Yosr Jarraya

Orcid: 0009-0000-6194-5321

According to our database1, Yosr Jarraya authored at least 49 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023

A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
ProSAS: Proactive Security Auditing System for Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack.
Proceedings of the Secure IT Systems, 2022

ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022

ProSPEC: Proactive Security Policy Enforcement for Containers.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021

VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021

Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns.
IEEE Trans. Serv. Comput., 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019

iCAT: An Interactive Customizable Anonymization Tool.
Proceedings of the Computer Security - ESORICS 2019, 2019

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Level Proactive Security Auditing for Clouds.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

2017
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015

Towards migrating security policies of virtual machines in Software Defined Networks.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015

Optimal placement of sequentially ordered virtual security appliances in the cloud.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Quantitative and qualitative analysis of SysML activity diagrams.
Int. J. Softw. Tools Technol. Transf., 2014

A Survey and a Layered Taxonomy of Software-Defined Networking.
IEEE Commun. Surv. Tutorials, 2014

Preservation of Security Configurations in the Cloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Towards a Distributed Plan Execution Monitoring Framework.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols.
J. Softw., 2012

Formal Specification and Probabilistic Verification of SysML Activity Diagrams.
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012

Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Cloud calculus: Security verification in elastic cloud computing platform.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

2011
Model-based systems security quantification.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

2010
Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models.
Springer, ISBN: 978-3-642-15227-6, 2010

2009
Synergistic verification and validation of systems and software engineering models.
Int. J. Gen. Syst., 2009

On the Meaning of SysML Activity Diagrams.
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009

2007
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

2006
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models.
Proceedings of the IASTED International Conference on Software Engineering, 2006

A Unified Approach for Verification and Validation of Systems and Software Engineering Models.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006


  Loading...