Yosr Jarraya
Cited by
Cited by
A survey and a layered taxonomy of software-defined networking
Y Jarraya, T Madi, M Debbabi
IEEE communications surveys & tutorials 16 (4), 1955-1980, 2014
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
M Debbabi, F Hassaïne, Y Jarraya, A Soeanu, L Alawneh
Springer, 2010
Efficient provisioning of security service function chaining using network security defense patterns
A Shameli-Sendi, Y Jarraya, M Pourzandi, M Cheriet
IEEE Transactions on Services Computing 12 (4), 534-549, 2016
Automatic verification and performance analysis of time-constrained sysml activity diagrams
Y Jarraya, A Soeanu, M Debbabi, F Hassaine
14th Annual IEEE International Conference and Workshops on the Engineering …, 2007
Auditing security compliance of the virtualized infrastructure in the cloud: Application to OpenStack
T Madi, S Majumdar, Y Wang, Y Jarraya, M Pourzandi, L Wang
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Cloud calculus: Security verification in elastic cloud computing platform
Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang, M Pourzandi
2012 international conference on collaboration technologies and systems (CTS …, 2012
A unified approach for verification and validation of systems and software engineering models
L Alawneh, M Debbabi, F Hassaine, Y Jarraya, A Soeanu
13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006
Security compliance auditing of identity and access management in the cloud: Application to OpenStack
S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ...
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
On the meaning of SysML activity diagrams
Y Jarraya, M Debbabi, J Bentahar
2009 16th Annual IEEE international Conference and Workshop on the …, 2009
Proactive verification of security compliance for clouds through pre-computation: Application to OpenStack
S Majumdar, Y Jarraya, T Madi, A Alimohammadifar, M Pourzandi, ...
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
Leaps: Learning-based proactive security auditing for clouds
S Majumdar, Y Jarraya, M Oqaily, A Alimohammadifar, M Pourzandi, ...
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Stealthy probing-based verification (SPV): An active approach to defending software defined networks against topology poisoning attacks
A Alimohammadifar, S Majumdar, T Madi, Y Jarraya, M Pourzandi, ...
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
User-level runtime security auditing for the cloud
S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ...
IEEE Transactions on Information Forensics and Security 13 (5), 1185-1199, 2017
Tenantguard: Scalable runtime verification of cloud-wide vm-level network isolation
Y Wang
Concordia University, 2017
ISOTOP: auditing virtual networks isolation across cloud layers in OpenStack
T Madi, Y Jarraya, A Alimohammadifar, S Majumdar, Y Wang, ...
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-35, 2018
Model-based systems security quantification
S Ouchani, Y Jarraya, OA Mohamed
2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011
Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud
Shameli-Sendi A., J Y., Fekih-Ahmed M., P M., T C., C M.
The 14th IFIP/IEEE Symposium on Integrated Network and Service Management …, 2015
Verification of Firewall Reconfiguration for Virtual Machines Migrations in the Cloud
Y Jarraya, A Eghtesadi, S Sadri, M Debbabi, M Pourzandi
Computer Networks, 2015
Learning probabilistic dependencies among events for proactive security auditing in clouds
S Majumdar, A Tabiban, Y Jarraya, M Oqaily, A Alimohammadifar, ...
Journal of Computer Security 27 (2), 165-202, 2019
Multistage ocdo: Scalable security provisioning optimization in sdn-based cloud
Y Jarraya, A Shameli-Sendi, M Pourzandi, M Cheriet
2015 IEEE 8th International Conference on Cloud Computing, 572-579, 2015
The system can't perform the operation now. Try again later.
Articles 1–20