Concordia University
Security evaluation methodologies, security evaluation of software, cyber forensics.
Security evaluation methodologies, security evaluation of software, cyber forensics.
Security evaluation methodologies, security evaluation of software, cyber forensics.
Security evaluation methodologies, security evaluation of software, cyber forensics.
Cryptographic protocol design, description and analysis; Network security.