How do we make security and privacy protection work for everyone?
Carol Fung
- Gina Cody Research Chair in Cybersecurity and the Internet of Things
- Associate Professor
- Concordia Institute for Information Systems Engineering
- network management2
- cybersecurity16
- network security12
- DDoS defense
- collaborative intrusion detection
- social networks23
- network 'softwarization'
- artificial intelligence (AI)52
- software-defined network security2
- internet of things (IoT) security2
- smart homes2
- mobile platform security3
- secure and usable smartphone systems
- privacy10
- trust management
- game theory16
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Jamal Bentahar
software agents, multi-agent systems, formal logic
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Lingyu Wang
network security, privacy, security metrics
-
Mazdak Nik-Bakht
construction management, building information modeling (BIM), decision making
-
Abdelhak Bentaleb
multimedia systems and communication, video streaming architecture, access networks
-
Essam Mansour
distributed/parallel systems, web data management, large-scale analytics on strings
-
Paula Lago
healthcare information systems, ubiquitous and pervasive computing, internet of things (IoT)
-
Jia Yuan Yu
data science, decision theory, machine learning
-
J. William Atwood
autonomic networking, multicast, communication protocols
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Martin A. French
risk, surveillance, privacy
-
Krzysztof Dzieciolowski
business analytics, data science, artificial intelligence (AI)
-
Huan Xie
trust, game theory, reciprocity
-
Rustam Vahidov
design science, decision support systems, artificial intelligence (AI)