Mehdi Saadallah | Computer Science | Best Researcher Award

Mr. Mehdi Saadallah | Computer Science
| Best Researcher Award

Vrije Universiteit Amsterdam | Netherlands

Mr. Mehdi Saadallah research focuses on advancing the integration of artificial intelligence (AI) and automation in cybersecurity operations, emphasizing the intersection between technology, human behavior, and organizational structures. It investigates how AI-driven tools influence professional identity, decision-making, and collaboration within Security Operations Centers (SOCs), where analysts and algorithms coexist in dynamic threat environments. By applying frameworks such as Paradox Theory, Organizational Routine Theory, and Identity Work Theory, the work uncovers the tensions, adaptations, and emergent practices that arise when automation transforms traditional cybersecurity routines. Empirical insights are drawn from multinational enterprises across diverse sectors, revealing how organizations balance efficiency, control, and trust in AI-augmented defense systems. The research also develops conceptual and operational models for AI-assisted vulnerability management and SOC modernization, providing a blueprint for improving detection, response, and resilience in complex digital ecosystems. Beyond theory, it delivers applied innovations that enhance cybersecurity governance, human–AI trust calibration, and automation ethics. Through interdisciplinary methods combining qualitative inquiry, computational analysis, and organizational modeling, the work contributes to redefining cybersecurity as a socio-technical discipline—bridging academic rigor and industrial application to guide the future of intelligent, adaptive, and human-centered cyber defense frameworks.

Featured Publications

Saadallah, M. (2025). Harmonizing paradoxical tensions in SOCs: A strategic model for integrating AI, automation, and human expertise in cyber defense and incident response. In Proceedings of the 58th Hawaii International Conference on System Sciences (HICSS-58). https://doi.org/10.24251/HICSS.2025.723

Saadallah, M., Shahim, A., & Khapova, S. (2025). Reconciling tensions in Security Operations Centers: A Paradox Theory approach. Big Data and Cognitive Computing, 9(11), 278. https://doi.org/10.3390/bdcc9110278

Saadallah, M., Shahim, A., & Khapova, S. (2025). Optimizing AI and human expertise integration in cybersecurity: Enhancing operational efficiency and collaborative decision-making. PriMera Scientific Engineering, 6(1), 177. https://doi.org/10.56831/psen-06-177

Saadallah, M., Shahim, A., & Khapova, S. (2024). Multi-method approach to human expertise, automation, and artificial intelligence for vulnerability management. In Advances in Intelligent Systems and Computing (pp. xxx–xxx). Springer. https://doi.org/10.1007/978-3-031-65175-5_29

 Saadallah, M., Shahim, A., & Khapova, S. (2024). Synergizing human expertise, automation, and artificial intelligence for vulnerability management. PriMera Scientific Engineering, 5(10), 160. https://doi.org/10.56831/psen-05-160

Rounak Raman | Information Technology | Young Scientist Award

Mr. Rounak Raman | Information Technology | Young Scientist Award

Netaji Subhas University of Technology | India

Mr. Rounak Raman research journey reflects a diverse and impactful engagement across multidisciplinary domains including Artificial Intelligence, Wireless Sensor Networks, IoT Security, and Neuroinformatics. At the forefront of innovation, multiple projects demonstrate a strong alignment with real-world challenges and technical excellence. The development of the EEG Data Analysis System and multimodal neurofeedback loop underlines expertise in biomedical signal processing and applied AI for cognitive enhancement, contributing to measurable improvements in attentiveness and engagement. In IoT and network optimization, the implementation of the Energy Aware Hybrid Clustering Protocol (EAHCP) showcased advancements in energy-efficient communication, achieving notable performance gains in scalability and mobility management. Research on secure IoT frameworks, such as the Hierarchical Key Rotation and Isolation Protocol (HKRISRP), reinforced resilience in wireless networks through lightweight cryptography and dynamic key rotation, enhancing both security and energy performance. Additional contributions in opportunistic networks introduced context-aware, trust-based, and collision-avoidant models that optimized data aggregation and reliability through intelligent decision mechanisms and trajectory optimization. The pursuit of Generative AI culminated in the development of SyntheX, a document analysis system integrating semantic search and transcription models to streamline enterprise knowledge management. Collectively, these works exemplify a strong commitment to advancing applied research in AI, cybersecurity, and intelligent network systems

Featured Publication

Raman, R., Yadav, A., Kukreja, D., & Sharma, D. K. (2025). CONTEXT-NET: A context-aware nexus-based aggregation protocol for opportunistic networks. Internet of Things, 25, 101809. https://doi.org/10.1016/j.iot.2025.101809