Makan Pourzandi

According to our database1, Makan Pourzandi authored at least 65 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns.
IEEE Trans. Serv. Comput., 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019

iCAT: An Interactive Customizable Anonymization Tool.
Proceedings of the Computer Security - ESORICS 2019, 2019

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Level Proactive Security Auditing for Clouds.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Information Forensics and Security, 2018

A framework for enabling security services collaboration across multiple domains.
Comput. Electr. Eng., 2018

Dynamic Security Orchestration for CDN Edge-Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

A Security Orchestration System for CDN Edge Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Demonstration of a framework for enabling security services collaboration across multiple domains.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Return Oriented Programming - Exploit Implementation using functions.
CoRR, 2017

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Aspect-oriented modeling framework for security hardening.
ISSE, 2016

Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing.
J. Netw. Comput. Appl., 2015

Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015

Optimal placement of sequentially ordered virtual security appliances in the cloud.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

2014
Preservation of Security Configurations in the Cloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Security and Communication Networks, 2013

Communication security for smart grid distribution networks.
IEEE Communications Magazine, 2013

Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud.
Proceedings of the Health Information Science - Second International Conference, 2013

2012
A quantitative analysis of current security concerns and solutions for cloud computing.
J. Cloud Computing, 2012

Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Cloud calculus: Security verification in elastic cloud computing platform.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

On SPIM detection in LTE networks.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
A Taxonomy Model for Cloud Computing Services.
Proceedings of the CLOSER 2011, 2011

2010
Verification of the Correctness in Composed UML Behavioural Diagrams.
Proceedings of the Software Engineering Research, 2010

Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.
Proceedings of the Software Engineering Research, 2010

Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010

Aspect weaver: a model transformation approach for UML models.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2009
Usability of Security Specification Approaches for UML Design: A Survey.
J. Object Technol., 2009

Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Electron. Notes Theor. Comput. Sci., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

PHD.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Security for Context-Aware ad-hoc Networking Applications.
Proceedings of the Advances in Ad Hoc Networking, 2008

Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA).
Proceedings of the LCN 2008, 2008

2006
Multiple personal security domains.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

The Service Availability Forum Security Service (SEC): Status and Future Directions.
Proceedings of the Service Availability, 2006

Work in Progress: RASS Framework for a Cluster-Aware SELinux.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Secure Software Development by Example.
IEEE Secur. Priv., 2005

Software Performance Analysis
CoRR, 2005

Clusters and security: distributed security for distributed systems.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Feasibility study and early experimental results towards cluster survivability.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Security in Carrier Class Server Applications for All-IP Networks
CoRR, 2004

XML distributed security policy for clusters.
Comput. Secur., 2004

DigSig: Runtime Authentication of Binaries at Kernel Level.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

2003
Distributed Access Control for Carrier Class Clusters.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

2002
A New Architecture for Secure Carrier-Class Clusters.
Proceedings of the 2002 IEEE International Conference on Cluster Computing (CLUSTER 2002), 2002

1996
Parallel Implementation of RBF Neural Networks.
Proceedings of the Euro-Par '96 Parallel Processing, 1996


  Loading...