Cloud Security Auditing

Yosr Jarraya , Mourad Debbabi , Taous Madi , Lingyu Wang

1
2019
Measuring Security Risk of Networks Using Attack Graphs

Sushil Jajodia , Steven Noel , Lingyu Wang , Anoop Singhal
international journal of next-generation computing 1 ( 1) 135 -147

93
2010
Aspect-Oriented Security Hardening of UML Design Models

Dima Alhadidi , Mourad Debbabi , Makan Pourzandi , Chamseddine Talhi

1
2015
Network Hardening: An Automated Approach to Improving Network Security

Sushil Jajodia , Massimiliano Albanese , Lingyu Wang

14
2014
Preserving Privacy in On-Line Analytical Processing (OLAP)

Sushil Jajodia , Lingyu Wang , Duminda Wijesekera
Springer 29 1 -180

6
2007
Preserving Privacy in On-Line Analytical Processing (OLAP) (Advances in Information Security)

Sushil Jajodia , Lingyu Wang , Duminda Wijesekera
Springer-Verlag New York, Inc.

2006
Security and Protection in Information Processing Systems (IFIP International Federation for Information Processing)

Yves Deswarte , Frederic Cuppens , Sushil Jajodia , Lingyu Wang
Springer-Verlag New York, Inc.

2004
On the Feasibility of Malware Authorship Attribution

Mourad Debbabi , Paria Shirani , Lingyu Wang , Saed Alrabaee
foundations and practice of security 256 -272

58
2016
A Relational Approach to the Interactive Analysis of Attack Graphs

Sushil Jajodia , Anoop Singhal , Lingyu Wang , Chao Yao
Journal of Computer Security 16 ( 4)

2008
Network Security Metrics

Sushil Jajodia , Anoop Singhal , Lingyu Wang

7
2017
Preserving Privacy in Web Applications Through Traffic Padding

Lingyu Wang , Wen Ming Liu
World Scientific Book Chapters 117 -135

2018
Surviving Unpatchable Vulnerabilities through Multi-Option Network Hardening

Sushil Jajodia , Anoop Singhal , Lingyu Wang , Daniel Borbor
Journal of Computer Security 1 -29

2018
Preserving Both Privacy and Utility in Network Trace Anonymization

Mourad Debbabi , Habib Louafi , Lingyu Wang , Yuan Hong
computer and communications security 459 -474

5
2018
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization

Meisam Mohammady , Momen Oqaily , Lingyu Wang , Yuan Hong
ACM Transactions on Privacy and Security (TOPS) 24 ( 3) 1 -36

2021
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies

Basile L. Agba , Mourad Debbabi , Paria Shirani , Bernard Lebel
ACM Computing Surveys 54 ( 2) 1 -42

24
2021
ProSAS: Proactive Security Auditing System for Clouds

Yosr Jarraya , Mourad Debbabi , Makan Pourzandi , Taous Madi
IEEE Transactions on Dependable and Secure Computing 1 -1

2021