Mobirise

Christopher Mansour, Ph.D.

Chair, Computing and Information Science Department

Assistant Professor of Cyber Security at Mercyhurst University

List of Publicaions

  1. Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis 
    Mansour, C., & Pape, N. (2023). dge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis. 2023 International Conference On Cyber Management And Engineering (CyMaEn). IEEE
    Download
  2. Detecting Malicious Hosts in SDN through System Call Learning 
    Mansour, C., & Chasaki, D. (2021). Detecting Malicious Hosts in SDN through System Call Learning. In 2021 IEEE INFOCOM Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE
    Download
  3. SDN Security Through System Call Learning 
    Mansour, C., & Chasaki, D. (2021). SDN Security Through System Call Learning. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE
    Download
  4. Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning 
    Mansour, C., & Chasaki, D. (2020). Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning. In 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE
    Download
  5. Adaptive Security Monitoring for Next-Generation Routers 
    Mansour, C., & Chasaki, D. (2019). Adaptive security monitoring for next-generation routers. EURASIP Journal on Embedded Systems, 2019(1), 1.
    Download
  6. Design of an SDN Security Mechanism to Detect Malicious Activities 
    Mansour, C., Chasaki, D. (2018, July). Design of an SDN Security Mechanism to Detect Malicious Activities. In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 186-190). IEEE.
    Download
  7. Trust and Reliability for Next-Generation Networks: A Layered Approach
     Mansour, Christopher. Villanova University, ProQuest Dissertations Publishing, 2018. 10791690. 
    Download
  8. Multi-layer Security Mechanism for Networked Embedded Devices
    Mansour C., Chasaki D. (2017) Multi-layer Security Mechanism for Networked Embedded Devices. In: Ochoa S., Singh P., Bravo J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science, vol 10586. Springer, Cham
    Download
  9. Real-time Attack and Failure Detection For Next Generation Networks
    Mansour, C., & Chasaki, D. (2017, February). Real-time Attack and Failure Detection For Next Generation Networks. In 2017 International Conference on Computing, Networking and Communications(ICNC),(pp.189-193). IEEE.
    Download
  10. Trust and Reliability for Next Generation Routers
    Mansour, C., & Chasaki, D. (2016, November). Trust and Reliability for Next Generation Routers. In Military Communications Conference. MILCOM 2016 - 2016 IEEE (pp. 740-745) IEEE
    Download
  11. Identifying Optimal Encryption Effort to Improve Battery Life in Mobile Wireless Devices
    Mansour, C., & Chasaki, D. (2015). Identifying Optimal Encryption Effort to Improve Battery Life in Mobile Wireless Devices. International Journal of Research in Wireless Systems, 4(1).
    Download
  12. Power Monitoring of Highly Parallel Network Processors
    Mansour, C., & Chasaki, D. (2016, February). Power monitoring of highly parallel network processors. In International Conference on Computing, Networking and Communications(ICNC),(pp.1-5). IEEE.
    Download
  13. Design of an Adaptive Security Mechanism for Modern Routers
    Mansour, C., Shehadeh, Y. E. H., & Chasaki, D. (2015, January). Design of an adaptive security mechanism for modern routers. In Consumer Electronics (ICCE), 2015 IEEE International Conference on (pp. 241-244). IEEE.
    Download
  14. Selective Encryption of Video Transmission over Multi-Hop Wireless Networks
    Mansour, C., & Chasaki, D. (2014, June). Selective encryption of video transmissions over multi-hop wireless networks. In Computers and Communication (ISCC), 2014 IEEE Symposium on (pp. 1-5). IEEE.
    Download
  15. Power Aware Selective Encryption of Video Transmission in Smart Devices
    Mansour, C., & Chasaki, D. (2014, August). Power-aware selective encryption of video transmissions in smart devices. In Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International (pp. 967-972). IEEE.
    Download
  16. Security Challenges in the Internet of Things
    Chasaki, D., & Mansour, C. (2015). Security challenges in the internet of things. International Journal of Space-Based and Situated Computing, 5(3), 141-149.
    Download
  17. Real-Time Implementation of ADM and DPCM Systems
    Achkar, R., Haidar, G. A., & Mansour, C. (2012, July). Real-time application of DPCM and ADM systems. In Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2012 8th International Symposium on (pp. 1-6). IEEE.
    Download
  18. Simulation of DPCM and ADM Systems
    Mansour, C., Achkar, R., & Haidar, G. A. (2012, March). Simulation of DPCM and ADM Systems. In Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference on (pp. 416-421). IEEE.
    Download
  19. Real-Time Implementation of ADM and DPCM Systems
    R. Achkar, G. Abou Haidar, C. Mansour, N. Halabi “Real-Time Application of DPCM & ADM Systems”, Journal of Communication and Computer, Volume 10, Number 4, April 2013, pp. 545-553

Mobirise