Since 'you cannot improve if you cannot measure', how can we measure the security of a computer system?
Lingyu Wang
- NSERC/Ericsson Research Chair in Software‑Defined Networking and Network Functions Virtualization Security
- Professor
- Concordia Institute for Information Systems Engineering
-
Mourad Debbabi
cybersecurity, cyberphysical systems, smart grids
-
Amr Youssef
cryptography, cryptanalysis, cryptographic protocols
-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Chadi Assi
wireless networks, network design, network optimization
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
J. William Atwood
networks, multicast, communication protocols
-
Jeremy Clark
cryptography, blockchain, cryptocurrency
-
Ayda Basyouni
software quality and best practices, information system security, networks
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Jamal Bentahar
software agents, multi-agent systems, software engineering
-
Dongyu Qiu
networks, network performance evaluation, wireless networks
-
Stefanie Duguay
networked publics, social media, gender and sexuality
-
Essam Mansour
distributed/parallel systems, web data management, large-scale analytics on strings
-
Walaa Hamouda
wireless communications, compressed sensing, channel coding
-
Ferhat Khendek
software engineering, ICT, service engineering
-
Jun Yan
smart grids, cyberphysical security, machine learning
-
Martin French
risk, surveillance, social justice
-
Olga Ormandjieva
software engineering, software metrics, category theory
-
Joey Paquet
programming languages, history of programming languages, language design
-
Brigitte Jaumard
large scale optimization, networks, ICT
-
Roch Glitho
end-user services architectures, virtualization, cloud computing