Christopher Mansour, Ph.D.

Associate Professor & Chair, Computing & Information Science

Founding Member of Cybersecurity Program at Mercyhurst University

Cybersecurity Expert & Public Speaker | Associate CISO

Mercyhurst Universiry
501 E 38th ST,
Erie, PA, 16546

List of Publications

  1. Security Monitoring for VANETs Using Machine Learning
    N. Pape and C. Mansour, "Security Monitoring for VANETs Using Machine Learning," 2024 7th International Conference on Information and Computer Technologies (ICICT), Honolulu, HI, USA, 2024, pp. 70-74, doi: 10.1109/ICICT62343.2024.00018.
    Download

  2. PASTA Threat Modeling for Vehicular Networks Security
    N. Pape and C. Mansour, "PASTA Threat Modeling for Vehicular Networks Security," 2024 7th International Conference on Information and Computer Technologies (ICICT), Honolulu, HI, USA, 2024, pp. 474-478, doi: 10.1109/ICICT62343.2024.00083.
    Download

  3. Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis
    N. Pape and C. Mansour, "Edge Machine Learning to Detect Malicious Activity in IoT Devices through System Calls and Traffic Analysis," 2023 International Conference On Cyber Management And Engineering (CyMaEn), Bangkok, Thailand, 2023, pp. 123-127, doi: 10.1109/CyMaEn57228.2023.10051091.
    Download

  4. Detecting Malicious Hosts in SDN through System Call Learning
    D. Chasaki and C. Mansour, "Detecting Malicious Hosts in SDN through System Call Learning," IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Vancouver, BC, Canada, 2021, pp. 1-2, doi: 10.1109/INFOCOMWKSHPS51825.2021.9484586.
    Download

  5. SDN Security Through System Call Learning
    D. Chasaki and C. Mansour, "SDN Security through System Call Learning," 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 2021, pp. 1-6, doi: 10.1109/NTMS49979.2021.9432640.
    Download

  6. Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning
    D. Chasaki and C. Mansour, "Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning," 2020 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 2020, pp. 145-151, doi: 10.1109/ICNC47757.2020.9049766.
    Download

  7. Adaptive Security Monitoring for Next-Generation Routers
    Mansour, C., Chasaki, D. Adaptive security monitoring for next-generation routers. J Embedded Systems 2019, 1 (2019). https://doi.org/10.1186/s13639-018-0087-0
    Download

  8. Design of an SDN Security Mechanism to Detect Malicious Activities
    C. Mansour and D. Chasaki, "Design of an SDN Security Mechanism to Detect Malicious Activities," 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), Prague, Czech Republic, 2018, pp. 186-190, doi: 10.1109/ICUFN.2018.8436794.
    Download

  9. Trust and Reliability for Next-Generation Networks: A Layered Approach
    Mansour, Christopher. Villanova University, ProQuest Dissertations Publishing, 2018. 10791690.
    Download

  10. Multi-layer Security Mechanism for Networked Embedded Devices
    C. Mansour and D. Chasaki (2017) Multi-layer Security Mechanism for Networked Embedded Devices. In: Ochoa S., Singh P., Bravo J. (eds) Ubiquitous Computing and Ambient Intelligence. UCAmI 2017. Lecture Notes in Computer Science, vol 10586. Springer, Cham
    Download

  11. Real-time Attack and Failure Detection For Next Generation Networks
    C. Mansour and D. Chasaki, "Real-time attack and failure detection for next generation networks," 2017 International Conference on Computing, Networking and Communications (ICNC), Silicon Valley, CA, USA, 2017, pp. 189-193, doi: 10.1109/ICCNC.2017.7876125.
    Download

  12. Trust and Reliability for Next Generation Routers
    C. Mansour and D. Chasaki, "Trust and reliability for next-generation routers," MILCOM 2016 - 2016 IEEE Military Communications Conference, Baltimore, MD, USA, 2016, pp. 740-745, doi: 10.1109/MILCOM.2016.7795417.
    Download

  13. Power Monitoring of Highly Parallel Network Processors
    C. Mansour and D. Chasaki, "Power monitoring of highly parallel network processors," 2016 International Conference on Computing, Networking and Communications (ICNC), Kauai, HI, USA, 2016, pp. 1-5, doi: 10.1109/ICCNC.2016.7440713.
    Download

  14. Design of an Adaptive Security Mechanism for Modern Routers
    C. Mansour, Y. El Hajj Shehadeh and D. Chasaki, "Design of an adaptive security mechanism for modern routers," 2015 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 2015, pp. 241-244, doi: 10.1109/ICCE.2015.7066397.
    Download

  15. Selective Encryption of Video Transmission over Multi-Hop Wireless Networks
    C. Mansour and D. Chasaki, "Selective encryption of video transmissions over multi-hop wireless networks," 2014 IEEE Symposium on Computers and Communications (ISCC), Funchal, Portugal, 2014, pp. 1-5, doi: 10.1109/ISCC.2014.6912646.
    Download

  16. Power Aware Selective Encryption of Video Transmission in Smart Devices
    C. Mansour and D. Chasaki, "Power-aware selective encryption of video transmissions in smart devices," 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, Cyprus, 2014, pp. 967-972, doi: 10.1109/IWCMC.2014.6906486.
    Download

  17. Security Challenges in the Internet of Things
    D. Chasaki, & C. Mansour, (2015). Security challenges in the internet of things. International Journal of Space-Based and Situated Computing, 5(3), 141-149.
    Download

  18. Real-Time Implementation of ADM and DPCM Systems
    R. Achkar, G. A. Haidar and C. Mansour, "Real-time application of DPCM and ADM systems," 2012 8th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP), Poznan, Poland, 2012, pp. 1-6, doi: 10.1109/CSNDSP.2012.6292635.
    Download

  19. Simulation of DPCM and ADM Systems
    C. Mansour, R. Achkar and G. A. Haidar, "Simulation of DPCM and ADM Systems," 2012 UKSim 14th International Conference on Computer Modelling and Simulation, Cambridge, UK, 2012, pp. 416-421, doi: 10.1109/UKSim.2012.64.
    Download

  20. Real-Time Implementation of ADM and DPCM Systems
    R. Achkar, G. Abou Haidar, C. Mansour, N. Halabi “Real-Time Application of DPCM & ADM Systems”, Journal of Communication and Computer, Volume 10, Number 4, April 2013, pp. 545-553