Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis
Mansour, C., & Pape, N. (2023). dge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis. 2023 International Conference On Cyber Management And Engineering (CyMaEn). IEEE Download
Detecting Malicious Hosts in SDN through System Call Learning
Mansour, C., & Chasaki, D. (2021). Detecting Malicious Hosts in SDN through System Call Learning. In 2021 IEEE INFOCOM Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE Download
SDN Security Through System Call Learning
Mansour, C., & Chasaki, D. (2021). SDN Security Through System Call Learning. In 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE Download
Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning
Mansour, C., & Chasaki, D. (2020). Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning. In 2020 International Conference on Computing, Networking and Communications (ICNC). IEEE Download
Adaptive Security Monitoring for Next-Generation Routers Mansour, C., & Chasaki, D. (2019). Adaptive security monitoring for next-generation routers. EURASIP Journal on Embedded Systems, 2019(1), 1. Download
Design of an SDN Security Mechanism to Detect Malicious Activities Mansour, C., Chasaki, D. (2018, July). Design of an SDN Security Mechanism to Detect Malicious Activities. In 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN) (pp. 186-190). IEEE. Download
Trust and Reliability for Next-Generation Networks: A Layered Approach Mansour, Christopher. Villanova University, ProQuest Dissertations Publishing, 2018. 10791690. Download
Multi-layer Security Mechanism for Networked Embedded Devices Mansour C., Chasaki D. (2017) Multi-layer Security Mechanism for Networked Embedded Devices. In: Ochoa S., Singh P., Bravo J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science, vol 10586. Springer, Cham Download
Real-time Attack and Failure Detection For Next Generation Networks Mansour, C., & Chasaki, D. (2017, February). Real-time Attack and Failure Detection For Next Generation Networks. In 2017 International Conference on Computing, Networking and Communications(ICNC),(pp.189-193). IEEE. Download
Trust and Reliability for Next Generation Routers Mansour, C., & Chasaki, D. (2016, November). Trust and Reliability for Next Generation Routers. In Military Communications Conference. MILCOM 2016 - 2016 IEEE (pp. 740-745) IEEE Download
Identifying Optimal Encryption Effort to Improve Battery Life in Mobile Wireless Devices Mansour, C., & Chasaki, D. (2015). Identifying Optimal Encryption Effort to Improve Battery Life in Mobile Wireless Devices. International Journal of Research in Wireless Systems, 4(1). Download
Power Monitoring of Highly Parallel Network Processors Mansour, C., & Chasaki, D. (2016, February). Power monitoring of highly parallel network processors. In International Conference on Computing, Networking and Communications(ICNC),(pp.1-5). IEEE. Download
Design of an Adaptive Security Mechanism for Modern Routers Mansour, C., Shehadeh, Y. E. H., & Chasaki, D. (2015, January). Design of an adaptive security mechanism for modern routers. In Consumer Electronics (ICCE), 2015 IEEE International Conference on (pp. 241-244). IEEE. Download
Selective Encryption of Video Transmission over Multi-Hop Wireless Networks Mansour, C., & Chasaki, D. (2014, June). Selective encryption of video transmissions over multi-hop wireless networks. In Computers and Communication (ISCC), 2014 IEEE Symposium on (pp. 1-5). IEEE. Download
Power Aware Selective Encryption of Video Transmission in Smart Devices Mansour, C., & Chasaki, D. (2014, August). Power-aware selective encryption of video transmissions in smart devices. In Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International (pp. 967-972). IEEE. Download
Security Challenges in the Internet of Things Chasaki, D., & Mansour, C. (2015). Security challenges in the internet of things. International Journal of Space-Based and Situated Computing, 5(3), 141-149. Download
Real-Time Implementation of ADM and DPCM Systems Achkar, R., Haidar, G. A., & Mansour, C. (2012, July). Real-time application of DPCM and ADM systems. In Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2012 8th International Symposium on (pp. 1-6). IEEE. Download
Simulation of DPCM and ADM Systems Mansour, C., Achkar, R., & Haidar, G. A. (2012, March). Simulation of DPCM and ADM Systems. In Computer Modelling and Simulation (UKSim), 2012 UKSim 14th International Conference on (pp. 416-421). IEEE. Download
Real-Time Implementation of ADM and DPCM Systems R. Achkar, G. Abou Haidar, C. Mansour, N. Halabi “Real-Time Application of DPCM & ADM Systems”, Journal of Communication and Computer, Volume 10, Number 4, April 2013, pp. 545-553