default search action
BibTeX records: Makan Pourzandi
@article{DBLP:journals/tdsc/OqailyKMJZPWD24, author = {Momen Oqaily and Mohammad Ekramul Kabir and Suryadipta Majumdar and Yosr Jarraya and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {2799--2817}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3317806}, doi = {10.1109/TDSC.2023.3317806}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OqailyKMJZPWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ThirunavukkarasuZMJPW24, author = {Sudershan Lakshmanan Thirunavukkarasu and Mengyuan Zhang and Suryadipta Majumdar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, title = {Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization {(NFV)}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {2964--2981}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3320811}, doi = {10.1109/TDSC.2023.3320811}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ThirunavukkarasuZMJPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Gholipourchoubeh24, author = {Mahmood Gholipourchoubeh and Hugo Kermabon{-}Bobinnec and Suryadipta Majumdar and Yosr Jarraya and Lingyu Wang and Boubakr Nour and Makan Pourzandi}, editor = {Jo{\~{a}}o P. Vilela and Haya Schulmann and Ninghui Li}, title = {{CCSM:} Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters}, booktitle = {Proceedings of the Fourteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2024, Porto, Portugal, June 19-21, 2024}, pages = {79--90}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626232.3653253}, doi = {10.1145/3626232.3653253}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Gholipourchoubeh24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/MolinaWAPA24, author = {Ricardo Misael Ayala Molina and Nathalie Wehbe and Hyarne Assem Alameddine and Makan Pourzandi and Chadi Assi}, title = {Inter-Slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2024, Thessaloniki, Greece, June 3-6, 2024}, pages = {432--440}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.23919/IFIPNetworking62109.2024.10619850}, doi = {10.23919/IFIPNETWORKING62109.2024.10619850}, timestamp = {Wed, 04 Sep 2024 21:11:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/MolinaWAPA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OqailyPJ0NPD24, author = {Momen Oqaily and Hinddeep Purohit and Yosr Jarraya and Lingyu Wang and Boubakr Nour and Makan Pourzandi and Mourad Debbabi}, editor = {Davide Balzarotti and Wenyuan Xu}, title = {ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers}, booktitle = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia, PA, USA, August 14-16, 2024}, publisher = {{USENIX} Association}, year = {2024}, url = {https://www.usenix.org/conference/usenixsecurity24/presentation/oqaily}, timestamp = {Mon, 22 Jul 2024 17:10:49 +0200}, biburl = {https://dblp.org/rec/conf/uss/OqailyPJ0NPD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/WehbeAPBA23, author = {Nathalie Wehbe and Hyame Assem Alameddine and Makan Pourzandi and Elias Bou{-}Harb and Chadi Assi}, title = {A Security Assessment of {HTTP/2} Usage in 5G Service-Based Architecture}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {1}, pages = {48--54}, year = {2023}, url = {https://doi.org/10.1109/MCOM.001.2200183}, doi = {10.1109/MCOM.001.2200183}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/WehbeAPBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/NourPD23, author = {Boubakr Nour and Makan Pourzandi and Mourad Debbabi}, title = {A Survey on Threat Hunting in Enterprise Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {25}, number = {4}, pages = {2299--2324}, year = {2023}, url = {https://doi.org/10.1109/COMST.2023.3299519}, doi = {10.1109/COMST.2023.3299519}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/NourPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/OqailyM0KJAPD23, author = {Momen Oqaily and Suryadipta Majumdar and Lingyu Wang and Mohammad Ekramul Kabir and Yosr Jarraya and A. S. M. Asadujjaman and Makan Pourzandi and Mourad Debbabi}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {79--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583643}, doi = {10.1145/3577923.3583643}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/OqailyM0KJAPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23, author = {Md. Nazmul Hoq and Jia Wei Yao and Suryadipta Majumdar and Luis Su{\'{a}}rez and Lingyu Wang and Amine Boukhtouta and Makan Pourzandi and Mourad Debbabi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {123--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_7}, doi = {10.1007/978-3-031-51476-0\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/NourPQD23, author = {Boubakr Nour and Makan Pourzandi and Rushaan Kamran Qureshi and Mourad Debbabi}, editor = {Mohamed Mosbah and Florence S{\`{e}}des and Nadia Tawbi and Toufik Ahmed and Nora Boulahia{-}Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting}, booktitle = {Foundations and Practice of Security - 16th International Symposium, {FPS} 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14552}, pages = {52--69}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-57540-2\_5}, doi = {10.1007/978-3-031-57540-2\_5}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/NourPQD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BagheriKMJWP23, author = {Sima Bagheri and Hugo Kermabon{-}Bobinnec and Suryadipta Majumdar and Yosr Jarraya and Lingyu Wang and Makan Pourzandi}, title = {Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {777--782}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10278632}, doi = {10.1109/ICC45041.2023.10278632}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/BagheriKMJWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/WehbeAPA23, author = {Nathalie Wehbe and Hyame Assem Alameddine and Makan Pourzandi and Chadi Assi}, title = {5GShield: {HTTP/2} Anomaly Detection in 5G Service-Based Architecture}, booktitle = {{IFIP} Networking Conference, {IFIP} Networking 2023, Barcelona, Spain, June 12-15, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.23919/IFIPNetworking57963.2023.10186410}, doi = {10.23919/IFIPNETWORKING57963.2023.10186410}, timestamp = {Mon, 31 Jul 2023 13:58:25 +0200}, biburl = {https://dblp.org/rec/conf/networking/WehbeAPA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MajumdarCAMJP0D22, author = {Suryadipta Majumdar and Gagandeep Singh Chawla and Amir Alimohammadifar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {ProSAS: Proactive Security Auditing System for Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2517--2534}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3062204}, doi = {10.1109/TDSC.2021.3062204}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MajumdarCAMJP0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/5gwf/BoukhtoutaMPA22, author = {Amine Boukhtouta and Taous Madi and Makan Pourzandi and Hyame Assem Alameddine}, title = {Cloud Native Applications Profiling using a Graph Neural Networks Approach}, booktitle = {2022 {IEEE} Future Networks World Forum, {FNWF} 2022, Montreal, QC, Canada, October 10-14, 2022}, pages = {220--227}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FNWF55208.2022.00046}, doi = {10.1109/FNWF55208.2022.00046}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/5gwf/BoukhtoutaMPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/AsadujjamanKPMWJP22, author = {A. S. M. Asadujjaman and Mohammad Ekramul Kabir and Hinddeep Purohit and Suryadipta Majumdar and Lingyu Wang and Yosr Jarraya and Makan Pourzandi}, title = {5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions}, booktitle = {{IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022}, pages = {162--169}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CloudCom55334.2022.00032}, doi = {10.1109/CLOUDCOM55334.2022.00032}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/AsadujjamanKPMWJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LeiZPM22, author = {Ming Lei and Lianying Zhao and Makan Pourzandi and Fereydoun Farrahi Moghaddam}, title = {A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments}, booktitle = {{IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022}, pages = {178--185}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CloudCom55334.2022.00034}, doi = {10.1109/CLOUDCOM55334.2022.00034}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/LeiZPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Kermabon-Bobinnec22, author = {Hugo Kermabon{-}Bobinnec and Mahmood Gholipourchoubeh and Sima Bagheri and Suryadipta Majumdar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {ProSPEC: Proactive Security Policy Enforcement for Containers}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {155--166}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511515}, doi = {10.1145/3508398.3511515}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Kermabon-Bobinnec22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OqailyJWPM22, author = {Alaa Oqaily and Yosr Jarraya and Lingyu Wang and Makan Pourzandi and Suryadipta Majumdar}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {{MLFM:} Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization {(NFV)}}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {466--489}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_23}, doi = {10.1007/978-3-031-17143-7\_23}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OqailyJWPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TabibanZJP0022, author = {Azadeh Tabiban and Heyang Zhao and Yosr Jarraya and Makan Pourzandi and Mengyuan Zhang and Lingyu Wang}, title = {ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization {(NFV)}}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-232/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/TabibanZJP0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/TabibanZJPW22, author = {Azadeh Tabiban and Heyang Zhao and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Hans P. Reiser and Marcel Kyas}, title = {VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {346--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_19}, doi = {10.1007/978-3-031-22295-5\_19}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/TabibanZJPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-13046, author = {Meisam Mohammady and Han Wang and Lingyu Wang and Mengyuan Zhang and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Mourad Debbabi and Yuan Hong}, title = {{DPOAD:} Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning}, journal = {CoRR}, volume = {abs/2206.13046}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.13046}, doi = {10.48550/ARXIV.2206.13046}, eprinttype = {arXiv}, eprint = {2206.13046}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-13046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MadiAPB21, author = {Taous Madi and Hyame Assem Alameddine and Makan Pourzandi and Amine Boukhtouta}, title = {{NFV} security survey in 5G networks: {A} three-dimensional threat taxonomy}, journal = {Comput. Networks}, volume = {197}, pages = {108288}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108288}, doi = {10.1016/J.COMNET.2021.108288}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MadiAPB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChawlaZMJPWD21, author = {Gagandeep Singh Chawla and Mengyuan Zhang and Suryadipta Majumdar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to {NFV}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1553--1567}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3041430}, doi = {10.1109/TDSC.2020.3041430}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChawlaZMJPWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OqailyJMMPWD21, author = {Momen Oqaily and Yosr Jarraya and Meisam Mohammady and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2486--2505}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2957488}, doi = {10.1109/TDSC.2019.2957488}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OqailyJMMPWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MohammadyOWHLPD21, author = {Meisam Mohammady and Momen Oqaily and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {14:1--14:36}, year = {2021}, url = {https://doi.org/10.1145/3439732}, doi = {10.1145/3439732}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GhorbaniMZPNC21, author = {Mohammad Mahdi Ghorbani and Fereydoun Farrahi Moghaddam and Mengyuan Zhang and Makan Pourzandi and Kim Khoa Nguyen and Mohamed Cheriet}, title = {DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {837--848}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485907}, doi = {10.1145/3485832.3485907}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GhorbaniMZPNC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21, author = {A. S. M. Asadujjaman and Momen Oqaily and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach to Verifying the Integrity of {NFV} Service Chains}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {245--253}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705020}, doi = {10.1109/CNS53000.2021.9705020}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MadiAPBSA21, author = {Taous Madi and Hyame Assem Alameddine and Makan Pourzandi and Amine Boukhtouta and Moataz Shoukry Samir and Chadi Assi}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {AutoGuard: {A} Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {715--735}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_34}, doi = {10.1007/978-3-030-88418-5\_34}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MadiAPBSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZhaoOZMCP21, author = {Lianying Zhao and Muhammad Shafayat Oshman and Mengyuan Zhang and Fereydoun Farrahi Moghaddam and Shubham Chander and Makan Pourzandi}, title = {Towards 5G-ready Security Metrics}, booktitle = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICC42927.2021.9500349}, doi = {10.1109/ICC42927.2021.9500349}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZhaoOZMCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icdf2c/2020, editor = {Sanjay Goel and Pavel Gladyshev and Daryl Johnson and Makan Pourzandi and Suryadipta Majumdar}, title = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference, {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {351}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68734-2}, doi = {10.1007/978-3-030-68734-2}, isbn = {978-3-030-68733-5}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohammadyXHZ0PD20, author = {Meisam Mohammady and Shangyu Xie and Yuan Hong and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{R2DP:} {A} Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {677--696}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417259}, doi = {10.1145/3372297.3417259}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MohammadyXHZ0PD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/OqailyTJMZP0D20, author = {Alaa Oqaily and Sudershan Lakshmanan Thirunavukkarasu and Yosr Jarraya and Suryadipta Majumdar and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization {(NFV)} Stack}, booktitle = {12th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020}, pages = {33--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CloudCom49646.2020.00003}, doi = {10.1109/CLOUDCOM49646.2020.00003}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/OqailyTJMZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/GhorbaniMZPNC20, author = {Mohammad Mahdi Ghorbani and Fereydoun Farrahi Moghaddam and Mengyuan Zhang and Makan Pourzandi and Kim Khoa Nguyen and Mohamed Cheriet}, title = {Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph}, booktitle = {12th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CloudCom49646.2020.00004}, doi = {10.1109/CLOUDCOM49646.2020.00004}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/GhorbaniMZPNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanJZP0D20, author = {Azadeh Tabiban and Yosr Jarraya and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162251}, doi = {10.1109/CNS48642.2020.9162251}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-09451, author = {Meisam Mohammady and Shangyu Xie and Yuan Hong and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, title = {R\({}^{\mbox{2}}\)DP: {A} Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions}, journal = {CoRR}, volume = {abs/2009.09451}, year = {2020}, url = {https://arxiv.org/abs/2009.09451}, eprinttype = {arXiv}, eprint = {2009.09451}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-09451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/MajumdarMWTOAJPWD19, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Azadeh Tabiban and Momen Oqaily and Amir Alimohammadifar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Cloud Security Auditing}, series = {Advances in Information Security}, volume = {76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23128-6}, doi = {10.1007/978-3-030-23128-6}, isbn = {978-3-030-23127-9}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MajumdarTJOAP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Learning probabilistic dependencies among events for proactive security auditing in clouds}, journal = {J. Comput. Secur.}, volume = {27}, number = {2}, pages = {165--202}, year = {2019}, url = {https://doi.org/10.3233/JCS-181137}, doi = {10.3233/JCS-181137}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MajumdarTJOAP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MadiJAMWPWD18, author = {Taous Madi and Yosr Jarraya and Amir Alimohammadifar and Suryadipta Majumdar and Yushun Wang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {1:1--1:35}, year = {2019}, url = {https://doi.org/10.1145/3267339}, doi = {10.1145/3267339}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SendiJPC19, author = {Alireza Shameli{-}Sendi and Yosr Jarraya and Makan Pourzandi and Mohamed Cheriet}, title = {Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {4}, pages = {534--549}, year = {2019}, url = {https://doi.org/10.1109/TSC.2016.2616867}, doi = {10.1109/TSC.2016.2616867}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/SendiJPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/Thirunavukkarasu19, author = {Sudershan Lakshmanan Thirunavukkarasu and Mengyuan Zhang and Alaa Oqaily and Gagandeep Singh Chawla and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, title = {Modeling {NFV} Deployment to Identify the Cross-Level Inconsistency Vulnerabilities}, booktitle = {2019 {IEEE} International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, Australia, December 11-13, 2019}, pages = {167--174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CloudCom.2019.00034}, doi = {10.1109/CLOUDCOM.2019.00034}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/Thirunavukkarasu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Multi-Level Proactive Security Auditing for Clouds}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937641}, doi = {10.1109/DSC47296.2019.8937641}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {239--262}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_12}, doi = {10.1007/978-3-030-29962-0\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19, author = {Momen Oqaily and Yosr Jarraya and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {iCAT: An Interactive Customizable Anonymization Tool}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {658--680}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_32}, doi = {10.1007/978-3-030-29959-0\_32}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/MigaultSBPAAC18, author = {Daniel Migault and Marcos A. Simpl{\'{\i}}cio Jr. and Bruno M. Barros and Makan Pourzandi and Thiago R. M. Almeida and Ewerton R. Andrade and Tereza Cristina M. B. Carvalho}, title = {A framework for enabling security services collaboration across multiple domains}, journal = {Comput. Electr. Eng.}, volume = {69}, pages = {224--239}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2018.02.026}, doi = {10.1016/J.COMPELECENG.2018.02.026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/MigaultSBPAAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MajumdarMWJPWD18, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {User-Level Runtime Security Auditing for the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1185--1199}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779444}, doi = {10.1109/TIFS.2017.2779444}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mohammady0HLPD18, author = {Meisam Mohammady and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Preserving Both Privacy and Utility in Network Trace Anonymization}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {459--474}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243809}, doi = {10.1145/3243734.3243809}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Mohammady0HLPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/MadiZJAP0D18, author = {Taous Madi and Mengyuan Zhang and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud}, booktitle = {2018 {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018}, pages = {163--170}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CloudCom2018.2018.00042}, doi = {10.1109/CLOUDCOM2018.2018.00042}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/MadiZJAP0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BoukhtoutaPBD18, author = {Amine Boukhtouta and Makan Pourzandi and Richard Brunner and St{\'{e}}phane Dault}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Fingerprinting Crowd Events in Content Delivery Networks: {A} Semi-supervised Methodology}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {312--329}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_20}, doi = {10.1007/978-3-319-95729-6\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BoukhtoutaPBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Alimohammadifar18, author = {Amir Alimohammadifar and Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {463--484}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_23}, doi = {10.1007/978-3-319-98989-1\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MajumdarMJP0D18, author = {Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Cloud Security Auditing: Major Approaches and Existing Challenges}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {61--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_5}, doi = {10.1007/978-3-030-18419-3\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/MajumdarMJP0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/JalalpourGMPPB18, author = {Elaheh Jalalpour and Milad Ghaznavi and Daniel Migault and Stere Preda and Makan Pourzandi and Raouf Boutaba}, title = {A Security Orchestration System for {CDN} Edge Servers}, booktitle = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018}, pages = {46--54}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NETSOFT.2018.8459910}, doi = {10.1109/NETSOFT.2018.8459910}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/JalalpourGMPPB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/JalalpourGMPPB18a, author = {Elaheh Jalalpour and Milad Ghaznavi and Daniel Migault and Stere Preda and Makan Pourzandi and Raouf Boutaba}, title = {Dynamic Security Orchestration for {CDN} Edge-Servers}, booktitle = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018}, pages = {329--331}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NETSOFT.2018.8459970}, doi = {10.1109/NETSOFT.2018.8459970}, timestamp = {Tue, 18 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/JalalpourGMPPB18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/AlmeidaBASMP18, author = {Thiago R. M. Almeida and Bruno M. Barros and Ewerton R. Andrade and Marcos A. Simpl{\'{\i}}cio Jr. and Daniel Migault and Makan Pourzandi}, title = {Demonstration of a framework for enabling security services collaboration across multiple domains}, booktitle = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft 2018, Montreal, QC, Canada, June 25-29, 2018}, pages = {341--343}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NETSOFT.2018.8460105}, doi = {10.1109/NETSOFT.2018.8460105}, timestamp = {Wed, 19 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsoft/AlmeidaBASMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-10464, author = {Meisam Mohammady and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {Preserving Both Privacy and Utility in Network Trace Anonymization}, journal = {CoRR}, volume = {abs/1810.10464}, year = {2018}, url = {http://arxiv.org/abs/1810.10464}, eprinttype = {arXiv}, eprint = {1810.10464}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-10464.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/AljumahPD17, author = {Feras Aljumah and Makan Pourzandi and Mourad Debbabi}, title = {Privacy-Preserving Querying on Privately Encrypted Data in the Cloud}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {35}, pages = {50--73}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-56121-8\_3}, doi = {10.1007/978-3-662-56121-8\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/AljumahPD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17, author = {Suryadipta Majumdar and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {LeaPS: Learning-Based Proactive Security Auditing for Clouds}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {265--285}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_15}, doi = {10.1007/978-3-319-66399-9\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarJOAPWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/MigaultSBPAAC17, author = {Daniel Migault and Marcos A. Simpl{\'{\i}}cio Jr. and Bruno M. Barros and Makan Pourzandi and Thiago R. M. Almeida and Ewerton R. Andrade and Tereza Cristina M. B. Carvalho}, editor = {Kisung Lee and Ling Liu}, title = {A Framework for Enabling Security Services Collaboration Across Multiple Domains}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {999--1010}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.67}, doi = {10.1109/ICDCS.2017.67}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/MigaultSBPAAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangMMJAP0D17, author = {Yushun Wang and Taous Madi and Suryadipta Majumdar and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/tenantguard-scalable-runtime-verification-cloud-wide-vm-level-network-isolation/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangMMJAP0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SathyanarayanPA17, author = {Sunil Kumar Sathyanarayan and Makan Pourzandi and Katayoun Aliyari}, title = {Return Oriented Programming - Exploit Implementation using functions}, journal = {CoRR}, volume = {abs/1706.08562}, year = {2017}, url = {http://arxiv.org/abs/1706.08562}, eprinttype = {arXiv}, eprint = {1706.08562}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SathyanarayanPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isse/MouhebANDWP16, author = {Djedjiga Mouheb and Dima Alhadidi and Mariam Nouh and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, title = {Aspect-oriented modeling framework for security hardening}, journal = {Innov. Syst. Softw. Eng.}, volume = {12}, number = {1}, pages = {41--67}, year = {2016}, url = {https://doi.org/10.1007/s11334-015-0263-5}, doi = {10.1007/S11334-015-0263-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MadiMWJPW16, author = {Taous Madi and Suryadipta Majumdar and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {195--206}, publisher = {{ACM}}, year = {2016}, url = {https://dl.acm.org/citation.cfm?id=2857721}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MadiMWJPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16, author = {Suryadipta Majumdar and Yosr Jarraya and Taous Madi and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {47--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_3}, doi = {10.1007/978-3-319-45744-4\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarJMAPWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/MouhebDPWNZATL15, author = {Djedjiga Mouheb and Mourad Debbabi and Makan Pourzandi and Lingyu Wang and Mariam Nouh and Raha Ziarati and Dima Alhadidi and Chamseddine Talhi and Vitor Lima}, title = {Aspect-Oriented Security Hardening of {UML} Design Models}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16106-8}, doi = {10.1007/978-3-319-16106-8}, isbn = {978-3-319-16105-1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JarrayaESDP15, author = {Yosr Jarraya and Arash Eghtesadi and Sahba Sadri and Mourad Debbabi and Makan Pourzandi}, title = {Verification of firewall reconfiguration for virtual machines migrations in the cloud}, journal = {Comput. Networks}, volume = {93}, pages = {480--491}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.10.008}, doi = {10.1016/J.COMNET.2015.10.008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JarrayaESDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SendiPAC15, author = {Alireza Shameli{-}Sendi and Makan Pourzandi and Mohamed Fekih Ahmed and Mohamed Cheriet}, title = {Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {58}, pages = {165--179}, year = {2015}, url = {https://doi.org/10.1016/j.jnca.2015.09.005}, doi = {10.1016/J.JNCA.2015.09.005}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/SendiPAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/JarrayaSPC15, author = {Yosr Jarraya and Alireza Shameli{-}Sendi and Makan Pourzandi and Mohamed Cheriet}, editor = {Calton Pu and Ajay Mohindra}, title = {Multistage {OCDO:} Scalable Security Provisioning Optimization in SDN-Based Cloud}, booktitle = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {572--579}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CLOUD.2015.82}, doi = {10.1109/CLOUD.2015.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/JarrayaSPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack}, booktitle = {7th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December 3, 2015}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CloudCom.2015.80}, doi = {10.1109/CLOUDCOM.2015.80}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/MajumdarMWJPWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/SendiJAPTC15, author = {Alireza Shameli{-}Sendi and Yosr Jarraya and Mohamed Fekih Ahmed and Makan Pourzandi and Chamseddine Talhi and Mohamed Cheriet}, editor = {Remi Badonnel and Jin Xiao and Shingo Ata and Filip De Turck and Voicu Groza and Carlos Raniery Paula dos Santos}, title = {Optimal placement of sequentially ordered virtual security appliances in the cloud}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015}, pages = {818--821}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INM.2015.7140384}, doi = {10.1109/INM.2015.7140384}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/im/SendiJAPTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/EghtesadiJDP14, author = {Arash Eghtesadi and Yosr Jarraya and Mourad Debbabi and Makan Pourzandi}, title = {Preservation of Security Configurations in the Cloud}, booktitle = {2014 {IEEE} International Conference on Cloud Engineering, Boston, MA, USA, March 11-14, 2014}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC2E.2014.14}, doi = {10.1109/IC2E.2014.14}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic2e/EghtesadiJDP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/AhmedTPC14, author = {Mohamed Fekih Ahmed and Chamseddine Talhi and Makan Pourzandi and Mohamed Cheriet}, title = {A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy}, booktitle = {2014 {IEEE} International Conference on Cloud Engineering, Boston, MA, USA, March 11-14, 2014}, pages = {568--573}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC2E.2014.46}, doi = {10.1109/IC2E.2014.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/AhmedTPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Bou-HarbFPDA13, author = {Elias Bou{-}Harb and Claude Fachkha and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {Communication security for smart grid distribution networks}, journal = {{IEEE} Commun. Mag.}, volume = {51}, number = {1}, pages = {42--49}, year = {2013}, url = {https://doi.org/10.1109/MCOM.2013.6400437}, doi = {10.1109/MCOM.2013.6400437}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Bou-HarbFPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Bou-HarbPDA13, author = {Elias Bou{-}Harb and Makan Pourzandi and Mourad Debbabi and Chadi Assi}, title = {A secure, efficient, and cost-effective distributed architecture for spam mitigation on {LTE} 4G mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1478--1489}, year = {2013}, url = {https://doi.org/10.1002/sec.413}, doi = {10.1002/SEC.413}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his2/AljumahLPD13, author = {Feras Aljumah and Raymond Hei Man Leung and Makan Pourzandi and Mourad Debbabi}, editor = {Guangyan Huang and Xiaohui Liu and Jing He and Frank Klawonn and Guiqing Yao}, title = {Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud}, booktitle = {Health Information Science - Second International Conference, {HIS} 2013, London, UK, March 25-27, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7798}, pages = {30--41}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37899-7\_3}, doi = {10.1007/978-3-642-37899-7\_3}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/his2/AljumahLPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/GonzalezMRSCNP12, author = {Nelson M. Gonzalez and Charles Miers and Fernando F. Red{\'{\i}}golo and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, title = {A quantitative analysis of current security concerns and solutions for cloud computing}, journal = {J. Cloud Comput.}, volume = {1}, pages = {11}, year = {2012}, url = {https://doi.org/10.1186/2192-113X-1-11}, doi = {10.1186/2192-113X-1-11}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/GonzalezMRSCNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/DasPD12, author = {Swagata Das and Makan Pourzandi and Mourad Debbabi}, title = {On {SPIM} detection in {LTE} networks}, booktitle = {25th {IEEE} Canadian Conference on Electrical and Computer Engineering, {CCECE} 2012, Montreal, QC, Canada, April 29 - May 2, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCECE.2012.6334959}, doi = {10.1109/CCECE.2012.6334959}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccece/DasPD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/JarrayaEDZP12, author = {Yosr Jarraya and Arash Eghtesadi and Mourad Debbabi and Ying Zhang and Makan Pourzandi}, editor = {Waleed W. Smari and Geoffrey Charles Fox}, title = {Cloud calculus: Security verification in elastic cloud computing platform}, booktitle = {2012 International Conference on Collaboration Technologies and Systems, {CTS} 2012, Denver, CO, USA, May 21-25, 2012}, pages = {447--454}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CTS.2012.6261089}, doi = {10.1109/CTS.2012.6261089}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cts/JarrayaEDZP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhangP12, author = {Ying Zhang and Makan Pourzandi}, title = {Studying Impacts of Prefix Interception Attack by Exploring {BGP} {AS-PATH} Prepending}, booktitle = {2012 {IEEE} 32nd International Conference on Distributed Computing Systems, Macau, China, June 18-21, 2012}, pages = {667--677}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDCS.2012.59}, doi = {10.1109/ICDCS.2012.59}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/ZhangP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/JarrayaEDZP12, author = {Yosr Jarraya and Arash Eghtesadi and Mourad Debbabi and Ying Zhang and Makan Pourzandi}, editor = {Andr{\'{e}}a W. Richa and Christian Scheideler}, title = {Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, {SSS} 2012, Toronto, Canada, October 1-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7596}, pages = {111--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33536-5\_12}, doi = {10.1007/978-3-642-33536-5\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/JarrayaEDZP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/GonzalezMRSCNP11, author = {Nelson M. Gonzalez and Charles Miers and Fernando F. Red{\'{\i}}golo and Marcos A. Simpl{\'{\i}}cio Jr. and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Frank Leymann and Ivan I. Ivanov and Marten van Sinderen and Boris Shishkov}, title = {A Taxonomy Model for Cloud Computing Services}, booktitle = {{CLOSER} 2011 - Proceedings of the 1st International Conference on Cloud Computing and Services Science, Noordwijkerhout, Netherlands, 7-9 May, 2011}, pages = {56--65}, publisher = {SciTePress}, year = {2011}, timestamp = {Mon, 26 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/GonzalezMRSCNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/GonzalezMRCSNP11, author = {Nelson M. Gonzalez and Charles Miers and Fernando F. Red{\'{\i}}golo and Tereza Cristina M. B. Carvalho and Marcos A. Simpl{\'{\i}}cio Jr. and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Costas Lambrinoudakis and Panagiotis Rizomiliotis and Tomasz Wiktor Wlodarczyk}, title = {A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011}, pages = {231--238}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CloudCom.2011.39}, doi = {10.1109/CLOUDCOM.2011.39}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/GonzalezMRCSNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/NouhZMADWP10, author = {Mariam Nouh and Raha Ziarati and Djedjiga Mouheb and Dima Alhadidi and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Joanna W. Ng and Christian Couturier and Hausi A. M{\"{u}}ller and Arthur G. Ryman and Anatol W. Kark}, title = {Aspect weaver: a model transformation approach for {UML} models}, booktitle = {Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada}, pages = {139--153}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1923947.1923962}, doi = {10.1145/1923947.1923962}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/facs2/MouhebANDWP10, author = {Djedjiga Mouheb and Dima Alhadidi and Mariam Nouh and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Lu{\'{\i}}s Soares Barbosa and Markus Lumpe}, title = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic Framework}, booktitle = {Formal Aspects of Component Software - 7th International Workshop, {FACS} 2010, Guimar{\~{a}}es, Portugal, October 14-16, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6921}, pages = {182--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27269-1\_11}, doi = {10.1007/978-3-642-27269-1\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/OuchaniMDP10, author = {Samir Ouchani and Otmane A{\"{\i}}t Mohamed and Mourad Debbabi and Makan Pourzandi}, editor = {Roger Y. Lee and Olga Ormandjieva and Alain Abran and Constantinos Constantinides}, title = {Verification of the Correctness in Composed {UML} Behavioural Diagrams}, booktitle = {Software Engineering Research, Management and Applications 2010 [selected papers from the 8th {ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2010, Montreal, Canada, May 24-26, 2010]}, series = {Studies in Computational Intelligence}, volume = {296}, pages = {163--177}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13273-5\_11}, doi = {10.1007/978-3-642-13273-5\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sera/OuchaniMDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10, author = {Djedjiga Mouheb and Chamseddine Talhi and Mariam Nouh and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Roger Y. Lee and Olga Ormandjieva and Alain Abran and Constantinos Constantinides}, title = {Aspect-Oriented Modeling for Representing and Integrating Security Concerns in {UML}}, booktitle = {Software Engineering Research, Management and Applications 2010 [selected papers from the 8th {ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2010, Montreal, Canada, May 24-26, 2010]}, series = {Studies in Computational Intelligence}, volume = {296}, pages = {197--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13273-5\_13}, doi = {10.1007/978-3-642-13273-5\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/TalhiMLDWP09, author = {Chamseddine Talhi and Djedjiga Mouheb and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, title = {Usability of Security Specification Approaches for {UML} Design: {A} Survey}, journal = {J. Object Technol.}, volume = {8}, number = {6}, pages = {102--122}, year = {2009}, url = {https://doi.org/10.5381/jot.2009.8.6.a1}, doi = {10.5381/JOT.2009.8.6.A1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/TalhiMLDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SimplicioCVCNP09, author = {Marcos A. Simpl{\'{\i}}cio Jr. and Vlad Coroama and Yeda Regina Venturini and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Irfan Awan and Muhammad Younas and Takahiro Hara and Arjan Durresi}, title = {{PHD}}, booktitle = {The {IEEE} 23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29, 2009}, pages = {487--494}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/AINA.2009.18}, doi = {10.1109/AINA.2009.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SimplicioCVCNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aosd/MouhebTLD0P09, author = {Djedjiga Mouheb and Chamseddine Talhi and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Omar Aldawud and Walter Cazzola and Thomas Cottenier and Jeff Gray and J{\"{o}}rg Kienzle and Dominik Stein}, title = {Weaving security aspects into {UML} 2.0 design models}, booktitle = {Proceedings of the 13th workshop on Aspect-oriented modeling, {AOM} '09, Charlottesville, Virginia, USA, March 2, 2009}, pages = {7--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1509297.1509300}, doi = {10.1145/1509297.1509300}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aosd/MouhebTLD0P09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/MouhebTMLDWP09, author = {Djedjiga Mouheb and Chamseddine Talhi and Azzam Mourad and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Hamido Fujita and Vladim{\'{\i}}r Mar{\'{\i}}k}, title = {An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Eighth SoMeT 2009, September 23-25, 2009, Prague, Czech Republic}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {199}, pages = {203--222}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-049-0-203}, doi = {10.3233/978-1-60750-049-0-203}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/somet/MouhebTMLDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LimaTMDWP09, author = {Vitor Lima and Chamseddine Talhi and Djedjiga Mouheb and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Ralf Huuck and Gerwin Klein and Bastian Schlich}, title = {Formal Verification and Validation of {UML} 2.0 Sequence Diagrams using Source and Destination of Messages}, booktitle = {Proceedings of the 4th International Workshop on Systems Software Verification, {SSV} 2009, Aachen, Germany, June 22-24, 2009}, series = {Electronic Notes in Theoretical Computer Science}, volume = {254}, pages = {143--160}, publisher = {Elsevier}, year = {2009}, url = {https://doi.org/10.1016/j.entcs.2009.09.064}, doi = {10.1016/J.ENTCS.2009.09.064}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/LimaTMDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/KpodjedoPP08, author = {Segla Kpodjedo and Samuel Pierre and Makan Pourzandi}, title = {Reputation based trust management using {TCG} in Mobile Ad-Hoc Networks {(RTA)}}, booktitle = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings}, pages = {518--519}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/LCN.2008.4664218}, doi = {10.1109/LCN.2008.4664218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/KpodjedoPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medhocnet/VenturiniCCNP08, author = {Yeda Regina Venturini and Vlad Coroama and Tereza Cristina M. B. Carvalho and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Pedro Cuenca and Carlos Guerrero and Ram{\'{o}}n Puigjaner and Bartomeu Serra}, title = {Security for Context-Aware ad-hoc Networking Applications}, booktitle = {Advances in Ad Hoc Networking - Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008}, series = {{IFIP}}, volume = {265}, pages = {145--156}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09490-8\_13}, doi = {10.1007/978-0-387-09490-8\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/medhocnet/VenturiniCCNP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/DarivemulaLTP06, author = {Arpan Darivemula and Chokchai Leangsuksun and Anand Tikotekar and Makan Pourzandi}, title = {Work in Progress: {RASS} Framework for a Cluster-Aware SELinux}, booktitle = {Sixth {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore}, pages = {29}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.ieeecomputersociety.org/10.1109/CCGRID.2006.184}, doi = {10.1109/CCGRID.2006.184}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/DarivemulaLTP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isas/BadovinatzBPRT06, author = {Peter Badovinatz and Santosh Balakrishnan and Makan Pourzandi and Manfred Reitenspie{\ss} and Chad Tindel}, editor = {Dave Penkler and Manfred Reitenspie{\ss} and Francis Tam}, title = {The Service Availability Forum Security Service {(SEC):} Status and Future Directions}, booktitle = {Service Availability, Third International Service Availability Symposium, {ISAS} 2006, Helsinki, Finland, May 15-16, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4328}, pages = {271--287}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11955498\_19}, doi = {10.1007/11955498\_19}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/isas/BadovinatzBPRT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/MatushimaVSCRNP06, author = {Reinaldo Matushima and Yeda Regina Venturini and Rony R. M. Sakuragui and Tereza Cristina M. B. Carvalho and Wilson Vicente Ruggiero and Mats N{\"{a}}slund and Makan Pourzandi}, editor = {Seizo Onoe and Mohsen Guizani and Hsiao{-}Hwa Chen and Mamoru Sawahashi}, title = {Multiple personal security domains}, booktitle = {Proceedings of the International Conference on Wireless Communications and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada, July 3-6, 2006}, pages = {361--366}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143549.1143621}, doi = {10.1145/1143549.1143621}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/MatushimaVSCRNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ApvrilleP05, author = {Axelle Apvrille and Makan Pourzandi}, title = {Secure Software Development by Example}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {4}, pages = {10--17}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.103}, doi = {10.1109/MSP.2005.103}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ApvrilleP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/LeangsuksunTPH05, author = {Chokchai Leangsuksun and Anand Tikotekar and Makan Pourzandi and Ibrahim Haddad}, title = {Feasibility study and early experimental results towards cluster survivability}, booktitle = {5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 9-12 May, 2005, Cardiff, {UK}}, pages = {77--81}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CCGRID.2005.1558537}, doi = {10.1109/CCGRID.2005.1558537}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/LeangsuksunTPH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/PourzandiGYK05, author = {Makan Pourzandi and David Gordon and William Yurcik and Gregory A. Koenig}, title = {Clusters and security: distributed security for distributed systems}, booktitle = {5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 9-12 May, 2005, Cardiff, {UK}}, pages = {96--104}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CCGRID.2005.1558540}, doi = {10.1109/CCGRID.2005.1558540}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/PourzandiGYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0507073, author = {Michel R. Dagenais and Karim Yaghmour and Charles Levert and Makan Pourzandi}, title = {Software Performance Analysis}, journal = {CoRR}, volume = {abs/cs/0507073}, year = {2005}, url = {http://arxiv.org/abs/cs/0507073}, eprinttype = {arXiv}, eprint = {cs/0507073}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0507073.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ApvrilleP04, author = {Axelle Apvrille and Makan Pourzandi}, title = {{XML} distributed security policy for clusters}, journal = {Comput. Secur.}, volume = {23}, number = {8}, pages = {649--658}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.09.006}, doi = {10.1016/J.COSE.2004.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ApvrilleP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/ApvrilleGHPR04, author = {Axelle Apvrille and David Gordon and Serge E. Hallyn and Makan Pourzandi and Vincent Roy}, editor = {Lee Damon}, title = {DigSig: Runtime Authentication of Binaries at Kernel Level}, booktitle = {Proceedings of the 18th Conference on Systems Administration {(LISA} 2004), Atlanta, USA, November 14-19, 2004}, pages = {59--66}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/lisa04/tech/apvrille.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/ApvrilleGHPR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0412039, author = {Marc Chatel and Michel R. Dagenais and Charles Levert and Makan Pourzandi}, title = {Security in Carrier Class Server Applications for All-IP Networks}, journal = {CoRR}, volume = {abs/cs/0412039}, year = {2004}, url = {http://arxiv.org/abs/cs/0412039}, eprinttype = {arXiv}, eprint = {cs/0412039}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0412039.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/PouzandiAGMG03, author = {Makan Pourzandi and Axelle Apvrille and E. Gingras and A. Medenou and David Gordon}, editor = {Hamid R. Arabnia and Youngsong Mun}, title = {Distributed Access Control for Carrier Class Clusters}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1}, pages = {132--137}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Thu, 26 Jan 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/PouzandiAGMG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/PourzandiHLZD02, author = {Makan Pourzandi and Ibrahim Haddad and Charles Levert and Miroslaw Zakrzewski and Michel R. Dagenais}, title = {A New Architecture for Secure Carrier-Class Clusters}, booktitle = {2002 {IEEE} International Conference on Cluster Computing {(CLUSTER} 2002), 23-26 September 2002, Chicago, IL, {USA}}, pages = {494--498}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CLUSTR.2002.1137790}, doi = {10.1109/CLUSTR.2002.1137790}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cluster/PourzandiHLZD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europar/DemianDPP96, author = {V. Demian and Frederic Desprez and H{\'{e}}l{\`{e}}ne Paugam{-}Moisy and Makan Pourzandi}, editor = {Luc Boug{\'{e}} and Pierre Fraigniaud and Anne Mignotte and Yves Robert}, title = {Parallel Implementation of {RBF} Neural Networks}, booktitle = {Euro-Par '96 Parallel Processing, Second International Euro-Par Conference, Lyon, France, August 26-29, 1996, Proceedings, Volume {II}}, series = {Lecture Notes in Computer Science}, volume = {1124}, pages = {243--250}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0024708}, doi = {10.1007/BFB0024708}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/europar/DemianDPP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.