-
Lingyu Wang
network security, privacy, security metrics
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Joey Paquet
programming languages, history of programming languages, language design
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
Mourad Debbabi
information systems security, cyberphysical systems, smart grids
top associated keywords A-Z
- network security12
- networks27
- botnet defence4
- cyberphysical systems12
- information systems security12
- software engineering26
- software security6
- aerospace69
- cloud computing17
- cryptographic protocols6
- cybersecurity16
- data security7
- detection of vulnerabilities3
- distributed/parallel systems25
- formal methods6
- intensional logic2
- malware analysis3
- programming languages6
- smart grids11
- 3D digital imaging15
- agile software development2
- artificial intelligence (AI)53
- attack graphs1
- automated reasoning3
- Boolean functions1
- compilers1
- computer graphics13
- concurrent processes2
- context-aware computing2
- cryptographic algorithms1
- cryptography5
- data hiding/embedding1
- data mining21
- demand-driven computing1
- email security2
- embedded systems8
- FH-CDMA sequence design1
- Forensic Lucid1
- functional verification5
- history of computing1
- history of programming languages1
- human-computer interaction (HCI)21
- information technologies25
- intrusion detection1
- language design1
- machine learning58
- middleware3
- natural language processing (NLP)15
- open source software10
- pattern recognition21
- privacy10