Get my own profile
Public access
View all63 articles
9 articles
available
not available
Based on funding mandates
Co-authors
- Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
- Mourad DebbabiDean, Professor, Hydro-Québec Hitachi Research Chair, Concordia UniversityVerified email at concordia.ca
- Makan PourzandiAffiliate Professor, Concordia University - Ericsson ResearchVerified email at concordia.ca
- Yosr JarrayaMaster Researcher, Ericsson Canada, Research SecurityVerified email at ericsson.com
- Suryadipta MajumdarAssociate Professor of Concordia Institute for Information Systems Engineering, Concordia UniversityVerified email at concordia.ca
- Saed AlrabaeeAssociate Professor, Information Systems and Security, UAEUVerified email at uaeu.ac.ae
- Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
- Paria ShiraniUniversity of OttawaVerified email at andrew.cmu.edu
- Mengyuan ZhangVrije Universiteit AmsterdamVerified email at vu.nl
- Djedjiga MouhebUniversité LavalVerified email at ift.ulaval.ca
- Taous MadiResearch Scientist, KAUSTVerified email at kaust.edu.sa
- Yuan HongUniversity of ConnecticutVerified email at uconn.edu
- Steven NoelCybersecurity Researcher, The MITRE CorporationVerified email at mitre.org
- Chamseddine TalhiProfessorVerified email at etsmtl.ca
- Amr YoussefConcordia UniversityVerified email at ciise.concordia.ca
- momen oqailyCIISE, Concordia universityVerified email at live.concordia.ca
- Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
- Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
- Mariam NouhKing Abdulaziz City for Science and Technology, University of OxfordVerified email at kacst.edu.sa
- Azadeh TabibanAssistant Professor in Computer Science Department, University of ManitobaVerified email at umanitoba.ca