VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV | 1 | 0.34 | 2021 |
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack | 0 | 0.34 | 2020 |
Icat: An Interactive Customizable Anonymization Tool | 0 | 0.34 | 2019 |
Learning probabilistic dependencies among events for proactive security auditing in clouds. | 3 | 0.41 | 2019 |
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns | 3 | 0.38 | 2019 |
Cloud Security Auditing - Major Approaches and Existing Challenges. | 0 | 0.34 | 2018 |
User-Level Runtime Security Auditing for the Cloud. | 2 | 0.36 | 2018 |
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud | 0 | 0.34 | 2018 |
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack. | 1 | 0.36 | 2018 |
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation. | 1 | 0.35 | 2017 |
Leaps: Learning-Based Proactive Security Auditing For Clouds | 3 | 0.38 | 2017 |
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack. | 6 | 0.44 | 2016 |
Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud | 2 | 0.37 | 2015 |
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack. | 6 | 0.51 | 2015 |
Verification of firewall reconfiguration for virtual machines migrations in the cloud | 2 | 0.36 | 2015 |
Optimal Placement Of Sequentially Ordered Virtual Security Appliances In The Cloud | 3 | 0.39 | 2015 |
Quantitative and qualitative analysis of SysML activity diagrams | 1 | 0.35 | 2014 |
A Survey and a Layered Taxonomy of Software-Defined Networking | 77 | 2.47 | 2014 |
Towards A Distributed Plan Execution Monitoring Framework | 0 | 0.34 | 2013 |
Cloud calculus: Security verification in elastic cloud computing platform. | 12 | 0.68 | 2012 |
Formal Specification and Probabilistic Verification of SysML Activity Diagrams | 3 | 0.45 | 2012 |
Formal verification of security preservation for migrating virtual machines in the cloud | 3 | 0.40 | 2012 |
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols. | 2 | 0.45 | 2012 |
Model-based systems security quantification | 9 | 0.63 | 2011 |
On the Meaning of SysML Activity Diagrams | 11 | 0.74 | 2009 |
Synergistic Verification And Validation Of Systems And Software Engineering Models | 0 | 0.34 | 2009 |
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams | 14 | 0.73 | 2007 |
A Unified Approach for Verification and Validation of Systems and Software Engineering Models | 8 | 0.60 | 2006 |
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models | 0 | 0.34 | 2006 |