Sign In
  • A-
  • A
  • A+
  • ع
  • A-
  • A
  • A+
  • ع
Prof.Madjid Merabti Dean of the College of Sciences Academic RankProfessor

Research Interests:

  • Distributed Multimedia Systems, Network Security, Networking, Wireless & Mobile Computing, Networked Appliances, Forensic Computing, Games Technology, Creative Technology.

Contact

Recent Keynote Talks at International Events UK’15 - “The Challenge of Cascading Effects of Cyber-Attacks in a Network of Critical Infrastructures”, 14th European Conference on Cyber Warfare and Security (ECCWS- 2015), , University of Hertfordshire, Hatfield, England, July 2-3, 2015. Netherlands’15 - “IoT: Safety and Security of Human Digital Memories”, TNO 8th UFBB, June 27-30, 2015, The Hague, Netherlands. Bali’14 - “ICT for Low Carbon Smart Cities”, 3rd International Conference on Sustainable Technology and Development (ICSTD’14), October 29-31, 2014, Bali, Indonesia. Cyprus’14 - “Three Decades of Ubiquitous Computing Development: Opportunities and New Challenges “, 9th IEEE International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob 2014), Larnaca, Cyprus, October 8-10, 2014. Jordan’13 - “Managing Macro and Micro Production and Distribution of Electricity”, 1st Int. Conference & Exhibition on the Applications of Information Technology in Developing Renewable Energy Processes and Systems, Amman-Jordan 29th-31st May 2013. Colombia’13 - “Cloud Computing and Security”, Cátedra Europa 2013, Universidad Del Norte, March 18-22, Barranquilla, Colombia, Ireland’12 - “Security as a Service for Mobile Cloud”, 5th IEEE Wireless Days Conference, November, 21-23, 2012, Dublin, Ireland. Ireland ’12 - “Security in a federated world – How can you trust somebody when you’ve only just been introduced? “, tmforum – Management World, Dublin, Ireland, 21 - 24 May 2012. UK ’12 - “Protecting Our Critical National Infrastructure From Cyber Security Attacks “, Inside Government - UK Cyber Security Strategy: Embracing Innovation, Managing Threats forum, London, 20 March 2012. Journal Editorships 1. Area Editor, “Consumer Communications”, IEEE Communications Magazine, 2010 – Now. 2. Associate Editor, “Security and Communications Networks”, Wiley, July 2007 – Now. 3. Editorial Board Member, “Journal of Computer Systems, Networking, and Communications”, Hindawi Pub., June 2007 – Now. 4. Editorial Board Member, “Peer-to-Peer Networking and Applications Journal”, Springer, January 2007 – Now. 5. Editor Board Member, “Computer Communications Journal”, Elsevier, 2000 – – Now
Publications in 2013 and 2014 Journal Articles 1. Hurst, W., Merabti, M., et al., “Protecting Critical Infrastructures Through Behavioural Observations”, International Journal of Critical Infrastructures., 2014. 2. Shi, Q., Zhang, N., Merabti, M., “Fair Signature Exchange via Delegation on Ubiquitous Networks”, Journal of Computer and System Sciences, (81, 4,), 2014. 3. Duarte, R., El Rhalibi, A., Merabti, M., “Coarticulation and Speech Synchronization in MPEG-4 based Facial Animation”, Kybernetes. (43, 8,), 2014. 4. Begen, A., Kolberg, M. & Merabti, M., “Trends in Consumer Communications: Networked Homes”, IEEE Communications Magazine, 2014. 5. Younis, Y., Kifayat, K. & Merabti, M., “An Access Control Model for Cloud Computing”, Journal of Information Security and Applications. (19, 45-60), 2014. 6. Pla Beltran, L., Merabti, M. & Hurst, W., “Using Behavioural Observation and Game Technology to Support Critical Infrastructure Security”, International Journal of Systems of Systems Engineering. (5, 1, 45-67), 2014. 7. Bouhafs, F. & Merabti, M., “,A Layered Communication Architecture for Power Routing in the Smart Grid”, International Journal of Information Technology and Web Engineering, (9(1), 59-69), 2014. 8. Dobbins, C., Merabti, M., Fergus, P., Llewellyn-Jones, D., “Creating Human Digital Memories with the Aid of Pervasive Mobile Devices”, Pervasive and Mobile Computing Journal, 2013. 9. Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K, “Lightweight Sybil Attack Detection in MANETS”, IEEE Systems Journal. (7, 2, 236-248), 2013. 10. Dobbins, C., Merabti, M., Fergus, P., Llewellyn-Jones, D., “Exploiting Linked Data to Create Rich Human Digital Memories”, Computer Communications. (36, 1-16), 2013. 11. Goudoulakis, E., Rhalibi, A., Merabti, M., “DIEGESIS - A Novel Multi-Agent Planning System for Digital Interactive Storytelling”, ACM Journal Computer in Entertainment, 2013. 12. Shi, Q., Zahang, N., Merabti, M., Kifayat, K., “Resource-Effficient Key Establishment in Heterogeneous Wireless Sensor Networks”, Journal of Parallel and Distributed Computing, (73, 2, 235-249), 2013. 13. Dobbins, C., Fergus, P., Merabti, M., et al., “Monitoring and Reducing Sedentary Behavior in the Elderly with the Aid of Human Digital Memories”, Telemedicine and e-Health Journal. (173 - 185), 2013. 14. Macdermott, A., Shi, Q., Merabti, M., Kifayat, K., “Hosting Critical Infrastructures Services in the Cloud Environment Considerations”, International Journal of Critical Infrastructures, (10, 3,), 2013. 15. Begen, A., Kolberg, M. & Merabti, M., “Trends in Consumer Communications. Trends in Consumer Communications”. IEEE Communications Magazine, 2013. 16. Lian, S., Merabti, M., “Innovative Multimedia Communications and Services”, Telecommunications Systems. (53, 3, 9727-9), 2013. 17. Benahmed, K., Merabti, M., Haffaf, H., “Distributed Monitoring for Misbehaviour Detection in Wireless Sensor Networks”, Wiley Security and Communications Networks. (6, 4, 388-400), 2013. 18. Kifayat, K., Merabti, M., Shi, Q., Abbas, S., “Component-based Security System (COMSEC) with QoS for Wireless Sensor Networks”, Wiley Security and Communications Networks. (6, 4,), 2013. 19. Shi, Q., Zhang, N., Merabti, M., Kifayat, K. “Resource-efficient Authentic Key Establishment in Heterogeneous Wireless Sensor Networks”, Journal of Parallel and Distributed Computing. (73, 2, 235-249), 2013. 20. Baharon, M., Shi, Q., LLewellyn-Jones, D., Merabti, M., “Secure Remote Data Processing in Cloud Computing”, International Journal of Computer Theory and Engineering, (5),2013. Books 1. Bouhafs, F., Mackay, M. & Merabti, M., Communication Challenges and Solutions in the Smart Grid, Springer, 2014. Book Chapters 1. Brucker, A., Malmignati, F., Merabti, M., et al, “The Aniketos Service Composition Framework”, Secure and Trustworthy Service Composition (13518-2). , Springer International Publishing, 2014. 2. Llewellyn-Jones, D., Shi, Q., Merabti, M, “Extending ADP Principles for the Description of Network Security Patterns”, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns (). , Springer, 2014. 3. Kifayat, K., Mackay, M., Merabti, M., et al, “Real-Time Management in Cloud Computation”, Security Engineering for Cloud Computation: Approaches and Tools (). , IGI Global, 2013. 4. Lempereur, B., Merabti, M., “Pypette: A Platform for the Evaluation of Live Digital Forensics”, Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, Information Science Reference, 2013. 5. Lempereur, B., Ayed, D., Asim, M., Merabti, M., Shi, Q., “Monitoring Threats to Composite Services within the Aniketos Run-Time Framework”, Secure and Trustworthy Composition, Springer International Publishing, 2014. 6. Hoque, S., Rahim, A., Llewellyn-Jones, D., Merabti, M., “Security Property Lifecycle Management for Secure Service Compositions”, Cyber Security and Privacy, Springer, 2013. Proceedings 1. Hurst, W., Merabti, M., Fergus, P., “A Survey of Critical Infrastructure Security”, 11th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, 2014. 2. Hurst, W., Merabti, M. & Fergus, P., “Big Data Analysis Techniques for Cyber-Threat Detection In Critical Infrastructures”, 28th IEEE International Conference on Advanced Information Networking and Applications, Victoria, Canada, 05/2014, IEEE 3. Younis, Y., Kifayat, K., Merabti, M., “Cache-Side Channel Attacks in Cloud Computing”, 2nd International Conference on Cloud Security Management - ICSM 2014, 2014. 4. Dobbins, C., Merabti, M., Fergus, P., LLewellyn-Jones, D., “The Big Data Obstacle of Lifelogging”, 28th IEEE International Conference on Advanced Information Networking and Applications, Victoria, Canada, IEEE, 2014. 5. Baharon, M., Shi, Q., Llewellyn-Jones, D., Merabti, M., “Secure Video Transcoding in Cloud Computing”, 2nd International Conference on Cloud Security Management, ACAD Conference Ltd, UK, 2014. 6. MacDermott, A., Hurst, W., Shi, Q., Merabti, M., “Simulating Critical Infrastructure Cascading Failure”, 16th International Conference on Computer Modelling and Simulation, Cambridge, UK - 03/2014 7. Song, C., Xiao, P., Sudirman, S., Merabti, M., “Region Adaptive Digital Image Watermarking System using DWT-SVD Algorithm”, 2014 NASA/ESA Conference on Adaptive Hardware and Systems, USA, 2014. 8. Zhou, B., LLewellyn-Jones, D., Shi, Q., Merabti, M., Asim, M., “Prototype for Design Time Secure and Trustworthy Service Composition”, 10th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, IEEE, 2013. 9. Baharon, M., Shi, Q., Llewellyn-Jones, D., Merabti, M., “Secure Rendering Process in Cloud Computing”, 11th IEEE International Conference on Privacy, Security, and Trust (PST), USA, IEEE, 2013. 10. Asim, M., Llewellyn-Jones, D., Lempereur, B., Zhou, B., Merabti, M., “Event Driven Monitoring of Composite Services”, IEEE International Conference on Social Computing (SocialCom 2013), Washington, DC, USA, IEEE, 2013. 11. Garcia Rodriguez, M., Ortin Soler, F., Llewellyn-Jones, D., Merabti, M., “Performance Cost Evaluation of Aspect Weaving”, 36Th Australasian Computer Science Conference (ACS 2013), Adelaide, Australia, 2013. 12. Kozal, A., Merabti, M., Bouhafs, F., “Spectrum Sensing Energy Tradeof in Multi-hop Cluster-Based Cooperative Cognitive Radio Networks”, IEEE INFOCOM, USA, IEEE, 2014. 13. Alohali, B., Merabti, M., Kifayat, K., “A Cloud of Things (CoT) Based Security for Home Area Networks in the Smart Grid”, 8th IEEE International Conference on Next Generation Mobile Apps, Services and Technology, Oxford, UK, IEEE, 2014. 14. Shone, N., Shi, Q., Merabti, M., Kifayat, K, “Misbehaviour Monitoring on Systems of Systems Components”, 8th International Conference on risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France, 23 October 2013. 15. Shone, N., Shi, Q., Merabti, M., Kifayat, K., “Towards Efficient Collaborative Behavioural Monitoring in a System-of-Systems”, 10th IEEE InternationalConference on Autonomic and Trusted Computing, Vietri sul Mare, Sorrento, Italy, December 18-21, 2013, IEEE 16. MacDermott, A., Shi, Q., Merabti, M., Kifayat, K., “Considering an Elastic Scaling Model for Cloud Security”, 8th IEEE International Conference for Internet Technology and Secured Transactions (ICITST), London, IEEE, 2013. 17. Carter, C., El Rhalibi, A., Merabti, M., “A Novel Scalable Hybrid Architecture for MMOG”, IEEE International Conference on Multimedia and Expo Workshops (ICMEW), USA, IEEE, 2013. 18. Sabino, M., Merabti, M. & al, E. (01/01/2013). Detecting Software Aging in Safety-Critical Infrastrcutures, Science and Information Conference (SAI), USA, 2013. 19. Parreira Duarte, R., El Rhalibi, A., Merabti, M., “Survey and Evaluation of MPEG4-Based 3D Character Animation Frameworks”, 5th International Conference on Games and Virtual Worlds for Serious Applications, 2013. 20. Shone, N., Shi, Q., Merabti, M., “Securing Complex System-of-Systems Compositions”, 12th European Conference on Information Warfare and Security - ECIW 2013, Finland, 2013.