Seguir
Lingyu Wang
Título
Citado por
Citado por
Ano
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal, S Jajodia
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
5582008
A logic-based framework for attribute based access control
L Wang, D Wijesekera, S Jajodia
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
3862004
Measuring network security using dynamic bayesian network
M Frigault, L Wang, A Singhal, S Jajodia
Proceedings of the 4th ACM workshop on Quality of protection, 23-30, 2008
3692008
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
3492006
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
3382010
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer communications 29 (15), 2917-2933, 2006
3032006
Measuring network security using bayesian network-based attack graphs
M Frigault, L Wang
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
2612008
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
B Cui, Z Liu, L Wang
IEEE Transactions on computers 65 (8), 2374-2385, 2016
2532016
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2014
2172014
Toward measuring network security using attack graphs
L Wang, A Singhal, S Jajodia
Proceedings of the 2007 ACM workshop on Quality of protection, 49-54, 2007
2142007
Measuring the overall security of network configurations using attack graphs
L Wang, A Singhal, S Jajodia
Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working …, 2007
2112007
Security risk analysis of enterprise networks using probabilistic attack graphs
L Wang, S Jajodia, A Singhal, A Singhal, X Ou
Network security metrics, 53-73, 2017
2092017
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1842010
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks
M Zhang, L Wang, S Jajodia, A Singhal, M Albanese
IEEE Transactions on Information Forensics and Security 11 (5), 1071-1086, 2016
1692016
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2011
1612011
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
1492010
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010
1292010
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
1262008
Securing OLAP data cubes against privacy breaches
L Wang, S Jajodia, D Wijesekera
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 161-175, 2004
1242004
OBA2: an Onion approach to binary code authorship attribution
S Alrabaee, N Saleem, S Preda, L Wang, M Debbabi
Digital Investigation 11, S94-S103, 2014
1052014
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20