How can we protect software systems from cyberattack?
Mourad Debbabi
- NSERC/Hydro‑Québec/Thales Industrial Research Chair in Smart Grid Security: Detection, Prevention, Mitigation, and Recovery from Cyberphysical Attacks
- Honorary Concordia University Research Chair in Information Systems Security
- Associate Dean, Research and Graduate Studies
- Gina Cody School of Engineering and Computer Science
- Professor
- Concordia Institute for Information Systems Engineering
- cybersecurity19
- cyberphysical systems4
- smart grids9
- detection of vulnerabilities2
- programming languages7
- email security2
- embedded systems7
- smart cities24
- smart infrastructures17
- language design2
- botnet defence4
- network security9
- software security6
- cryptographic protocols5
- cyberforensics5
- middleware3
- malware analysis3
- open source software7
- functional verification6
- validation4
-
Joey Paquet
programming languages, history of programming languages, language design
-
Lingyu Wang
network security, privacy, security metrics
-
Amr Youssef
cryptography, cryptanalysis, cryptographic protocols
-
Jun Yan
smart grids, cyberphysical security, machine learning
-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Jamal Bentahar
software agents, multi-agent systems, software engineering
-
Yann-Gaël Guéhéneuc
pattern-based software engineering, design pattern detection, metamodeling
-
Ferhat Khendek
software engineering, ICT, service engineering
-
Ayda Basyouni
software quality and best practices, information system security, networks
-
J. William Atwood
networks, multicast, communication protocols
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
Mazdak Nik-Bakht
construction management, BIM, decision making
-
Dongyu Qiu
networks, network performance evaluation, wireless networks
-
Emad Shihab
software engineering, mining software repositories, mobile apps
-
Arash Mohammadi
signal processing, information fusion, nonlinear systems
-
Jia Yuan Yu
data science, decision theory, machine learning
-
Youmin Zhang
intelligent unmanned systems, UAVs, UGVs
-
Abdelwahab Hamou-Lhadj
empirical software engineering, complex software systems, software maintenance
-
Otmane Ait Mohamed
functional verification, formal methods, reliability analysis
-
Chadi Assi
wireless networks, network design, network optimization
-
Zachary Patterson
transportation planning, sustainable transportation, transportation modeling
-
Walaa Hamouda
wireless communications, compressed sensing, channel coding
-
Jeremy Clark
cryptography, blockchain, cryptocurrency
-
Yuhong Yan
service-oriented computing, end-user services architectures, enterprise applications
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Andreas Athienitis
building envelope performance, solar energy, smart cities
-
Sofiène Tahar
communication protocols, hardware specification, functional verification