How can we design robust and usable systems to withstand state‑level adversaries?
How can we best help our students learn to incorporate security best practices into their professional work?
- Associate Professor
- Concordia Institute for Information Systems Engineering
network security, privacy, security metrics
cybersecurity, cyberphysical systems, smart grids
bitcoin, blockchain, FinTech
cryptography, cryptanalysis, cryptographic protocols
software quality and best practices, information system security, networks
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
J. William Atwood
networks, multicast, communication protocols
wireless networks, network design, network optimization
cloud networks, wireless networks, cognitive radio networks
risk, surveillance, social justice