How can we design robust and usable systems to withstand state‑level adversaries?
Mohammad Mannan
- Professor and Associate Director
- Concordia Institute for Information Systems Engineering
- anti-surveillance tools2
- web authentication
- trusted computing
- privacy10
- mobile platform security3
- cryptographic protocols6
- social networks21
- information systems security12
- cyberphysical systems12
- malware analysis3
- email security2
- identity theft
- phishing
- online banking
- PIN security
- network security12
- data security7
- usable security3
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Mourad Debbabi
information systems security, cyberphysical systems, smart grids
-
Lingyu Wang
network security, privacy, security metrics
-
Jeremy Clark
cryptography, blockchain, cryptocurrency
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Carol Fung
network management, cybersecurity, network security
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Chadi Assi
wireless networks, network design, network optimization
-
Walter Lucia
cyberphysical systems, predictive control, fault-tolerant control
-
Jun Yan
smart grids, cyberphysical security, machine learning
-
Arash Mohammadi
signal processing, information systems security, cyberphysical systems