challita K.; Bou Abdo J.; Demerjian J. (06-15-2021. ) The impact of blockchain on cybersecurity management.Advances in Cybersecurity Management, , 116-138 More Information

Jurdi W.A.; Abdo J.B.; Demerjian J.; Makhoul A. (06-01-2021. ) Critique on Natural Noise in Recommender Systems.ACM Transactions on Knowledge Discovery from Data, , 15 (5 ) , More Information

Hajj S.; El Sibai R.; Bou Abdo J.; Demerjian J.; Makhoul A.; Guyeux C. (04-01-2021. ) Anomaly-based intrusion detection systems: The requirements, methods, measurements, and datasets.Transactions on Emerging Telecommunications Technologies, , 32 (4 ) , More Information

Boudargham N.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (03-01-2021. ) An optimal cluster-based routing algorithm for UCBSNs.Internet Technology Letters, , 4 (2 ) , More Information

Sibai R.E.; Challita K.; Abdo J.B.; Demerjian J. (03-01-2021. ) A new user-based incentive strategy for improving bike sharing systems’ performance.Sustainability (Switzerland), , 13 (5 ) ,1-18 More Information

Hajj S.; Sibai R.E.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A.; Ginhac D. (01-01-2021. ) A Critical Review on the Implementation of Static Data Sampling Techniques to Detect Network Attacks.IEEE Access, , 9 ,138903-138938 More Information

Challita K.; Abdo J.B. (01-01-2021. ) The Maximum (k, m)-Subsets Problem is in the Class NEXP .IAENG International Journal of Computer Science, , 48 (2 ) ,1-5

Bou Abdo J.; El Sibai R.; Demerjian J. (01-01-2021. ) Permissionless proof-of-reputation-X: A hybrid reputation-based consensus algorithm for permissionle.Transactions on Emerging Telecommunications Technologies, , 32 (1 ) , More Information

Abdo J.B.; Zeadally S. (01-01-2021. ) Neural network-based blockchain decision scheme.Information Security Journal, , 30 (3 ) ,173-187 More Information

El Sibai R.; Bou Abdo J.; Abou Jaoude C.; Demerjian J.; Chabchoub Y.; Chiky R. (11-24-2020. ) A cloud-based foundational infrastructure for water management ecosystem.Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, CloudTech 2020, , More Information

El Sibai R.; Bou Abdo J.; Abou Jaoude C.; Demerjian J.; Assaker J.; Makhoul A. (09-01-2020. ) Efficient anomaly detection on sampled data streams with contaminated phase I data.Internet Technology Letters, , 3 (5 ) , More Information

Bou Abdo J.; El Sibai R.; Kambhampaty K.; Demerjian J. (05-01-2020. ) Permissionless reputation-based consensus algorithm for blockchain.Internet Technology Letters, , 3 (3 ) , More Information

Boudargham N.; Bou Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (05-01-2020. ) Performance of low level protocols in high traffic wireless body sensor networks.Peer-to-Peer Networking and Applications, , 13 (3 ) ,850-871 More Information

Boudargham N.; Sibai R.E.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (02-01-2020. ) Toward fast and accurate emergency cases detection in BSNs.IET Wireless Sensor Systems, , 10 (1 ) ,47-60 More Information

El Sibai R.; Gemayel N.; Bou Abdo J.; Demerjian J. (02-01-2020. ) A survey on access control mechanisms for cloud computing.Transactions on Emerging Telecommunications Technologies, , 31 (2 ) , More Information

Guyeux C.; Charr J.C.; Abdo J.B.; Demerjian J. (01-01-2020. ) Advances in the enumeration of foldable self-avoiding walks.International Journal of Computational Science and Engineering, , 22 (4 ) ,365-375 More Information

Boudargham N.; Abdo J.B.; Demerjian J.; Makhoul A.; Guyeux C. (01-01-2020. ) Mobility aware and traffic adaptive hybrid MAC protocol for collaborative body sensor networks.International Journal of Sensor Networks, , 32 (3 ) ,182-196 More Information

Al Jurdi W.; Jaoude C.A.; Badran M.E.K.; Abdo J.B.; Demerjian J.; Makhoul A. (01-01-2019. ) SCCF Parameter and Similarity Measure Optimization and Evaluation.Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), , 11775 LNAI ,118-127 More Information

El Khoury Badran M.; Abdo J.B.; Jurdi W.; Demerjian J. (01-01-2019. ) Adaptive serendipity for recommender systems: Let it find you.ICAART 2019 - Proceedings of the 11th International Conference on Agents and Artificial Intelligence, , 2 ,739-745 More Information

Merhej J.; Demerjian J.; Fares K.; Abdo J.B.; Makhoul A. (01-01-2019. ) Geolocalization in smart environment.SENSORNETS 2019 - Proceedings of the 8th International Conference on Sensor Networks, , 108-115 More Information

Boudargham N.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (01-01-2019. ) Efficient cluster based routing protocol for collaborative body sensor networks.SENSORNETS 2019 - Proceedings of the 8th International Conference on Sensor Networks, , 94-101 More Information

Chaaya G.; Abdo J.B.; Métais E.; Chiky R.; Demerjian J.; Barbar K. (01-01-2019. ) Comparison of the non-personalized active learning strategies used in recommender systems.Lecture Notes in Business Information Processing, , 341 ,443-456 More Information

Dargham N.B.; Makhoul A.; Abdo J.B.; Demerjian J.; Guyeux C. (10-22-2018. ) Efficient hybrid emergency aware MAC protocol for wireless body sensor networks.Sensors (Switzerland), , 18 (10 ) , More Information

Al Jurdi W.; Bou Abdo J. (08-10-2018. ) DCS - Securing Short-Range Wireless Communication.2018 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2018, , More Information

Hassanieh L.A.; Jaoudeh C.A.; Abdo J.B.; Demerjian J. (06-01-2018. ) Similarity measures for collaborative filtering recommender systems.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-5 More Information

Boudargham N.; Abdo J.; Demerjian J.; Guyeux C.; Atechian T. (06-01-2018. ) Efficient cluster-based routing algorithm for body sensor networks.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information

Sibai R.E.; Abdo J.B.; Demerjian J.; Chabchoub Y.; Chiky R.; Barbar K. (06-01-2018. ) Information technology infrastructure for data streams native filtering.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information

Chaaya G.; Abdo J.B.; Demerjian J.; Chiky R.; Metais E.; Barbar K. (06-01-2018. ) An improved non-personalized combined-heuristic strategy for collaborative filtering recommender sys.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information

Boudargham N.; Abdo J.; Demerjian J.; Guyeux C.; Makhoul A. (06-01-2018. ) Collaborative body sensor networks: Taxonomy and open challenges.2018 IEEE Middle East and North Africa Communications Conference, MENACOMM 2018, , 1-6 More Information

Abdo J.B.; Jreish R.; Demerjian J. (01-01-2018. ) Extended optimisation mechanism for radio resource allocation in multicast mobile networks.International Journal of Mobile Network Design and Innovation, , 8 (3 ) ,157-167 More Information

Jurdi W.; Abdo J. (08-31-2017. ) Dual channel security.ACM International Conference Proceeding Series, , Part F130524 , More Information

Bou Abdo J.; Demerjian J. (08-01-2017. ) Evaluation of mobile cloud architectures.Pervasive and Mobile Computing, , 39 ,284-303 More Information

Abdo J.B.; Jreish R.; Demerjian J.; Atechian T. (07-14-2017. ) Optimizing Radio Resource Allocation in Multicast Mobile Networks.Proceedings - 19th IEEE International Conference on Computational Science and Engineering, 14th IEEE International Conference on Embedded and Ubiquitous Computing and 15th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, CSE-EUC-DCABES 2016, , 329-334 More Information

Abdo J.B. (06-12-2017. ) Authentication proxy as a service.2017 2nd International Conference on Fog and Mobile Edge Computing, FMEC 2017, , 45-49 More Information

Hamandi K.; Bou Abdo J.; Elhajj I.; Kayssi A.; Chehab A. (01-15-2017. ) A privacy-enhanced computationally-efficient and comprehensive LTE-AKA.Computer Communications, , 98 ,20-30 More Information

Chaaya G.; Metais E.; Abdo J.B.; Chiky R.; Demerjian J.; Barbar K. (01-01-2017. ) Evaluating non-personalized single-heuristic active learning strategies for collaborative filtering .Proceedings - 16th IEEE International Conference on Machine Learning and Applications, ICMLA 2017, , 2017-December ,593-600 More Information

Boudargham N.; Abdo J.B.; Demerjian J.; Guyeux C.; Makhoul A. (07-02-2016. ) Investigating low level protocols for Wireless Body Sensor Networks.Proceedings of IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, , 0 , More Information

Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (04-03-2016. ) Operator centric mobile cloud architecture.IEEE Wireless Communications and Networking Conference, WCNC, , 2982-2987 More Information

Abdo J.B.; Bourgeau T.; Demerjian J.; Chaouchi H. (01-01-2016. ) Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing.Mobile Information Systems, , 2016 , More Information

El Sibaï R.; Atéchian T.; Abdo J.; Demerjian J.; Tawil R. (12-11-2015. ) A new software-based service provision approach for vehicular cloud.GSCIT 2015 - Global Summit on Computer and Information Technology - Proceedings, , More Information

El Sibaï R.; Atéchian T.; Abdo J.; Tawil R.; Demerjian J. (11-24-2015. ) Connectivity-aware service provision in vehicular cloud.Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, , More Information

Abdo J.B.; Demerjian J.; Chaouchi H.; Atechian T. (10-19-2015. ) Enhanced Revenue Optimizing SLA-Based Admission Control for IaaS Cloud Networks.Proceedings - 2015 International Conference on Future Internet of Things and Cloud, FiCloud 2015 and 2015 International Conference on Open and Big Data, OBD 2015, , 225-230 More Information

Abdo J.B.; Demerjian J.; Chaouchi H.; Atechian T.; Bassil C. (05-26-2015. ) Privacy using mobile cloud computing.2015 5th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2015, , 178-182 More Information

Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (12-17-2014. ) Cloud federation means cash.2014 3rd International Conference on e-Technologies and Networks for Development, ICeND 2014, , 39-42 More Information

Abdo J.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G.; Atechian T. (03-09-2014. ) Cloud federation? We are not ready yet.Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014, , 831-834 More Information

Abdo J.B.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (01-01-2014. ) Single-Sign-On in operator centric mobile cloud architecture.Proceedings of the Mediterranean Electrotechnical Conference - MELECON, , 151-155 More Information

Abdo J.; Sarji I.; Elhajj I.; Chehab A.; Kayssi A. (01-01-2014. ) Application-aware fast dormancy in LTE.Proceedings - International Conference on Advanced Information Networking and Applications, AINA, , 194-201 More Information

Abdo J.B.; Demerjian J.; Chaouchi H.; Pujolle G. (07-12-2013. ) EC-AKA2 a revolutionary AKA protocol.International Conference on Computer Applications Technology, ICCAT 2013, , More Information

Abdo J.B.; Demerjian J.; Ahmad K.; Chaouchi H.; Pujolle G. (04-12-2013. ) EPS mutual authentication and crypt-analyzing SPAKA.2013 International Conference on Computing, Management and Telecommunications, ComManTel 2013, , 303-308 More Information

Abdo J.; Demerjian J.; Chaouchi H.; Barbar K.; Pujolle G. (01-01-2013. ) Broker-based cross-cloud federation manager.2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, , 244-251 More Information

Bou Abdo J.; Chaouchi H.; Aoude M. (08-15-2012. ) Ensured confidentiality authentication and key agreement protocol for EPS.2012 Symposium on Broadband Networks and Fast Internet, RELABIRA 2012, , 73-77 More Information

Post Graduate Training and Education

09-2022 Wargaming: Constructing Simulations and Competitive Strategy Exercises, Center of Strategic & International Studies, , Washington D.C.

05-2021 Senior Executives in National and International Security, Harvard Kennedy School, , Cambridge, MA

Contact Information

Academic - bouabdjs@ucmail.uc.edu