free web creation software
Mobirise

Christopher Mansour, Ph.D.

Assistant Professor of Computing and Information Science/Cyber Security at Mercyhurst University

Villanova University

The following includes the list of publications that were the result of the work at Villanova University, Villanova, PA, United States, 19085

  1. Adaptive Security Monitoring for Next-Generation Routers 
    Mansour, C., & Chasaki, D. (2019). Adaptive security monitoring for next-generation routers. EURASIP Journal on Embedded Systems, 2019(1), 1.
    Download
  2. Design of an SDN Security Mechanism to Detect Malicious Activities 
    Mansour, C., Chasaki, D. (2018, July). Design of an SDN Security Mechanism to Detect Malicious Activities. In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 186-190). IEEE.
    Download
  3. Trust and Reliability for Next-Generation Networks: A Layered Approach
     Mansour, Christopher. Villanova University, ProQuest Dissertations Publishing, 2018. 10791690. 
    Download
  4. Multi-layer Security Mechanism for Networked Embedded Devices
    Mansour C., Chasaki D. (2017) Multi-layer Security Mechanism for Networked Embedded Devices. In: Ochoa S., Singh P., Bravo J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science, vol 10586. Springer, Cham
    Download
  5. Real-time Attack and Failure Detection For Next Generation Networks
    Mansour, C., & Chasaki, D. (2017, February). Real-time Attack and Failure Detection For Next Generation Networks. In 2017 International Conference on Computing, Networking and Communications(ICNC),(pp.189-193). IEEE.
    Download
  6. Trust and Reliability for Next Generation Routers
    Mansour, C., & Chasaki, D. (2016, November). Trust and Reliability for Next Generation Routers. In Military Communications Conference. MILCOM 2016 - 2016 IEEE (pp. 740-745) IEEE
    Download
  7. Identifying Optimal Encryption Effort to Improve Battery Life in Mobile Wireless Devices
    Mansour, C., & Chasaki, D. (2015). Identifying Optimal Encryption Effort to Improve Battery Life in Mobile Wireless Devices. International Journal of Research in Wireless Systems, 4(1).
    Download
  8. Power Monitoring of Highly Parallel Network Processors
    Mansour, C., & Chasaki, D. (2016, February). Power monitoring of highly parallel network processors. In International Conference on Computing, Networking and Communications(ICNC),(pp.1-5). IEEE.
    Download
  9. Design of an Adaptive Security Mechanism for Modern Routers
    Mansour, C., Shehadeh, Y. E. H., & Chasaki, D. (2015, January). Design of an adaptive security mechanism for modern routers. In Consumer Electronics (ICCE), 2015 IEEE International Conference on (pp. 241-244). IEEE.
    Download
  10. Selective Encryption of Video Transmission over Multi-Hop Wireless Networks
    Mansour, C., & Chasaki, D. (2014, June). Selective encryption of video transmissions over multi-hop wireless networks. In Computers and Communication (ISCC), 2014 IEEE Symposium on (pp. 1-5). IEEE.
    Download
  11. Power Aware Selective Encryption of Video Transmission in Smart Devices
    Mansour, C., & Chasaki, D. (2014, August). Power-aware selective encryption of video transmissions in smart devices. In Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International (pp. 967-972). IEEE.
    Download
  12. Security Challenges in the Internet of Things
    Chasaki, D., & Mansour, C. (2015). Security challenges in the internet of things. International Journal of Space-Based and Situated Computing, 5(3), 141-149.
    Download

American University of Science and Technology

The following includes the list of publications that were the result of the work at the American University of Science and Technology, Beirut, Lebanon

  1. Real-Time Implementation of ADM and DPCM Systems
    Achkar, R., Haidar, G. A., & Mansour, C. (2012, July). Real-time application of DPCM and ADM systems. In Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2012 8th International Symposium on (pp. 1-6). IEEE.
    Download
  2. Simulation of DPCM and ADM Systems
    Mansour, C., Achkar, R., & Haidar, G. A. (2012, March). Simulation of DPCM and ADM Systems. In Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference on (pp. 416-421). IEEE.
    Download
  3. Real-Time Implementation of ADM and DPCM Systems
    R. Achkar, G. Abou Haidar, C. Mansour, N. Halabi “Real-Time Application of DPCM & ADM Systems”, Journal of Communication and Computer, Volume 10, Number 4, April 2013, pp. 545-553

Mobirise