default search action
Makan Pourzandi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j28]Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi:
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection. Comput. Secur. 148: 104114 (2025) - 2024
- [j27]Boubakr Nour, Sonika Ujjwal, Leyli Karaçay, Zakaria Laaroussi, Utku Gülen, Emrah Tomur, Makan Pourzandi:
Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense. IEEE Internet Things Mag. 7(6): 28-34 (2024) - [j26]Momen Oqaily, Mohammad Ekramul Kabir, Suryadipta Majumdar, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 2799-2817 (2024) - [j25]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV). IEEE Trans. Dependable Secur. Comput. 21(4): 2964-2981 (2024) - [j24]Sima Bagheri, Hugo Kermabon-Bobinnec, Mohammad Ekramul Kabir, Suryadipta Majumdar, Lingyu Wang, Yosr Jarraya, Boubakr Nour, Makan Pourzandi:
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters. IEEE Trans. Inf. Forensics Secur. 19: 8204-8219 (2024) - [j23]Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, Mourad Debbabi:
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery. IEEE Trans. Netw. Serv. Manag. 21(5): 5178-5196 (2024) - [c72]Mahmood Gholipourchoubeh, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi:
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters. CODASPY 2024: 79-90 - [c71]Hugo Kermabon-Bobinnec, Yosr Jarraya, Lingyu Wang, Suryadipta Majumdar, Makan Pourzandi:
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences. NDSS 2024 - [c70]Ricardo Misael Ayala Molina, Nathalie Wehbe, Hyarne Assem Alameddine, Makan Pourzandi, Chadi Assi:
Inter-Slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks. IFIP Networking 2024: 432-440 - [c69]Momen Oqaily, Hinddeep Purohit, Yosr Jarraya, Lingyu Wang, Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers. USENIX Security Symposium 2024 - 2023
- [j22]Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Elias Bou-Harb, Chadi Assi:
A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture. IEEE Commun. Mag. 61(1): 48-54 (2023) - [j21]Boubakr Nour, Makan Pourzandi, Mourad Debbabi:
A Survey on Threat Hunting in Enterprise Networks. IEEE Commun. Surv. Tutorials 25(4): 2299-2324 (2023) - [c68]Momen Oqaily, Suryadipta Majumdar, Lingyu Wang, Mohammad Ekramul Kabir, Yosr Jarraya, A. S. M. Asadujjaman, Makan Pourzandi, Mourad Debbabi:
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds. CODASPY 2023: 79-90 - [c67]Md. Nazmul Hoq, Jia Wei Yao, Suryadipta Majumdar, Luis Suárez, Lingyu Wang, Amine Boukhtouta, Makan Pourzandi, Mourad Debbabi:
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring. ESORICS (2) 2023: 123-144 - [c66]Boubakr Nour, Makan Pourzandi, Rushaan Kamran Qureshi, Mourad Debbabi:
Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting. FPS (2) 2023: 52-69 - [c65]Sima Bagheri, Hugo Kermabon-Bobinnec, Suryadipta Majumdar, Yosr Jarraya, Lingyu Wang, Makan Pourzandi:
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters. ICC 2023: 777-782 - [c64]Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi:
5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture. IFIP Networking 2023: 1-9 - 2022
- [j20]Suryadipta Majumdar, Gagandeep Singh Chawla, Amir Alimohammadifar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ProSAS: Proactive Security Auditing System for Clouds. IEEE Trans. Dependable Secur. Comput. 19(4): 2517-2534 (2022) - [c63]Amine Boukhtouta, Taous Madi, Makan Pourzandi, Hyame Assem Alameddine:
Cloud Native Applications Profiling using a Graph Neural Networks Approach. FNWF 2022: 220-227 - [c62]A. S. M. Asadujjaman, Mohammad Ekramul Kabir, Hinddeep Purohit, Suryadipta Majumdar, Lingyu Wang, Yosr Jarraya, Makan Pourzandi:
5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions. CloudCom 2022: 162-169 - [c61]Ming Lei, Lianying Zhao, Makan Pourzandi, Fereydoun Farrahi Moghaddam:
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments. CloudCom 2022: 178-185 - [c60]Hugo Kermabon-Bobinnec, Mahmood Gholipourchoubeh, Sima Bagheri, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
ProSPEC: Proactive Security Policy Enforcement for Containers. CODASPY 2022: 155-166 - [c59]Alaa Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar:
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV). ESORICS (3) 2022: 466-489 - [c58]Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Mengyuan Zhang, Lingyu Wang:
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV). NDSS 2022 - [c57]Azadeh Tabiban, Heyang Zhao, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. NordSec 2022: 346-367 - [i6]Meisam Mohammady, Han Wang, Lingyu Wang, Mengyuan Zhang, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Mourad Debbabi, Yuan Hong:
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning. CoRR abs/2206.13046 (2022) - 2021
- [j19]Taous Madi, Hyame Assem Alameddine, Makan Pourzandi, Amine Boukhtouta:
NFV security survey in 5G networks: A three-dimensional threat taxonomy. Comput. Networks 197: 108288 (2021) - [j18]Gagandeep Singh Chawla, Mengyuan Zhang, Suryadipta Majumdar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV. IEEE Trans. Dependable Secur. Comput. 18(4): 1553-1567 (2021) - [j17]Momen Oqaily, Yosr Jarraya, Meisam Mohammady, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing. IEEE Trans. Dependable Secur. Comput. 18(5): 2486-2505 (2021) - [j16]Meisam Mohammady, Momen Oqaily, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization. ACM Trans. Priv. Secur. 24(3): 14:1-14:36 (2021) - [c56]Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet:
DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment. ACSAC 2021: 837-848 - [c55]A. S. M. Asadujjaman, Momen Oqaily, Yosr Jarraya, Suryadipta Majumdar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains. CNS 2021: 245-253 - [c54]Taous Madi, Hyame Assem Alameddine, Makan Pourzandi, Amine Boukhtouta, Moataz Shoukry Samir, Chadi Assi:
AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks. ESORICS (1) 2021: 715-735 - [c53]Lianying Zhao, Muhammad Shafayat Oshman, Mengyuan Zhang, Fereydoun Farrahi Moghaddam, Shubham Chander, Makan Pourzandi:
Towards 5G-ready Security Metrics. ICC 2021: 1-6 - [e1]Sanjay Goel, Pavel Gladyshev, Daryl Johnson, Makan Pourzandi, Suryadipta Majumdar:
Digital Forensics and Cyber Crime - 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, October 15-16, 2020, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 351, Springer 2021, ISBN 978-3-030-68733-5 [contents] - 2020
- [c52]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CCS 2020: 677-696 - [c51]Alaa Oqaily, Sudershan Lakshmanan Thirunavukkarasu, Yosr Jarraya, Suryadipta Majumdar, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack. CloudCom 2020: 33-40 - [c50]Mohammad Mahdi Ghorbani, Fereydoun Farrahi Moghaddam, Mengyuan Zhang, Makan Pourzandi, Kim Khoa Nguyen, Mohamed Cheriet:
Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph. CloudCom 2020: 41-48 - [c49]Azadeh Tabiban, Yosr Jarraya, Mengyuan Zhang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack. CNS 2020: 1-9 - [i5]Meisam Mohammady, Shangyu Xie, Yuan Hong, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions. CoRR abs/2009.09451 (2020)
2010 – 2019
- 2019
- [b2]Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - [j15]Suryadipta Majumdar, Azadeh Tabiban, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Learning probabilistic dependencies among events for proactive security auditing in clouds. J. Comput. Secur. 27(2): 165-202 (2019) - [j14]Taous Madi, Yosr Jarraya, Amir Alimohammadifar, Suryadipta Majumdar, Yushun Wang, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. ACM Trans. Priv. Secur. 22(1): 1:1-1:35 (2019) - [j13]Alireza Shameli-Sendi, Yosr Jarraya, Makan Pourzandi, Mohamed Cheriet:
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns. IEEE Trans. Serv. Comput. 12(4): 534-549 (2019) - [c48]Sudershan Lakshmanan Thirunavukkarasu, Mengyuan Zhang, Alaa Oqaily, Gagandeep Singh Chawla, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities. CloudCom 2019: 167-174 - [c47]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Multi-Level Proactive Security Auditing for Clouds. DSC 2019: 1-8 - [c46]Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. ESORICS (2) 2019: 239-262 - [c45]Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. ESORICS (1) 2019: 658-680 - 2018
- [j12]Daniel Migault, Marcos A. Simplício Jr., Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho:
A framework for enabling security services collaboration across multiple domains. Comput. Electr. Eng. 69: 224-239 (2018) - [j11]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
User-Level Runtime Security Auditing for the Cloud. IEEE Trans. Inf. Forensics Secur. 13(5): 1185-1199 (2018) - [c44]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CCS 2018: 459-474 - [c43]Taous Madi, Mengyuan Zhang, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud. CloudCom 2018: 163-170 - [c42]Amine Boukhtouta, Makan Pourzandi, Richard Brunner, Stéphane Dault:
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology. DBSec 2018: 312-329 - [c41]Amir Alimohammadifar, Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks. ESORICS (2) 2018: 463-484 - [c40]Suryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing: Major Approaches and Existing Challenges. FPS 2018: 61-77 - [c39]Elaheh Jalalpour, Milad Ghaznavi, Daniel Migault, Stere Preda, Makan Pourzandi, Raouf Boutaba:
A Security Orchestration System for CDN Edge Servers. NetSoft 2018: 46-54 - [c38]Elaheh Jalalpour, Milad Ghaznavi, Daniel Migault, Stere Preda, Makan Pourzandi, Raouf Boutaba:
Dynamic Security Orchestration for CDN Edge-Servers. NetSoft 2018: 329-331 - [c37]Thiago R. M. Almeida, Bruno M. Barros, Ewerton R. Andrade, Marcos A. Simplício Jr., Daniel Migault, Makan Pourzandi:
Demonstration of a framework for enabling security services collaboration across multiple domains. NetSoft 2018: 341-343 - [i4]Meisam Mohammady, Lingyu Wang, Yuan Hong, Habib Louafi, Makan Pourzandi, Mourad Debbabi:
Preserving Both Privacy and Utility in Network Trace Anonymization. CoRR abs/1810.10464 (2018) - 2017
- [j10]Feras Aljumah, Makan Pourzandi, Mourad Debbabi:
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud. Trans. Large Scale Data Knowl. Centered Syst. 35: 50-73 (2017) - [c36]Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. ESORICS (2) 2017: 265-285 - [c35]Daniel Migault, Marcos A. Simplício Jr., Bruno M. Barros, Makan Pourzandi, Thiago R. M. Almeida, Ewerton R. Andrade, Tereza Cristina M. B. Carvalho:
A Framework for Enabling Security Services Collaboration Across Multiple Domains. ICDCS 2017: 999-1010 - [c34]Yushun Wang, Taous Madi, Suryadipta Majumdar, Yosr Jarraya, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. NDSS 2017 - [i3]Sunil Kumar Sathyanarayan, Makan Pourzandi, Katayoun Aliyari:
Return Oriented Programming - Exploit Implementation using functions. CoRR abs/1706.08562 (2017) - 2016
- [j9]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-oriented modeling framework for security hardening. Innov. Syst. Softw. Eng. 12(1): 41-67 (2016) - [c33]Taous Madi, Suryadipta Majumdar, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang:
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. CODASPY 2016: 195-206 - [c32]Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. ESORICS (1) 2016: 47-66 - 2015
- [b1]Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima:
Aspect-Oriented Security Hardening of UML Design Models. Springer 2015, ISBN 978-3-319-16105-1, pp. 1-219 - [j8]Yosr Jarraya, Arash Eghtesadi, Sahba Sadri, Mourad Debbabi, Makan Pourzandi:
Verification of firewall reconfiguration for virtual machines migrations in the cloud. Comput. Networks 93: 480-491 (2015) - [j7]Alireza Shameli-Sendi, Makan Pourzandi, Mohamed Fekih Ahmed, Mohamed Cheriet:
Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing. J. Netw. Comput. Appl. 58: 165-179 (2015) - [c31]Yosr Jarraya, Alireza Shameli-Sendi, Makan Pourzandi, Mohamed Cheriet:
Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud. CLOUD 2015: 572-579 - [c30]Suryadipta Majumdar, Taous Madi, Yushun Wang, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. CloudCom 2015: 58-65 - [c29]Alireza Shameli-Sendi, Yosr Jarraya, Mohamed Fekih Ahmed, Makan Pourzandi, Chamseddine Talhi, Mohamed Cheriet:
Optimal placement of sequentially ordered virtual security appliances in the cloud. IM 2015: 818-821 - 2014
- [c28]Arash Eghtesadi, Yosr Jarraya, Mourad Debbabi, Makan Pourzandi:
Preservation of Security Configurations in the Cloud. IC2E 2014: 17-26 - [c27]Mohamed Fekih Ahmed, Chamseddine Talhi, Makan Pourzandi, Mohamed Cheriet:
A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy. IC2E 2014: 568-573 - 2013
- [j6]Elias Bou-Harb, Claude Fachkha, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1): 42-49 (2013) - [j5]Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi, Chadi Assi:
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks. Secur. Commun. Networks 6(12): 1478-1489 (2013) - [c26]Feras Aljumah, Raymond Hei Man Leung, Makan Pourzandi, Mourad Debbabi:
Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud. HIS 2013: 30-41 - 2012
- [j4]Nelson M. Gonzalez, Charles Miers, Fernando F. Redígolo, Marcos A. Simplício Jr., Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi:
A quantitative analysis of current security concerns and solutions for cloud computing. J. Cloud Comput. 1: 11 (2012) - [c25]Swagata Das, Makan Pourzandi, Mourad Debbabi:
On SPIM detection in LTE networks. CCECE 2012: 1-4 - [c24]Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi, Ying Zhang, Makan Pourzandi:
Cloud calculus: Security verification in elastic cloud computing platform. CTS 2012: 447-454 - [c23]Ying Zhang, Makan Pourzandi:
Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending. ICDCS 2012: 667-677 - [c22]Yosr Jarraya, Arash Eghtesadi, Mourad Debbabi, Ying Zhang, Makan Pourzandi:
Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud. SSS 2012: 111-125 - 2011
- [c21]Nelson M. Gonzalez, Charles Miers, Fernando F. Redígolo, Marcos A. Simplício Jr., Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi:
A Taxonomy Model for Cloud Computing Services. CLOSER 2011: 56-65 - [c20]Nelson M. Gonzalez, Charles Miers, Fernando F. Redígolo, Tereza Cristina M. B. Carvalho, Marcos A. Simplício Jr., Mats Näslund, Makan Pourzandi:
A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. CloudCom 2011: 231-238 - 2010
- [c19]Mariam Nouh, Raha Ziarati, Djedjiga Mouheb, Dima Alhadidi, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect weaver: a model transformation approach for UML models. CASCON 2010: 139-153 - [c18]Djedjiga Mouheb, Dima Alhadidi, Mariam Nouh, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework. FACS 2010: 182-199 - [c17]Samir Ouchani, Otmane Aït Mohamed, Mourad Debbabi, Makan Pourzandi:
Verification of the Correctness in Composed UML Behavioural Diagrams. SERA (selected papers) 2010: 163-177 - [c16]Djedjiga Mouheb, Chamseddine Talhi, Mariam Nouh, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. SERA (selected papers) 2010: 197-213
2000 – 2009
- 2009
- [j3]Chamseddine Talhi, Djedjiga Mouheb, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Usability of Security Specification Approaches for UML Design: A Survey. J. Object Technol. 8(6): 102-122 (2009) - [c15]Marcos A. Simplício Jr., Vlad Coroama, Yeda Regina Venturini, Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi:
PHD. AINA 2009: 487-494 - [c14]Djedjiga Mouheb, Chamseddine Talhi, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Weaving security aspects into UML 2.0 design models. AOM@AOSD 2009: 7-12 - [c13]Djedjiga Mouheb, Chamseddine Talhi, Azzam Mourad, Vitor Lima, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. SoMeT 2009: 203-222 - [c12]Vitor Lima, Chamseddine Talhi, Djedjiga Mouheb, Mourad Debbabi, Lingyu Wang, Makan Pourzandi:
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. SSV 2009: 143-160 - 2008
- [c11]Segla Kpodjedo, Samuel Pierre, Makan Pourzandi:
Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA). LCN 2008: 518-519 - [c10]Yeda Regina Venturini, Vlad Coroama, Tereza Cristina M. B. Carvalho, Mats Näslund, Makan Pourzandi:
Security for Context-Aware ad-hoc Networking Applications. Med-Hoc-Net 2008: 145-156 - 2006
- [c9]Arpan Darivemula, Chokchai Leangsuksun, Anand Tikotekar, Makan Pourzandi:
Work in Progress: RASS Framework for a Cluster-Aware SELinux. CCGRID 2006: 29 - [c8]Peter Badovinatz, Santosh Balakrishnan, Makan Pourzandi, Manfred Reitenspieß, Chad Tindel:
The Service Availability Forum Security Service (SEC): Status and Future Directions. ISAS 2006: 271-287 - [c7]Reinaldo Matushima, Yeda Regina Venturini, Rony R. M. Sakuragui, Tereza Cristina M. B. Carvalho, Wilson Vicente Ruggiero, Mats Näslund, Makan Pourzandi:
Multiple personal security domains. IWCMC 2006: 361-366 - 2005
- [j2]Axelle Apvrille, Makan Pourzandi:
Secure Software Development by Example. IEEE Secur. Priv. 3(4): 10-17 (2005) - [c6]Chokchai Leangsuksun, Anand Tikotekar, Makan Pourzandi, Ibrahim Haddad:
Feasibility study and early experimental results towards cluster survivability. CCGRID 2005: 77-81 - [c5]Makan Pourzandi, David Gordon, William Yurcik, Gregory A. Koenig:
Clusters and security: distributed security for distributed systems. CCGRID 2005: 96-104 - [i2]Michel R. Dagenais, Karim Yaghmour, Charles Levert, Makan Pourzandi:
Software Performance Analysis. CoRR abs/cs/0507073 (2005) - 2004
- [j1]Axelle Apvrille, Makan Pourzandi:
XML distributed security policy for clusters. Comput. Secur. 23(8): 649-658 (2004) - [c4]Axelle Apvrille, David Gordon, Serge E. Hallyn, Makan Pourzandi, Vincent Roy:
DigSig: Runtime Authentication of Binaries at Kernel Level. LISA 2004: 59-66 - [i1]Marc Chatel, Michel R. Dagenais, Charles Levert, Makan Pourzandi:
Security in Carrier Class Server Applications for All-IP Networks. CoRR abs/cs/0412039 (2004) - 2003
- [c3]Makan Pourzandi, Axelle Apvrille, E. Gingras, A. Medenou, David Gordon:
Distributed Access Control for Carrier Class Clusters. PDPTA 2003: 132-137 - 2002
- [c2]Makan Pourzandi, Ibrahim Haddad, Charles Levert, Miroslaw Zakrzewski, Michel R. Dagenais:
A New Architecture for Secure Carrier-Class Clusters. CLUSTER 2002: 494-498
1990 – 1999
- 1996
- [c1]V. Demian, Frederic Desprez, Hélène Paugam-Moisy, Makan Pourzandi:
Parallel Implementation of RBF Neural Networks. Euro-Par, Vol. II 1996: 243-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint