Research interest
Computer Networking, Multimedia communication,
Cloud-native, Artificial Intelligence, SIP, Cybersecurity.

Ali AL-ALLAWEE (PhD)

(Assoc. Prof.)

(Maître de Conferences 27 et 61)

Computer Networks

Email: aliabd.cs@gmail.com

Bio

Ali Al-Allawee is a computer science researcher with extensive academic and research experience in advanced networking and communication technologies. He earned his Bachelor of Science in Computer Science in 2003, followed by a Master’s degree in Computer Science from Universiti Teknologi Malaysia in 2008. In 2014, he completed his PhD at the National Advanced IPv6 Center, Universiti Sains Malaysia (USM), specializing in next-generation internet technologies. Following his doctoral studies, he pursued postdoctoral research at the Université de Haute-Alsace (IUT Colmar), where he contributed to ongoing developments in networking and communication systems. His current research interests span multimedia communication, cloud technologies, edge computing, Session Initiation Protocol (SIP), and IPv6 connectivity, reflecting a strong focus on modern, scalable, and efficient network infrastructures.


Recent Publications

    2026
  1. Abualhaj, M., Al-katib, S., Hiri, M., Shambour, Q., AL-ALLAWEE, A., and Al- momani, O. An efficient feature selection technique to enhance spam email detection. TEM Journal 15, 1 (2026), 91–101

  2. Abualhaj, M., Al-khatib, S., Al-zyoud, M., Hiari, M., AL-ALLAWEE, A., and Al- sharaiah, M. A customized machine learning model for improving malware detection. Journal Computer Network and Information Security 18, 1 (2026), 1–17

  3. Abualhaj, M. M., Hiari, M. O., Al-Khatib, S. N., Abu-Shareha, A. A., Daoud, M. S., Al-Allawee, M. F. A., and Anbar, M. A robust ids system for intelligent phishing website detection. International Journal of Electrical and Electronic Engineering and Telecommunica- tions 15, 2 (2026), 116–127

  4. Al-allaweea, A., Alia, A. K., Al-Dabbagha, M., Aldossaryb, S., and Rosmawarnic, N. A metaheuristic-driven intrusion detection model dragonfly algorithm for feature selection and xgboost classification. Procedia Computer Science 275 (2026), 637–644.

  5. Hyassat, A., AL-ALLAWEE, A., Abualhaj, M., Daoud, M., Al-Mimi, H., and Anber, M. Firewall enhancement for intrusion detection using dragonfly and bat-inspired optimiza- tion. In 12 International Conference on Social Networks Analysis, Management and Security (SNAMS2025) (2026)

  6. Abualhaj, M., Daoud, M., AL-ALLAWEE, A., AL-Mimi, H., Al-khatib, S., and Hyas- sat, A. Detecting spam using k-nearest neighbors and metaheuristic feature selection algo- rithms. In 12 International Conference on Social Networks Analysis, Management and Security (SNAMS2025) (2026)
  7. 2025

  8. Al-Fathi, M., and AL-ALLAWEE, A. Performance evaluation of rsa variants for network security using sip,EDUSJ, Vol, 34,3,26-35, 2025.

  9. Ahmed, Y., and Al-Allawee, A. A comparative study between logistic regression and svm for resource management in network slicing. Jurnal dan Penelitian Teknik Informatika 9, 4 (2025), 1924–1934

  10. Abualhaj, M. M., Al-Khatib, S. N., Abu-Shareha, A. A., Almomani, O., Al-Mimi, H., Al-Allawee, A., Daoud, M. S., and Anbar, M. Spam detection boosted by firefly-based feature selection and optimized classifiers. Int. J. Adv. Soft Comput. Appl. 17, 3 (2025), 1–19

  11. Al-Allawee, A., Aldossary, S., Abdullah, R. M., and Abdulrazak, L. F. Intelligent firewall for attack detection: Integrating dragonfly and bat algorithms with machine learning. Journal of Computing & Biomedical Informatics 10, 01 (2025)

  12. AL-ALLAWEE, A., LORENZ, P., ALSAMARA, M., and PARAPTODIYONO, S. Ef- ficient sip dispatcher mechanism based on auto scaling processes. In 2024 IEEE Global Com- munications Conference: Communication & Information Systems Security (2025)

  13. Abualhaj, M. M., Al-Mimi, H., Al-Allawee, A., Shambour, Q. Y., and Anbar, M. Enhancing intrusion detection using dragonfly algorithm-based feature selection and extra trees for classification. In 2025 5th International Conference on Emerging Smart Technologies and Applications (eSmarTA) (2025), IEEE, pp. 1–6

  14. Abualhaj, M. M., Daoud, M. S., Al-Allawee, A., Al-Mimi, H., Anbar, M., and Munther, A. Attack detection using decision tree and naïve bayes with bat algorithm-based feature selection. In 2025 Sixth International Conference on Intelligent Data Science Technolo- gies and Applications (IDSTA) (2025), IEEE, pp. 141–145

  15. Abualhaj, M. M., AL-ALLAWEE, A., Almomani, O., and Anbar, M. Optimized feature selection for enhanced network attack detection using bat algorithm. In 2025 15th International Conference on Electrical Engineering (ICEENG) (2025), 5, p. 1

  16. Praytno, S. Y., Rosmawarni, N., Verdini, V., Supriyanto, AL-ALLAWEE, A., and Putra, M. J. Designing an arduino uno-based internet of things (iot) system for detecting dehydration based on urine color. In International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS) (2025)

  17. Abualhaj, M., AL-ALLAWEE, A., Daoud, M., and Munther, A. Optimized network intrusion prevention system via dragonfly algorithm-based feature selection. In In-press: 3rd International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS2025) (2025)

  18. Younus, A. N., and Al-Allawee, A. Towards autonomous network slicing ai-based resource management strategies. In 2025 3rd International Conference on Business Analytics for Technology and Security (ICBATS) (2025), IEEE, pp. 1–6
  19. 2024

  20. Abualhaj, M. M., Al-Zyoud, M., Hiari, M. O., Alrabanah, Y., Anbar, M., Amer, A., and Al-Allawee, A. A fine-tuning of decision tree classifier for ransomware detection based on memory data. International Journal of Data & Network Science 8, 2 (2024)

  21. Al-Allawee, A., Lorenz, P., and Munther, A. Efficient collaborative edge computing for vehicular network using clustering service. Network 4, 3 (2024), 390–403

  22. Abualhaj, M. M., Al-Khatib, S. N., Al-Allawee, A., Munther, A., and Anbar, M. Enhancing network intrusion detection systems through dimensionality reduction. In Interna- tional Conference on Soft Computing and Data Mining (2024), Springer Nature Switzerland Cham, pp. 244–253

  23. Abualhaj, M. M., Abu-Shareha, A. A., Al-Allawee, A., Munther, A., and Anbar, M. Performance evaluation of whale and harris hawks optimization algorithms with intrusion prevention systems. In International Conference on Soft Computing and Data Mining (2024), Springer Nature Switzerland Cham, pp. 254–265

  24. Abualhaj, M. M., Al-Khatib, S. N., Al-Allawee, A., Munther, A., and Anbar, M. Enhancing intrusion detection systems: A comparative study using whale optimization algorithm and hawks optimization algorithm. In 2024 11th International Conference on Electrical and Electronics Engineering (ICEEE) (2024), IEEE, pp. 404–409

  25. Abu-Shareha, A. A., Abualhaj, M. M., Ali, A.-A., Munther, A., and Anbar, M. En- hancing malware detection with firefly and grey wolf optimization algorithms. In 2024 11th International Conference on Electrical and Electronics Engineering (ICEEE) (2024), IEEE, pp. 394–398
  26. 2023

  27. Al-Allawee, A., Allaoui, H., and Lorenz, P. Toward effective ims connectivity over ipv4-ipv6 coexistence network: Design, implementation, and experimental evaluation. Telematique 22, 01 (2023), 1897–1907

  28. Al-Allawee, A., Mihoubi, M., Lorenz, P., and Abakar, K. S. Efficient dispatcher mechanism for sip cluster based on memory utilization. In ICC 2023-IEEE International Conference on Communications (2023), IEEE, pp. 3370–3375

  29. Praptodiyono, S., Firmansyah, T., Anwar, M. H., Wicaksana, C. A., Pramudyo, A. S., and Al-Allawee, A. Development of hybrid intrusion detection system based on suricata with pfsense method for high reduction of ddos attacks on ipv6 networks. Eastern- European Journal of Enterprise Technologies 125, 9 (2023)
  30. 2022

  31. Al-Allawee, A., Lorenz, P., Abouaissa, A., and Abualhaj, M. A performance eval- uation of in-memory databases operations in session initiation protocol. Network 3, 1 (2022), 1–14

  32. Khudher, A. A., Munther, A., and Praptodiyono, S. Efficient ipv4-ipv6 translation mechanism for ims using sip proxy. International Journal of Internet Protocol Technology 15, 1 (2022), 41–52

  33. AL-ALLAWEE, A. The impact of block and stream cipher on session initiation protocol proxy performance. Journal of Engineering Science and Technology (JESTEC) 17, 2 (2022), 1508–1522

View More

Get In Touch