Year |
Citation |
Score |
2020 |
Duman O, Zhang M, Wang L, Debbabi M, Atallah R, Lebel B. Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.3009931 |
0.305 |
|
2020 |
Oqaily M, Jarraya Y, Mohammady M, Majumdar S, Pourzandi M, Wang L, Debbabi M. SegGuard: Segmentation-based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2957488 |
0.344 |
|
2019 |
Khalili M, Zhang M, Borbor D, Wang L, Scarabeo N, Zamor M. Monitoring and Improving Managed Security Services inside a Security Operation Center Eai Endorsed Transactions On Security and Safety. 5: 157413. DOI: 10.4108/Eai.8-4-2019.157413 |
0.335 |
|
2019 |
Zhang M, Carnavalet XdCd, Wang L, Ragab A. Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security Ieee Transactions On Information Forensics and Security. 14: 2315-2330. DOI: 10.1109/Tifs.2019.2895963 |
0.312 |
|
2019 |
Zhang M, Wang L, Jajodia S, Singhal A. Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2889086 |
0.336 |
|
2019 |
Alrabaee S, Debbabi M, Wang L. On the feasibility of binary authorship characterization Digital Investigation. 28. DOI: 10.1016/J.Diin.2019.01.028 |
0.301 |
|
2019 |
Borbor D, Wang L, Jajodia S, Singhal A. Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks Computer Communications. 145: 96-112. DOI: 10.1016/J.Comcom.2019.06.004 |
0.323 |
|
2018 |
Shameli-Sendi A, Dagenais M, Wang L. Realtime intrusion risk assessment model based on attack and service dependency graphs Computer Communications. 116: 253-272. DOI: 10.1016/J.Comcom.2017.12.003 |
0.34 |
|
2017 |
Majumdar S, Madi T, Wang Y, Jarraya Y, Pourzandi M, Wang L, Debbabi M. User-Level Runtime Security Auditing for the Cloud Ieee Transactions On Information Forensics and Security. 13: 1185-1199. DOI: 10.1109/Tifs.2017.2779444 |
0.345 |
|
2017 |
Hong Y, Liu WM, Wang L. Privacy Preserving Smart Meter Streaming Against Information Leakage of Appliance Status Ieee Transactions On Information Forensics and Security. 12: 2227-2241. DOI: 10.1109/Tifs.2017.2704904 |
0.334 |
|
2016 |
Zhang M, Wang L, Jajodia S, Singhal A, Albanese M. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks Ieee Transactions On Information Forensics and Security. 11: 1071-1086. DOI: 10.1109/Tifs.2016.2516916 |
0.374 |
|
2016 |
Cui B, Liu Z, Wang L. Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Ieee Transactions On Computers. 65: 2374-2385. DOI: 10.1109/Tc.2015.2389959 |
0.362 |
|
2016 |
Alrabaee S, Wang L, Debbabi M. BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs) Digital Investigation. 18. DOI: 10.1016/J.Diin.2016.04.002 |
0.309 |
|
2016 |
Mouheb D, Alhadidi D, Nouh M, Debbabi M, Wang L, Pourzandi M. Aspect-oriented modeling framework for security hardening Innovations in Systems and Software Engineering. 12: 41-67. DOI: 10.1007/S11334-015-0263-5 |
0.337 |
|
2015 |
Alrabaee S, Shirani P, Wang L, Debbabi M. SIGMA: A semantic integrated graph matching approach for identifying reused functions in binary code Digital Investigation. 12: S61-S71. DOI: 10.1016/J.Diin.2015.01.011 |
0.302 |
|
2014 |
Xu Z, Wang C, Ren K, Wang L, Zhang B. Proof-carrying cloud computation: The case of convex optimization Ieee Transactions On Information Forensics and Security. 9: 1790-1803. DOI: 10.1109/Tifs.2014.2352457 |
0.33 |
|
2014 |
Liu WM, Wang L, Cheng P, Ren K, Zhu S, Debbabi M. PPTP: Privacy-preserving traffic padding in web-based applications Ieee Transactions On Dependable and Secure Computing. 11: 538-552. DOI: 10.1109/Tdsc.2014.2302308 |
0.37 |
|
2014 |
Wang L, Jajodia S, Singhal A, Cheng P, Noel S. K-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities Ieee Transactions On Dependable and Secure Computing. 11: 30-44. DOI: 10.1109/Tdsc.2013.24 |
0.367 |
|
2014 |
Alrabaee S, Saleem N, Preda S, Wang L, Debbabi M. OBA2: An onion approach to binary code authorship attribution Digital Investigation. 11. DOI: 10.1016/J.Diin.2014.03.012 |
0.306 |
|
2012 |
Zeng Y, Wang L, Deng X, Cao X, Khundker N. Secure collaboration in global design and supply chain environment: Problem analysis and literature review Computers in Industry. 63: 545-556. DOI: 10.1016/J.Compind.2012.05.001 |
0.313 |
|
2010 |
Zhu B, Setia S, Jajodia S, Wang L. Providing Witness Anonymity Under Peer-to-Peer Settings Ieee Transactions On Information Forensics and Security. 5: 324-336. DOI: 10.1109/Tifs.2010.2041821 |
0.315 |
|
2010 |
Zhu B, Ren K, Wang L, Debbabi M. PCM: A privacy-preserving detection mechanism in mobile ad hoc networks Security and Communication Networks. 3: 167-184. DOI: 10.1002/Sec.122 |
0.331 |
|
2009 |
Talhi C, Mouheb D, Lima V, Debbabi M, Wang L, Pourzandi M. Usability of security specification approaches for UML design: A survey Journal of Object Technology. 8: 1-20. DOI: 10.5381/Jot.2009.8.6.A1 |
0.316 |
|
2009 |
Yao C, Wang L, Wang XS, Bettini C, Jajodia S. Evaluating privacy threats in released database views by symmetric indistinguishability Journal of Computer Security. 17: 5-42. DOI: 10.3233/Jcs-2009-0317 |
0.318 |
|
2009 |
Lima V, Talhi C, Mouheb D, Debbabi M, Wang L, Pourzandi M. Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages Electronic Notes in Theoretical Computer Science. 254: 143-160. DOI: 10.1016/J.Entcs.2009.09.064 |
0.345 |
|
2008 |
Wang L, Yao C, Singhal A, Jajodia S. Implementing interactive analysis of attack graphs using relational databases Journal of Computer Security. 16: 419-437. DOI: 10.3233/Jcs-2008-0327 |
0.343 |
|
2007 |
Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401 |
0.524 |
|
2006 |
Wang L, Noel S, Jajodia S. Minimum-cost network hardening using attack graphs Computer Communications. 29: 3812-3824. DOI: 10.1016/J.Comcom.2006.06.018 |
0.327 |
|
2006 |
Wang L, Liu A, Jajodia S. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts Computer Communications. 29: 2917-2933. DOI: 10.1016/J.Comcom.2006.04.001 |
0.302 |
|
2004 |
Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in data cubes Journal of Computer Security. 12: 655-692. DOI: 10.3233/Jcs-2004-12501 |
0.538 |
|
Show low-probability matches. |