Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks M Zhang, L Wang, S Jajodia, A Singhal, M Albanese IEEE Transactions on Information Forensics and Security 11 (5), 1071-1086, 2016 | 94 | 2016 |
Modeling network diversity for evaluating the robustness of networks against zero-day attacks L Wang, M Zhang, S Jajodia, A Singhal, M Albanese European Symposium on Research in Computer Security, 494-511, 2014 | 48 | 2014 |
Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security M Zhang, XC de Carnavalet, L Wang, A Ragab IEEE Transactions on Information Forensics and Security 14 (9), 2315-2330, 2019 | 7 | 2019 |
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks M Zhang, L Wang, S Jajodia, A Singhal IEEE Transactions on Dependable and Secure Computing, 2018 | 4 | 2018 |
Modeling NFV Deployment to Identify the Cross-level Inconsistency Vulnerabilities SL Thirunavukkarasu, M Zhang, A Oqaily, GS Chawla, L Wang, ... 2019 IEEE International Conference on Cloud Computing Technology and Science …, 2019 | 2 | 2019 |
Quantic: Distance metrics for evaluating multi-tenancy threats in public cloud T Madi, M Zhang, Y Jarraya, A Alimohammadifar, M Pourzandi, L Wang, ... 2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018 | 2 | 2018 |
Network security metrics: from known vulnerabilities to zero day attacks L Wang, M Zhang, A Singhal From Database to Cyber Security, 450-469, 2018 | 2 | 2018 |
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks O Duman, M Zhang, L Wang, M Debbabi 2017 IEEE International Conference on Smart Grid Communications …, 2017 | 2 | 2017 |
iCAT: An Interactive Customizable Anonymization Tool M Oqaily, Y Jarraya, M Zhang, L Wang, M Pourzandi, M Debbabi European Symposium on Research in Computer Security, 658-680, 2019 | 1 | 2019 |
VMGuard: State-based Proactive Verification of Virtual Network Isolation with Application to NFV GS Chawla, M Zhang, S Majumdar, Y Jarraya, M Pourzandi, L Wang, ... IEEE Transactions on Dependable and Secure Computing, 2020 | | 2020 |
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions M Mohammady, S Xie, Y Hong, M Zhang, L Wang, M Pourzandi, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | | 2020 |
Factor of Security (FoS): Quantifying the Security Effectiveness of Redundant Smart Grid Subsystems O Duman, M Zhang, L Wang, M Debbabi, R Atallah, B Lebel IEEE Transactions on Dependable and Secure Computing, 2020 | | 2020 |
CASFinder: Detecting Common Attack Surface M Zhang, Y Xin, L Wang, S Jajodia, A Singhal IFIP Annual Conference on Data and Applications Security and Privacy, 338-358, 2019 | | 2019 |
Network Attack Surface: Lifting the Attack Surface Concept to Network Level for Evaluating the Resilience against Zero-Day Attacks M Zhang, L Wang, S Jajodia, A Singhal | | 2018 |
Network Security Metrics: Estimating the Resilience of Networks Against Zero Day Attacks M Zhang Concordia University, 2017 | | 2017 |
Evaluating the Network Diversity of Networks Against Zero-Day Attacks M Zhang, L Wang, S Jajodia, A Singhal Network Security Metrics, 117-140, 2017 | | 2017 |
QuantiC: Distance Metrics for Evaluating Multi-tenancy Threats in Software Defined Networking (SDN)-Based Cloud T Madi, M Zhang, Y Jarraya, A Alimohammadifar, M Pourzandi, L Wang, ... | | |
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack A Tabiban, Y Jarraya, M Zhang, M Pourzandi, L Wang, M Debbabi | | |