Taous Madi

Orcid: 0000-0001-6181-9763

According to our database1, Taous Madi authored at least 16 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
ProSAS: Proactive Security Auditing System for Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Intrusion Prevention Scheme Against Rank Attacks for Software-Defined Low Power IoT Networks.
IEEE Access, 2022

Cloud Native Applications Profiling using a Graph Neural Networks Approach.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
NFV security survey in 5G networks: A three-dimensional threat taxonomy.
Comput. Networks, 2021

AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

2018
User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

2017
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
A Survey and a Layered Taxonomy of Software-Defined Networking.
IEEE Commun. Surv. Tutorials, 2014


  Loading...