Mohamed Ben Farah
Lecturer in Networks and Cyber Security
- Email:
- mohamed.benfarah@bcu.ac.uk
Mohamed (BEng, MSc, PhD, HDR) is a Lecturer in Cyber Security at Birmingham City University. Prior to this position, he was a research associate in Cyber Security at the Institute for Signals, Sensors and Communications with the Department of Electronic and Electrical Engineering at the University of Strathclyde.
Mohamed has published over 30 journal and conference papers and has organised conferences and workshops in Cyber Security, Cryptography and Artificial Intelligence. He is a reviewer for world-leading academic conferences and journals and is the Outreach Lead of the Blockchain Group for IEEE UK and Ireland.
If you are interested in joining this research team in cyber security, please do not hesitate to get in touch with Dr Mohamed on mohamed.benfarah@bcu.ac.uk.
Qualifications
- PhD
- HDR (Accreditation to Supervise Research)
- MSc
- BEng
Memberships
- Blockchain Group for IEEE UK and Ireland
Teaching
- MSc Cyber Security
- BSc Cyber Security
- BSc Networks and Cyber Security
- BSc Digital Forensics
Research
- Cyber Security in the Maritime Industry
- Cyber-attacks and mitigation strategies
- Cyber Range
- Cryptography in IoT networks
Postgraduate Supervision
Mohamed is supervising undergraduate, postgraduate and PhD students.
Publications
- Maxence Lannuzel, Mohamed Ben Farah, Xavier Bellekens, David Brosset. Digital investigation on ships: a Voyage Data Recorder implementation. 6th NMIOTC Cybersecurity conference in maritime domain-27-28 SEP 2022.
- Elochukwu Ukwandu, Mohamed Amine Ben-Farah, Hanan Hindy, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Ivan Andonovic, and Xavier Bellekens. Cyber-security challenges in aviation industry: a review of current and future trends. Information, 13(3):146, 2022
- Mohamed Amine Ben Farah, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. Cyber security in the maritime industry: a systematic survey of recent advances and future trends. Information, 13(1):22, 2022
- Ahmed Osman, Raouf Abozariba, A. Taufiq Asyhari, Adel Aneiba, M. Ben Farah. Detection of JavaScript Injection Eavesdropping on WebRTC communications. International Conference on Smart Computing for Smart Cities (SC2)-2022.
- Eleni-Constantina Davri, Eleni Darra, Isidoros Monogioudis, Athanasios Grigoriadis, Christos Iliou, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Adamantini Peratikou, Helen Gibson, Damir Haskovic, Dimitrios Kavallieros, Evangelos Chaskos, Peng Zhao, Stavros Shiaeles, Nick Savage, Babak Akhgar, Xavier Bellekens, Mohamed Amine Ben Farah. Cyber Security Certification Programmes. IEEE International Conference on Cyber Security and Resilience (CSR), Pages 428-435, 2021
- Ramzi Guesmi and MA Ben Farah. A new efficient medical image cipher based on hybrid chaotic map and dna code. Multimedia Tools and Applications, pages 1-20, 2021
- Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, and Xavier Bellekens. A review of cyber-ranges and test-beds: current and future trends. Sensors, 20(24):7148, 2020
- MA Ben Farah, R Guesmi, A Kachouri, and M Samet. A novel chaos based optical image encryption using fractional fourier transform and dna sequence operation. Optics & Laser Technology, 121:105777, 2020
- MA Ben Farah, R Guesmi, A Kachouri, and M Samet. A new design of cryptosystem based on s-box and chaotic permutation. Multimedia Tools and Applications, pages 1-22, 2020
- MA Ben Farah, A Farah, and T Farah. An image encryption scheme based on a new hybrid chaotic map and optimised substitution box. Nonlinear Dynamics, 99(4):3041-3064, 2019
- Salwa Baabou, Awatef Ben Fradj, Mohamed Amine Farah, Abdelrahman G Abubakr, François Bremond, and Abdennaceur Kachouri. A comparative study and state-of-the-art evaluation for pedestrian detection. In 2019 19th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pages 485-490. IEEE, 2019
- Salwa Baabou, Behzad Mirmahboub, François Bremond, Mohamed Amine Farah, and Abdennaceur Kachouri. Person re-identification using pose-driven body parts. In International conference on the Sciences of Electronics, Technologies of Information and Telecommunications, pages 303-310. Springer, 2018
- Salwa Baabou, Furqan M Khan, François Bremond, Awatef Ben Fradj, Mohamed Amine Farah, and Abdennaceur Kachouri. Tracklet and signature representation for multi-shot person re-identification. In 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD), pages 214-219. IEEE, 2018
- Salwa Baabou, François Bremond, Awatef Fradj, Mohamed Amine Farah, and Abdennaceur Kachouri. Hand-crafted system for person re-identification: A comprehensive review. 2017
- Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, and Mounir Samet. A novel chaos based image encryption using dna sequence operation and secure hash algorithm sha-
- Nonlinear Dynamics, 83(3):1123-1136, 2016
- Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, and Mounir Samet. Hash key-based image encryption using crossover operator and chaos. Multimedia tools and applications, 75(8):4753-4769,
2016
- Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, and Mounir Samet. Chaos-based designing of a highly nonlinear s-box using boolean functions. In 2015 IEEE 12th International MultiConference on Systems, Signals & Devices (SSD15), pages 1-
IEEE, 2015
- Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, and Mounir Samet. A novel design of chaos-based s-boxes using genetic algorithm techniques. In 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), pages 678-684. IEEE Computer Society, 2014
- Awatef Ben Fradj Guiloufi, Nejah Nasri, Mohamed Alamine Ben Farah, and Abdennaceur Kachouri. Medbs clustering algorithm for the small-scale wireless sensor networks. 2013
- Mouna Aoun, Mohamed Amine Ben Farah, Mounir Samet, and Abdennaceur Kachouri. Mobile radio communication in aquatic environment. In 7th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, pages 1-
IEEE, 2012
- Besma OUNI, BEN FARAH Mohamed Amine, Mounir SAMET, and Abdennaceur KACHOURI. Steganography based on chaotic encryption
- Jalel Hajji, Mohamed Amine Ben Farah, Mounir Samet, and Abdennaceur Kachouri. Crypto-compression of images based on chaos. In 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pages 344-350. IEEE, 2012
- MA Ben Farah, A Kachouri, and M Samet. Improvement of cryptosystem based on iterating chaotic map. Communications in Nonlinear Science and Numerical Simulation, 16(6):2543-2553, 2011
- MABEN FARAH, A Kachouri, M Samet, and L Kamoun. New method to identify telephone standards in software radio
- Nada Rebhi, Mohamed Amine BEN FARAH, Abdennaceur KACHOURI, and Mounir SAMET. Analyse de sécurité d'une nouvelle méthode de cryptage chaotique. In 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (SETIT), 2007
- MABEN FARAH, A KACHOURI, and M SAMET. Cryptanalysis of improved block cryptosystem based on iteration of chaotic map
- MABEN FARAH, H MAROUANE, A KACHOURI, and L KAMOUN. Analyse spectrale non parametrique dans la bande gsm applique au software radio"
- Salwa Baabou, François Bremond, Awatef Ben Fradj, and Mohamed Amine. A study of the person reidentification system
- M Ben Farah, A Kachouri, and M Samet. Secure chaotic communication system based on active sliding mode synchronisation. Proc GEI, Tunisia, 2008
- MA Ben Farah, A Kachouri, and M Samet. Design of secure digital communication systems using DCSK chaotic modulation. In International Conference on Design and Test of Integrated Systems in Nanoscale Technology, 2006. DTIS 2006., pages 200-204. IEEE, 2006
- MA Ben Farah, A Kachouri, and M Samet. Vpf journal of engineering and applied sciences 2 (6): 1097-1 102, 2007
- Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, and Mounir Samet. A novel approach for designing s-boxes based on chaos and genetic algorithm techniques
- Ben Farah, A Kachouri MA, and M Samet. New application of DCSK modulation in secure communication system. In International Conference on Design and Test of Integrated Systems in nanoscale technology (DTIS'06), Tunis, Tunisia, 2006
- N Rebh, MA Ben Farah, A Kachouri, and M Samet. Evaluation des performances de la modulation DCSK: Analyse de l'effet du bruit dans la transmissiond'image. Septièmes journées scientifiques des jeunes chercheurs en Génie Electrique et Informatique (GEI 2007) Monastir Tunisie, 2007
- Chaima Bejaoui, Mohamed Alamine Ben Farah, and Abdennaceur Kachouri. Usability of leach and leach-c in wireless multimedia sensor networks
Work With Industry
Worked with various industrial partners on different security-related projects partners such as:
- The Centre for Security Studies (KEMEA)
- CybExer Technologies
- The Centre for Research and Technology-Hellas (CERTH)