Get my own profile
Public access
View all64 articles
9 articles
available
not available
Based on funding mandates
Co-authors
Sushil JajodiaUniversity Professor, BDM International Professor, and Director, Center for Secure InformationVerified email at gmu.edu
Mourad DebbabiDean, Professor, Hydro-Québec Hitachi Research Chair, Concordia UniversityVerified email at concordia.ca
Makan PourzandiAffiliate Professor, Concordia University - Ericsson ResearchVerified email at concordia.ca
Yosr JarrayaMaster Researcher, Ericsson Canada, Research SecurityVerified email at ericsson.com
Suryadipta MajumdarAssociate Professor of Concordia Institute for Information Systems Engineering, Concordia UniversityVerified email at concordia.ca
Saed AlrabaeeAssociate Professor, Information Systems and Security, UAEUVerified email at uaeu.ac.ae
Paria ShiraniUniversity of OttawaVerified email at andrew.cmu.edu
Mengyuan ZhangVrije Universiteit AmsterdamVerified email at vu.nl
Duminda WijesekeraGeorge mason UniversityVerified email at gmu.edu
Djedjiga MouhebUniversité LavalVerified email at ift.ulaval.ca
Taous MadiResearch Scientist, KAUSTVerified email at kaust.edu.sa
Yuan HongUniversity of ConnecticutVerified email at uconn.edu
Steven NoelCybersecurity Researcher, The MITRE CorporationVerified email at mitre.org
Chamseddine TalhiProfessorVerified email at etsmtl.ca
Amr YoussefConcordia UniversityVerified email at ciise.concordia.ca
momen oqailyCIISE, Concordia universityVerified email at live.concordia.ca
Massimiliano AlbaneseAssociate Professor, George Mason UniversityVerified email at gmu.edu
Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
Mariam NouhKing Abdulaziz City for Science and Technology, University of OxfordVerified email at kacst.edu.sa
Azadeh TabibanAssistant Professor in Computer Science Department, University of ManitobaVerified email at umanitoba.ca