-
Mohammad Mannan
anti-surveillance tools, web authentication, trusted computing
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Mourad Debbabi
information systems security, cyberphysical systems, smart grids
top associated keywords A-Z
- cryptography5
- cyberphysical systems12
- data security7
- anti-surveillance tools2
- botnet defence4
- cyberforensics5
- cybersecurity16
- detection of vulnerabilities3
- email security2
- embedded systems8
- malware analysis3
- networks27
- privacy10
- software engineering26
- software security6
- usable security3
- wireless networks19
- aerospace69
- anonymity modeling1
- blockchain2
- Boolean functions1
- CDMA20001
- cloud computing17
- coding theory1
- complex dynamic systems19
- cross-layer design2
- cryptocurrency4
- cryptographic algorithms1
- data hiding/embedding1
- deanonymization1
- FH-CDMA sequence design1
- FinTech3
- functional verification5
- ICT29
- identity theft1
- information technologies25
- intra-flow interference1
- middleware3
- mobile ad hoc networks11
- mobile platform security3
- network resource allocation3
- online banking1
- open source software10
- P2P networks1
- phishing1
- PIN security1
- programming languages6
- side channel attacks1
- smart cities25
- smart grids11
- smart infrastructures22