Christopher Mansour, Ph.D.
Associate Professor & Chair, Computing & Information Science
Founding Member of Cybersecurity Program at Mercyhurst University
Cybersecurity Expert & Public Speaker | Associate CISO
Mercyhurst Universiry
501 E 38th ST,
Erie, PA, 16546
List of Publications
-
Security of Electric Vehicles: A Brief Survey
B. Wilson and C. Mansour, "Security of Electric Vehicles: A Brief Survey," 2024 7th International Conference on Information and Communications Technology (ICOIACT), Ishikawa, Japan, 2024, pp. 125-129, doi: 10.1109/ICOIACT64819.2024.10913368.
Download -
Security Monitoring for VANETs Using Machine Learning
N. Pape and C. Mansour, "Security Monitoring for VANETs Using Machine Learning," 2024 7th International Conference on Information and Computer Technologies (ICICT), Honolulu, HI, USA, 2024, pp. 70-74, doi: 10.1109/ICICT62343.2024.00018.
Download -
PASTA Threat Modeling for Vehicular Networks Security
N. Pape and C. Mansour, "PASTA Threat Modeling for Vehicular Networks Security," 2024 7th International Conference on Information and Computer Technologies (ICICT), Honolulu, HI, USA, 2024, pp. 474-478, doi: 10.1109/ICICT62343.2024.00083.
Download -
Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis
N. Pape and C. Mansour, "Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis," 2023 International Conference On Cyber Management And Engineering (CyMaEn), Bangkok, Thailand, 2023, pp. 123-127, doi: 10.1109/CyMaEn57228.2023.10051091.
Download -
Detecting Malicious Hosts in SDN through System Call Learning
D. Chasaki and C. Mansour, "Detecting Malicious Hosts in SDN through System Call Learning," IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 2021, pp. 1-2, doi: 10.1109/INFOCOMWKSHPS51825.2021.9484586.
Download -
SDN Security Through System Call Learning
D. Chasaki and C. Mansour, "SDN Security through System Call Learning," 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 2021, pp. 1-6, doi: 10.1109/NTMS49979.2021.9432640.
Download -
Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning
D. Chasaki and C. Mansour, "Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning," 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 2020, pp. 145-151, doi: 10.1109/ICNC47757.2020.9049766.
Download -
Adaptive Security Monitoring for Next-Generation Routers
Mansour, C., Chasaki, D. Adaptive security monitoring for next-generation routers. J Embedded Systems 2019, 1 (2019). https://doi.org/10.1186/s13639-018-0087-0
Download -
Design of an SDN Security Mechanism to Detect Malicious Activities
C. Mansour and D. Chasaki, "Design of an SDN Security Mechanism to Detect Malicious Activities," 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 2018, pp. 186-190, doi: 10.1109/ICUFN.2018.8436794.
Download -
Trust and Reliability for Next-Generation Networks: A Layered Approach
Mansour, Christopher. Villanova University, ProQuest Dissertations Publishing, 2018. 10791690.
Download -
Multi-layer Security Mechanism for Networked Embedded Devices
C. Mansour and D. Chasaki (2017) Multi-layer Security Mechanism for Networked Embedded Devices. In: Ochoa S., Singh P., Bravo J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science, vol 10586. Springer, Cham
Download -
Real-time Attack and Failure Detection For Next Generation Networks
C. Mansour and D. Chasaki, "Real-time attack and failure detection for next generation networks," 2017 International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA, 2017, pp. 189-193, doi: 10.1109/ICCNC.2017.7876125.
Download -
Trust and Reliability for Next Generation Routers
C. Mansour and D. Chasaki, "Trust and reliability for next-generation routers," MILCOM 2016 - 2016 IEEE Military Communications Conference, Baltimore, MD, USA, 2016, pp. 740-745, doi: 10.1109/MILCOM.2016.7795417.
Download -
Power Monitoring of Highly Parallel Network Processors
C. Mansour and D. Chasaki, "Power monitoring of highly parallel network processors," 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA, 2016, pp. 1-5, doi: 10.1109/ICCNC.2016.7440713.
Download -
Design of an Adaptive Security Mechanism for Modern Routers
C. Mansour, Y. El Hajj Shehadeh and D. Chasaki, "Design of an adaptive security mechanism for modern routers," 2015 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2015, pp. 241-244, doi: 10.1109/ICCE.2015.7066397.
Download -
Selective Encryption of Video Transmission over Multi-Hop Wireless Networks
C. Mansour and D. Chasaki, "Selective encryption of video transmissions over multi-hop wireless networks," 2014 IEEE Symposium on Computers and Communications (ISCC), Funchal, Portugal, 2014, pp. 1-5, doi: 10.1109/ISCC.2014.6912646.
Download -
Power Aware Selective Encryption of Video Transmission in Smart Devices
C. Mansour and D. Chasaki, "Power-aware selective encryption of video transmissions in smart devices," 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, Cyprus, 2014, pp. 967-972, doi: 10.1109/IWCMC.2014.6906486.
Download -
Security Challenges in the Internet of Things
D. Chasaki, & C. Mansour, (2015). Security challenges in the internet of things. International Journal of Space-Based and Situated Computing, 5(3), 141-149.
Download -
Real-Time Implementation of ADM and DPCM Systems
R. Achkar, G. A. Haidar and C. Mansour, "Real-time application of DPCM and ADM systems," 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Poznan, Poland, 2012, pp. 1-6, doi: 10.1109/CSNDSP.2012.6292635.
Download -
Simulation of DPCM and ADM Systems
C. Mansour, R. Achkar and G. A. Haidar, "Simulation of DPCM and ADM Systems," 2012 UKSim 14th International Conference on Computer Modelling and Simulation, Cambridge, UK, 2012, pp. 416-421, doi: 10.1109/UKSim.2012.64.
Download -
Real-Time Implementation of ADM and DPCM Systems
R. Achkar, G. Abou Haidar, C. Mansour, N. Halabi “Real-Time Application of DPCM & ADM Systems”, Journal of Communication and Computer, Volume 10, Number 4, April 2013, pp. 545-553