A survey and a layered taxonomy of software-defined networking Y Jarraya, T Madi, M Debbabi IEEE communications surveys & tutorials 16 (4), 1955-1980, 2014 | 501 | 2014 |
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models M Debbabi, F Hassaïne, Y Jarraya, A Soeanu, L Alawneh Springer, 2010 | 136 | 2010 |
Efficient provisioning of security service function chaining using network security defense patterns A Shameli-Sendi, Y Jarraya, M Pourzandi, M Cheriet IEEE Transactions on Services Computing 12 (4), 534-549, 2016 | 92 | 2016 |
Automatic verification and performance analysis of time-constrained sysml activity diagrams Y Jarraya, A Soeanu, M Debbabi, F Hassaine 14th Annual IEEE International Conference and Workshops on the Engineering …, 2007 | 72 | 2007 |
Auditing security compliance of the virtualized infrastructure in the cloud: Application to OpenStack T Madi, S Majumdar, Y Wang, Y Jarraya, M Pourzandi, L Wang Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016 | 55 | 2016 |
Security compliance auditing of identity and access management in the cloud: Application to OpenStack S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ... 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 45 | 2015 |
Cloud calculus: Security verification in elastic cloud computing platform Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang, M Pourzandi 2012 international conference on collaboration technologies and systems (CTS …, 2012 | 42 | 2012 |
A unified approach for verification and validation of systems and software engineering models L Alawneh, M Debbabi, F Hassaine, Y Jarraya, A Soeanu 13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006 | 41 | 2006 |
Proactive verification of security compliance for clouds through pre-computation: Application to OpenStack S Majumdar, Y Jarraya, T Madi, A Alimohammadifar, M Pourzandi, ... Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 38 | 2016 |
Stealthy probing-based verification (SPV): An active approach to defending software defined networks against topology poisoning attacks A Alimohammadifar, S Majumdar, T Madi, Y Jarraya, M Pourzandi, ... Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 37 | 2018 |
On the meaning of SysML activity diagrams Y Jarraya, M Debbabi, J Bentahar 2009 16th Annual IEEE International Conference and Workshop on the …, 2009 | 37 | 2009 |
User-level runtime security auditing for the cloud S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ... IEEE Transactions on Information Forensics and Security 13 (5), 1185-1199, 2017 | 34 | 2017 |
Leaps: Learning-based proactive security auditing for clouds S Majumdar, Y Jarraya, M Oqaily, A Alimohammadifar, M Pourzandi, ... Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 34 | 2017 |
Tenantguard: Scalable runtime verification of cloud-wide vm-level network isolation Y Wang Concordia University, 2017 | 31 | 2017 |
ISOTOP: auditing virtual networks isolation across cloud layers in OpenStack T Madi, Y Jarraya, A Alimohammadifar, S Majumdar, Y Wang, ... ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-35, 2018 | 27 | 2018 |
Model-based systems security quantification S Ouchani, Y Jarraya, OA Mohamed 2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011 | 21 | 2011 |
Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud Shameli-Sendi A., J Y., Fekih-Ahmed M., P M., T C., C M. The 14th IFIP/IEEE Symposium on Integrated Network and Service Management …, 2015 | 17 | 2015 |
Learning probabilistic dependencies among events for proactive security auditing in clouds S Majumdar, A Tabiban, Y Jarraya, M Oqaily, A Alimohammadifar, ... Journal of Computer Security 27 (2), 165-202, 2019 | 16 | 2019 |
SegGuard: segmentation-based anonymization of network data in clouds for privacy-preserving security auditing M Oqaily, Y Jarraya, M Mohammady, S Majumdar, M Pourzandi, L Wang, ... IEEE Transactions on Dependable and Secure Computing 18 (5), 2486-2505, 2019 | 14 | 2019 |
Verification of Firewall Reconfiguration for Virtual Machines Migrations in the Cloud Y Jarraya, A Eghtesadi, S Sadri, M Debbabi, M Pourzandi Computer Networks, 2015 | 14 | 2015 |