An attack graph-based probabilistic security metric L Wang, T Islam, T Long, A Singhal, S Jajodia Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008 | 551 | 2008 |
A logic-based framework for attribute based access control L Wang, D Wijesekera, S Jajodia Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004 | 382 | 2004 |
Measuring network security using dynamic bayesian network M Frigault, L Wang, A Singhal, S Jajodia Proceedings of the 4th ACM workshop on Quality of protection, 23-30, 2008 | 366 | 2008 |
Minimum-cost network hardening using attack graphs L Wang, S Noel, S Jajodia Computer Communications 29 (18), 3812-3824, 2006 | 347 | 2006 |
On the analysis of the zeus botnet crimeware toolkit H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ... 2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010 | 334 | 2010 |
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts L Wang, A Liu, S Jajodia Computer communications 29 (15), 2917-2933, 2006 | 300 | 2006 |
Measuring network security using bayesian network-based attack graphs M Frigault, L Wang 2008 32nd Annual IEEE International Computer Software and Applications …, 2008 | 256 | 2008 |
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage B Cui, Z Liu, L Wang IEEE Transactions on computers 65 (8), 2374-2385, 2016 | 251 | 2016 |
Toward measuring network security using attack graphs L Wang, A Singhal, S Jajodia Proceedings of the 2007 ACM workshop on Quality of protection, 49-54, 2007 | 211 | 2007 |
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities L Wang, S Jajodia, A Singhal, P Cheng, S Noel IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2014 | 210 | 2014 |
Measuring the overall security of network configurations using attack graphs L Wang, A Singhal, S Jajodia Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working …, 2007 | 210 | 2007 |
Security risk analysis of enterprise networks using probabilistic attack graphs L Wang, S Jajodia, A Singhal, A Singhal, X Ou Network security metrics, 53-73, 2017 | 205 | 2017 |
Measuring security risk of networks using attack graphs S Noel, S Jajodia, L Wang, A Singhal International Journal of Next-Generation Computing 1 (1), 135-147, 2010 | 180 | 2010 |
Mechanism design-based secure leader election model for intrusion detection in MANET N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya IEEE transactions on dependable and secure computing 8 (1), 89-103, 2011 | 161 | 2011 |
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks M Zhang, L Wang, S Jajodia, A Singhal, M Albanese IEEE Transactions on Information Forensics and Security 11 (5), 1071-1086, 2016 | 160 | 2016 |
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks L Wang, S Jajodia, A Singhal, S Noel Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010 | 147 | 2010 |
Localized multicast: efficient and distributed replica detection in large-scale sensor networks B Zhu, S Setia, S Jajodia, S Roy, L Wang IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010 | 127 | 2010 |
A game-theoretic intrusion detection model for mobile ad hoc networks H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya Computer communications 31 (4), 708-721, 2008 | 126 | 2008 |
Securing OLAP data cubes against privacy breaches L Wang, S Jajodia, D Wijesekera Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 161-175, 2004 | 124 | 2004 |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface J Vaidya, SA Chun, L Wang, B Shafiq Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2013 | 109* | 2013 |