BibTeX records: Lingyu Wang 0001

download as .bib file

@article{DBLP:journals/csur/AlrabaeeDW23,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies,
                  and Features},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {2},
  pages        = {19:1--19:41},
  year         = {2023},
  url          = {https://doi.org/10.1145/3486860},
  doi          = {10.1145/3486860},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/AlrabaeeDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/XieMWWVH23,
  author       = {Shangyu Xie and
                  Meisam Mohammady and
                  Han Wang and
                  Lingyu Wang and
                  Jaideep Vaidya and
                  Yuan Hong},
  title        = {A Generalized Framework for Preserving Both Privacy and Utility in
                  Data Outsourcing},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {1},
  pages        = {1--15},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2021.3078099},
  doi          = {10.1109/TKDE.2021.3078099},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/XieMWWVH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/OqailyM0KJAPD23,
  author       = {Momen Oqaily and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Mohammad Ekramul Kabir and
                  Yosr Jarraya and
                  A. S. M. Asadujjaman and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual
                  Network Function Chains Hosted on Third-Party Clouds},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {79--90},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3583643},
  doi          = {10.1145/3577923.3583643},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/OqailyM0KJAPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HoqYMSWBPD23,
  author       = {Md. Nazmul Hoq and
                  Jia Wei Yao and
                  Suryadipta Majumdar and
                  Luis Su{\'{a}}rez and
                  Lingyu Wang and
                  Amine Boukhtouta and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Evaluating the Security Posture of 5G Networks by Combining State
                  Auditing and Event Monitoring},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {123--144},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_7},
  doi          = {10.1007/978-3-031-51476-0\_7},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HoqYMSWBPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BagheriKMJWP23,
  author       = {Sima Bagheri and
                  Hugo Kermabon{-}Bobinnec and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation
                  for Kubernetes Clusters},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {777--782},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10278632},
  doi          = {10.1109/ICC45041.2023.10278632},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/BagheriKMJWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/QasemSDWLA21,
  author       = {Abdullah Qasem and
                  Paria Shirani and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Bernard Lebel and
                  Basile L. Agba},
  title        = {Automatic Vulnerability Detection in Embedded Devices and Firmware:
                  Survey and Layered Taxonomies},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {2},
  pages        = {25:1--25:42},
  year         = {2022},
  url          = {https://doi.org/10.1145/3432893},
  doi          = {10.1145/3432893},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/QasemSDWLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DumanZWDAL22,
  author       = {Onur Duman and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Ribal F. Atallah and
                  Bernard Lebel},
  title        = {Factor of Security (FoS): Quantifying the Security Effectiveness of
                  Redundant Smart Grid Subsystems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {1018--1035},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3009931},
  doi          = {10.1109/TDSC.2020.3009931},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DumanZWDAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MajumdarCAMJP0D22,
  author       = {Suryadipta Majumdar and
                  Gagandeep Singh Chawla and
                  Amir Alimohammadifar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {ProSAS: Proactive Security Auditing System for Clouds},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2517--2534},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3062204},
  doi          = {10.1109/TDSC.2021.3062204},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MajumdarCAMJP0D22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Hong022,
  author       = {Yuan Hong and
                  Lingyu Wang},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {{WPES} '22: 21st Workshop on Privacy in the Electronic Society},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3535--3537},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563220},
  doi          = {10.1145/3548606.3563220},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Hong022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/AsadujjamanKPMWJP22,
  author       = {A. S. M. Asadujjaman and
                  Mohammad Ekramul Kabir and
                  Hinddeep Purohit and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Yosr Jarraya and
                  Makan Pourzandi},
  title        = {5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network
                  Functions},
  booktitle    = {{IEEE} International Conference on Cloud Computing Technology and
                  Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022},
  pages        = {162--169},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CloudCom55334.2022.00032},
  doi          = {10.1109/CLOUDCOM55334.2022.00032},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/AsadujjamanKPMWJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Kermabon-Bobinnec22,
  author       = {Hugo Kermabon{-}Bobinnec and
                  Mahmood Gholipourchoubeh and
                  Sima Bagheri and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {ProSPEC: Proactive Security Policy Enforcement for Containers},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {155--166},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511515},
  doi          = {10.1145/3508398.3511515},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Kermabon-Bobinnec22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OqailyJWPM22,
  author       = {Alaa Oqaily and
                  Yosr Jarraya and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Suryadipta Majumdar},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {{MLFM:} Machine Learning Meets Formal Method for Faster Identification
                  of Security Breaches in Network Functions Virtualization {(NFV)}},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  pages        = {466--489},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7\_23},
  doi          = {10.1007/978-3-031-17143-7\_23},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OqailyJWPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/XieMWWVH22,
  author       = {Shangyu Xie and
                  Meisam Mohammady and
                  Han Wang and
                  Lingyu Wang and
                  Jaideep Vaidya and
                  Yuan Hong},
  title        = {A Generalized Framework for Preserving Both Privacy and Utility in
                  Data Outsourcing (Extended Abstract)},
  booktitle    = {38th {IEEE} International Conference on Data Engineering, {ICDE} 2022,
                  Kuala Lumpur, Malaysia, May 9-12, 2022},
  pages        = {1549--1550},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDE53745.2022.00151},
  doi          = {10.1109/ICDE53745.2022.00151},
  timestamp    = {Fri, 05 Aug 2022 16:24:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icde/XieMWWVH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/Duman0AKD22,
  author       = {Onur Duman and
                  Lingyu Wang and
                  Minh Au and
                  Marthe Kassouf and
                  Mourad Debbabi},
  title        = {Hardening Substations against Supply Chain Attacks Under Operational
                  Constraints},
  booktitle    = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISGT50606.2022.9817488},
  doi          = {10.1109/ISGT50606.2022.9817488},
  timestamp    = {Wed, 03 Aug 2022 12:04:15 +0200},
  biburl       = {https://dblp.org/rec/conf/isgt/Duman0AKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TabibanZJP0022,
  author       = {Azadeh Tabiban and
                  Heyang Zhao and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Mengyuan Zhang and
                  Lingyu Wang},
  title        = {ProvTalk: Towards Interpretable Multi-level Provenance Analysis in
                  Networking Functions Virtualization {(NFV)}},
  booktitle    = {29th Annual Network and Distributed System Security Symposium, {NDSS}
                  2022, San Diego, California, USA, April 24-28, 2022},
  publisher    = {The Internet Society},
  year         = {2022},
  url          = {https://www.ndss-symposium.org/ndss-paper/auto-draft-232/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/TabibanZJP0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/TabibanZJPW22,
  author       = {Azadeh Tabiban and
                  Heyang Zhao and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Hans P. Reiser and
                  Marcel Kyas},
  title        = {VinciDecoder: Automatically Interpreting Provenance Graphs into Textual
                  Forensic Reports with Application to OpenStack},
  booktitle    = {Secure {IT} Systems - 27th Nordic Conference, NordSec 2022, Reykjavic,
                  Iceland, November 30-December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13700},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22295-5\_19},
  doi          = {10.1007/978-3-031-22295-5\_19},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/TabibanZJPW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2022,
  editor       = {Yuan Hong and
                  Lingyu Wang},
  title        = {Proceedings of the 21st Workshop on Privacy in the Electronic Society,
                  WPES2022, Los Angeles, CA, USA, 7 November 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3559613},
  doi          = {10.1145/3559613},
  isbn         = {978-1-4503-9873-2},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-13046,
  author       = {Meisam Mohammady and
                  Han Wang and
                  Lingyu Wang and
                  Mengyuan Zhang and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Mourad Debbabi and
                  Yuan Hong},
  title        = {{DPOAD:} Differentially Private Outsourcing of Anomaly Detection through
                  Iterative Sensitivity Learning},
  journal      = {CoRR},
  volume       = {abs/2206.13046},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.13046},
  doi          = {10.48550/ARXIV.2206.13046},
  eprinttype    = {arXiv},
  eprint       = {2206.13046},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-13046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWJS21,
  author       = {Mengyuan Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Network Attack Surface: Lifting the Concept of Attack Surface to the
                  Network Level for Evaluating Networks' Resilience Against Zero-Day
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {310--324},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2889086},
  doi          = {10.1109/TDSC.2018.2889086},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChawlaZMJPWD21,
  author       = {Gagandeep Singh Chawla and
                  Mengyuan Zhang and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {VMGuard: State-Based Proactive Verification of Virtual Network Isolation
                  With Application to {NFV}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1553--1567},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3041430},
  doi          = {10.1109/TDSC.2020.3041430},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChawlaZMJPWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OqailyJMMPWD21,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Meisam Mohammady and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {SegGuard: Segmentation-Based Anonymization of Network Data in Clouds
                  for Privacy-Preserving Security Auditing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2486--2505},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2957488},
  doi          = {10.1109/TDSC.2019.2957488},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OqailyJMMPWD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MohammadyOWHLPD21,
  author       = {Meisam Mohammady and
                  Momen Oqaily and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {A Multi-view Approach to Preserve Privacy and Utility in Network Trace
                  Anonymization},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {14:1--14:36},
  year         = {2021},
  url          = {https://doi.org/10.1145/3439732},
  doi          = {10.1145/3439732},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MohammadyOWHLPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AsadujjamanOJMP21,
  author       = {A. S. M. Asadujjaman and
                  Momen Oqaily and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Artificial Packet-Pair Dispersion {(APPD):} {A} Blackbox Approach
                  to Verifying the Integrity of {NFV} Service Chains},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {245--253},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705020},
  doi          = {10.1109/CNS53000.2021.9705020},
  timestamp    = {Fri, 18 Feb 2022 10:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AsadujjamanOJMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Paria Shirani and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Ashkan Rahimian and
                  Lina Nouh and
                  Djedjiga Mouheb and
                  He Huang and
                  Aiman Hanna},
  title        = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious
                  Code Fingerprinting},
  series       = {Advances in Information Security},
  volume       = {78},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-34238-8},
  doi          = {10.1007/978-3-030-34238-8},
  isbn         = {978-3-030-34237-1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlrabaeeDW20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {{CPA:} Accurate Cross-Platform Binary Authorship Characterization
                  Using {LDA}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3051--3066},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2980190},
  doi          = {10.1109/TIFS.2020.2980190},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlrabaeeDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohammadyXHZ0PD20,
  author       = {Meisam Mohammady and
                  Shangyu Xie and
                  Yuan Hong and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{R2DP:} {A} Universal and Automated Approach to Optimizing the Randomization
                  Mechanisms of Differential Privacy for Utility Metrics with No Known
                  Optimal Distributions},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {677--696},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417259},
  doi          = {10.1145/3372297.3417259},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohammadyXHZ0PD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/OqailyTJMZP0D20,
  author       = {Alaa Oqaily and
                  Sudershan L. T and
                  Yosr Jarraya and
                  Suryadipta Majumdar and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization
                  {(NFV)} Stack},
  booktitle    = {12th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2020, Bangkok, Thailand, December 14-17, 2020},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CloudCom49646.2020.00003},
  doi          = {10.1109/CLOUDCOM49646.2020.00003},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/OqailyTJMZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanJZP0D20,
  author       = {Azadeh Tabiban and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Catching Falling Dominoes: Cloud Management-Level Provenance Analysis
                  with Application to OpenStack},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162251},
  doi          = {10.1109/CNS48642.2020.9162251},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanJZP0D20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Alhebaishi0J20,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Modeling and Mitigating Security Threats in Network Functions Virtualization
                  {(NFV)}},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_1},
  doi          = {10.1007/978-3-030-49669-2\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Alhebaishi0J20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-09451,
  author       = {Meisam Mohammady and
                  Shangyu Xie and
                  Yuan Hong and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {R\({}^{\mbox{2}}\)DP: {A} Universal and Automated Approach to Optimizing
                  the Randomization Mechanisms of Differential Privacy for Utility Metrics
                  with No Known Optimal Distributions},
  journal      = {CoRR},
  volume       = {abs/2009.09451},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.09451},
  eprinttype    = {arXiv},
  eprint       = {2009.09451},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-09451.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/MajumdarMWTOAJPWD19,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Azadeh Tabiban and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Cloud Security Auditing},
  series       = {Advances in Information Security},
  volume       = {76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23128-6},
  doi          = {10.1007/978-3-030-23128-6},
  isbn         = {978-3-030-23127-9},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BorborWJS19,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Optimizing the network diversity to improve the resilience of networks
                  against unknown attacks},
  journal      = {Comput. Commun.},
  volume       = {145},
  pages        = {96--112},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comcom.2019.06.004},
  doi          = {10.1016/J.COMCOM.2019.06.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BorborWJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeDW19,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the feasibility of binary authorship characterization},
  journal      = {Digit. Investig.},
  volume       = {28 Supplement},
  pages        = {S3--S11},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.01.028},
  doi          = {10.1016/J.DIIN.2019.01.028},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MajumdarTJOAP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Yosr Jarraya and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Learning probabilistic dependencies among events for proactive security
                  auditing in clouds},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {2},
  pages        = {165--202},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-181137},
  doi          = {10.3233/JCS-181137},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MajumdarTJOAP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlhebaishiWJS19,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Mitigating the insider threat of remote administrators in clouds through
                  maintenance task assignments},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {427--458},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191306},
  doi          = {10.3233/JCS-191306},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlhebaishiWJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlrabaeeSWDH19,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Aiman Hanna},
  title        = {Decoupling coding habits from functionality for effective binary authorship
                  attribution},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {6},
  pages        = {613--648},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191292},
  doi          = {10.3233/JCS-191292},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlrabaeeSWDH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AlhebaishiWS19,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Anoop Singhal},
  title        = {Threat Modeling for Cloud Infrastructures},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {17},
  pages        = {e5},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.10-1-2019.156246},
  doi          = {10.4108/EAI.10-1-2019.156246},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AlhebaishiWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KhaliliZBWSZ19,
  author       = {Mina Khalili and
                  Mengyuan Zhang and
                  Daniel Borbor and
                  Lingyu Wang and
                  Nicandro Scarabeo and
                  Michel{-}Ange Zamor},
  title        = {Monitoring and Improving Managed Security Services inside a Security
                  Operation Center},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {18},
  pages        = {e1},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.8-4-2019.157413},
  doi          = {10.4108/EAI.8-4-2019.157413},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KhaliliZBWSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCWR19,
  author       = {Mengyuan Zhang and
                  Xavier de Carn{\'{e}} de Carnavalet and
                  Lingyu Wang and
                  Ahmed Ragab},
  title        = {Large-Scale Empirical Study of Important Features Indicative of Discovered
                  Vulnerabilities to Assess Application Security},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {9},
  pages        = {2315--2330},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2895963},
  doi          = {10.1109/TIFS.2019.2895963},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangCWR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MadiJAMWPWD18,
  author       = {Taous Madi and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{ISOTOP:} Auditing Virtual Networks Isolation Across Cloud Layers
                  in OpenStack},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1:1--1:35},
  year         = {2019},
  url          = {https://doi.org/10.1145/3267339},
  doi          = {10.1145/3267339},
  timestamp    = {Fri, 10 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/MadiJAMWPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/Thirunavukkarasu19,
  author       = {Sudershan Lakshmanan Thirunavukkarasu and
                  Mengyuan Zhang and
                  Alaa Oqaily and
                  Gagandeep Singh Chawla and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Modeling {NFV} Deployment to Identify the Cross-Level Inconsistency
                  Vulnerabilities},
  booktitle    = {2019 {IEEE} International Conference on Cloud Computing Technology
                  and Science (CloudCom), Sydney, Australia, December 11-13, 2019},
  pages        = {167--174},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CloudCom.2019.00034},
  doi          = {10.1109/CLOUDCOM.2019.00034},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/Thirunavukkarasu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangXWJS19,
  author       = {Mengyuan Zhang and
                  Yue Xin and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Simon N. Foley},
  title        = {CASFinder: Detecting Common Attack Surface},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {338--358},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_18},
  doi          = {10.1007/978-3-030-22479-0\_18},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangXWJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/MajumdarTMOJP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Meisam Mohammady and
                  Alaa Oqaily and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Multi-Level Proactive Security Auditing for Clouds},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937641},
  doi          = {10.1109/DSC47296.2019.8937641},
  timestamp    = {Mon, 16 Mar 2020 18:03:41 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/MajumdarTMOJP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlrabaeeK0D19,
  author       = {Saed Alrabaee and
                  ElMouatez Billah Karbab and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {BinEye: Towards Efficient Binary Authorship Characterization Using
                  Deep Learning},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {47--67},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_3},
  doi          = {10.1007/978-3-030-29962-0\_3},
  timestamp    = {Mon, 05 Feb 2024 20:29:41 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AlrabaeeK0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarTMOJP0D19,
  author       = {Suryadipta Majumdar and
                  Azadeh Tabiban and
                  Meisam Mohammady and
                  Alaa Oqaily and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Proactivizer: Transforming Existing Verification Tools into Efficient
                  Solutions for Runtime Security Enforcement},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11736},
  pages        = {239--262},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_12},
  doi          = {10.1007/978-3-030-29962-0\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarTMOJP0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OqailyJZ0PD19,
  author       = {Momen Oqaily and
                  Yosr Jarraya and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {iCAT: An Interactive Customizable Anonymization Tool},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {658--680},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_32},
  doi          = {10.1007/978-3-030-29959-0\_32},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OqailyJZ0PD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DumanGKA0D19,
  author       = {Onur Duman and
                  Mohsen Ghafouri and
                  Marthe Kassouf and
                  Ribal Atallah and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Modeling Supply Chain Attacks in {IEC} 61850 Substations},
  booktitle    = {2019 {IEEE} International Conference on Communications, Control, and
                  Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing,
                  China, October 21-23, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SmartGridComm.2019.8909818},
  doi          = {10.1109/SMARTGRIDCOMM.2019.8909818},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DumanGKA0D19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2019w,
  editor       = {Jianying Zhou and
                  Robert H. Deng and
                  Zhou Li and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Lingyu Wang and
                  Kehuan Zhang},
  title        = {Applied Cryptography and Network Security Workshops - {ACNS} 2019
                  Satellite Workshops, SiMLA, Cloud S{\&}P, AIBlock, and AIoTS,
                  Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11605},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29729-9},
  doi          = {10.1007/978-3-030-29729-9},
  isbn         = {978-3-030-29728-2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2019w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SendiDW18,
  author       = {Alireza Shameli{-}Sendi and
                  Michel R. Dagenais and
                  Lingyu Wang},
  title        = {Realtime intrusion risk assessment model based on attack and service
                  dependency graphs},
  journal      = {Comput. Commun.},
  volume       = {116},
  pages        = {253--272},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.comcom.2017.12.003},
  doi          = {10.1016/J.COMCOM.2017.12.003},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SendiDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BorborWJS18,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Surviving unpatchable vulnerabilities through heterogeneous network
                  hardening options},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {6},
  pages        = {761--789},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171106},
  doi          = {10.3233/JCS-171106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BorborWJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/QuHW18,
  author       = {Wenyu Qu and
                  Wei Huo and
                  Lingyu Wang},
  title        = {Opportunistic Diversity-Based Detection of Injection Attacks in Web
                  Applications},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {5},
  number       = {16},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.11-12-2018.156032},
  doi          = {10.4108/EAI.11-12-2018.156032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/QuHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MajumdarMWJPWD18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {User-Level Runtime Security Auditing for the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {5},
  pages        = {1185--1199},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779444},
  doi          = {10.1109/TIFS.2017.2779444},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MajumdarMWJPWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AlrabaeeSWD18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{FOSSIL}: {A} Resilient and Efficient System for Identifying
                  {FOSS} Functions in Malware Binaries},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {2},
  pages        = {8:1--8:34},
  year         = {2018},
  url          = {https://doi.org/10.1145/3175492},
  doi          = {10.1145/3175492},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AlrabaeeSWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/0001ZS18,
  author       = {Lingyu Wang and
                  Mengyuan Zhang and
                  Anoop Singhal},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {450--469},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_22},
  doi          = {10.1007/978-3-030-04834-1\_22},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/0001ZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Mohammady0HLPD18,
  author       = {Meisam Mohammady and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Preserving Both Privacy and Utility in Network Trace Anonymization},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {459--474},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243809},
  doi          = {10.1145/3243734.3243809},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Mohammady0HLPD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/MadiZJAP0D18,
  author       = {Taous Madi and
                  Mengyuan Zhang and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in
                  Public Cloud},
  booktitle    = {2018 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CloudCom2018.2018.00042},
  doi          = {10.1109/CLOUDCOM2018.2018.00042},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/MadiZJAP0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/TabibanM0D18,
  author       = {Azadeh Tabiban and
                  Suryadipta Majumdar and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{PERMON:} An OpenStack Middleware for Runtime Security Policy Enforcement
                  in Clouds},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433180},
  doi          = {10.1109/CNS.2018.8433180},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/TabibanM0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Alhebaishi0JS18,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Modeling and Mitigating the Insider Threat of Remote Administrators
                  in Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_1},
  doi          = {10.1007/978-3-319-95729-6\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Alhebaishi0JS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ShiraniCALD0H18,
  author       = {Paria Shirani and
                  Leo Collard and
                  Basile L. Agba and
                  Bernard Lebel and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Aiman Hanna},
  editor       = {Cristiano Giuffrida and
                  S{\'{e}}bastien Bardin and
                  Gregory Blanc},
  title        = {{BINARM:} Scalable and Efficient Detection of Vulnerabilities in Firmware
                  Images of Intelligent Electronic Devices},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 15th International Conference, {DIMVA} 2018, Saclay, France, June
                  28-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10885},
  pages        = {114--138},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93411-2\_6},
  doi          = {10.1007/978-3-319-93411-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ShiraniCALD0H18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Aiman Hanna},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {On Leveraging Coding Habits for Effective Binary Authorship Attribution},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_2},
  doi          = {10.1007/978-3-319-99073-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlrabaeeS0DH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Alimohammadifar18,
  author       = {Amir Alimohammadifar and
                  Suryadipta Majumdar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Stealthy Probing-Based Verification {(SPV):} An Active Approach to
                  Defending Software Defined Networks Against Topology Poisoning Attacks},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {463--484},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_23},
  doi          = {10.1007/978-3-319-98989-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Alimohammadifar18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/MajumdarMJP0D18,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Nur Zincir{-}Heywood and
                  Guillaume Bonfante and
                  Mourad Debbabi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Cloud Security Auditing: Major Approaches and Existing Challenges},
  booktitle    = {Foundations and Practice of Security - 11th International Symposium,
                  {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11358},
  pages        = {61--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-18419-3\_5},
  doi          = {10.1007/978-3-030-18419-3\_5},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/MajumdarMJP0D18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-10464,
  author       = {Meisam Mohammady and
                  Lingyu Wang and
                  Yuan Hong and
                  Habib Louafi and
                  Makan Pourzandi and
                  Mourad Debbabi},
  title        = {Preserving Both Privacy and Utility in Network Trace Anonymization},
  journal      = {CoRR},
  volume       = {abs/1810.10464},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.10464},
  eprinttype    = {arXiv},
  eprint       = {1810.10464},
  timestamp    = {Wed, 31 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-10464.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/WangJS17,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Network Security Metrics},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66505-4},
  doi          = {10.1007/978-3-319-66505-4},
  isbn         = {978-3-319-66504-7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/WangJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSPWD17,
  author       = {Saed Alrabaee and
                  Noman Saleem and
                  Stere Preda and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Corrigendum to 'OBA2: An Onion approach to Binary code Authorship
                  Attribution' [Digit Investig 11 {(2014)} {S94-S103]}},
  journal      = {Digit. Investig.},
  volume       = {21},
  pages        = {89},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.02.004},
  doi          = {10.1016/J.DIIN.2017.02.004},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSPWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HongLW17,
  author       = {Yuan Hong and
                  Wen Ming Liu and
                  Lingyu Wang},
  title        = {Privacy Preserving Smart Meter Streaming Against Information Leakage
                  of Appliance Status},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {9},
  pages        = {2227--2241},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2704904},
  doi          = {10.1109/TIFS.2017.2704904},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HongLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Borbor0JS17,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Securing Networks Against Unpatchable and Unknown Vulnerabilities
                  Using Heterogeneous Hardening Options},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {509--528},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_28},
  doi          = {10.1007/978-3-319-61176-1\_28},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Borbor0JS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/Shirani0D17,
  author       = {Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Michalis Polychronakis and
                  Michael Meier},
  title        = {BinShape: Scalable and Robust Binary Library Function Identification
                  Using Function Shape},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment
                  - 14th International Conference, {DIMVA} 2017, Bonn, Germany, July
                  6-7, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10327},
  pages        = {301--324},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60876-1\_14},
  doi          = {10.1007/978-3-319-60876-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/Shirani0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarJOAPWD17,
  author       = {Suryadipta Majumdar and
                  Yosr Jarraya and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {LeaPS: Learning-Based Proactive Security Auditing for Clouds},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_15},
  doi          = {10.1007/978-3-319-66399-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarJOAPWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WangMMJAP0D17,
  author       = {Yushun Wang and
                  Taous Madi and
                  Suryadipta Majumdar and
                  Yosr Jarraya and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level
                  Network Isolation},
  booktitle    = {24th Annual Network and Distributed System Security Symposium, {NDSS}
                  2017, San Diego, California, USA, February 26 - March 1, 2017},
  publisher    = {The Internet Society},
  year         = {2017},
  url          = {https://www.ndss-symposium.org/ndss2017/ndss-2017-programme/tenantguard-scalable-runtime-verification-cloud-wide-vm-level-network-isolation/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WangMMJAP0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/DumanZ0D17,
  author       = {Onur Duman and
                  Mengyuan Zhang and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Measuring the security posture of {IEC} 61850 substations with redundancy
                  against zero day attacks},
  booktitle    = {2017 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2017, Dresden, Germany, October 23-27, 2017},
  pages        = {108--114},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SmartGridComm.2017.8340727},
  doi          = {10.1109/SMARTGRIDCOMM.2017.8340727},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/DumanZ0D17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2016,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-51966-1},
  doi          = {10.1007/978-3-319-51966-1},
  isbn         = {978-3-319-51965-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AlrabaeeSD017,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the Feasibility of Malware Authorship Attribution},
  journal      = {CoRR},
  volume       = {abs/1701.02711},
  year         = {2017},
  url          = {http://arxiv.org/abs/1701.02711},
  eprinttype    = {arXiv},
  eprint       = {1701.02711},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AlrabaeeSD017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/LiuW16,
  author       = {Wen Ming Liu and
                  Lingyu Wang},
  title        = {Preserving Privacy Against Side-Channel Leaks - From Data Publishing
                  to Web Applications},
  series       = {Advances in Information Security},
  volume       = {68},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42644-0},
  doi          = {10.1007/978-3-319-42644-0},
  isbn         = {978-3-319-42642-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Alrabaee0D16,
  author       = {Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {\emph{BinGold}: Towards robust binary analysis by extracting the semantics
                  of binary code as semantic flow graphs (SFGs)},
  journal      = {Digit. Investig.},
  volume       = {18 Supplement},
  pages        = {S11--S22},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.diin.2016.04.002},
  doi          = {10.1016/J.DIIN.2016.04.002},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Alrabaee0D16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isse/MouhebANDWP16,
  author       = {Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mariam Nouh and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Aspect-oriented modeling framework for security hardening},
  journal      = {Innov. Syst. Softw. Eng.},
  volume       = {12},
  number       = {1},
  pages        = {41--67},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11334-015-0263-5},
  doi          = {10.1007/S11334-015-0263-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isse/MouhebANDWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/CuiWHW16,
  author       = {Baojiang Cui and
                  Fuwei Wang and
                  Yongle Hao and
                  Lingyu Wang},
  title        = {A taint based approach for automatic reverse engineering of gray-box
                  file formats},
  journal      = {Soft Comput.},
  volume       = {20},
  number       = {9},
  pages        = {3563--3578},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00500-015-1713-6},
  doi          = {10.1007/S00500-015-1713-6},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/CuiWHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/CuiLW16,
  author       = {Baojiang Cui and
                  Zheli Liu and
                  Lingyu Wang},
  title        = {Key-Aggregate Searchable Encryption {(KASE)} for Group Data Sharing
                  via Cloud Storage},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {8},
  pages        = {2374--2385},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2015.2389959},
  doi          = {10.1109/TC.2015.2389959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/CuiLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWJSA16,
  author       = {Mengyuan Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Massimiliano Albanese},
  title        = {Network Diversity: {A} Security Metric for Evaluating the Resilience
                  of Networks Against Zero-Day Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1071--1086},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516916},
  doi          = {10.1109/TIFS.2016.2516916},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWJSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MadiMWJPW16,
  author       = {Taous Madi and
                  Suryadipta Majumdar and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Alexander Pretschner},
  title        = {Auditing Security Compliance of the Virtualized Infrastructure in
                  the Cloud: Application to OpenStack},
  booktitle    = {Proceedings of the Sixth {ACM} on Conference on Data and Application
                  Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
                  9-11, 2016},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://dl.acm.org/citation.cfm?id=2857721},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/MadiMWJPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BorborWJS16,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Diversifying Network Services Under Cost Constraints for Better Resilience
                  Against Unknown Attacks},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_21},
  doi          = {10.1007/978-3-319-41483-6\_21},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BorborWJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MajumdarJMAPWD16,
  author       = {Suryadipta Majumdar and
                  Yosr Jarraya and
                  Taous Madi and
                  Amir Alimohammadifar and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Proactive Verification of Security Compliance for Clouds Through Pre-computation:
                  Application to OpenStack},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4\_3},
  doi          = {10.1007/978-3-319-45744-4\_3},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MajumdarJMAPWD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/Emirkanian-Bouchard16,
  author       = {Mickael Emirkanian{-}Bouchard and
                  Lingyu Wang},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Towards Metric-Driven, Application-Specific Visualization of Attack
                  Graphs},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {117--134},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_8},
  doi          = {10.1007/978-3-319-51966-1\_8},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/Emirkanian-Bouchard16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/AlrabaeeSDW16,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Mourad Debbabi and
                  Lingyu Wang},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the Feasibility of Malware Authorship Attribution},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {256--272},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_17},
  doi          = {10.1007/978-3-319-51966-1\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/AlrabaeeSDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/AlhebaishiWJS16,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Threat Modeling for Cloud Data Center Infrastructures},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {302--319},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_20},
  doi          = {10.1007/978-3-319-51966-1\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/AlhebaishiWJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/MouhebDPWNZATL15,
  author       = {Djedjiga Mouheb and
                  Mourad Debbabi and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mariam Nouh and
                  Raha Ziarati and
                  Dima Alhadidi and
                  Chamseddine Talhi and
                  Vitor Lima},
  title        = {Aspect-Oriented Security Hardening of {UML} Design Models},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16106-8},
  doi          = {10.1007/978-3-319-16106-8},
  isbn         = {978-3-319-16105-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/MouhebDPWNZATL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSWD15,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{SIGMA:} {A} Semantic Integrated Graph Matching Approach for identifying
                  reused functions in binary code},
  journal      = {Digit. Investig.},
  volume       = {12 Supplement 1},
  pages        = {S61--S71},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.01.011},
  doi          = {10.1016/J.DIIN.2015.01.011},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/RahimianSAWD15,
  author       = {Ashkan Rahimian and
                  Paria Shirani and
                  Saed Alrabaee and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {BinComp: {A} stratified approach to compiler provenance Attribution},
  journal      = {Digit. Investig.},
  volume       = {14 Supplement 1},
  pages        = {S146--S155},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.diin.2015.05.015},
  doi          = {10.1016/J.DIIN.2015.05.015},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/RahimianSAWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiuWZZ15,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Lei Zhang and
                  Shunzhi Zhu},
  title        = {\emph{k}-jump: {A} strategy to design publicly-known algorithms for
                  privacy preserving micro-data disclosure},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {2},
  pages        = {131--165},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140514},
  doi          = {10.3233/JCS-140514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LiuWZZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/MajumdarMWJPWD15,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Security Compliance Auditing of Identity and Access Management in
                  the Cloud: Application to OpenStack},
  booktitle    = {7th {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2015, Vancouver, BC, Canada, November 30 - December
                  3, 2015},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CloudCom.2015.80},
  doi          = {10.1109/CLOUDCOM.2015.80},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/MajumdarMWJPWD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/WangAJ14,
  author       = {Lingyu Wang and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  title        = {Network Hardening - An Automated Approach to Improving Network Security},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04612-9},
  doi          = {10.1007/978-3-319-04612-9},
  isbn         = {978-3-319-04611-2},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/WangAJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/AlrabaeeSPWD14,
  author       = {Saed Alrabaee and
                  Noman Saleem and
                  Stere Preda and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{OBA2:} An Onion approach to Binary code Authorship Attribution},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {Supplement 1},
  pages        = {S94--S103},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2014.03.012},
  doi          = {10.1016/J.DIIN.2014.03.012},
  timestamp    = {Wed, 17 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/AlrabaeeSPWD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangJSCN14,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Pengsu Cheng and
                  Steven Noel},
  title        = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk
                  of Unknown Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {30--44},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.24},
  doi          = {10.1109/TDSC.2013.24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuWCRZD14,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Pengsu Cheng and
                  Kui Ren and
                  Shunzhi Zhu and
                  Mourad Debbabi},
  title        = {{PPTP:} Privacy-Preserving Traffic Padding in Web-Based Applications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {538--552},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2302308},
  doi          = {10.1109/TDSC.2014.2302308},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuWCRZD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuWRWZ14,
  author       = {Zhen Xu and
                  Cong Wang and
                  Kui Ren and
                  Lingyu Wang and
                  Bingsheng Zhang},
  title        = {Proof-Carrying Cloud Computation: The Case of Convex Optimization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {11},
  pages        = {1790--1803},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2352457},
  doi          = {10.1109/TIFS.2014.2352457},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuWRWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HongVLW14,
  author       = {Yuan Hong and
                  Jaideep Vaidya and
                  Haibing Lu and
                  Lingyu Wang},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Collaboratively Solving the Traveling Salesman Problem with Limited
                  Disclosure},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_12},
  doi          = {10.1007/978-3-662-43936-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HongVLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangZJSA14,
  author       = {Lingyu Wang and
                  Mengyuan Zhang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Massimiliano Albanese},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Modeling Network Diversity for Evaluating the Robustness of Networks
                  against Zero-Day Attacks},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {494--511},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_28},
  doi          = {10.1007/978-3-319-11212-1\_28},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangZJSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/LiuWRD13,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Kui Ren and
                  Mourad Debbabi},
  title        = {Background Knowledge-Resistant Traffic Padding for Preserving User
                  Privacy in Web-Based Applications},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 1},
  pages        = {679--686},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudCom.2013.96},
  doi          = {10.1109/CLOUDCOM.2013.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/LiuWRD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/AlbaneseJSW13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Lingyu Wang},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities},
  booktitle    = {E-Business and Telecommunications - International Joint Conference,
                  {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {456},
  pages        = {322--340},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-44788-8\_19},
  doi          = {10.1007/978-3-662-44788-8\_19},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/AlbaneseJSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/XuWWRW13,
  author       = {Zhen Xu and
                  Cong Wang and
                  Qian Wang and
                  Kui Ren and
                  Lingyu Wang},
  title        = {Proof-carrying cloud computation: The case of convex optimization},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {610--614},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566845},
  doi          = {10.1109/INFCOM.2013.6566845},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/XuWWRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Lingyu Wang},
  editor       = {Pierangela Samarati},
  title        = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {207--218},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223168/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlbaneseJSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/NzoukouWJS13,
  author       = {William Nzoukou and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {A Unified Framework for Measuring a Network's Mean Time-to-Compromise},
  booktitle    = {{IEEE} 32nd Symposium on Reliable Distributed Systems, {SRDS} 2013,
                  Braga, Portugal, 1-3 October 2013},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SRDS.2013.30},
  doi          = {10.1109/SRDS.2013.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/NzoukouWJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2013,
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6},
  doi          = {10.1007/978-3-642-39256-6},
  isbn         = {978-3-642-39255-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/ZengW12,
  author       = {Yong Zeng and
                  Lingyu Wang},
  title        = {Secure collaboration in design and supply chain management},
  journal      = {Comput. Ind.},
  volume       = {63},
  number       = {6},
  pages        = {543--544},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compind.2012.05.002},
  doi          = {10.1016/J.COMPIND.2012.05.002},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/ZengW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/ZengWDCK12,
  author       = {Yong Zeng and
                  Lingyu Wang and
                  Xiaoguang Deng and
                  Xinlin Cao and
                  Nafisa Khundker},
  title        = {Secure collaboration in global design and supply chain environment:
                  Problem analysis and literature review},
  journal      = {Comput. Ind.},
  volume       = {63},
  number       = {6},
  pages        = {545--556},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compind.2012.05.001},
  doi          = {10.1016/J.COMPIND.2012.05.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/ZengWDCK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/ZhangCWZ12,
  author       = {Da Yong Zhang and
                  Xinlin Cao and
                  Lingyu Wang and
                  Yong Zeng},
  title        = {Mitigating the risk of information leakage in a two-level supply chain
                  through optimal supplier selection},
  journal      = {J. Intell. Manuf.},
  volume       = {23},
  number       = {4},
  pages        = {1351--1364},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10845-011-0527-3},
  doi          = {10.1007/S10845-011-0527-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jim/ZhangCWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiuW12,
  author       = {Wen Ming Liu and
                  Lingyu Wang},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Privacy streamliner: a two-stage approach to improving algorithm efficiency},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {193--204},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133626},
  doi          = {10.1145/2133601.2133626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiuW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/LiuWRCD12,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Kui Ren and
                  Pengsu Cheng and
                  Mourad Debbabi},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {k-Indistinguishable Traffic Padding in Web Applications},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {79--99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_5},
  doi          = {10.1007/978-3-642-31680-7\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/LiuWRCD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/ChengWJS12,
  author       = {Pengsu Cheng and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Aggregating {CVSS} Base Scores for Semantics-Rich Network Security
                  Metrics},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.4},
  doi          = {10.1109/SRDS.2012.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/ChengWJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/ZhangZWLG11,
  author       = {Da Yong Zhang and
                  Yong Zeng and
                  Lingyu Wang and
                  Hongtao Li and
                  Yuanfeng Geng},
  title        = {Modeling and evaluating information leakage caused by inferences in
                  supply chains},
  journal      = {Comput. Ind.},
  volume       = {62},
  number       = {3},
  pages        = {351--363},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compind.2010.10.002},
  doi          = {10.1016/J.COMPIND.2010.10.002},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/ZhangZWLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohammedOWDB11,
  author       = {Noman Mohammed and
                  Hadi Otrok and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {Mechanism Design-Based Secure Leader Election Model for Intrusion
                  Detection in {MANET}},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {89--103},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2009.22},
  doi          = {10.1109/TDSC.2009.22},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohammedOWDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/LiuWCD11,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Pengsu Cheng and
                  Mourad Debbabi},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Privacy-preserving traffic padding in web-based applications},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {131--136},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046573},
  doi          = {10.1145/2046556.2046573},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/LiuWCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijngc/NoelWSJ10,
  author       = {Steven Noel and
                  Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  title        = {Measuring Security Risk of Networks Using Attack Graphs},
  journal      = {Int. J. Next Gener. Comput.},
  volume       = {1},
  number       = {1},
  year         = {2010},
  url          = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/68},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijngc/NoelWSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuRWD10,
  author       = {Bo Zhu and
                  Kui Ren and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {{PCM:} a privacy-preserving detection mechanism in mobile \emph{ad
                  hoc} networks},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {2-3},
  pages        = {167--184},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.122},
  doi          = {10.1002/SEC.122},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuRWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuSJW10,
  author       = {Bo Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Providing witness anonymity under peer-to-peer settings},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {2},
  pages        = {324--336},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2041821},
  doi          = {10.1109/TIFS.2010.2041821},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuSJW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhuSJRW10,
  author       = {Bo Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Sankardas Roy and
                  Lingyu Wang},
  title        = {Localized Multicast: Efficient and Distributed Replica Detection in
                  Large-Scale Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {9},
  number       = {7},
  pages        = {913--926},
  year         = {2010},
  url          = {https://doi.org/10.1109/TMC.2010.40},
  doi          = {10.1109/TMC.2010.40},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhuSJRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ChengWL10,
  author       = {Pengsu Cheng and
                  Lingyu Wang and
                  Tao Long},
  title        = {Compressing Attack Graphs Through Reference Encoding},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1026--1031},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.188},
  doi          = {10.1109/CIT.2010.188},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ChengWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cascon/NouhZMADWP10,
  author       = {Mariam Nouh and
                  Raha Ziarati and
                  Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Joanna W. Ng and
                  Christian Couturier and
                  Hausi A. M{\"{u}}ller and
                  Arthur G. Ryman and
                  Anatol W. Kark},
  title        = {Aspect weaver: a model transformation approach for {UML} models},
  booktitle    = {Proceedings of the 2010 conference of the Centre for Advanced Studies
                  on Collaborative Research, November 1-4, 2010, Toronto, Ontario, Canada},
  pages        = {139--153},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1923947.1923962},
  doi          = {10.1145/1923947.1923962},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cascon/NouhZMADWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangJSN10,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Steven Noel},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {\emph{k}-Zero Day Safety: Measuring the Security Risk of Networks
                  against Unknown Attacks},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_35},
  doi          = {10.1007/978-3-642-15497-3\_35},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangJSN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/facs2/MouhebANDWP10,
  author       = {Djedjiga Mouheb and
                  Dima Alhadidi and
                  Mariam Nouh and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Lu{\'{\i}}s Soares Barbosa and
                  Markus Lumpe},
  title        = {Aspect Weaving in {UML} Activity Diagrams: {A} Semantic and Algorithmic
                  Framework},
  booktitle    = {Formal Aspects of Component Software - 7th International Workshop,
                  {FACS} 2010, Guimar{\~{a}}es, Portugal, October 14-16, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6921},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-27269-1\_11},
  doi          = {10.1007/978-3-642-27269-1\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/facs2/MouhebANDWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdt/LiuWZ10,
  author       = {Wen Ming Liu and
                  Lingyu Wang and
                  Lei Zhang},
  editor       = {Luc Segoufin},
  title        = {k-jump strategy for preserving privacy in micro-data disclosure},
  booktitle    = {Database Theory - {ICDT} 2010, 13th International Conference, Lausanne,
                  Switzerland, March 23-25, 2010, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {104--115},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1804669.1804684},
  doi          = {10.1145/1804669.1804684},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdt/LiuWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BinsalleehOBSYDW10,
  author       = {Hamad Binsalleeh and
                  Thomas C. Ormerod and
                  Amine Boukhtouta and
                  Prosenjit Sinha and
                  Amr M. Youssef and
                  Mourad Debbabi and
                  Lingyu Wang},
  title        = {On the analysis of the Zeus botnet crimeware toolkit},
  booktitle    = {Eighth Annual Conference on Privacy, Security and Trust, {PST} 2010,
                  August 17-19, 2010, Ottawa, Ontario, Canada},
  pages        = {31--38},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/PST.2010.5593240},
  doi          = {10.1109/PST.2010.5593240},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BinsalleehOBSYDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/OrmerodWDYBBS10,
  author       = {Thomas C. Ormerod and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Amr M. Youssef and
                  Hamad Binsalleeh and
                  Amine Boukhtouta and
                  Prosenjit Sinha},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {Defaming Botnet Toolkits: {A} Bottom-Up Approach to Mitigating the
                  Threat},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {195--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.39},
  doi          = {10.1109/SECURWARE.2010.39},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securware/OrmerodWDYBBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/MouhebTNLDWP10,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Mariam Nouh and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Roger Y. Lee and
                  Olga Ormandjieva and
                  Alain Abran and
                  Constantinos Constantinides},
  title        = {Aspect-Oriented Modeling for Representing and Integrating Security
                  Concerns in {UML}},
  booktitle    = {Software Engineering Research, Management and Applications 2010 [selected
                  papers from the 8th {ACIS} International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2010, Montreal, Canada,
                  May 24-26, 2010]},
  series       = {Studies in Computational Intelligence},
  volume       = {296},
  pages        = {197--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13273-5\_13},
  doi          = {10.1007/978-3-642-13273-5\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/MouhebTNLDWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/FungWWH09,
  author       = {Benjamin C. M. Fung and
                  Ke Wang and
                  Lingyu Wang and
                  Patrick C. K. Hung},
  title        = {Privacy-preserving data publishing for cluster analysis},
  journal      = {Data Knowl. Eng.},
  volume       = {68},
  number       = {6},
  pages        = {552--575},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.datak.2008.12.001},
  doi          = {10.1016/J.DATAK.2008.12.001},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/FungWWH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/YaoWWBJ09,
  author       = {Chao Yao and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Claudio Bettini and
                  Sushil Jajodia},
  title        = {Evaluating privacy threats in released database views by symmetric
                  indistinguishability},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {5--42},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0317},
  doi          = {10.3233/JCS-2009-0317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/YaoWWBJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jot/TalhiMLDWP09,
  author       = {Chamseddine Talhi and
                  Djedjiga Mouheb and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  title        = {Usability of Security Specification Approaches for {UML} Design: {A}
                  Survey},
  journal      = {J. Object Technol.},
  volume       = {8},
  number       = {6},
  pages        = {102--122},
  year         = {2009},
  url          = {https://doi.org/10.5381/jot.2009.8.6.a1},
  doi          = {10.5381/JOT.2009.8.6.A1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jot/TalhiMLDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aosd/MouhebTLD0P09,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Omar Aldawud and
                  Walter Cazzola and
                  Thomas Cottenier and
                  Jeff Gray and
                  J{\"{o}}rg Kienzle and
                  Dominik Stein},
  title        = {Weaving security aspects into {UML} 2.0 design models},
  booktitle    = {Proceedings of the 13th workshop on Aspect-oriented modeling, {AOM}
                  '09, Charlottesville, Virginia, USA, March 2, 2009},
  pages        = {7--12},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1509297.1509300},
  doi          = {10.1145/1509297.1509300},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aosd/MouhebTLD0P09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangWF09,
  author       = {Yiming Wang and
                  Lingyu Wang and
                  Benjamin C. M. Fung},
  title        = {Preserving Privacy for Location-Based Services with Continuous Queries},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199361},
  doi          = {10.1109/ICC.2009.5199361},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangWF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/MokhovLW09,
  author       = {Serguei A. Mokhov and
                  Jian Li and
                  Lingyu Wang},
  editor       = {Khaldoun Al Agha and
                  Mohamad Badra and
                  Gregory B. Newby},
  title        = {Simple Dynamic Key Management in {SQL} Randomization},
  booktitle    = {{NTMS} 2009, 3rd International Conference on New Technologies, Mobility
                  and Security, 20-23 December 2009, Cairo, Egypt},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/NTMS.2009.5384673},
  doi          = {10.1109/NTMS.2009.5384673},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/MokhovLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangWJB09,
  author       = {Lei Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {L-Cover: Preserving Diversity by Anonymity},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_10},
  doi          = {10.1007/978-3-642-04219-5\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangWJB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/MouhebTMLDWP09,
  author       = {Djedjiga Mouheb and
                  Chamseddine Talhi and
                  Azzam Mourad and
                  Vitor Lima and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Hamido Fujita and
                  Vladim{\'{\i}}r Mar{\'{\i}}k},
  title        = {An Aspect-Oriented Approach for Software Security Hardening: from
                  Design to Implementation},
  booktitle    = {New Trends in Software Methodologies, Tools and Techniques - Proceedings
                  of the Eighth SoMeT 2009, September 23-25, 2009, Prague, Czech Republic},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {199},
  pages        = {203--222},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-049-0-203},
  doi          = {10.3233/978-1-60750-049-0-203},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/somet/MouhebTMLDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LimaTMDWP09,
  author       = {Vitor Lima and
                  Chamseddine Talhi and
                  Djedjiga Mouheb and
                  Mourad Debbabi and
                  Lingyu Wang and
                  Makan Pourzandi},
  editor       = {Ralf Huuck and
                  Gerwin Klein and
                  Bastian Schlich},
  title        = {Formal Verification and Validation of {UML} 2.0 Sequence Diagrams
                  using Source and Destination of Messages},
  booktitle    = {Proceedings of the 4th International Workshop on Systems Software
                  Verification, {SSV} 2009, Aachen, Germany, June 22-24, 2009},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {254},
  pages        = {143--160},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.entcs.2009.09.064},
  doi          = {10.1016/J.ENTCS.2009.09.064},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/LimaTMDWP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/OtrokMWDB08,
  author       = {Hadi Otrok and
                  Noman Mohammed and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {A game-theoretic intrusion detection model for mobile ad hoc networks},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {4},
  pages        = {708--721},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.10.024},
  doi          = {10.1016/J.COMCOM.2007.10.024},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/OtrokMWDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangYSJ08,
  author       = {Lingyu Wang and
                  Chao Yao and
                  Anoop Singhal and
                  Sushil Jajodia},
  title        = {Implementing interactive analysis of attack graphs using relational
                  databases},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {419--437},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0327},
  doi          = {10.3233/JCS-2008-0327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WangYSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiuLHWD08,
  author       = {Qian Liu and
                  Shuo Lu and
                  Yuan Hong and
                  Lingyu Wang and
                  Rachida Dssouli},
  title        = {Securing Telehealth Applications in a Web-Based e-Health Portal},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {3--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.9},
  doi          = {10.1109/ARES.2008.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiuLHWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ChenWS08,
  author       = {Feng Chen and
                  Lingyu Wang and
                  Jinshu Su},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {An Efficient Approach to Minimum-Cost Network Hardening Using Attack
                  Graphs},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {209--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.38},
  doi          = {10.1109/IAS.2008.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ChenWS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrigaultWSJ08,
  author       = {Marcel Frigault and
                  Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Andy Ozment and
                  Ketil St{\o}len},
  title        = {Measuring network security using dynamic bayesian network},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP
                  2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456362.1456368},
  doi          = {10.1145/1456362.1456368},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FrigaultWSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisse/MokhovRHW08,
  author       = {Serguei A. Mokhov and
                  Farid Rassai and
                  Lee Wei Huynh and
                  Lingyu Wang},
  editor       = {Tarek M. Sobh and
                  Khaled M. Elleithy and
                  Ausif Mahmood},
  title        = {The Authentication Framework within the Java Data Security Framework
                  {(JDSF):} Design and Implementation Refinement},
  booktitle    = {Novel Algorithms and Techniques in Telecommunications and Networking,
                  proceedings of the 2008 International Conference on Telecommunications
                  and Networking (TeNe), part of the International Joint Conferences
                  on Computer, Information, and Systems Sciences, and Engineering, {CISSE}
                  2008, Bridgeport, Connecticut, {USA}},
  pages        = {423--429},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-90-481-3662-9\_73},
  doi          = {10.1007/978-90-481-3662-9\_73},
  timestamp    = {Tue, 29 Dec 2020 18:38:51 +0100},
  biburl       = {https://dblp.org/rec/conf/cisse/MokhovRHW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisse/MokhovHW08,
  author       = {Serguei A. Mokhov and
                  Lee Wei Huynh and
                  Lingyu Wang},
  editor       = {Tarek M. Sobh and
                  Khaled M. Elleithy and
                  Ausif Mahmood},
  title        = {The Integrity Framework within the Java Data Security Framework {(JDSF):}
                  Design and Implementation Refinement},
  booktitle    = {Novel Algorithms and Techniques in Telecommunications and Networking,
                  proceedings of the 2008 International Conference on Telecommunications
                  and Networking (TeNe), part of the International Joint Conferences
                  on Computer, Information, and Systems Sciences, and Engineering, {CISSE}
                  2008, Bridgeport, Connecticut, {USA}},
  pages        = {449--455},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-90-481-3662-9\_77},
  doi          = {10.1007/978-90-481-3662-9\_77},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisse/MokhovHW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HongLLWD08,
  author       = {Yuan Hong and
                  Shuo Lu and
                  Qian Liu and
                  Lingyu Wang and
                  Rachida Dssouli},
  title        = {Preserving Privacy in E-health Systems Using Hippocratic Databases},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {692--697},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.62},
  doi          = {10.1109/COMPSAC.2008.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HongLLWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/FrigaultW08,
  author       = {Marcel Frigault and
                  Lingyu Wang},
  title        = {Measuring Network Security Using Bayesian Network-Based Attack Graphs},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {698--703},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.88},
  doi          = {10.1109/COMPSAC.2008.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/FrigaultW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangWJB08,
  author       = {Lei Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Vijay Atluri},
  title        = {Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_15},
  doi          = {10.1007/978-3-540-70567-3\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangWJB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangILSJ08,
  author       = {Lingyu Wang and
                  Tania Islam and
                  Tao Long and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Vijay Atluri},
  title        = {An Attack Graph-Based Probabilistic Security Metric},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_22},
  doi          = {10.1007/978-3-540-70567-3\_22},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangILSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhuRW08,
  author       = {Bo Zhu and
                  Kui Ren and
                  Lingyu Wang},
  title        = {Anonymous Misbehavior Detection in Mobile Ad Hoc Networks},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China},
  pages        = {358--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.Workshops.2008.23},
  doi          = {10.1109/ICDCS.WORKSHOPS.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhuRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FungWWD08,
  author       = {Benjamin C. M. Fung and
                  Ke Wang and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {A framework for privacy-preserving cluster analysis},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISI.2008.4565028},
  doi          = {10.1109/ISI.2008.4565028},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FungWWD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/IslamW08,
  author       = {Tania Islam and
                  Lingyu Wang},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {A Heuristic Approach to Minimum-Cost Network Hardening Using Attack
                  Graph},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.9},
  doi          = {10.1109/NTMS.2008.ECP.9},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/IslamW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/LiuLW08,
  author       = {Shuai Liu and
                  Wei Li and
                  Lingyu Wang},
  editor       = {Akshai Aggarwal and
                  Mohamad Badra and
                  Fabio Massacci},
  title        = {Towards Efficient Over-Encryption in Outsourced Databases Using Secret
                  Sharing},
  booktitle    = {{NTMS} 2008, 2nd International Conference on New Technologies, Mobility
                  and Security, November 5-7, 2008, Tangier, Morocco},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NTMS.2008.ECP.100},
  doi          = {10.1109/NTMS.2008.ECP.100},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/LiuLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiWZZ08,
  author       = {Wei Li and
                  Lingyu Wang and
                  Bo Zhu and
                  Lei Zhang},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {An Integrity Lock Architecture for Supporting Distributed Authorizations
                  in Database Federations},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_13},
  doi          = {10.1007/978-0-387-09699-5\_13},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiWZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/MohammedOWDB08,
  author       = {Noman Mohammed and
                  Hadi Otrok and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion
                  Detection in {MANET}},
  booktitle    = {{WCNC} 2008, {IEEE} Wireless Communications {\&} Networking Conference,
                  March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings},
  pages        = {2816--2821},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/WCNC.2008.493},
  doi          = {10.1109/WCNC.2008.493},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/MohammedOWDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/OtrokMWDB08,
  author       = {Hadi Otrok and
                  Noman Mohammed and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {A Moderate to Robust Game Theoretical Model for Intrusion Detection
                  in MANETs},
  booktitle    = {{IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2008, Avignon, France, 12-14
                  October 2008, Proceedings},
  pages        = {608--612},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WiMob.2008.21},
  doi          = {10.1109/WIMOB.2008.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/OtrokMWDB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/WangJ08,
  author       = {Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Security in Data Warehouses and {OLAP} Systems},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {191--212},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_8},
  doi          = {10.1007/978-0-387-48533-1\_8},
  timestamp    = {Mon, 07 Dec 2020 17:16:27 +0100},
  biburl       = {https://dblp.org/rec/reference/dbsec/WangJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/WangJW07,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Preserving Privacy in On-Line Analytical Processing {(OLAP)}},
  series       = {Advances in Information Security},
  volume       = {29},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46274-5},
  doi          = {10.1007/978-0-387-46274-5},
  isbn         = {978-0-387-46273-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/WangJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangLJW07,
  author       = {Lingyu Wang and
                  Yingjiu Li and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Parity-based inference control for multi-dimensional range sum queries},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {417--445},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15401},
  doi          = {10.3233/JCS-2007-15401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WangLJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuWYZ07,
  author       = {Xuxin Xu and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Bo Zhu},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Preventing Collusion Attacks on the One-Way Function Tree {(OFT)}
                  Scheme},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {177--193},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_12},
  doi          = {10.1007/978-3-540-72738-5\_12},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuWYZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangSJ07,
  author       = {Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {G{\"{u}}nter Karjoth and
                  Ketil St{\o}len},
  title        = {Toward measuring network security using attack graphs},
  booktitle    = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP
                  2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314257.1314273},
  doi          = {10.1145/1314257.1314273},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangSJ07,
  author       = {Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Measuring the Overall Security of Network Configurations Using Attack
                  Graphs},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_9},
  doi          = {10.1007/978-3-540-73538-0\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wimob/OtrokMWDB07,
  author       = {Hadi Otrok and
                  Noman Mohammed and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Prabir Bhattacharya},
  title        = {An Efficient and Truthful Leader {IDS} Election Mechanism for {MANET}},
  booktitle    = {Third {IEEE} International Conference on Wireless and Mobile Computing,
                  Networking and Communications, WiMob 2007, White Plains, New York,
                  USA, 8-10 October 2007, Proceedings},
  pages        = {78},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.ieeecomputersociety.org/10.1109/WIMOB.2007.19},
  doi          = {10.1109/WIMOB.2007.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wimob/OtrokMWDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangJW07,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Preserving Privacy in On-line Analytical Processing Data Cubes},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {355--380},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_11},
  doi          = {10.1007/978-0-387-27696-0\_11},
  timestamp    = {Mon, 04 Apr 2022 16:00:08 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WangJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangLJ06,
  author       = {Lingyu Wang and
                  Anyi Liu and
                  Sushil Jajodia},
  title        = {Using attack graphs for correlating, hypothesizing, and predicting
                  intrusion alerts},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {15},
  pages        = {2917--2933},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.04.001},
  doi          = {10.1016/J.COMCOM.2006.04.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangLJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangNJ06,
  author       = {Lingyu Wang and
                  Steven Noel and
                  Sushil Jajodia},
  title        = {Minimum-cost network hardening using attack graphs},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {18},
  pages        = {3812--3824},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.06.018},
  doi          = {10.1016/J.COMCOM.2006.06.018},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangNJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangYSJ06,
  author       = {Lingyu Wang and
                  Chao Yao and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Interactive Analysis of Attack Graphs Using Relational Queries},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_9},
  doi          = {10.1007/11805588\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangYSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/YaoWWJ06,
  author       = {Chao Yao and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Indistinguishability: The Other Aspect of Privacy},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_1},
  doi          = {10.1007/11844662\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/YaoWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLJ05,
  author       = {Lingyu Wang and
                  Anyi Liu and
                  Sushil Jajodia},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {An Efficient and Unified Approach to Correlating, Hypothesizing, and
                  Predicting Intrusion Alerts},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_15},
  doi          = {10.1007/11555827\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangWJ04,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Cardinality-based inference control in data cubes},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {655--692},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12501},
  doi          = {10.3233/JCS-2004-12501},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WangWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangWJ04,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {A logic-based framework for attribute based access control},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {45--55},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029140},
  doi          = {10.1145/1029133.1029140},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangJW04,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Securing {OLAP} Data Cubes Against Privacy Breaches},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {161},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301322},
  doi          = {10.1109/SECPRI.2004.1301322},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangJW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11/2004,
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  publisher    = {Kluwer},
  year         = {2004},
  isbn         = {1-4020-8144-8},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2004,
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Security and Protection in Information Processing Systems, {IFIP}
                  18th WorldComputer Congress, {TC11} 19th International Information
                  Security Conference, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {147},
  publisher    = {Kluwer / Springer},
  year         = {2004},
  isbn         = {1-4020-8142-1},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLWJ03,
  author       = {Lingyu Wang and
                  Yingjiu Li and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Precisely Answering Multi-dimensional Range Queries without Privacy
                  Breaches},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_6},
  doi          = {10.1007/978-3-540-39650-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLWJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/LiWWJ02,
  author       = {Yingjiu Li and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Anne Banks Pidduck and
                  John Mylopoulos and
                  Carson C. Woo and
                  M. Tamer {\"{O}}zsu},
  title        = {Auditing Interval-Based Inference},
  booktitle    = {Advanced Information Systems Engineering, 14th International Conference,
                  CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2348},
  pages        = {553--567},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-47961-9\_38},
  doi          = {10.1007/3-540-47961-9\_38},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/LiWWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangWJ02,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Towards Secure {XML} Federations},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {117--131},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangWJ02,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Cardinality-Based Inference Control in Sum-Only Data Cubes},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_4},
  doi          = {10.1007/3-540-45853-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/foiks/LiZWJ02,
  author       = {Yingjiu Li and
                  Sencun Zhu and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Thomas Eiter and
                  Klaus{-}Dieter Schewe},
  title        = {A Privacy-Enhanced Microaggregation Method},
  booktitle    = {Foundations of Information and Knowledge Systems, Second International
                  Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2284},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45758-5\_10},
  doi          = {10.1007/3-540-45758-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/foiks/LiZWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/LiWJ02,
  author       = {Yingjiu Li and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Roger Dingledine and
                  Paul F. Syverson},
  title        = {Preventing Interval-Based Inference by Random Data Perturbation},
  booktitle    = {Privacy Enhancing Technologies, Second International Workshop, {PET}
                  2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2482},
  pages        = {160--170},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36467-6\_12},
  doi          = {10.1007/3-540-36467-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/LiWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics