BibTeX records: Makan Pourzandi

download as .bib file

@article{DBLP:journals/tdsc/OqailyKMJZPWD24,
  author       = {Momen Oqaily and
                  Mohammad Ekramul Kabir and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {iCAT+: An Interactive Customizable Anonymization Tool Using Automated
                  Translation Through Deep Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {2799--2817},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3317806},
  doi          = {10.1109/TDSC.2023.3317806},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OqailyKMJZPWD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ThirunavukkarasuZMJPW24,
  author       = {Sudershan Lakshmanan Thirunavukkarasu and
                  Mengyuan Zhang and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  title        = {Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks
                  in Network Functions Virtualization {(NFV)}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {2964--2981},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3320811},
  doi          = {10.1109/TDSC.2023.3320811},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ThirunavukkarasuZMJPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Gholipourchoubeh24,
  author       = {Mahmood Gholipourchoubeh and
                  Hugo Kermabon{-}Bobinnec and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Boubakr Nour and
                  Makan Pourzandi},
  editor       = {Jo{\~{a}}o P. Vilela and
                  Haya Schulmann and
                  Ninghui Li},
  title        = {{CCSM:} Building Cross-Cluster Security Models for Edge-Core Environments
                  Involving Multiple Kubernetes Clusters},
  booktitle    = {Proceedings of the Fourteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2024, Porto, Portugal, June 19-21,
                  2024},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626232.3653253},
  doi          = {10.1145/3626232.3653253},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Gholipourchoubeh24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MolinaWAPA24,
  author       = {Ricardo Misael Ayala Molina and
                  Nathalie Wehbe and
                  Hyarne Assem Alameddine and
                  Makan Pourzandi and
                  Chadi Assi},
  title        = {Inter-Slice Defender: An Anomaly Detection Solution for Distributed
                  Slice Mobility Attacks},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2024, Thessaloniki,
                  Greece, June 3-6, 2024},
  pages        = {432--440},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.23919/IFIPNetworking62109.2024.10619850},
  doi          = {10.23919/IFIPNETWORKING62109.2024.10619850},
  timestamp    = {Wed, 04 Sep 2024 21:11:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/MolinaWAPA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OqailyPJ0NPD24,
  author       = {Momen Oqaily and
                  Hinddeep Purohit and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Boubakr Nour and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Davide Balzarotti and
                  Wenyuan Xu},
  title        = {ChainPatrol: Balancing Attack Detection and Classification with Performance
                  Overhead for Service Function Chains Using Virtual Trailers},
  booktitle    = {33rd {USENIX} Security Symposium, {USENIX} Security 2024, Philadelphia,
                  PA, USA, August 14-16, 2024},
  publisher    = {{USENIX} Association},
  year         = {2024},
  url          = {https://www.usenix.org/conference/usenixsecurity24/presentation/oqaily},
  timestamp    = {Mon, 22 Jul 2024 17:10:49 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/OqailyPJ0NPD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/WehbeAPBA23,
  author       = {Nathalie Wehbe and
                  Hyame Assem Alameddine and
                  Makan Pourzandi and
                  Elias Bou{-}Harb and
                  Chadi Assi},
  title        = {A Security Assessment of {HTTP/2} Usage in 5G Service-Based Architecture},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {1},
  pages        = {48--54},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.001.2200183},
  doi          = {10.1109/MCOM.001.2200183},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/WehbeAPBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/NourPD23,
  author       = {Boubakr Nour and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {A Survey on Threat Hunting in Enterprise Networks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {25},
  number       = {4},
  pages        = {2299--2324},
  year         = {2023},
  url          = {https://doi.org/10.1109/COMST.2023.3299519},
  doi          = {10.1109/COMST.2023.3299519},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/NourPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/OqailyM0KJAPD23,
  author       = {Momen Oqaily and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Mohammad Ekramul Kabir and
                  Yosr Jarraya and
                  A. S. M. Asadujjaman and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual
                  Network Function Chains Hosted on Third-Party Clouds},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583643},
  doi          = {10.1145/3577923.3583643},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/OqailyM0KJAPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23,
  author       = {Md. Nazmul Hoq and
                  Jia Wei Yao and
                  Suryadipta Majumdar and
                  Luis Su{\'{a}}rez and
                  Lingyu Wang and
                  Amine Boukhtouta and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Evaluating the Security Posture of 5G Networks by Combining State
                  Auditing and Event Monitoring},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {123--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_7},
  doi          = {10.1007/978-3-031-51476-0\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/NourPQD23,
  author       = {Boubakr Nour and
                  Makan Pourzandi and
                  Rushaan Kamran Qureshi and
                  Mourad Debbabi},
  editor       = {Mohamed Mosbah and
                  Florence S{\`{e}}des and
                  Nadia Tawbi and
                  Toufik Ahmed and
                  Nora Boulahia{-}Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Accurify: Automated New Testflows Generation for Attack Variants in
                  Threat Hunting},
  booktitle    = {Foundations and Practice of Security - 16th International Symposium,
                  {FPS} 2023, Bordeaux, France, December 11-13, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14552},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-57540-2\_5},
  doi          = {10.1007/978-3-031-57540-2\_5},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/NourPQD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BagheriKMJWP23,
  author       = {Sima Bagheri and
                  Hugo Kermabon{-}Bobinnec and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation
                  for Kubernetes Clusters},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {777--782},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10278632},
  doi          = {10.1109/ICC45041.2023.10278632},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/BagheriKMJWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/WehbeAPA23,
  author       = {Nathalie Wehbe and
                  Hyame Assem Alameddine and
                  Makan Pourzandi and
                  Chadi Assi},
  title        = {5GShield: {HTTP/2} Anomaly Detection in 5G Service-Based Architecture},
  booktitle    = {{IFIP} Networking Conference, {IFIP} Networking 2023, Barcelona, Spain,
                  June 12-15, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.23919/IFIPNetworking57963.2023.10186410},
  doi          = {10.23919/IFIPNETWORKING57963.2023.10186410},
  timestamp    = {Mon, 31 Jul 2023 13:58:25 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/WehbeAPA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MajumdarCAMJP0D22,
  author       = {Suryadipta Majumdar and
                  Gagandeep Singh Chawla and
                  Amir Alimohammadifar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {ProSAS: Proactive Security Auditing System for Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2517--2534},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3062204},
  doi          = {10.1109/TDSC.2021.3062204},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MajumdarCAMJP0D22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/5gwf/BoukhtoutaMPA22,
  author       = {Amine Boukhtouta and
                  Taous Madi and
                  Makan Pourzandi and
                  Hyame Assem Alameddine},
  title        = {Cloud Native Applications Profiling using a Graph Neural Networks
                  Approach},
  booktitle    = {2022 {IEEE} Future Networks World Forum, {FNWF} 2022, Montreal, QC,
                  Canada, October 10-14, 2022},
  pages        = {220--227},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FNWF55208.2022.00046},
  doi          = {10.1109/FNWF55208.2022.00046},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/5gwf/BoukhtoutaMPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/AsadujjamanKPMWJP22,
  author       = {A. S. M. Asadujjaman and
                  Mohammad Ekramul Kabir and
                  Hinddeep Purohit and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Yosr Jarraya and
                  Makan Pourzandi},
  title        = {5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network
                  Functions},
  booktitle    = {{IEEE} International Conference on Cloud Computing Technology and
                  Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022},
  pages        = {162--169},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CloudCom55334.2022.00032},
  doi          = {10.1109/CLOUDCOM55334.2022.00032},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/AsadujjamanKPMWJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/LeiZPM22,
  author       = {Ming Lei and
                  Lianying Zhao and
                  Makan Pourzandi and
                  Fereydoun Farrahi Moghaddam},
  title        = {A Hybrid Decision-making Approach to Security Metrics Aggregation
                  in Cloud Environments},
  booktitle    = {{IEEE} International Conference on Cloud Computing Technology and
                  Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022},
  pages        = {178--185},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CloudCom55334.2022.00034},
  doi          = {10.1109/CLOUDCOM55334.2022.00034},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/LeiZPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Kermabon-Bobinnec22,
  author       = {Hugo Kermabon{-}Bobinnec and
                  Mahmood Gholipourchoubeh and
                  Sima Bagheri and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {ProSPEC: Proactive Security Policy Enforcement for Containers},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511515},
  doi          = {10.1145/3508398.3511515},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Kermabon-Bobinnec22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OqailyJWPM22,
  author       = {Alaa Oqaily and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {{MLFM:} Machine Learning Meets Formal Method for Faster Identification
                  of Security Breaches in Network Functions Virtualization {(NFV)}},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {466--489},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_23},
  doi          = {10.1007/978-3-031-17143-7\_23},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OqailyJWPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TabibanZJP0022,
  author       = {Azadeh Tabiban and
                  Heyang Zhao and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Mengyuan Zhang and
                  Lingyu Wang},
  title        = {ProvTalk: Towards Interpretable Multi-level Provenance Analysis in
                  Networking Functions Virtualization {(NFV)}},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-232/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/TabibanZJP0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/TabibanZJPW22,
  author       = {Azadeh Tabiban and
                  Heyang Zhao and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {VinciDecoder: Automatically Interpreting Provenance Graphs into Textual
                  Forensic Reports with Application to OpenStack},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_19},
  doi          = {10.1007/978-3-031-22295-5\_19},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/TabibanZJPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-13046,
  author       = {Meisam Mohammady and
                  Han Wang and
                  Lingyu Wang and
                  Mengyuan Zhang and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Yuan Hong},
  title        = {{DPOAD:} Differentially Private Outsourcing of Anomaly Detection through
                  Iterative Sensitivity Learning},
  journal      = {CoRR},
  volume       = {abs/2206.13046},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.13046},
  doi          = {10.48550/ARXIV.2206.13046},
  eprinttype    = {arXiv},
  eprint       = {2206.13046},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-13046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MadiAPB21,
  author       = {Taous Madi and
                  Hyame Assem Alameddine and
                  Makan Pourzandi and
                  Amine Boukhtouta},
  title        = {{NFV} security survey in 5G networks: {A} three-dimensional threat
                  taxonomy},
  journal      = {Comput. Networks},
  volume       = {197},
  pages        = {108288},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108288},
  doi          = {10.1016/J.COMNET.2021.108288},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MadiAPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChawlaZMJPWD21,
  author       = {Gagandeep Singh Chawla and
                  Mengyuan Zhang and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {VMGuard: State-Based Proactive Verification of Virtual Network Isolation
                  With Application to {NFV}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1553--1567},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3041430},
  doi          = {10.1109/TDSC.2020.3041430},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChawlaZMJPWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OqailyJMMPWD21,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Meisam Mohammady and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {SegGuard: Segmentation-Based Anonymization of Network Data in Clouds
                  for Privacy-Preserving Security Auditing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2486--2505},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2957488},
  doi          = {10.1109/TDSC.2019.2957488},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OqailyJMMPWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MohammadyOWHLPD21,
  author       = {Meisam Mohammady and
                  Momen Oqaily and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace
                  Anonymization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {14:1--14:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3439732},
  doi          = {10.1145/3439732},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GhorbaniMZPNC21,
  author       = {Mohammad Mahdi Ghorbani and
                  Fereydoun Farrahi Moghaddam and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Kim Khoa Nguyen and
                  Mohamed Cheriet},
  title        = {DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based
                  Environment},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {837--848},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485907},
  doi          = {10.1145/3485832.3485907},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GhorbaniMZPNC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21,
  author       = {A. S. M. Asadujjaman and
                  Momen Oqaily and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach
                  to Verifying the Integrity of {NFV} Service Chains},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705020},
  doi          = {10.1109/CNS53000.2021.9705020},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MadiAPBSA21,
  author       = {Taous Madi and
                  Hyame Assem Alameddine and
                  Makan Pourzandi and
                  Amine Boukhtouta and
                  Moataz Shoukry Samir and
                  Chadi Assi},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {AutoGuard: {A} Dual Intelligence Proactive Anomaly Detection at Application-Layer
                  in 5G Networks},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {715--735},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_34},
  doi          = {10.1007/978-3-030-88418-5\_34},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MadiAPBSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZhaoOZMCP21,
  author       = {Lianying Zhao and
                  Muhammad Shafayat Oshman and
                  Mengyuan Zhang and
                  Fereydoun Farrahi Moghaddam and
                  Shubham Chander and
                  Makan Pourzandi},
  title        = {Towards 5G-ready Security Metrics},
  booktitle    = {{ICC} 2021 - {IEEE} International Conference on Communications, Montreal,
                  QC, Canada, June 14-23, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICC42927.2021.9500349},
  doi          = {10.1109/ICC42927.2021.9500349},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZhaoOZMCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdf2c/2020,
  editor       = {Sanjay Goel and
                  Pavel Gladyshev and
                  Daryl Johnson and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  title        = {Digital Forensics and Cyber Crime - 11th {EAI} International Conference,
                  {ICDF2C} 2020, Boston, MA, USA, October 15-16, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {351},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-68734-2},
  doi          = {10.1007/978-3-030-68734-2},
  isbn         = {978-3-030-68733-5},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdf2c/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohammadyXHZ0PD20,
  author       = {Meisam Mohammady and
                  Shangyu Xie and
                  Yuan Hong and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{R2DP:} {A} Universal and Automated Approach to Optimizing the Randomization
                  Mechanisms of Differential Privacy for Utility Metrics with No Known
                  Optimal Distributions},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {677--696},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417259},
  doi          = {10.1145/3372297.3417259},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MohammadyXHZ0PD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/OqailyTJMZP0D20,
  author       = {Alaa Oqaily and
                  Sudershan Lakshmanan Thirunavukkarasu and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization
                  {(NFV)} Stack},
  booktitle    = {12th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CloudCom49646.2020.00003},
  doi          = {10.1109/CLOUDCOM49646.2020.00003},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/OqailyTJMZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/GhorbaniMZPNC20,
  author       = {Mohammad Mahdi Ghorbani and
                  Fereydoun Farrahi Moghaddam and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Kim Khoa Nguyen and
                  Mohamed Cheriet},
  title        = {Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice
                  Data Exchange Graph},
  booktitle    = {12th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CloudCom49646.2020.00004},
  doi          = {10.1109/CLOUDCOM49646.2020.00004},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/GhorbaniMZPNC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanJZP0D20,
  author       = {Azadeh Tabiban and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis
                  with Application to OpenStack},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162251},
  doi          = {10.1109/CNS48642.2020.9162251},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09451,
  author       = {Meisam Mohammady and
                  Shangyu Xie and
                  Yuan Hong and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {R\({}^{\mbox{2}}\)DP: {A} Universal and Automated Approach to Optimizing
                  the Randomization Mechanisms of Differential Privacy for Utility Metrics
                  with No Known Optimal Distributions},
  journal      = {CoRR},
  volume       = {abs/2009.09451},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.09451},
  eprinttype    = {arXiv},
  eprint       = {2009.09451},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-09451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/MajumdarMWTOAJPWD19,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Azadeh Tabiban and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Cloud Security Auditing},
  series       = {Advances in Information Security},
  volume       = {76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23128-6},
  doi          = {10.1007/978-3-030-23128-6},
  isbn         = {978-3-030-23127-9},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MajumdarTJOAP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Yosr Jarraya and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Learning probabilistic dependencies among events for proactive security
                  auditing in clouds},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {165--202},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-181137},
  doi          = {10.3233/JCS-181137},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MajumdarTJOAP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MadiJAMWPWD18,
  author       = {Taous Madi and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers
                  in OpenStack},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1:1--1:35},
  year         = {2019},
  url          = {https://doi.org/10.1145/3267339},
  doi          = {10.1145/3267339},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/SendiJPC19,
  author       = {Alireza Shameli{-}Sendi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Mohamed Cheriet},
  title        = {Efficient Provisioning of Security Service Function Chaining Using
                  Network Security Defense Patterns},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {4},
  pages        = {534--549},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2016.2616867},
  doi          = {10.1109/TSC.2016.2616867},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/SendiJPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/Thirunavukkarasu19,
  author       = {Sudershan Lakshmanan Thirunavukkarasu and
                  Mengyuan Zhang and
                  Alaa Oqaily and
                  Gagandeep Singh Chawla and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Modeling {NFV} Deployment to Identify the Cross-Level Inconsistency
                  Vulnerabilities},
  booktitle    = {2019 {IEEE} International Conference on Cloud Computing Technology
                  and Science (CloudCom), Sydney, Australia, December 11-13, 2019},
  pages        = {167--174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CloudCom.2019.00034},
  doi          = {10.1109/CLOUDCOM.2019.00034},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/Thirunavukkarasu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Meisam Mohammady and
                  Alaa Oqaily and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Multi-Level Proactive Security Auditing for Clouds},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937641},
  doi          = {10.1109/DSC47296.2019.8937641},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarTMOJP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Meisam Mohammady and
                  Alaa Oqaily and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Proactivizer: Transforming Existing Verification Tools into Efficient
                  Solutions for Runtime Security Enforcement},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {239--262},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_12},
  doi          = {10.1007/978-3-030-29962-0\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarTMOJP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {iCAT: An Interactive Customizable Anonymization Tool},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {658--680},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_32},
  doi          = {10.1007/978-3-030-29959-0\_32},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/MigaultSBPAAC18,
  author       = {Daniel Migault and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Bruno M. Barros and
                  Makan Pourzandi and
                  Thiago R. M. Almeida and
                  Ewerton R. Andrade and
                  Tereza Cristina M. B. Carvalho},
  title        = {A framework for enabling security services collaboration across multiple
                  domains},
  journal      = {Comput. Electr. Eng.},
  volume       = {69},
  pages        = {224--239},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2018.02.026},
  doi          = {10.1016/J.COMPELECENG.2018.02.026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/MigaultSBPAAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MajumdarMWJPWD18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {User-Level Runtime Security Auditing for the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1185--1199},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779444},
  doi          = {10.1109/TIFS.2017.2779444},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mohammady0HLPD18,
  author       = {Meisam Mohammady and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Preserving Both Privacy and Utility in Network Trace Anonymization},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {459--474},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243809},
  doi          = {10.1145/3243734.3243809},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Mohammady0HLPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/MadiZJAP0D18,
  author       = {Taous Madi and
                  Mengyuan Zhang and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in
                  Public Cloud},
  booktitle    = {2018 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CloudCom2018.2018.00042},
  doi          = {10.1109/CLOUDCOM2018.2018.00042},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/MadiZJAP0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BoukhtoutaPBD18,
  author       = {Amine Boukhtouta and
                  Makan Pourzandi and
                  Richard Brunner and
                  St{\'{e}}phane Dault},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Fingerprinting Crowd Events in Content Delivery Networks: {A} Semi-supervised
                  Methodology},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {312--329},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_20},
  doi          = {10.1007/978-3-319-95729-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BoukhtoutaPBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Alimohammadifar18,
  author       = {Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to
                  Defending Software Defined Networks Against Topology Poisoning Attacks},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {463--484},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_23},
  doi          = {10.1007/978-3-319-98989-1\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MajumdarMJP0D18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Cloud Security Auditing: Major Approaches and Existing Challenges},
  booktitle    = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-18419-3\_5},
  doi          = {10.1007/978-3-030-18419-3\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/MajumdarMJP0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/JalalpourGMPPB18,
  author       = {Elaheh Jalalpour and
                  Milad Ghaznavi and
                  Daniel Migault and
                  Stere Preda and
                  Makan Pourzandi and
                  Raouf Boutaba},
  title        = {A Security Orchestration System for {CDN} Edge Servers},
  booktitle    = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft
                  2018, Montreal, QC, Canada, June 25-29, 2018},
  pages        = {46--54},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NETSOFT.2018.8459910},
  doi          = {10.1109/NETSOFT.2018.8459910},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/JalalpourGMPPB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/JalalpourGMPPB18a,
  author       = {Elaheh Jalalpour and
                  Milad Ghaznavi and
                  Daniel Migault and
                  Stere Preda and
                  Makan Pourzandi and
                  Raouf Boutaba},
  title        = {Dynamic Security Orchestration for {CDN} Edge-Servers},
  booktitle    = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft
                  2018, Montreal, QC, Canada, June 25-29, 2018},
  pages        = {329--331},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NETSOFT.2018.8459970},
  doi          = {10.1109/NETSOFT.2018.8459970},
  timestamp    = {Tue, 18 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/JalalpourGMPPB18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/AlmeidaBASMP18,
  author       = {Thiago R. M. Almeida and
                  Bruno M. Barros and
                  Ewerton R. Andrade and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Daniel Migault and
                  Makan Pourzandi},
  title        = {Demonstration of a framework for enabling security services collaboration
                  across multiple domains},
  booktitle    = {4th {IEEE} Conference on Network Softwarization and Workshops, NetSoft
                  2018, Montreal, QC, Canada, June 25-29, 2018},
  pages        = {341--343},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NETSOFT.2018.8460105},
  doi          = {10.1109/NETSOFT.2018.8460105},
  timestamp    = {Wed, 19 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsoft/AlmeidaBASMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-10464,
  author       = {Meisam Mohammady and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Preserving Both Privacy and Utility in Network Trace Anonymization},
  journal      = {CoRR},
  volume       = {abs/1810.10464},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.10464},
  eprinttype    = {arXiv},
  eprint       = {1810.10464},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-10464.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/AljumahPD17,
  author       = {Feras Aljumah and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Privacy-Preserving Querying on Privately Encrypted Data in the Cloud},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {35},
  pages        = {50--73},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-56121-8\_3},
  doi          = {10.1007/978-3-662-56121-8\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/AljumahPD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17,
  author       = {Suryadipta Majumdar and
                  Yosr Jarraya and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {LeaPS: Learning-Based Proactive Security Auditing for Clouds},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_15},
  doi          = {10.1007/978-3-319-66399-9\_15},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarJOAPWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/MigaultSBPAAC17,
  author       = {Daniel Migault and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Bruno M. Barros and
                  Makan Pourzandi and
                  Thiago R. M. Almeida and
                  Ewerton R. Andrade and
                  Tereza Cristina M. B. Carvalho},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {A Framework for Enabling Security Services Collaboration Across Multiple
                  Domains},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {999--1010},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.67},
  doi          = {10.1109/ICDCS.2017.67},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/MigaultSBPAAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangMMJAP0D17,
  author       = {Yushun Wang and
                  Taous Madi and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level
                  Network Isolation},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/tenantguard-scalable-runtime-verification-cloud-wide-vm-level-network-isolation/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangMMJAP0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SathyanarayanPA17,
  author       = {Sunil Kumar Sathyanarayan and
                  Makan Pourzandi and
                  Katayoun Aliyari},
  title        = {Return Oriented Programming - Exploit Implementation using functions},
  journal      = {CoRR},
  volume       = {abs/1706.08562},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.08562},
  eprinttype    = {arXiv},
  eprint       = {1706.08562},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SathyanarayanPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isse/MouhebANDWP16,
  author       = {Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mariam Nouh and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Aspect-oriented modeling framework for security hardening},
  journal      = {Innov. Syst. Softw. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {41--67},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11334-015-0263-5},
  doi          = {10.1007/S11334-015-0263-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MadiMWJPW16,
  author       = {Taous Madi and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Auditing Security Compliance of the Virtualized Infrastructure in
                  the Cloud: Application to OpenStack},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857721},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MadiMWJPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16,
  author       = {Suryadipta Majumdar and
                  Yosr Jarraya and
                  Taous Madi and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Proactive Verification of Security Compliance for Clouds Through Pre-computation:
                  Application to OpenStack},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_3},
  doi          = {10.1007/978-3-319-45744-4\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarJMAPWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/MouhebDPWNZATL15,
  author       = {Djedjiga Mouheb and
                  Mourad Debbabi and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mariam Nouh and
                  Raha Ziarati and
                  Dima Alhadidi and
                  Chamseddine Talhi and
                  Vitor Lima},
  title        = {Aspect-Oriented Security Hardening of {UML} Design Models},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16106-8},
  doi          = {10.1007/978-3-319-16106-8},
  isbn         = {978-3-319-16105-1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JarrayaESDP15,
  author       = {Yosr Jarraya and
                  Arash Eghtesadi and
                  Sahba Sadri and
                  Mourad Debbabi and
                  Makan Pourzandi},
  title        = {Verification of firewall reconfiguration for virtual machines migrations
                  in the cloud},
  journal      = {Comput. Networks},
  volume       = {93},
  pages        = {480--491},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2015.10.008},
  doi          = {10.1016/J.COMNET.2015.10.008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JarrayaESDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SendiPAC15,
  author       = {Alireza Shameli{-}Sendi and
                  Makan Pourzandi and
                  Mohamed Fekih Ahmed and
                  Mohamed Cheriet},
  title        = {Taxonomy of Distributed Denial of Service mitigation approaches for
                  cloud computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {58},
  pages        = {165--179},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jnca.2015.09.005},
  doi          = {10.1016/J.JNCA.2015.09.005},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/SendiPAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JarrayaSPC15,
  author       = {Yosr Jarraya and
                  Alireza Shameli{-}Sendi and
                  Makan Pourzandi and
                  Mohamed Cheriet},
  editor       = {Calton Pu and
                  Ajay Mohindra},
  title        = {Multistage {OCDO:} Scalable Security Provisioning Optimization in
                  SDN-Based Cloud},
  booktitle    = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015,
                  New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {572--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CLOUD.2015.82},
  doi          = {10.1109/CLOUD.2015.82},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/JarrayaSPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Security Compliance Auditing of Identity and Access Management in
                  the Cloud: Application to OpenStack},
  booktitle    = {7th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
                  3, 2015},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CloudCom.2015.80},
  doi          = {10.1109/CLOUDCOM.2015.80},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/MajumdarMWJPWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/SendiJAPTC15,
  author       = {Alireza Shameli{-}Sendi and
                  Yosr Jarraya and
                  Mohamed Fekih Ahmed and
                  Makan Pourzandi and
                  Chamseddine Talhi and
                  Mohamed Cheriet},
  editor       = {Remi Badonnel and
                  Jin Xiao and
                  Shingo Ata and
                  Filip De Turck and
                  Voicu Groza and
                  Carlos Raniery Paula dos Santos},
  title        = {Optimal placement of sequentially ordered virtual security appliances
                  in the cloud},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2015, Ottawa, ON, Canada, 11-15 May, 2015},
  pages        = {818--821},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INM.2015.7140384},
  doi          = {10.1109/INM.2015.7140384},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/im/SendiJAPTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/EghtesadiJDP14,
  author       = {Arash Eghtesadi and
                  Yosr Jarraya and
                  Mourad Debbabi and
                  Makan Pourzandi},
  title        = {Preservation of Security Configurations in the Cloud},
  booktitle    = {2014 {IEEE} International Conference on Cloud Engineering, Boston,
                  MA, USA, March 11-14, 2014},
  pages        = {17--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IC2E.2014.14},
  doi          = {10.1109/IC2E.2014.14},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/EghtesadiJDP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/AhmedTPC14,
  author       = {Mohamed Fekih Ahmed and
                  Chamseddine Talhi and
                  Makan Pourzandi and
                  Mohamed Cheriet},
  title        = {A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy},
  booktitle    = {2014 {IEEE} International Conference on Cloud Engineering, Boston,
                  MA, USA, March 11-14, 2014},
  pages        = {568--573},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IC2E.2014.46},
  doi          = {10.1109/IC2E.2014.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/AhmedTPC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Bou-HarbFPDA13,
  author       = {Elias Bou{-}Harb and
                  Claude Fachkha and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {Communication security for smart grid distribution networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {51},
  number       = {1},
  pages        = {42--49},
  year         = {2013},
  url          = {https://doi.org/10.1109/MCOM.2013.6400437},
  doi          = {10.1109/MCOM.2013.6400437},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/Bou-HarbFPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Bou-HarbPDA13,
  author       = {Elias Bou{-}Harb and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {A secure, efficient, and cost-effective distributed architecture for
                  spam mitigation on {LTE} 4G mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1478--1489},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.413},
  doi          = {10.1002/SEC.413},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Bou-HarbPDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his2/AljumahLPD13,
  author       = {Feras Aljumah and
                  Raymond Hei Man Leung and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Guangyan Huang and
                  Xiaohui Liu and
                  Jing He and
                  Frank Klawonn and
                  Guiqing Yao},
  title        = {Emergency Mobile Access to Personal Health Records Stored on an Untrusted
                  Cloud},
  booktitle    = {Health Information Science - Second International Conference, {HIS}
                  2013, London, UK, March 25-27, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7798},
  pages        = {30--41},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37899-7\_3},
  doi          = {10.1007/978-3-642-37899-7\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/his2/AljumahLPD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/GonzalezMRSCNP12,
  author       = {Nelson M. Gonzalez and
                  Charles Miers and
                  Fernando F. Red{\'{\i}}golo and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  title        = {A quantitative analysis of current security concerns and solutions
                  for cloud computing},
  journal      = {J. Cloud Comput.},
  volume       = {1},
  pages        = {11},
  year         = {2012},
  url          = {https://doi.org/10.1186/2192-113X-1-11},
  doi          = {10.1186/2192-113X-1-11},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/GonzalezMRSCNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/DasPD12,
  author       = {Swagata Das and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {On {SPIM} detection in {LTE} networks},
  booktitle    = {25th {IEEE} Canadian Conference on Electrical and Computer Engineering,
                  {CCECE} 2012, Montreal, QC, Canada, April 29 - May 2, 2012},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCECE.2012.6334959},
  doi          = {10.1109/CCECE.2012.6334959},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/DasPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/JarrayaEDZP12,
  author       = {Yosr Jarraya and
                  Arash Eghtesadi and
                  Mourad Debbabi and
                  Ying Zhang and
                  Makan Pourzandi},
  editor       = {Waleed W. Smari and
                  Geoffrey Charles Fox},
  title        = {Cloud calculus: Security verification in elastic cloud computing platform},
  booktitle    = {2012 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2012, Denver, CO, USA, May 21-25, 2012},
  pages        = {447--454},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CTS.2012.6261089},
  doi          = {10.1109/CTS.2012.6261089},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/JarrayaEDZP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhangP12,
  author       = {Ying Zhang and
                  Makan Pourzandi},
  title        = {Studying Impacts of Prefix Interception Attack by Exploring {BGP}
                  {AS-PATH} Prepending},
  booktitle    = {2012 {IEEE} 32nd International Conference on Distributed Computing
                  Systems, Macau, China, June 18-21, 2012},
  pages        = {667--677},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCS.2012.59},
  doi          = {10.1109/ICDCS.2012.59},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhangP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/JarrayaEDZP12,
  author       = {Yosr Jarraya and
                  Arash Eghtesadi and
                  Mourad Debbabi and
                  Ying Zhang and
                  Makan Pourzandi},
  editor       = {Andr{\'{e}}a W. Richa and
                  Christian Scheideler},
  title        = {Formal Verification of Security Preservation for Migrating Virtual
                  Machines in the Cloud},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 14th
                  International Symposium, {SSS} 2012, Toronto, Canada, October 1-4,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7596},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33536-5\_12},
  doi          = {10.1007/978-3-642-33536-5\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/JarrayaEDZP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/GonzalezMRSCNP11,
  author       = {Nelson M. Gonzalez and
                  Charles Miers and
                  Fernando F. Red{\'{\i}}golo and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Frank Leymann and
                  Ivan I. Ivanov and
                  Marten van Sinderen and
                  Boris Shishkov},
  title        = {A Taxonomy Model for Cloud Computing Services},
  booktitle    = {{CLOSER} 2011 - Proceedings of the 1st International Conference on
                  Cloud Computing and Services Science, Noordwijkerhout, Netherlands,
                  7-9 May, 2011},
  pages        = {56--65},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Mon, 26 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/GonzalezMRSCNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/GonzalezMRCSNP11,
  author       = {Nelson M. Gonzalez and
                  Charles Miers and
                  Fernando F. Red{\'{\i}}golo and
                  Tereza Cristina M. B. Carvalho and
                  Marcos A. Simpl{\'{\i}}cio Jr. and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Costas Lambrinoudakis and
                  Panagiotis Rizomiliotis and
                  Tomasz Wiktor Wlodarczyk},
  title        = {A Quantitative Analysis of Current Security Concerns and Solutions
                  for Cloud Computing},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing Technology
                  and Science, CloudCom 2011, Athens, Greece, November 29 - December
                  1, 2011},
  pages        = {231--238},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CloudCom.2011.39},
  doi          = {10.1109/CLOUDCOM.2011.39},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/GonzalezMRCSNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/NouhZMADWP10,
  author       = {Mariam Nouh and
                  Raha Ziarati and
                  Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Joanna W. Ng and
                  Christian Couturier and
                  Hausi A. M{\"{u}}ller and
                  Arthur G. Ryman and
                  Anatol W. Kark},
  title        = {Aspect weaver: a model transformation approach for {UML} models},
  booktitle    = {Proceedings of the 2010 conference of the Centre for Advanced Studies
                  on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada},
  pages        = {139--153},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1923947.1923962},
  doi          = {10.1145/1923947.1923962},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/facs2/MouhebANDWP10,
  author       = {Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mariam Nouh and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Lu{\'{\i}}s Soares Barbosa and
                  Markus Lumpe},
  title        = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic
                  Framework},
  booktitle    = {Formal Aspects of Component Software - 7th International Workshop,
                  {FACS} 2010, Guimar{\~{a}}es, Portugal, October 14-16, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6921},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27269-1\_11},
  doi          = {10.1007/978-3-642-27269-1\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/OuchaniMDP10,
  author       = {Samir Ouchani and
                  Otmane A{\"{\i}}t Mohamed and
                  Mourad Debbabi and
                  Makan Pourzandi},
  editor       = {Roger Y. Lee and
                  Olga Ormandjieva and
                  Alain Abran and
                  Constantinos Constantinides},
  title        = {Verification of the Correctness in Composed {UML} Behavioural Diagrams},
  booktitle    = {Software Engineering Research, Management and Applications 2010 [selected
                  papers from the 8th {ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2010, Montreal, Canada,
                  May 24-26, 2010]},
  series       = {Studies in Computational Intelligence},
  volume       = {296},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13273-5\_11},
  doi          = {10.1007/978-3-642-13273-5\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/OuchaniMDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Mariam Nouh and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Roger Y. Lee and
                  Olga Ormandjieva and
                  Alain Abran and
                  Constantinos Constantinides},
  title        = {Aspect-Oriented Modeling for Representing and Integrating Security
                  Concerns in {UML}},
  booktitle    = {Software Engineering Research, Management and Applications 2010 [selected
                  papers from the 8th {ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2010, Montreal, Canada,
                  May 24-26, 2010]},
  series       = {Studies in Computational Intelligence},
  volume       = {296},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13273-5\_13},
  doi          = {10.1007/978-3-642-13273-5\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/TalhiMLDWP09,
  author       = {Chamseddine Talhi and
                  Djedjiga Mouheb and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Usability of Security Specification Approaches for {UML} Design: {A}
                  Survey},
  journal      = {J. Object Technol.},
  volume       = {8},
  number       = {6},
  pages        = {102--122},
  year         = {2009},
  url          = {https://doi.org/10.5381/jot.2009.8.6.a1},
  doi          = {10.5381/JOT.2009.8.6.A1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/TalhiMLDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SimplicioCVCNP09,
  author       = {Marcos A. Simpl{\'{\i}}cio Jr. and
                  Vlad Coroama and
                  Yeda Regina Venturini and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Irfan Awan and
                  Muhammad Younas and
                  Takahiro Hara and
                  Arjan Durresi},
  title        = {{PHD}},
  booktitle    = {The {IEEE} 23rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2009, Bradford, United Kingdom, May 26-29,
                  2009},
  pages        = {487--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/AINA.2009.18},
  doi          = {10.1109/AINA.2009.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SimplicioCVCNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aosd/MouhebTLD0P09,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Omar Aldawud and
                  Walter Cazzola and
                  Thomas Cottenier and
                  Jeff Gray and
                  J{\"{o}}rg Kienzle and
                  Dominik Stein},
  title        = {Weaving security aspects into {UML} 2.0 design models},
  booktitle    = {Proceedings of the 13th workshop on Aspect-oriented modeling, {AOM}
                  '09, Charlottesville, Virginia, USA, March 2, 2009},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1509297.1509300},
  doi          = {10.1145/1509297.1509300},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aosd/MouhebTLD0P09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/MouhebTMLDWP09,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Azzam Mourad and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Hamido Fujita and
                  Vladim{\'{\i}}r Mar{\'{\i}}k},
  title        = {An Aspect-Oriented Approach for Software Security Hardening: from
                  Design to Implementation},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Eighth SoMeT 2009, September 23-25, 2009, Prague, Czech Republic},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {199},
  pages        = {203--222},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-049-0-203},
  doi          = {10.3233/978-1-60750-049-0-203},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/MouhebTMLDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LimaTMDWP09,
  author       = {Vitor Lima and
                  Chamseddine Talhi and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Ralf Huuck and
                  Gerwin Klein and
                  Bastian Schlich},
  title        = {Formal Verification and Validation of {UML} 2.0 Sequence Diagrams
                  using Source and Destination of Messages},
  booktitle    = {Proceedings of the 4th International Workshop on Systems Software
                  Verification, {SSV} 2009, Aachen, Germany, June 22-24, 2009},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {254},
  pages        = {143--160},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.entcs.2009.09.064},
  doi          = {10.1016/J.ENTCS.2009.09.064},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/LimaTMDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/KpodjedoPP08,
  author       = {Segla Kpodjedo and
                  Samuel Pierre and
                  Makan Pourzandi},
  title        = {Reputation based trust management using {TCG} in Mobile Ad-Hoc Networks
                  {(RTA)}},
  booktitle    = {{LCN} 2008, The 33rd {IEEE} Conference on Local Computer Networks,
                  The Conference on Leading Edge and Practical Computer Networking,
                  Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008,
                  Proceedings},
  pages        = {518--519},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/LCN.2008.4664218},
  doi          = {10.1109/LCN.2008.4664218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/KpodjedoPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medhocnet/VenturiniCCNP08,
  author       = {Yeda Regina Venturini and
                  Vlad Coroama and
                  Tereza Cristina M. B. Carvalho and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Pedro Cuenca and
                  Carlos Guerrero and
                  Ram{\'{o}}n Puigjaner and
                  Bartomeu Serra},
  title        = {Security for Context-Aware ad-hoc Networking Applications},
  booktitle    = {Advances in Ad Hoc Networking - Proceedings of the Seventh Annual
                  Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain,
                  June 25-27, 2008},
  series       = {{IFIP}},
  volume       = {265},
  pages        = {145--156},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09490-8\_13},
  doi          = {10.1007/978-0-387-09490-8\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/medhocnet/VenturiniCCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/DarivemulaLTP06,
  author       = {Arpan Darivemula and
                  Chokchai Leangsuksun and
                  Anand Tikotekar and
                  Makan Pourzandi},
  title        = {Work in Progress: {RASS} Framework for a Cluster-Aware SELinux},
  booktitle    = {Sixth {IEEE} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2006), 16-19 May 2006, Singapore},
  pages        = {29},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCGRID.2006.184},
  doi          = {10.1109/CCGRID.2006.184},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/DarivemulaLTP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isas/BadovinatzBPRT06,
  author       = {Peter Badovinatz and
                  Santosh Balakrishnan and
                  Makan Pourzandi and
                  Manfred Reitenspie{\ss} and
                  Chad Tindel},
  editor       = {Dave Penkler and
                  Manfred Reitenspie{\ss} and
                  Francis Tam},
  title        = {The Service Availability Forum Security Service {(SEC):} Status and
                  Future Directions},
  booktitle    = {Service Availability, Third International Service Availability Symposium,
                  {ISAS} 2006, Helsinki, Finland, May 15-16, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4328},
  pages        = {271--287},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11955498\_19},
  doi          = {10.1007/11955498\_19},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/isas/BadovinatzBPRT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/MatushimaVSCRNP06,
  author       = {Reinaldo Matushima and
                  Yeda Regina Venturini and
                  Rony R. M. Sakuragui and
                  Tereza Cristina M. B. Carvalho and
                  Wilson Vicente Ruggiero and
                  Mats N{\"{a}}slund and
                  Makan Pourzandi},
  editor       = {Seizo Onoe and
                  Mohsen Guizani and
                  Hsiao{-}Hwa Chen and
                  Mamoru Sawahashi},
  title        = {Multiple personal security domains},
  booktitle    = {Proceedings of the International Conference on Wireless Communications
                  and Mobile Computing, {IWCMC} 2006, Vancouver, British Columbia, Canada,
                  July 3-6, 2006},
  pages        = {361--366},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143549.1143621},
  doi          = {10.1145/1143549.1143621},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/MatushimaVSCRNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ApvrilleP05,
  author       = {Axelle Apvrille and
                  Makan Pourzandi},
  title        = {Secure Software Development by Example},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {4},
  pages        = {10--17},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.103},
  doi          = {10.1109/MSP.2005.103},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ApvrilleP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/LeangsuksunTPH05,
  author       = {Chokchai Leangsuksun and
                  Anand Tikotekar and
                  Makan Pourzandi and
                  Ibrahim Haddad},
  title        = {Feasibility study and early experimental results towards cluster survivability},
  booktitle    = {5th International Symposium on Cluster Computing and the Grid (CCGrid
                  2005), 9-12 May, 2005, Cardiff, {UK}},
  pages        = {77--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CCGRID.2005.1558537},
  doi          = {10.1109/CCGRID.2005.1558537},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/LeangsuksunTPH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/PourzandiGYK05,
  author       = {Makan Pourzandi and
                  David Gordon and
                  William Yurcik and
                  Gregory A. Koenig},
  title        = {Clusters and security: distributed security for distributed systems},
  booktitle    = {5th International Symposium on Cluster Computing and the Grid (CCGrid
                  2005), 9-12 May, 2005, Cardiff, {UK}},
  pages        = {96--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CCGRID.2005.1558540},
  doi          = {10.1109/CCGRID.2005.1558540},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/PourzandiGYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0507073,
  author       = {Michel R. Dagenais and
                  Karim Yaghmour and
                  Charles Levert and
                  Makan Pourzandi},
  title        = {Software Performance Analysis},
  journal      = {CoRR},
  volume       = {abs/cs/0507073},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0507073},
  eprinttype    = {arXiv},
  eprint       = {cs/0507073},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0507073.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ApvrilleP04,
  author       = {Axelle Apvrille and
                  Makan Pourzandi},
  title        = {{XML} distributed security policy for clusters},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {8},
  pages        = {649--658},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.09.006},
  doi          = {10.1016/J.COSE.2004.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ApvrilleP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/ApvrilleGHPR04,
  author       = {Axelle Apvrille and
                  David Gordon and
                  Serge E. Hallyn and
                  Makan Pourzandi and
                  Vincent Roy},
  editor       = {Lee Damon},
  title        = {DigSig: Runtime Authentication of Binaries at Kernel Level},
  booktitle    = {Proceedings of the 18th Conference on Systems Administration {(LISA}
                  2004), Atlanta, USA, November 14-19, 2004},
  pages        = {59--66},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/lisa04/tech/apvrille.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/ApvrilleGHPR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0412039,
  author       = {Marc Chatel and
                  Michel R. Dagenais and
                  Charles Levert and
                  Makan Pourzandi},
  title        = {Security in Carrier Class Server Applications for All-IP Networks},
  journal      = {CoRR},
  volume       = {abs/cs/0412039},
  year         = {2004},
  url          = {http://arxiv.org/abs/cs/0412039},
  eprinttype    = {arXiv},
  eprint       = {cs/0412039},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0412039.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/PouzandiAGMG03,
  author       = {Makan Pourzandi and
                  Axelle Apvrille and
                  E. Gingras and
                  A. Medenou and
                  David Gordon},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Distributed Access Control for Carrier Class Clusters},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} '03, June 23 - 26,
                  2003, Las Vegas, Nevada, USA, Volume 1},
  pages        = {132--137},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Thu, 26 Jan 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/PouzandiAGMG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/PourzandiHLZD02,
  author       = {Makan Pourzandi and
                  Ibrahim Haddad and
                  Charles Levert and
                  Miroslaw Zakrzewski and
                  Michel R. Dagenais},
  title        = {A New Architecture for Secure Carrier-Class Clusters},
  booktitle    = {2002 {IEEE} International Conference on Cluster Computing {(CLUSTER}
                  2002), 23-26 September 2002, Chicago, IL, {USA}},
  pages        = {494--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CLUSTR.2002.1137790},
  doi          = {10.1109/CLUSTR.2002.1137790},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cluster/PourzandiHLZD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europar/DemianDPP96,
  author       = {V. Demian and
                  Frederic Desprez and
                  H{\'{e}}l{\`{e}}ne Paugam{-}Moisy and
                  Makan Pourzandi},
  editor       = {Luc Boug{\'{e}} and
                  Pierre Fraigniaud and
                  Anne Mignotte and
                  Yves Robert},
  title        = {Parallel Implementation of {RBF} Neural Networks},
  booktitle    = {Euro-Par '96 Parallel Processing, Second International Euro-Par Conference,
                  Lyon, France, August 26-29, 1996, Proceedings, Volume {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1124},
  pages        = {243--250},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0024708},
  doi          = {10.1007/BFB0024708},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/europar/DemianDPP96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}