Moussa Ouedraogo

According to our database1, Moussa Ouedraogo authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec., February, 2024

2018
Assurance of Security and Privacy Requirements for Cloud Deployment Models.
IEEE Trans. Cloud Comput., 2018

2017
MAESTRO: Constructing a Reference Framework for Self Monitoring Devices Dedicated to Seniors.
Proceedings of the 19th IEEE International Symposium on Multimedia, 2017

2016
A Framework for Security Transparency in Cloud Computing.
Future Internet, 2016

Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Adopting trust and assurance as indicators for the reassignment of responsibilities in multi-agent systems.
Knowl. Eng. Rev., 2015

Security transparency: the next frontier for security research in the cloud.
J. Cloud Comput., 2015

Adopting an Agent and Event Driven Approach for Enabling Mutual Auditability and Security Transparency in Cloud based Services.
Proceedings of the CLOSER 2015, 2015

Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based Systems.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

2014
A Distributed IDS for Industrial Control Systems.
Int. J. Cyber Warf. Terror., 2014

Keeping an Eye on Your Security Through Assurance Indicators.
Proceedings of the SECRYPT 2014, 2014

Inserting "Brains" into Software Agents - Preliminary Considerations.
Proceedings of the Internet and Distributed Computing Systems, 2014

Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems.
Proceedings of the 1st International Conference on Information and Communication Technologies for Disaster Management, 2014

2013
Taxonomy of quality metrics for assessing assurance of security correctness.
Softw. Qual. J., 2013

Selecting a Cloud Service Provider in the age of cybercrime.
Comput. Secur., 2013

Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Appraisal and reporting of security assurance at operational systems level.
J. Syst. Softw., 2012

Towards Security Assurance Metrics for Service Systems Security.
Proceedings of the Exploring Services Science - Third International Conference, 2012

2011
Valuation and reporting of security assurance at operational systems level.
PhD thesis, 2011

Security Assurance Evaluation and IT Systems' Context of Use Security Criticality.
Int. J. Handheld Comput. Res., 2011

A new approach to evaluating security assurance.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
An Agent-Based System to Support Assurance of Security Requirements.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Information Systems Security Criticality and Assurance Evaluation.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Towards Security Effectiveness Measurement utilizing Risk-Based Security Assurance.
Proceedings of the Information Security South Africa Conference 2010, 2010

Towards an abstraction layer for security assurance measurements: (invited paper).
Proceedings of the Software Architecture, 4th European Conference, 2010

2009
A Risk Based Approach for Security Assurance Evaluation of IT Systems.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
Deployment of a Security Assurance Monitoring Framework for Telecommunication Service Infrastructures on a VoIP Service.
Proceedings of the NTMS 2008, 2008


  Loading...