Sitemap
A list of all the posts and pages found on the site. For you robots out there, there is an XML version available for digesting as well.
Pages
Posts
Future Blog Post
This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.
Blog Post number 4
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 3
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 2
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Blog Post number 1
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
events
Best Paper Award at ICACTCE’24
I am honored to receive the Best Paper Award at the 4th International Conference on Advances in Communication Technology and Computer Engineering (ICACTCE’24) for our paper “Securing O-RAN with Zero Trust Architecture and Large Language Models.”
Machine Learning for Cybersecurity Workshop
Technical workshop on ML applications in threat detection, covering supervised learning techniques for malware detection and anomaly detection systems.
Blockchain Security Conference
Conference on blockchain applications in cybersecurity frameworks, exploring decentralized security architectures and smart contract security.
Cybersecurity Research Symposium
Annual symposium featuring latest research in network security, featuring presentations from leading cybersecurity researchers across Quebec.
Workshop: AI Security in IoT Networks
Hands-on workshop on implementing AI-driven security solutions for Internet of Things networks. Practical sessions on threat detection and mitigation strategies.
International Conference on Cybersecurity and AI
Leading conference bringing together researchers and practitioners in cybersecurity and artificial intelligence. Featuring cutting-edge research presentations and collaborative workshops.
2nd Workshop on AI and (cyber)security: Friend or Foe?
I will be speaking as a keynote speaker at the 2nd Workshop on AI and (cyber)security: Friend or Foe? at IEEE SMC 2025, which will take place on October 5-8, 2025 in Vienna, Austria.
news
Speaking at IEEE SMC Workshop on AI and Cybersecurity
I will be speaking at the IEEE SMC Workshop on AI and Cybersecurity: Friend or Foe? at SMC 2025 in October 2025.
portfolio
Portfolio item number 1
Short description of portfolio item number 1
Portfolio item number 2
Short description of portfolio item number 2 
publications
An IoT Blockchain Architecture Using Oracles and Smart Contracts: the Use-Case of a Food Supply Chain
H. Moudoud, S. Cherkaoui and L. Khoukhi. (2019). "An IoT Blockchain Architecture Using Oracles and Smart Contracts: the Use-Case of a Food Supply Chain." 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1-6.
Data-Quality Based Scheduling for Federated Edge Learning
A. Taïk, H. Moudoud and S. Cherkaoui. (2021). "Data-Quality Based Scheduling for Federated Edge Learning." IEEE 46th Conference on Local Computer Networks (LCN), pp. 17-23.
Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT
H. Moudoud, L. Khoukhi and S. Cherkaoui. (2021). "Prediction and Detection of FDIA and DDoS Attacks in 5G Enabled IoT." IEEE Network, vol. 35, no. 2, pp. 194-201.
Towards a Secure and Reliable Federated Learning using Blockchain
Hajar Moudoud, Soumaya Cherkaoui, Lyes Khoukhi. (2022). "Towards a Secure and Reliable Federated Learning using Blockchain." arXiv preprint. arXiv:2201.11311.
Towards a Scalable and Trustworthy Blockchain: IoT Use Case
Hajar Moudoud, et al. (2022). "Towards a Scalable and Trustworthy Blockchain: IoT Use Case." arXiv preprint. arXiv:2201.11337.
Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model
H. Moudoud, Z. Mlika, L. Khoukhi and S. Cherkaoui. (2022). "Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model." IEEE Transactions on Network Science and Engineering, vol. 9, no. 5, pp. 2978-2990.
Toward Secure and Private Federated Learning for IoT using Blockchain
H. Moudoud and S. Cherkaoui. (2022). "Toward Secure and Private Federated Learning for IoT using Blockchain." GLOBECOM 2022 - IEEE Global Communications Conference, pp. 4316-4321.
Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach
H. Moudoud and S. Cherkaoui. (2023). "Empowering Security and Trust in 5G and Beyond: A Deep Reinforcement Learning Approach." IEEE Open Journal of the Communications Society, vol. 4, pp. 2410-2420.
Multi-tasking Federated Learning meets Blockchain to Foster Trust and Security in the Metaverse
H. Moudoud and S. Cherkaoui. (2023). "Multi-tasking Federated Learning meets Blockchain to Foster Trust and Security in the Metaverse." Ad Hoc Networks, vol. 150, p. 103264.
Securing Federated Learning through Blockchain and Explainable AI for Robust Intrusion Detection in IoT Networks
Z. Abou El Houda, H. Moudoud, B. Brik and L. Khoukhi. (2023). "Securing Federated Learning through Blockchain and Explainable AI for Robust Intrusion Detection in IoT Networks." IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1-6.
Federated Learning Meets Blockchain to Secure the Metaverse
H. Moudoud and S. Cherkaoui. (2023). "Federated Learning Meets Blockchain to Secure the Metaverse." 2023 International Wireless Communications and Mobile Computing (IWCMC), pp. 339-344.
Secure and Efficient Federated Learning for Robust Intrusion Detection in IoT Networks
Z. Abou El Houda, H. Moudoud and L. Khoukhi. (2023). "Secure and Efficient Federated Learning for Robust Intrusion Detection in IoT Networks." GLOBECOM 2023 - IEEE Global Communications Conference, pp. 2668-2673.
Strengthening Open Radio Access Networks: Advancing Safeguards Through ZTA and Deep Learning
H. Moudoud, W. Hamhoum and S. Cherkaoui. (2023). "Strengthening Open Radio Access Networks: Advancing Safeguards Through ZTA and Deep Learning." GLOBECOM 2023 - IEEE Global Communications Conference, pp. 80-85.
Cyber Security for Next-Generation Computing Technologies
Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Muhammad Fazal Ijaz, Hajar Moudoud. (2024). "Cyber Security for Next-Generation Computing Technologies." CRC Press.
Federated Deep Reinforcement Learning for Efficient Jamming Attack Mitigation in O-RAN
H. Moudoud, S. Cherkaoui and L. Khoukhi. (2024). "Federated Deep Reinforcement Learning for Efficient Jamming Attack Mitigation in O-RAN." IEEE Transactions on Vehicular Technology, vol. 73, no. 6, pp. 8457-8471.
Advancing Security and Trust in WSNs: A Federated Multi-Agent Deep Reinforcement Learning Approach
Hajar Moudoud, Zakaria Abou El Houda, Bouziane Brik. (2024). "Advancing Security and Trust in WSNs: A Federated Multi-Agent Deep Reinforcement Learning Approach." IEEE Transactions on Consumer Electronics.
Reputation-Aware Scheduling for Secure Internet of Drones: A Federated Multi-Agent Deep Reinforcement Learning Approach
Hajar Moudoud, Zakaria Abou El Houda, Bouzian Brik. (2024). "Reputation-Aware Scheduling for Secure Internet of Drones: A Federated Multi-Agent Deep Reinforcement Learning Approach." IEEE INFOCOM 2024 Workshops.
Securing the Metaverse: The Intersection of ML-Based Oracles and Blockchain Technology
Hajar Moudoud, Zakaria Abou El Houda, Bouziane Brik. (2024). "Securing the Metaverse: The Intersection of ML-Based Oracles and Blockchain Technology." IEEE Conference on Metaverse Technologies. Best Paper Award.
A Privacy-Preserving Framework for Efficient Network Intrusion Detection in Consumer Network Using Quantum Federated Learning
Z. Abou El Houda, H. Moudoud, B. Brik and M. Adil. (2024). "A Privacy-Preserving Framework for Efficient Network Intrusion Detection in Consumer Network Using Quantum Federated Learning." IEEE Transactions on Consumer Electronics.
Zero Trust Security Architecture for 6G Open Radio Access Networks (ORAN)
H. Moudoud, Z. Abou El Houda and B. Brik. (2024). "Zero Trust Security Architecture for 6G Open Radio Access Networks (ORAN)." IEEE Networking Letters, vol. 6, no. 4, pp. 272-275.
Blockchain Meets O-RAN: A Decentralized Zero-Trust Framework for Secure and Resilient O-RAN in 6G and Beyond
Z. Abou El Houda, H. Moudoud and L. Khoukhi. (2024). "Blockchain Meets O-RAN: A Decentralized Zero-Trust Framework for Secure and Resilient O-RAN in 6G and Beyond." IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1-6.
Blockchain-Enabled Federated Learning for Enhanced Collaborative Intrusion Detection in Vehicular Edge Computing
Z. Abou El Houda, H. Moudoud, B. Brik and L. Khoukhi. (2024). "Blockchain-Enabled Federated Learning for Enhanced Collaborative Intrusion Detection in Vehicular Edge Computing." IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 7, pp. 7661-7672.
Securing O-RAN with Zero Trust Architecture and Large Language Models
H. Moudoud, Z. Abou El Houda and B. Brik. (2025). "Securing O-RAN with Zero Trust Architecture and Large Language Models." Proceedings of the 4th International Conference on Advances in Communication Technology and Computer Engineering (ICACTCE), pp. 357-368. Best Paper Award.
Digital Forensics in Next-Generation Internet for Medical Things
Hemant Kumar Saini, Sita Rani, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, Hajar Moudoud. (2025). "Digital Forensics in Next-Generation Internet for Medical Things." CRC Press.
When Federated Learning Meets Knowledge Distillation to Secure Consumer Edge Network
Z. Abou El Houda, H. Moudoud and B. Brik. (2025). "When Federated Learning Meets Knowledge Distillation to Secure Consumer Edge Network." IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 7192-7200.
MetaPower: Empowering Peer-to-Peer Energy Trading in the Metaverse With Digital Twins and Blockchain
H. Moudoud, Z. Abou El Houda, B. Brik, S. Harous and S. Abbas. (2025). "MetaPower: Empowering Peer-to-Peer Energy Trading in the Metaverse With Digital Twins and Blockchain." IEEE Systems, Man, and Cybernetics Magazine, vol. 11, no. 2, pp. 14-20.
An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection
A. Kadi, A. Selamnia, Z. Abou El Houda, H. Moudoud, B. Brik and L. Khoukhi. (2025). "An In-Depth Comparative Study of Quantum-Classical Encoding Methods for Network Intrusion Detection." IEEE Open Journal of the Communications Society, vol. 6, pp. 1129-1148.
Integrating Zero Trust Architecture in O-RAN: A Comprehensive Survey and Analysis
A. Mehrban, Z. Abou El Houda, H. Moudoud and L. Bao Le. (2025). "Integrating Zero Trust Architecture in O-RAN: A Comprehensive Survey and Analysis." IEEE Open Journal of the Communications Society, vol. 6, pp. 10465-10495.
Graph Neural Network Framework for Advanced Persistent Threat Detection in IIoT Environments
K. Merzouki, Y. Hadi, H. Elghazi, H. Moudoud and Z. Abou El Houda. (2025). "Graph Neural Network Framework for Advanced Persistent Threat Detection in IIoT Environments." 2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1-7.
A Blockchain-Based Cross-Domain DDoS Mitigation in Consumer Networks
H. Moudoud, Z. Abou El Houda and B. Brik. (2025). "A Blockchain-Based Cross-Domain DDoS Mitigation in Consumer Networks." IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 7095-7104.
Advancing Robustness and Privacy in Federated Learning for Secure Autonomous Vehicle Systems
H. Moudoud, Z. Abou El Houda, B. Brik, M. A. Jan and B. Alshawi. (2025). "Advancing Robustness and Privacy in Federated Learning for Secure Autonomous Vehicle Systems." IEEE Transactions on Consumer Electronics, vol. 71, no. 2, pp. 6183-6192.
A Blockchain-Enabled Multi-Layered Zero-Trust Security Framework for O-RAN
A. Mehrban, Z. Abou El Houda, H. Moudoud, B. Brik and L. Khoukhi. (2025). "A Blockchain-Enabled Multi-Layered Zero-Trust Security Framework for O-RAN." IEEE International Wireless Communications and Mobile Computing (IWCMC), pp. 1564-1569.
Blockchain-Based Federated Learning for Enhanced Cyber-Threats Detection in Connected Vehicles
H. Amari, Z. Abou El Houda, H. Moudoud, L. Khoukhi and L. Hadrich Belguith. (2025). "Blockchain-Based Federated Learning for Enhanced Cyber-Threats Detection in Connected Vehicles." ICC 2025 - IEEE International Conference on Communications, pp. 4257-4262.
An SDN-based Adaptive Ensemble Learning Framework for Intrusion Mitigation in Wireless Networks
H. Moudoud, Z. Abou El Houda, L. Khoukhi and H. T. Mouftah. (2025). "An SDN-based Adaptive Ensemble Learning Framework for Intrusion Mitigation in Wireless Networks." ICC 2025 - IEEE International Conference on Communications, pp. 554-559.
LLMs to Secure Consumer Networks: Open Problems and Future Directions
H. Moudoud, Z. Abou El Houda and B. Brik. (2025). "LLMs to Secure Consumer Networks: Open Problems and Future Directions." IEEE Consumer Electronics Magazine, vol. 14, no. 5, pp. 51-59.
Advancing Privacy and Fairness in Healthcare Using Federated Edge Learning and Blockchain
H. Moudoud, Z. Abou El Houda and B. Brik. (2025). "Advancing Privacy and Fairness in Healthcare Using Federated Edge Learning and Blockchain." IEEE Internet of Things Journal, vol. 12, no. 22, pp. 46129-46137.
students
Abdelghani El Cheddadi
Thesis Title: Governance of Artificial Intelligence: From Ethical Foundations to Professional Certification Standards
Abderrahman Elhajjout
Thesis Title: Towards an Automated Security Framework for IoT Networks Using LLMs
Abdoul Faycal Zoungrana
Thesis Title: Utilisation de modèles d’intelligence artificielle générative et adaptative pour la détection d’intrusions dans des environnements de cybermenaces dynamiques
Ali Mehrban
Thesis Title: Edge-AI Automation for Securing Next-Generation Wireless Networks: A Framework for Autonomous Threat Detection and Mitigation
Amadou Brie Tounkara
Thesis Title: Intrusion Detection using Reinforcement Learning
Dylan Richard
Thesis Title: Decentralized File Management: Enhancing Security and Accessibility with Blockchain Technology
Edgar Lefevre
Project Title: NetGuard: Designing a Cybersecurity Dome for Proactive Network Monitoring and Defense
Jean Jarcke Mukombelwa Malasi
Thesis Title: Large Language Models and Generative AI in Cybersecurity
Maxime Lefebvre
Thesis Title: Towards Secure and Fair Machine Learning: Developing Robust Frameworks for Bias-Resilient and Attack-Resistant AI Systems
Megane Labelle
Project Title: Using Artificial Intelligence Models for Intrusion Detection in Computer Networks
Ousmane Alassane Soultana
Thesis Title: Enhancing Intrusion Detection Systems through Machine Learning: Towards Adaptive and Intelligent Security Solutions
Petit Uriel Kiaku
Project Title: Intelligent Real-Time Surveillance System Using Computer Vision: Preventive Detection of Risky Behaviors in Public Spaces
Reda Bensouda
Thesis Title: Cybersecurity and Digital Transformation
talks
Talk 1 on Relevant Topic in Your Field
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Conference Proceeding talk 3 on Relevant Topic in Your Field
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
teaching
Teaching experience 1
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Teaching experience 2
Workshop, University 1, Department, 2015
This is a description of a teaching experience. You can use markdown like any other post.