banner

Jihene Bennaceur

avatar

Qualifications: Ph.D. in Computer science in 2020 from the National school of computer science (ENSI) Master’s Degree in Communication Systems in 2015 from ISITCOM

Biography

Ph.D. in Computer Science – National School of Sciences Information (ENSI), Tunis, Tunisia (Dec 2015 – Jan 2020). Mention: Very Honorable.
Dissertation: Security of Communication Protocols in Cognitive Radio Networks.

Research Master in Computer Networks – Higher Institute of Computer Science and Communication Techniques (ISITCOM), Sousse, Tunisia (Sep 2012 – Jan 2014). Mention: Good.

Dr. Jihen Bennaceur is an Assistant Professor of Computer Science at MedTech University, specializing in cybersecurity, artificial intelligence, wireless networks, and trust management. Her research journey spans both industry and academia, including a post‑doctoral position with SAMA Partners Business Solutions (Germany–Tunisia) focused on trust in cyber‑threat‑intelligence sharing, and a research fellowship at École de Technologie Supérieure (ETS), Montréal, optimizing resource allocation in network virtualization. Dr. Bennaceur has organized international cybersecurity seminars, served as a reviewer for Elsevier, Wiley, and Springer journals, and chaired sessions at global conferences. Her work has been recognized with a Best Presentation Award at the International Conference on Intelligence and Security Informatics (2023). She actively supervises Ph.D., master’s, and capstone projects on secure software supply chains, AI‑driven security, and large‑language‑model robustness.

Areas of Expertise

Computer Science Cybersecurity Artificial Intelligence LLM security Wireless & Cognitive Radio Networks Software‑Defined Networking (SDN) Wireless Sensor Networks Trust & Reputation Management Threat Intelligence Sharing Game Theory & Mathematical Modeling Blockchain 5G & IoT Security Machine Learning Software Supply‑Chain Security Penetration Testing

Research Interest

Wireless Sensor Networks Cognitive Radio Networks IoT applications Artificial Intelligence Blockchain Cybersecurity Information sharing SDN and 5G Trust models for secure information sharing Software supply‑chain attack mitigation AI/ML for cyber‑threat detection Game‑theoretic security in cognitive radio & virtualized networks Blockchain‑enabled trust management Large Language Model (LLM) security and evaluation

  • Bennaceur J., Zouaghi W., Thabet K., Bennour A., Ben Jemaa R., Mabrouk A. “Trust-Centric Blockchain Framework: A Three-Layered Architecture for Securing Open and Private Systems.” Proceedings of the 27th International Conference on Enterprise Information Systems (ICEIS 2025), vol. 1, pp. 1097-1109, 2025. 
  • Bennaceur J., Zouaghi W., Mabrouk A. “Towards Multi-Layered Secure Architecture for Enhanced Threat Information Sharing.” Journal of Systems Science and Systems Engineering, 2025. Impact factor 1.2.
  • Bennaceur J., Zouaghi W., Mabrouk A. “Enhancing Cyber Threat Intelligence through Supervised Machine Learning: A Comprehensive Classification Approach.” IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Paris, December 2023 (proceedings dated April 2023). Class C.
  • Thabet K., Bennaceur J., Hamza S., Ben Jemaa R., Zouaghi W. “Securing the Software Supply Chain: A New Taxonomy for Attack Classification.” IEEE WETICE, Paris, December 2023 (April 2023). Class C.
  • Thabet K., Bennaceur J., Hamza S., Ben Jemaa R., Zouaghi W. “Unveiling the Software Supply Chain Paradigm: Architecture, Actors, Challenges, and Security Perspectives.” IEEE WETICE, Paris, December 2023 (April 2023). Class C.
  • Bennaceur J., Zouaghi W., Hamouda I., Mabrouk A. “Supervised Machine Learning Approach Towards Cyber Threat Information Sharing Big Data Mining.” Intelligence and Security Informatics, London, April 2023. Class C.
  • Bennaceur J., Zouaghi W., Hamouda I., Mabrouk A. “Composite Multi-Dimensional Trust-Based Schemes (CMT) for Threat Information Sharing.” ResearchSquare pre-print, September 2022.
  • Bennaceur J., Idoudi H., Azouz Saldane L. “Hierarchical Game-Based Secure Data Collection with Trust and Reputation Management in the CRN.” Computers & Electrical Engineering, May 2021. Impact factor 4.3.
  • Bennaceur J., Ahmadi H., Souihi S. “Game-Theoretic Approaches for Service Provisioning in Network Virtualization: A Survey.” International Journal of Network Management (MDPI Telecom), May 2021. Impact factor 1.2.
  • Bennaceur J., Idoudi H., Azouz Saldane L. “Towards Trustworthy Cognitive Radio-Based Internet of Medical Things.” In Smart Systems for E-Health, Advanced Information and Knowledge Processing series, Springer, ISBN 978-3-030-14939-0, April 2021 (Book chapter).
  • Bennaceur J., Idoudi H., Azouz Saldane L. “Trust Management in Cognitive Radio Networks: A Survey.” International Journal of Network Management, September 2018. Impact factor 1.5.
  • Bennaceur J., Souihi S., Idoudi H., Azouz Saldane L., Mellouk A. “Game-Based Secure Sensing for the Mobile Cognitive Radio Network.” IEEE 28th Annual International Symposium on Personal, Indoor & Mobile Radio Communications (PIMRC), Montréal, October 2017. Class B.
  • Bennaceur J., Idoudi H., Azouz Saldane L. “Game-Based Secure Sensing for the CRN.” 13th IEEE International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, June 2017. Class B.
  • Bennaceur J., Idoudi H., Azouz Saldane L. “A Trust Game Model for the Cognitive Radio Networks.” 5th International Conference on Performance Evaluation and Modelling in Wired & Wireless Networks, Paris, November 2016.
  • Bennaceur J., Idoudi H., Azouz Saldane L. “Fault-Tolerant Placement Strategy for WSN.” IEEE Wireless Communications and Networking Conference (WCNC), Doha, April 2016.

  • Privacy and Security CS512
  • Introduction to Cybersecurity CS412
  • Data Structures and Algorithms CS341
  • Big Data and cybersecurity CS316
  • Programming in C CS101
  • Programming in c and complexity CS111
  • Operating Systems CS303
  • ISS396 (Junior project) and ISS196 ( Freshman project))
right menu