Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lingyu Wang 0001
@article{DBLP:journals/csur/AlrabaeeDW23, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {2}, pages = {19:1--19:41}, year = {2023}, url = {https://doi.org/10.1145/3486860}, doi = {10.1145/3486860}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/AlrabaeeDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/XieMWWVH23, author = {Shangyu Xie and Meisam Mohammady and Han Wang and Lingyu Wang and Jaideep Vaidya and Yuan Hong}, title = {A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {1}, pages = {1--15}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3078099}, doi = {10.1109/TKDE.2021.3078099}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/XieMWWVH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/OqailyM0KJAPD23, author = {Momen Oqaily and Suryadipta Majumdar and Lingyu Wang and Mohammad Ekramul Kabir and Yosr Jarraya and A. S. M. Asadujjaman and Makan Pourzandi and Mourad Debbabi}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {79--90}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3583643}, doi = {10.1145/3577923.3583643}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/OqailyM0KJAPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23, author = {Md. Nazmul Hoq and Jia Wei Yao and Suryadipta Majumdar and Luis Su{\'{a}}rez and Lingyu Wang and Amine Boukhtouta and Makan Pourzandi and Mourad Debbabi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {123--144}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_7}, doi = {10.1007/978-3-031-51476-0\_7}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BagheriKMJWP23, author = {Sima Bagheri and Hugo Kermabon{-}Bobinnec and Suryadipta Majumdar and Yosr Jarraya and Lingyu Wang and Makan Pourzandi}, title = {Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {777--782}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10278632}, doi = {10.1109/ICC45041.2023.10278632}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/BagheriKMJWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/QasemSDWLA21, author = {Abdullah Qasem and Paria Shirani and Mourad Debbabi and Lingyu Wang and Bernard Lebel and Basile L. Agba}, title = {Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {2}, pages = {25:1--25:42}, year = {2022}, url = {https://doi.org/10.1145/3432893}, doi = {10.1145/3432893}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/QasemSDWLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DumanZWDAL22, author = {Onur Duman and Mengyuan Zhang and Lingyu Wang and Mourad Debbabi and Ribal F. Atallah and Bernard Lebel}, title = {Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1018--1035}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3009931}, doi = {10.1109/TDSC.2020.3009931}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DumanZWDAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MajumdarCAMJP0D22, author = {Suryadipta Majumdar and Gagandeep Singh Chawla and Amir Alimohammadifar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {ProSAS: Proactive Security Auditing System for Clouds}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2517--2534}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3062204}, doi = {10.1109/TDSC.2021.3062204}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MajumdarCAMJP0D22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hong022, author = {Yuan Hong and Lingyu Wang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{WPES} '22: 21st Workshop on Privacy in the Electronic Society}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3535--3537}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563220}, doi = {10.1145/3548606.3563220}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hong022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/AsadujjamanKPMWJP22, author = {A. S. M. Asadujjaman and Mohammad Ekramul Kabir and Hinddeep Purohit and Suryadipta Majumdar and Lingyu Wang and Yosr Jarraya and Makan Pourzandi}, title = {5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions}, booktitle = {{IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022}, pages = {162--169}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CloudCom55334.2022.00032}, doi = {10.1109/CLOUDCOM55334.2022.00032}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/AsadujjamanKPMWJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Kermabon-Bobinnec22, author = {Hugo Kermabon{-}Bobinnec and Mahmood Gholipourchoubeh and Sima Bagheri and Suryadipta Majumdar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {ProSPEC: Proactive Security Policy Enforcement for Containers}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {155--166}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511515}, doi = {10.1145/3508398.3511515}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Kermabon-Bobinnec22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OqailyJWPM22, author = {Alaa Oqaily and Yosr Jarraya and Lingyu Wang and Makan Pourzandi and Suryadipta Majumdar}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {{MLFM:} Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization {(NFV)}}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, pages = {466--489}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7\_23}, doi = {10.1007/978-3-031-17143-7\_23}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OqailyJWPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/XieMWWVH22, author = {Shangyu Xie and Meisam Mohammady and Han Wang and Lingyu Wang and Jaideep Vaidya and Yuan Hong}, title = {A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract)}, booktitle = {38th {IEEE} International Conference on Data Engineering, {ICDE} 2022, Kuala Lumpur, Malaysia, May 9-12, 2022}, pages = {1549--1550}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDE53745.2022.00151}, doi = {10.1109/ICDE53745.2022.00151}, timestamp = {Fri, 05 Aug 2022 16:24:00 +0200}, biburl = {https://dblp.org/rec/conf/icde/XieMWWVH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/Duman0AKD22, author = {Onur Duman and Lingyu Wang and Minh Au and Marthe Kassouf and Mourad Debbabi}, title = {Hardening Substations against Supply Chain Attacks Under Operational Constraints}, booktitle = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISGT50606.2022.9817488}, doi = {10.1109/ISGT50606.2022.9817488}, timestamp = {Wed, 03 Aug 2022 12:04:15 +0200}, biburl = {https://dblp.org/rec/conf/isgt/Duman0AKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TabibanZJP0022, author = {Azadeh Tabiban and Heyang Zhao and Yosr Jarraya and Makan Pourzandi and Mengyuan Zhang and Lingyu Wang}, title = {ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization {(NFV)}}, booktitle = {29th Annual Network and Distributed System Security Symposium, {NDSS} 2022, San Diego, California, USA, April 24-28, 2022}, publisher = {The Internet Society}, year = {2022}, url = {https://www.ndss-symposium.org/ndss-paper/auto-draft-232/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/TabibanZJP0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/TabibanZJPW22, author = {Azadeh Tabiban and Heyang Zhao and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Hans P. Reiser and Marcel Kyas}, title = {VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack}, booktitle = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30-December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13700}, pages = {346--367}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22295-5\_19}, doi = {10.1007/978-3-031-22295-5\_19}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/TabibanZJPW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2022, editor = {Yuan Hong and Lingyu Wang}, title = {Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559613}, doi = {10.1145/3559613}, isbn = {978-1-4503-9873-2}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-13046, author = {Meisam Mohammady and Han Wang and Lingyu Wang and Mengyuan Zhang and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Mourad Debbabi and Yuan Hong}, title = {{DPOAD:} Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning}, journal = {CoRR}, volume = {abs/2206.13046}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.13046}, doi = {10.48550/ARXIV.2206.13046}, eprinttype = {arXiv}, eprint = {2206.13046}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-13046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWJS21, author = {Mengyuan Zhang and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {310--324}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889086}, doi = {10.1109/TDSC.2018.2889086}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChawlaZMJPWD21, author = {Gagandeep Singh Chawla and Mengyuan Zhang and Suryadipta Majumdar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to {NFV}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1553--1567}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3041430}, doi = {10.1109/TDSC.2020.3041430}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChawlaZMJPWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OqailyJMMPWD21, author = {Momen Oqaily and Yosr Jarraya and Meisam Mohammady and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2486--2505}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2957488}, doi = {10.1109/TDSC.2019.2957488}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OqailyJMMPWD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MohammadyOWHLPD21, author = {Meisam Mohammady and Momen Oqaily and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {14:1--14:36}, year = {2021}, url = {https://doi.org/10.1145/3439732}, doi = {10.1145/3439732}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21, author = {A. S. M. Asadujjaman and Momen Oqaily and Yosr Jarraya and Suryadipta Majumdar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach to Verifying the Integrity of {NFV} Service Chains}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {245--253}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705020}, doi = {10.1109/CNS53000.2021.9705020}, timestamp = {Fri, 18 Feb 2022 10:36:40 +0100}, biburl = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20, author = {Saed Alrabaee and Mourad Debbabi and Paria Shirani and Lingyu Wang and Amr M. Youssef and Ashkan Rahimian and Lina Nouh and Djedjiga Mouheb and He Huang and Aiman Hanna}, title = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting}, series = {Advances in Information Security}, volume = {78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-34238-8}, doi = {10.1007/978-3-030-34238-8}, isbn = {978-3-030-34237-1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlrabaeeDW20, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization Using {LDA}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3051--3066}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2980190}, doi = {10.1109/TIFS.2020.2980190}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohammadyXHZ0PD20, author = {Meisam Mohammady and Shangyu Xie and Yuan Hong and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{R2DP:} {A} Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {677--696}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417259}, doi = {10.1145/3372297.3417259}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohammadyXHZ0PD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/OqailyTJMZP0D20, author = {Alaa Oqaily and Sudershan L. T and Yosr Jarraya and Suryadipta Majumdar and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization {(NFV)} Stack}, booktitle = {12th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020}, pages = {33--40}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CloudCom49646.2020.00003}, doi = {10.1109/CLOUDCOM49646.2020.00003}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/OqailyTJMZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanJZP0D20, author = {Azadeh Tabiban and Yosr Jarraya and Mengyuan Zhang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162251}, doi = {10.1109/CNS48642.2020.9162251}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Alhebaishi0J20, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Modeling and Mitigating Security Threats in Network Functions Virtualization {(NFV)}}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_1}, doi = {10.1007/978-3-030-49669-2\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Alhebaishi0J20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-09451, author = {Meisam Mohammady and Shangyu Xie and Yuan Hong and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, title = {R\({}^{\mbox{2}}\)DP: {A} Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions}, journal = {CoRR}, volume = {abs/2009.09451}, year = {2020}, url = {https://arxiv.org/abs/2009.09451}, eprinttype = {arXiv}, eprint = {2009.09451}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-09451.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/MajumdarMWTOAJPWD19, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Azadeh Tabiban and Momen Oqaily and Amir Alimohammadifar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Cloud Security Auditing}, series = {Advances in Information Security}, volume = {76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23128-6}, doi = {10.1007/978-3-030-23128-6}, isbn = {978-3-030-23127-9}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BorborWJS19, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Optimizing the network diversity to improve the resilience of networks against unknown attacks}, journal = {Comput. Commun.}, volume = {145}, pages = {96--112}, year = {2019}, url = {https://doi.org/10.1016/j.comcom.2019.06.004}, doi = {10.1016/J.COMCOM.2019.06.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BorborWJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeDW19, author = {Saed Alrabaee and Mourad Debbabi and Lingyu Wang}, title = {On the feasibility of binary authorship characterization}, journal = {Digit. Investig.}, volume = {28 Supplement}, pages = {S3--S11}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.01.028}, doi = {10.1016/J.DIIN.2019.01.028}, timestamp = {Thu, 11 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeDW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MajumdarTJOAP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Learning probabilistic dependencies among events for proactive security auditing in clouds}, journal = {J. Comput. Secur.}, volume = {27}, number = {2}, pages = {165--202}, year = {2019}, url = {https://doi.org/10.3233/JCS-181137}, doi = {10.3233/JCS-181137}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MajumdarTJOAP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlhebaishiWJS19, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Mitigating the insider threat of remote administrators in clouds through maintenance task assignments}, journal = {J. Comput. Secur.}, volume = {27}, number = {4}, pages = {427--458}, year = {2019}, url = {https://doi.org/10.3233/JCS-191306}, doi = {10.3233/JCS-191306}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlhebaishiWJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlrabaeeSWDH19, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi and Aiman Hanna}, title = {Decoupling coding habits from functionality for effective binary authorship attribution}, journal = {J. Comput. Secur.}, volume = {27}, number = {6}, pages = {613--648}, year = {2019}, url = {https://doi.org/10.3233/JCS-191292}, doi = {10.3233/JCS-191292}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlrabaeeSWDH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AlhebaishiWS19, author = {Nawaf Alhebaishi and Lingyu Wang and Anoop Singhal}, title = {Threat Modeling for Cloud Infrastructures}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {17}, pages = {e5}, year = {2019}, url = {https://doi.org/10.4108/eai.10-1-2019.156246}, doi = {10.4108/EAI.10-1-2019.156246}, timestamp = {Mon, 17 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AlhebaishiWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/KhaliliZBWSZ19, author = {Mina Khalili and Mengyuan Zhang and Daniel Borbor and Lingyu Wang and Nicandro Scarabeo and Michel{-}Ange Zamor}, title = {Monitoring and Improving Managed Security Services inside a Security Operation Center}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {18}, pages = {e1}, year = {2019}, url = {https://doi.org/10.4108/eai.8-4-2019.157413}, doi = {10.4108/EAI.8-4-2019.157413}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/KhaliliZBWSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCWR19, author = {Mengyuan Zhang and Xavier de Carn{\'{e}} de Carnavalet and Lingyu Wang and Ahmed Ragab}, title = {Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {9}, pages = {2315--2330}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2895963}, doi = {10.1109/TIFS.2019.2895963}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCWR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MadiJAMWPWD18, author = {Taous Madi and Yosr Jarraya and Amir Alimohammadifar and Suryadipta Majumdar and Yushun Wang and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {1}, pages = {1:1--1:35}, year = {2019}, url = {https://doi.org/10.1145/3267339}, doi = {10.1145/3267339}, timestamp = {Fri, 10 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/Thirunavukkarasu19, author = {Sudershan Lakshmanan Thirunavukkarasu and Mengyuan Zhang and Alaa Oqaily and Gagandeep Singh Chawla and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, title = {Modeling {NFV} Deployment to Identify the Cross-Level Inconsistency Vulnerabilities}, booktitle = {2019 {IEEE} International Conference on Cloud Computing Technology and Science (CloudCom), Sydney, Australia, December 11-13, 2019}, pages = {167--174}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CloudCom.2019.00034}, doi = {10.1109/CLOUDCOM.2019.00034}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/Thirunavukkarasu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhangXWJS19, author = {Mengyuan Zhang and Yue Xin and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Simon N. Foley}, title = {CASFinder: Detecting Common Attack Surface}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {338--358}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_18}, doi = {10.1007/978-3-030-22479-0\_18}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ZhangXWJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Multi-Level Proactive Security Auditing for Clouds}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937641}, doi = {10.1109/DSC47296.2019.8937641}, timestamp = {Mon, 16 Mar 2020 18:03:41 +0100}, biburl = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlrabaeeK0D19, author = {Saed Alrabaee and ElMouatez Billah Karbab and Lingyu Wang and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {47--67}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_3}, doi = {10.1007/978-3-030-29962-0\_3}, timestamp = {Mon, 05 Feb 2024 20:29:41 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AlrabaeeK0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarTMOJP0D19, author = {Suryadipta Majumdar and Azadeh Tabiban and Meisam Mohammady and Alaa Oqaily and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11736}, pages = {239--262}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29962-0\_12}, doi = {10.1007/978-3-030-29962-0\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarTMOJP0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19, author = {Momen Oqaily and Yosr Jarraya and Mengyuan Zhang and Lingyu Wang and Makan Pourzandi and Mourad Debbabi}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {iCAT: An Interactive Customizable Anonymization Tool}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {658--680}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_32}, doi = {10.1007/978-3-030-29959-0\_32}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DumanGKA0D19, author = {Onur Duman and Mohsen Ghafouri and Marthe Kassouf and Ribal Atallah and Lingyu Wang and Mourad Debbabi}, title = {Modeling Supply Chain Attacks in {IEC} 61850 Substations}, booktitle = {2019 {IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing, China, October 21-23, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartGridComm.2019.8909818}, doi = {10.1109/SMARTGRIDCOMM.2019.8909818}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DumanGKA0D19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2019w, editor = {Jianying Zhou and Robert H. Deng and Zhou Li and Suryadipta Majumdar and Weizhi Meng and Lingyu Wang and Kehuan Zhang}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2019 Satellite Workshops, SiMLA, Cloud S{\&}P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11605}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29729-9}, doi = {10.1007/978-3-030-29729-9}, isbn = {978-3-030-29728-2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2019w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SendiDW18, author = {Alireza Shameli{-}Sendi and Michel R. Dagenais and Lingyu Wang}, title = {Realtime intrusion risk assessment model based on attack and service dependency graphs}, journal = {Comput. Commun.}, volume = {116}, pages = {253--272}, year = {2018}, url = {https://doi.org/10.1016/j.comcom.2017.12.003}, doi = {10.1016/J.COMCOM.2017.12.003}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SendiDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BorborWJS18, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Surviving unpatchable vulnerabilities through heterogeneous network hardening options}, journal = {J. Comput. Secur.}, volume = {26}, number = {6}, pages = {761--789}, year = {2018}, url = {https://doi.org/10.3233/JCS-171106}, doi = {10.3233/JCS-171106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BorborWJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/QuHW18, author = {Wenyu Qu and Wei Huo and Lingyu Wang}, title = {Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {5}, number = {16}, pages = {e5}, year = {2018}, url = {https://doi.org/10.4108/eai.11-12-2018.156032}, doi = {10.4108/EAI.11-12-2018.156032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/QuHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MajumdarMWJPWD18, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {User-Level Runtime Security Auditing for the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {5}, pages = {1185--1199}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779444}, doi = {10.1109/TIFS.2017.2779444}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AlrabaeeSWD18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying {FOSS} Functions in Malware Binaries}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {2}, pages = {8:1--8:34}, year = {2018}, url = {https://doi.org/10.1145/3175492}, doi = {10.1145/3175492}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/0001ZS18, author = {Lingyu Wang and Mengyuan Zhang and Anoop Singhal}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {450--469}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_22}, doi = {10.1007/978-3-030-04834-1\_22}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/0001ZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Mohammady0HLPD18, author = {Meisam Mohammady and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Preserving Both Privacy and Utility in Network Trace Anonymization}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {459--474}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243809}, doi = {10.1145/3243734.3243809}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Mohammady0HLPD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/MadiZJAP0D18, author = {Taous Madi and Mengyuan Zhang and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud}, booktitle = {2018 {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018}, pages = {163--170}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CloudCom2018.2018.00042}, doi = {10.1109/CLOUDCOM2018.2018.00042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/MadiZJAP0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/TabibanM0D18, author = {Azadeh Tabiban and Suryadipta Majumdar and Lingyu Wang and Mourad Debbabi}, title = {{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433180}, doi = {10.1109/CNS.2018.8433180}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/TabibanM0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Alhebaishi0JS18, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {3--20}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_1}, doi = {10.1007/978-3-319-95729-6\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Alhebaishi0JS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ShiraniCALD0H18, author = {Paria Shirani and Leo Collard and Basile L. Agba and Bernard Lebel and Mourad Debbabi and Lingyu Wang and Aiman Hanna}, editor = {Cristiano Giuffrida and S{\'{e}}bastien Bardin and Gregory Blanc}, title = {{BINARM:} Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 15th International Conference, {DIMVA} 2018, Saclay, France, June 28-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10885}, pages = {114--138}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93411-2\_6}, doi = {10.1007/978-3-319-93411-2\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ShiraniCALD0H18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi and Aiman Hanna}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {On Leveraging Coding Habits for Effective Binary Authorship Attribution}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {26--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_2}, doi = {10.1007/978-3-319-99073-6\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlrabaeeS0DH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Alimohammadifar18, author = {Amir Alimohammadifar and Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {463--484}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_23}, doi = {10.1007/978-3-319-98989-1\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MajumdarMJP0D18, author = {Suryadipta Majumdar and Taous Madi and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Cloud Security Auditing: Major Approaches and Existing Challenges}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {61--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_5}, doi = {10.1007/978-3-030-18419-3\_5}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/MajumdarMJP0D18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-10464, author = {Meisam Mohammady and Lingyu Wang and Yuan Hong and Habib Louafi and Makan Pourzandi and Mourad Debbabi}, title = {Preserving Both Privacy and Utility in Network Trace Anonymization}, journal = {CoRR}, volume = {abs/1810.10464}, year = {2018}, url = {http://arxiv.org/abs/1810.10464}, eprinttype = {arXiv}, eprint = {1810.10464}, timestamp = {Wed, 31 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-10464.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/WangJS17, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Network Security Metrics}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66505-4}, doi = {10.1007/978-3-319-66505-4}, isbn = {978-3-319-66504-7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/WangJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSPWD17, author = {Saed Alrabaee and Noman Saleem and Stere Preda and Lingyu Wang and Mourad Debbabi}, title = {Corrigendum to 'OBA2: An Onion approach to Binary code Authorship Attribution' [Digit Investig 11 {(2014)} {S94-S103]}}, journal = {Digit. Investig.}, volume = {21}, pages = {89}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.02.004}, doi = {10.1016/J.DIIN.2017.02.004}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSPWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HongLW17, author = {Yuan Hong and Wen Ming Liu and Lingyu Wang}, title = {Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {9}, pages = {2227--2241}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2704904}, doi = {10.1109/TIFS.2017.2704904}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HongLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Borbor0JS17, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {509--528}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_28}, doi = {10.1007/978-3-319-61176-1\_28}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Borbor0JS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/Shirani0D17, author = {Paria Shirani and Lingyu Wang and Mourad Debbabi}, editor = {Michalis Polychronakis and Michael Meier}, title = {BinShape: Scalable and Robust Binary Library Function Identification Using Function Shape}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July 6-7, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10327}, pages = {301--324}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60876-1\_14}, doi = {10.1007/978-3-319-60876-1\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/Shirani0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17, author = {Suryadipta Majumdar and Yosr Jarraya and Momen Oqaily and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {LeaPS: Learning-Based Proactive Security Auditing for Clouds}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {265--285}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_15}, doi = {10.1007/978-3-319-66399-9\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarJOAPWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WangMMJAP0D17, author = {Yushun Wang and Taous Madi and Suryadipta Majumdar and Yosr Jarraya and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation}, booktitle = {24th Annual Network and Distributed System Security Symposium, {NDSS} 2017, San Diego, California, USA, February 26 - March 1, 2017}, publisher = {The Internet Society}, year = {2017}, url = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/tenantguard-scalable-runtime-verification-cloud-wide-vm-level-network-isolation/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WangMMJAP0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/DumanZ0D17, author = {Onur Duman and Mengyuan Zhang and Lingyu Wang and Mourad Debbabi}, title = {Measuring the security posture of {IEC} 61850 substations with redundancy against zero day attacks}, booktitle = {2017 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2017, Dresden, Germany, October 23-27, 2017}, pages = {108--114}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SmartGridComm.2017.8340727}, doi = {10.1109/SMARTGRIDCOMM.2017.8340727}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/DumanZ0D17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2016, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51966-1}, doi = {10.1007/978-3-319-51966-1}, isbn = {978-3-319-51965-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AlrabaeeSD017, author = {Saed Alrabaee and Paria Shirani and Mourad Debbabi and Lingyu Wang}, title = {On the Feasibility of Malware Authorship Attribution}, journal = {CoRR}, volume = {abs/1701.02711}, year = {2017}, url = {http://arxiv.org/abs/1701.02711}, eprinttype = {arXiv}, eprint = {1701.02711}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AlrabaeeSD017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/LiuW16, author = {Wen Ming Liu and Lingyu Wang}, title = {Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications}, series = {Advances in Information Security}, volume = {68}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42644-0}, doi = {10.1007/978-3-319-42644-0}, isbn = {978-3-319-42642-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Alrabaee0D16, author = {Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)}, journal = {Digit. Investig.}, volume = {18 Supplement}, pages = {S11--S22}, year = {2016}, url = {https://doi.org/10.1016/j.diin.2016.04.002}, doi = {10.1016/J.DIIN.2016.04.002}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isse/MouhebANDWP16, author = {Djedjiga Mouheb and Dima Alhadidi and Mariam Nouh and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, title = {Aspect-oriented modeling framework for security hardening}, journal = {Innov. Syst. Softw. Eng.}, volume = {12}, number = {1}, pages = {41--67}, year = {2016}, url = {https://doi.org/10.1007/s11334-015-0263-5}, doi = {10.1007/S11334-015-0263-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CuiWHW16, author = {Baojiang Cui and Fuwei Wang and Yongle Hao and Lingyu Wang}, title = {A taint based approach for automatic reverse engineering of gray-box file formats}, journal = {Soft Comput.}, volume = {20}, number = {9}, pages = {3563--3578}, year = {2016}, url = {https://doi.org/10.1007/s00500-015-1713-6}, doi = {10.1007/S00500-015-1713-6}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/CuiWHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/CuiLW16, author = {Baojiang Cui and Zheli Liu and Lingyu Wang}, title = {Key-Aggregate Searchable Encryption {(KASE)} for Group Data Sharing via Cloud Storage}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {8}, pages = {2374--2385}, year = {2016}, url = {https://doi.org/10.1109/TC.2015.2389959}, doi = {10.1109/TC.2015.2389959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/CuiLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWJSA16, author = {Mengyuan Zhang and Lingyu Wang and Sushil Jajodia and Anoop Singhal and Massimiliano Albanese}, title = {Network Diversity: {A} Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1071--1086}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516916}, doi = {10.1109/TIFS.2016.2516916}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWJSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MadiMWJPW16, author = {Taous Madi and Suryadipta Majumdar and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang}, editor = {Elisa Bertino and Ravi S. Sandhu and Alexander Pretschner}, title = {Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack}, booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March 9-11, 2016}, pages = {195--206}, publisher = {{ACM}}, year = {2016}, url = {https://dl.acm.org/citation.cfm?id=2857721}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/MadiMWJPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BorborWJS16, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Silvio Ranise and Vipin Swarup}, title = {Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {295--312}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_21}, doi = {10.1007/978-3-319-41483-6\_21}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BorborWJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16, author = {Suryadipta Majumdar and Yosr Jarraya and Taous Madi and Amir Alimohammadifar and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {47--66}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_3}, doi = {10.1007/978-3-319-45744-4\_3}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MajumdarJMAPWD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/Emirkanian-Bouchard16, author = {Mickael Emirkanian{-}Bouchard and Lingyu Wang}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Towards Metric-Driven, Application-Specific Visualization of Attack Graphs}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {117--134}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_8}, doi = {10.1007/978-3-319-51966-1\_8}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/Emirkanian-Bouchard16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AlrabaeeSDW16, author = {Saed Alrabaee and Paria Shirani and Mourad Debbabi and Lingyu Wang}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Feasibility of Malware Authorship Attribution}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {256--272}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_17}, doi = {10.1007/978-3-319-51966-1\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/AlrabaeeSDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AlhebaishiWJS16, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Threat Modeling for Cloud Data Center Infrastructures}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {302--319}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_20}, doi = {10.1007/978-3-319-51966-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/AlhebaishiWJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/MouhebDPWNZATL15, author = {Djedjiga Mouheb and Mourad Debbabi and Makan Pourzandi and Lingyu Wang and Mariam Nouh and Raha Ziarati and Dima Alhadidi and Chamseddine Talhi and Vitor Lima}, title = {Aspect-Oriented Security Hardening of {UML} Design Models}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16106-8}, doi = {10.1007/978-3-319-16106-8}, isbn = {978-3-319-16105-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSWD15, author = {Saed Alrabaee and Paria Shirani and Lingyu Wang and Mourad Debbabi}, title = {{SIGMA:} {A} Semantic Integrated Graph Matching Approach for identifying reused functions in binary code}, journal = {Digit. Investig.}, volume = {12 Supplement 1}, pages = {S61--S71}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.01.011}, doi = {10.1016/J.DIIN.2015.01.011}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/RahimianSAWD15, author = {Ashkan Rahimian and Paria Shirani and Saed Alrabaee and Lingyu Wang and Mourad Debbabi}, title = {BinComp: {A} stratified approach to compiler provenance Attribution}, journal = {Digit. Investig.}, volume = {14 Supplement 1}, pages = {S146--S155}, year = {2015}, url = {https://doi.org/10.1016/j.diin.2015.05.015}, doi = {10.1016/J.DIIN.2015.05.015}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiuWZZ15, author = {Wen Ming Liu and Lingyu Wang and Lei Zhang and Shunzhi Zhu}, title = {\emph{k}-jump: {A} strategy to design publicly-known algorithms for privacy preserving micro-data disclosure}, journal = {J. Comput. Secur.}, volume = {23}, number = {2}, pages = {131--165}, year = {2015}, url = {https://doi.org/10.3233/JCS-140514}, doi = {10.3233/JCS-140514}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiuWZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack}, booktitle = {7th {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December 3, 2015}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CloudCom.2015.80}, doi = {10.1109/CLOUDCOM.2015.80}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/MajumdarMWJPWD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/WangAJ14, author = {Lingyu Wang and Massimiliano Albanese and Sushil Jajodia}, title = {Network Hardening - An Automated Approach to Improving Network Security}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04612-9}, doi = {10.1007/978-3-319-04612-9}, isbn = {978-3-319-04611-2}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/WangAJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/AlrabaeeSPWD14, author = {Saed Alrabaee and Noman Saleem and Stere Preda and Lingyu Wang and Mourad Debbabi}, title = {{OBA2:} An Onion approach to Binary code Authorship Attribution}, journal = {Digit. Investig.}, volume = {11}, number = {Supplement 1}, pages = {S94--S103}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2014.03.012}, doi = {10.1016/J.DIIN.2014.03.012}, timestamp = {Wed, 17 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/AlrabaeeSPWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangJSCN14, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal and Pengsu Cheng and Steven Noel}, title = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk of Unknown Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {30--44}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.24}, doi = {10.1109/TDSC.2013.24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuWCRZD14, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Kui Ren and Shunzhi Zhu and Mourad Debbabi}, title = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {538--552}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302308}, doi = {10.1109/TDSC.2014.2302308}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuWRWZ14, author = {Zhen Xu and Cong Wang and Kui Ren and Lingyu Wang and Bingsheng Zhang}, title = {Proof-Carrying Cloud Computation: The Case of Convex Optimization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {11}, pages = {1790--1803}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2352457}, doi = {10.1109/TIFS.2014.2352457}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuWRWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HongVLW14, author = {Yuan Hong and Jaideep Vaidya and Haibing Lu and Lingyu Wang}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {179--194}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_12}, doi = {10.1007/978-3-662-43936-4\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HongVLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangZJSA14, author = {Lingyu Wang and Mengyuan Zhang and Sushil Jajodia and Anoop Singhal and Massimiliano Albanese}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {494--511}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_28}, doi = {10.1007/978-3-319-11212-1\_28}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangZJSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LiuWRD13, author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Mourad Debbabi}, title = {Background Knowledge-Resistant Traffic Padding for Preserving User Privacy in Web-Based Applications}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {679--686}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.96}, doi = {10.1109/CLOUDCOM.2013.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/LiuWRD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/AlbaneseJSW13, author = {Massimiliano Albanese and Sushil Jajodia and Anoop Singhal and Lingyu Wang}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {456}, pages = {322--340}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-44788-8\_19}, doi = {10.1007/978-3-662-44788-8\_19}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/AlbaneseJSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/XuWWRW13, author = {Zhen Xu and Cong Wang and Qian Wang and Kui Ren and Lingyu Wang}, title = {Proof-carrying cloud computation: The case of convex optimization}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {610--614}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566845}, doi = {10.1109/INFCOM.2013.6566845}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/XuWWRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13, author = {Massimiliano Albanese and Sushil Jajodia and Anoop Singhal and Lingyu Wang}, editor = {Pierangela Samarati}, title = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {207--218}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223168/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlbaneseJSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/NzoukouWJS13, author = {William Nzoukou and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {A Unified Framework for Measuring a Network's Mean Time-to-Compromise}, booktitle = {{IEEE} 32nd Symposium on Reliable Distributed Systems, {SRDS} 2013, Braga, Portugal, 1-3 October 2013}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SRDS.2013.30}, doi = {10.1109/SRDS.2013.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/NzoukouWJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2013, editor = {Lingyu Wang and Basit Shafiq}, title = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6}, doi = {10.1007/978-3-642-39256-6}, isbn = {978-3-642-39255-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/ZengW12, author = {Yong Zeng and Lingyu Wang}, title = {Secure collaboration in design and supply chain management}, journal = {Comput. Ind.}, volume = {63}, number = {6}, pages = {543--544}, year = {2012}, url = {https://doi.org/10.1016/j.compind.2012.05.002}, doi = {10.1016/J.COMPIND.2012.05.002}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/ZengW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/ZengWDCK12, author = {Yong Zeng and Lingyu Wang and Xiaoguang Deng and Xinlin Cao and Nafisa Khundker}, title = {Secure collaboration in global design and supply chain environment: Problem analysis and literature review}, journal = {Comput. Ind.}, volume = {63}, number = {6}, pages = {545--556}, year = {2012}, url = {https://doi.org/10.1016/j.compind.2012.05.001}, doi = {10.1016/J.COMPIND.2012.05.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/ZengWDCK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/ZhangCWZ12, author = {Da Yong Zhang and Xinlin Cao and Lingyu Wang and Yong Zeng}, title = {Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection}, journal = {J. Intell. Manuf.}, volume = {23}, number = {4}, pages = {1351--1364}, year = {2012}, url = {https://doi.org/10.1007/s10845-011-0527-3}, doi = {10.1007/S10845-011-0527-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jim/ZhangCWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiuW12, author = {Wen Ming Liu and Lingyu Wang}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Privacy streamliner: a two-stage approach to improving algorithm efficiency}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {193--204}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133626}, doi = {10.1145/2133601.2133626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/LiuW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/LiuWRCD12, author = {Wen Ming Liu and Lingyu Wang and Kui Ren and Pengsu Cheng and Mourad Debbabi}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {k-Indistinguishable Traffic Padding in Web Applications}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {79--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_5}, doi = {10.1007/978-3-642-31680-7\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/LiuWRCD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/ChengWJS12, author = {Pengsu Cheng and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Aggregating {CVSS} Base Scores for Semantics-Rich Network Security Metrics}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.4}, doi = {10.1109/SRDS.2012.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/ChengWJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/ZhangZWLG11, author = {Da Yong Zhang and Yong Zeng and Lingyu Wang and Hongtao Li and Yuanfeng Geng}, title = {Modeling and evaluating information leakage caused by inferences in supply chains}, journal = {Comput. Ind.}, volume = {62}, number = {3}, pages = {351--363}, year = {2011}, url = {https://doi.org/10.1016/j.compind.2010.10.002}, doi = {10.1016/J.COMPIND.2010.10.002}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/ZhangZWLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MohammedOWDB11, author = {Noman Mohammed and Hadi Otrok and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in {MANET}}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {1}, pages = {89--103}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2009.22}, doi = {10.1109/TDSC.2009.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MohammedOWDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LiuWCD11, author = {Wen Ming Liu and Lingyu Wang and Pengsu Cheng and Mourad Debbabi}, editor = {Yan Chen and Jaideep Vaidya}, title = {Privacy-preserving traffic padding in web-based applications}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {131--136}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046573}, doi = {10.1145/2046556.2046573}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/LiuWCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijngc/NoelWSJ10, author = {Steven Noel and Lingyu Wang and Anoop Singhal and Sushil Jajodia}, title = {Measuring Security Risk of Networks Using Attack Graphs}, journal = {Int. J. Next Gener. Comput.}, volume = {1}, number = {1}, year = {2010}, url = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/68}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijngc/NoelWSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuRWD10, author = {Bo Zhu and Kui Ren and Lingyu Wang and Mourad Debbabi}, title = {{PCM:} a privacy-preserving detection mechanism in mobile \emph{ad hoc} networks}, journal = {Secur. Commun. Networks}, volume = {3}, number = {2-3}, pages = {167--184}, year = {2010}, url = {https://doi.org/10.1002/sec.122}, doi = {10.1002/SEC.122}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuRWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuSJW10, author = {Bo Zhu and Sanjeev Setia and Sushil Jajodia and Lingyu Wang}, title = {Providing witness anonymity under peer-to-peer settings}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {2}, pages = {324--336}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2041821}, doi = {10.1109/TIFS.2010.2041821}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuSJW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhuSJRW10, author = {Bo Zhu and Sanjeev Setia and Sushil Jajodia and Sankardas Roy and Lingyu Wang}, title = {Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {9}, number = {7}, pages = {913--926}, year = {2010}, url = {https://doi.org/10.1109/TMC.2010.40}, doi = {10.1109/TMC.2010.40}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ZhuSJRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ChengWL10, author = {Pengsu Cheng and Lingyu Wang and Tao Long}, title = {Compressing Attack Graphs Through Reference Encoding}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1026--1031}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.188}, doi = {10.1109/CIT.2010.188}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ChengWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cascon/NouhZMADWP10, author = {Mariam Nouh and Raha Ziarati and Djedjiga Mouheb and Dima Alhadidi and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Joanna W. Ng and Christian Couturier and Hausi A. M{\"{u}}ller and Arthur G. Ryman and Anatol W. Kark}, title = {Aspect weaver: a model transformation approach for {UML} models}, booktitle = {Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada}, pages = {139--153}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1923947.1923962}, doi = {10.1145/1923947.1923962}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangJSN10, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal and Steven Noel}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {\emph{k}-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {573--587}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_35}, doi = {10.1007/978-3-642-15497-3\_35}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangJSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/facs2/MouhebANDWP10, author = {Djedjiga Mouheb and Dima Alhadidi and Mariam Nouh and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Lu{\'{\i}}s Soares Barbosa and Markus Lumpe}, title = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic Framework}, booktitle = {Formal Aspects of Component Software - 7th International Workshop, {FACS} 2010, Guimar{\~{a}}es, Portugal, October 14-16, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6921}, pages = {182--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-27269-1\_11}, doi = {10.1007/978-3-642-27269-1\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdt/LiuWZ10, author = {Wen Ming Liu and Lingyu Wang and Lei Zhang}, editor = {Luc Segoufin}, title = {k-jump strategy for preserving privacy in micro-data disclosure}, booktitle = {Database Theory - {ICDT} 2010, 13th International Conference, Lausanne, Switzerland, March 23-25, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, pages = {104--115}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1804669.1804684}, doi = {10.1145/1804669.1804684}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdt/LiuWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BinsalleehOBSYDW10, author = {Hamad Binsalleeh and Thomas C. Ormerod and Amine Boukhtouta and Prosenjit Sinha and Amr M. Youssef and Mourad Debbabi and Lingyu Wang}, title = {On the analysis of the Zeus botnet crimeware toolkit}, booktitle = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010, August 17-19, 2010, Ottawa, Ontario, Canada}, pages = {31--38}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/PST.2010.5593240}, doi = {10.1109/PST.2010.5593240}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BinsalleehOBSYDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/OrmerodWDYBBS10, author = {Thomas C. Ormerod and Lingyu Wang and Mourad Debbabi and Amr M. Youssef and Hamad Binsalleeh and Amine Boukhtouta and Prosenjit Sinha}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Defaming Botnet Toolkits: {A} Bottom-Up Approach to Mitigating the Threat}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {195--200}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.39}, doi = {10.1109/SECURWARE.2010.39}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securware/OrmerodWDYBBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10, author = {Djedjiga Mouheb and Chamseddine Talhi and Mariam Nouh and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Roger Y. Lee and Olga Ormandjieva and Alain Abran and Constantinos Constantinides}, title = {Aspect-Oriented Modeling for Representing and Integrating Security Concerns in {UML}}, booktitle = {Software Engineering Research, Management and Applications 2010 [selected papers from the 8th {ACIS} International Conference on Software Engineering Research, Management and Applications, {SERA} 2010, Montreal, Canada, May 24-26, 2010]}, series = {Studies in Computational Intelligence}, volume = {296}, pages = {197--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13273-5\_13}, doi = {10.1007/978-3-642-13273-5\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/FungWWH09, author = {Benjamin C. M. Fung and Ke Wang and Lingyu Wang and Patrick C. K. Hung}, title = {Privacy-preserving data publishing for cluster analysis}, journal = {Data Knowl. Eng.}, volume = {68}, number = {6}, pages = {552--575}, year = {2009}, url = {https://doi.org/10.1016/j.datak.2008.12.001}, doi = {10.1016/J.DATAK.2008.12.001}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/FungWWH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/YaoWWBJ09, author = {Chao Yao and Lingyu Wang and Xiaoyang Sean Wang and Claudio Bettini and Sushil Jajodia}, title = {Evaluating privacy threats in released database views by symmetric indistinguishability}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {5--42}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0317}, doi = {10.3233/JCS-2009-0317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/YaoWWBJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jot/TalhiMLDWP09, author = {Chamseddine Talhi and Djedjiga Mouheb and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, title = {Usability of Security Specification Approaches for {UML} Design: {A} Survey}, journal = {J. Object Technol.}, volume = {8}, number = {6}, pages = {102--122}, year = {2009}, url = {https://doi.org/10.5381/jot.2009.8.6.a1}, doi = {10.5381/JOT.2009.8.6.A1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jot/TalhiMLDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aosd/MouhebTLD0P09, author = {Djedjiga Mouheb and Chamseddine Talhi and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Omar Aldawud and Walter Cazzola and Thomas Cottenier and Jeff Gray and J{\"{o}}rg Kienzle and Dominik Stein}, title = {Weaving security aspects into {UML} 2.0 design models}, booktitle = {Proceedings of the 13th workshop on Aspect-oriented modeling, {AOM} '09, Charlottesville, Virginia, USA, March 2, 2009}, pages = {7--12}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1509297.1509300}, doi = {10.1145/1509297.1509300}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aosd/MouhebTLD0P09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWF09, author = {Yiming Wang and Lingyu Wang and Benjamin C. M. Fung}, title = {Preserving Privacy for Location-Based Services with Continuous Queries}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199361}, doi = {10.1109/ICC.2009.5199361}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangWF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/MokhovLW09, author = {Serguei A. Mokhov and Jian Li and Lingyu Wang}, editor = {Khaldoun Al Agha and Mohamad Badra and Gregory B. Newby}, title = {Simple Dynamic Key Management in {SQL} Randomization}, booktitle = {{NTMS} 2009, 3rd International Conference on New Technologies, Mobility and Security, 20-23 December 2009, Cairo, Egypt}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/NTMS.2009.5384673}, doi = {10.1109/NTMS.2009.5384673}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/MokhovLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangWJB09, author = {Lei Zhang and Lingyu Wang and Sushil Jajodia and Alexander Brodsky}, editor = {Willem Jonker and Milan Petkovic}, title = {L-Cover: Preserving Diversity by Anonymity}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {158--171}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_10}, doi = {10.1007/978-3-642-04219-5\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangWJB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/MouhebTMLDWP09, author = {Djedjiga Mouheb and Chamseddine Talhi and Azzam Mourad and Vitor Lima and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Hamido Fujita and Vladim{\'{\i}}r Mar{\'{\i}}k}, title = {An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation}, booktitle = {New Trends in Software Methodologies, Tools and Techniques - Proceedings of the Eighth SoMeT 2009, September 23-25, 2009, Prague, Czech Republic}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {199}, pages = {203--222}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-049-0-203}, doi = {10.3233/978-1-60750-049-0-203}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/somet/MouhebTMLDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LimaTMDWP09, author = {Vitor Lima and Chamseddine Talhi and Djedjiga Mouheb and Mourad Debbabi and Lingyu Wang and Makan Pourzandi}, editor = {Ralf Huuck and Gerwin Klein and Bastian Schlich}, title = {Formal Verification and Validation of {UML} 2.0 Sequence Diagrams using Source and Destination of Messages}, booktitle = {Proceedings of the 4th International Workshop on Systems Software Verification, {SSV} 2009, Aachen, Germany, June 22-24, 2009}, series = {Electronic Notes in Theoretical Computer Science}, volume = {254}, pages = {143--160}, publisher = {Elsevier}, year = {2009}, url = {https://doi.org/10.1016/j.entcs.2009.09.064}, doi = {10.1016/J.ENTCS.2009.09.064}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/LimaTMDWP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/OtrokMWDB08, author = {Hadi Otrok and Noman Mohammed and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {A game-theoretic intrusion detection model for mobile ad hoc networks}, journal = {Comput. Commun.}, volume = {31}, number = {4}, pages = {708--721}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.10.024}, doi = {10.1016/J.COMCOM.2007.10.024}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/OtrokMWDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangYSJ08, author = {Lingyu Wang and Chao Yao and Anoop Singhal and Sushil Jajodia}, title = {Implementing interactive analysis of attack graphs using relational databases}, journal = {J. Comput. Secur.}, volume = {16}, number = {4}, pages = {419--437}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0327}, doi = {10.3233/JCS-2008-0327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WangYSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiuLHWD08, author = {Qian Liu and Shuo Lu and Yuan Hong and Lingyu Wang and Rachida Dssouli}, title = {Securing Telehealth Applications in a Web-Based e-Health Portal}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {3--9}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.9}, doi = {10.1109/ARES.2008.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LiuLHWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ChenWS08, author = {Feng Chen and Lingyu Wang and Jinshu Su}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {An Efficient Approach to Minimum-Cost Network Hardening Using Attack Graphs}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {209--212}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.38}, doi = {10.1109/IAS.2008.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ChenWS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrigaultWSJ08, author = {Marcel Frigault and Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {Andy Ozment and Ketil St{\o}len}, title = {Measuring network security using dynamic bayesian network}, booktitle = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008}, pages = {23--30}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456362.1456368}, doi = {10.1145/1456362.1456368}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FrigaultWSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisse/MokhovRHW08, author = {Serguei A. Mokhov and Farid Rassai and Lee Wei Huynh and Lingyu Wang}, editor = {Tarek M. Sobh and Khaled M. Elleithy and Ausif Mahmood}, title = {The Authentication Framework within the Java Data Security Framework {(JDSF):} Design and Implementation Refinement}, booktitle = {Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, {CISSE} 2008, Bridgeport, Connecticut, {USA}}, pages = {423--429}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-90-481-3662-9\_73}, doi = {10.1007/978-90-481-3662-9\_73}, timestamp = {Tue, 29 Dec 2020 18:38:51 +0100}, biburl = {https://dblp.org/rec/conf/cisse/MokhovRHW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisse/MokhovHW08, author = {Serguei A. Mokhov and Lee Wei Huynh and Lingyu Wang}, editor = {Tarek M. Sobh and Khaled M. Elleithy and Ausif Mahmood}, title = {The Integrity Framework within the Java Data Security Framework {(JDSF):} Design and Implementation Refinement}, booktitle = {Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, {CISSE} 2008, Bridgeport, Connecticut, {USA}}, pages = {449--455}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-90-481-3662-9\_77}, doi = {10.1007/978-90-481-3662-9\_77}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisse/MokhovHW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HongLLWD08, author = {Yuan Hong and Shuo Lu and Qian Liu and Lingyu Wang and Rachida Dssouli}, title = {Preserving Privacy in E-health Systems Using Hippocratic Databases}, booktitle = {Proceedings of the 32nd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {692--697}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/COMPSAC.2008.62}, doi = {10.1109/COMPSAC.2008.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HongLLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/FrigaultW08, author = {Marcel Frigault and Lingyu Wang}, title = {Measuring Network Security Using Bayesian Network-Based Attack Graphs}, booktitle = {Proceedings of the 32nd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {698--703}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/COMPSAC.2008.88}, doi = {10.1109/COMPSAC.2008.88}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/FrigaultW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhangWJB08, author = {Lei Zhang and Lingyu Wang and Sushil Jajodia and Alexander Brodsky}, editor = {Vijay Atluri}, title = {Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {190--204}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_15}, doi = {10.1007/978-3-540-70567-3\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZhangWJB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangILSJ08, author = {Lingyu Wang and Tania Islam and Tao Long and Anoop Singhal and Sushil Jajodia}, editor = {Vijay Atluri}, title = {An Attack Graph-Based Probabilistic Security Metric}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {283--296}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_22}, doi = {10.1007/978-3-540-70567-3\_22}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangILSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhuRW08, author = {Bo Zhu and Kui Ren and Lingyu Wang}, title = {Anonymous Misbehavior Detection in Mobile Ad Hoc Networks}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China}, pages = {358--363}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.Workshops.2008.23}, doi = {10.1109/ICDCS.WORKSHOPS.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhuRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FungWWD08, author = {Benjamin C. M. Fung and Ke Wang and Lingyu Wang and Mourad Debbabi}, title = {A framework for privacy-preserving cluster analysis}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings}, pages = {46--51}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ISI.2008.4565028}, doi = {10.1109/ISI.2008.4565028}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/FungWWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/IslamW08, author = {Tania Islam and Lingyu Wang}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {A Heuristic Approach to Minimum-Cost Network Hardening Using Attack Graph}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.9}, doi = {10.1109/NTMS.2008.ECP.9}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/IslamW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/LiuLW08, author = {Shuai Liu and Wei Li and Lingyu Wang}, editor = {Akshai Aggarwal and Mohamad Badra and Fabio Massacci}, title = {Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing}, booktitle = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility and Security, November 5-7, 2008, Tangier, Morocco}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NTMS.2008.ECP.100}, doi = {10.1109/NTMS.2008.ECP.100}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/LiuLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiWZZ08, author = {Wei Li and Lingyu Wang and Bo Zhu and Lei Zhang}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {189--203}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_13}, doi = {10.1007/978-0-387-09699-5\_13}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiWZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/MohammedOWDB08, author = {Noman Mohammed and Hadi Otrok and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in {MANET}}, booktitle = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings}, pages = {2816--2821}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/WCNC.2008.493}, doi = {10.1109/WCNC.2008.493}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/MohammedOWDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/OtrokMWDB08, author = {Hadi Otrok and Noman Mohammed and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs}, booktitle = {{IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2008, Avignon, France, 12-14 October 2008, Proceedings}, pages = {608--612}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WiMob.2008.21}, doi = {10.1109/WIMOB.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/OtrokMWDB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/WangJ08, author = {Lingyu Wang and Sushil Jajodia}, editor = {Michael Gertz and Sushil Jajodia}, title = {Security in Data Warehouses and {OLAP} Systems}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {191--212}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_8}, doi = {10.1007/978-0-387-48533-1\_8}, timestamp = {Mon, 07 Dec 2020 17:16:27 +0100}, biburl = {https://dblp.org/rec/reference/dbsec/WangJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/WangJW07, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, title = {Preserving Privacy in On-Line Analytical Processing {(OLAP)}}, series = {Advances in Information Security}, volume = {29}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46274-5}, doi = {10.1007/978-0-387-46274-5}, isbn = {978-0-387-46273-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/WangJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangLJW07, author = {Lingyu Wang and Yingjiu Li and Sushil Jajodia and Duminda Wijesekera}, title = {Parity-based inference control for multi-dimensional range sum queries}, journal = {J. Comput. Secur.}, volume = {15}, number = {4}, pages = {417--445}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15401}, doi = {10.3233/JCS-2007-15401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WangLJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuWYZ07, author = {Xuxin Xu and Lingyu Wang and Amr M. Youssef and Bo Zhu}, editor = {Jonathan Katz and Moti Yung}, title = {Preventing Collusion Attacks on the One-Way Function Tree {(OFT)} Scheme}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {177--193}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_12}, doi = {10.1007/978-3-540-72738-5\_12}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuWYZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangSJ07, author = {Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {G{\"{u}}nter Karjoth and Ketil St{\o}len}, title = {Toward measuring network security using attack graphs}, booktitle = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007}, pages = {49--54}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314257.1314273}, doi = {10.1145/1314257.1314273}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangSJ07, author = {Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Measuring the Overall Security of Network Configurations Using Attack Graphs}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {98--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_9}, doi = {10.1007/978-3-540-73538-0\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wimob/OtrokMWDB07, author = {Hadi Otrok and Noman Mohammed and Lingyu Wang and Mourad Debbabi and Prabir Bhattacharya}, title = {An Efficient and Truthful Leader {IDS} Election Mechanism for {MANET}}, booktitle = {Third {IEEE} International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2007, White Plains, New York, USA, 8-10 October 2007, Proceedings}, pages = {78}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.19}, doi = {10.1109/WIMOB.2007.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wimob/OtrokMWDB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WangJW07, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, editor = {Ting Yu and Sushil Jajodia}, title = {Preserving Privacy in On-line Analytical Processing Data Cubes}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {355--380}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_11}, doi = {10.1007/978-0-387-27696-0\_11}, timestamp = {Mon, 04 Apr 2022 16:00:08 +0200}, biburl = {https://dblp.org/rec/series/ais/WangJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangLJ06, author = {Lingyu Wang and Anyi Liu and Sushil Jajodia}, title = {Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts}, journal = {Comput. Commun.}, volume = {29}, number = {15}, pages = {2917--2933}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.04.001}, doi = {10.1016/J.COMCOM.2006.04.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangLJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangNJ06, author = {Lingyu Wang and Steven Noel and Sushil Jajodia}, title = {Minimum-cost network hardening using attack graphs}, journal = {Comput. Commun.}, volume = {29}, number = {18}, pages = {3812--3824}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.06.018}, doi = {10.1016/J.COMCOM.2006.06.018}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangNJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangYSJ06, author = {Lingyu Wang and Chao Yao and Anoop Singhal and Sushil Jajodia}, editor = {Ernesto Damiani and Peng Liu}, title = {Interactive Analysis of Attack Graphs Using Relational Queries}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {119--132}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_9}, doi = {10.1007/11805588\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangYSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/YaoWWJ06, author = {Chao Yao and Lingyu Wang and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Indistinguishability: The Other Aspect of Privacy}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {1--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_1}, doi = {10.1007/11844662\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/YaoWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLJ05, author = {Lingyu Wang and Anyi Liu and Sushil Jajodia}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {247--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_15}, doi = {10.1007/11555827\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangLJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangWJ04, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Cardinality-based inference control in data cubes}, journal = {J. Comput. Secur.}, volume = {12}, number = {5}, pages = {655--692}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12501}, doi = {10.3233/JCS-2004-12501}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WangWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangWJ04, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {A logic-based framework for attribute based access control}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {45--55}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029140}, doi = {10.1145/1029133.1029140}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangJW04, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, title = {Securing {OLAP} Data Cubes Against Privacy Breaches}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {161}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301322}, doi = {10.1109/SECPRI.2004.1301322}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangJW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11/2004, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, publisher = {Kluwer}, year = {2004}, isbn = {1-4020-8144-8}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2004, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Security and Protection in Information Processing Systems, {IFIP} 18th WorldComputer Congress, {TC11} 19th International Information Security Conference, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {147}, publisher = {Kluwer / Springer}, year = {2004}, isbn = {1-4020-8142-1}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLWJ03, author = {Lingyu Wang and Yingjiu Li and Duminda Wijesekera and Sushil Jajodia}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {Precisely Answering Multi-dimensional Range Queries without Privacy Breaches}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {100--115}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_6}, doi = {10.1007/978-3-540-39650-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangLWJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/LiWWJ02, author = {Yingjiu Li and Lingyu Wang and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Anne Banks Pidduck and John Mylopoulos and Carson C. Woo and M. Tamer {\"{O}}zsu}, title = {Auditing Interval-Based Inference}, booktitle = {Advanced Information Systems Engineering, 14th International Conference, CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2348}, pages = {553--567}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-47961-9\_38}, doi = {10.1007/3-540-47961-9\_38}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/LiWWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangWJ02, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Towards Secure {XML} Federations}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {117--131}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangWJ02, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Cardinality-Based Inference Control in Sum-Only Data Cubes}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {55--71}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_4}, doi = {10.1007/3-540-45853-0\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/foiks/LiZWJ02, author = {Yingjiu Li and Sencun Zhu and Lingyu Wang and Sushil Jajodia}, editor = {Thomas Eiter and Klaus{-}Dieter Schewe}, title = {A Privacy-Enhanced Microaggregation Method}, booktitle = {Foundations of Information and Knowledge Systems, Second International Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2284}, pages = {148--159}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45758-5\_10}, doi = {10.1007/3-540-45758-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/foiks/LiZWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/LiWJ02, author = {Yingjiu Li and Lingyu Wang and Sushil Jajodia}, editor = {Roger Dingledine and Paul F. Syverson}, title = {Preventing Interval-Based Inference by Random Data Perturbation}, booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2482}, pages = {160--170}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36467-6\_12}, doi = {10.1007/3-540-36467-6\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/LiWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.