Name
Papers
Collaborators
YOSR JARRAYA
29
33
Citations 
PageRank 
Referers 
173
14.52
438
Referees 
References 
876
363
Search Limit
100876
Title
Citations
PageRank
Year
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV10.342021
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack00.342020
Icat: An Interactive Customizable Anonymization Tool00.342019
Learning probabilistic dependencies among events for proactive security auditing in clouds.30.412019
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns30.382019
Cloud Security Auditing - Major Approaches and Existing Challenges.00.342018
User-Level Runtime Security Auditing for the Cloud.20.362018
QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud00.342018
ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.10.362018
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.10.352017
Leaps: Learning-Based Proactive Security Auditing For Clouds30.382017
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.60.442016
Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud20.372015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.60.512015
Verification of firewall reconfiguration for virtual machines migrations in the cloud20.362015
Optimal Placement Of Sequentially Ordered Virtual Security Appliances In The Cloud30.392015
Quantitative and qualitative analysis of SysML activity diagrams10.352014
A Survey and a Layered Taxonomy of Software-Defined Networking772.472014
Towards A Distributed Plan Execution Monitoring Framework00.342013
Cloud calculus: Security verification in elastic cloud computing platform.120.682012
Formal Specification and Probabilistic Verification of SysML Activity Diagrams30.452012
Formal verification of security preservation for migrating virtual machines in the cloud30.402012
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols.20.452012
Model-based systems security quantification90.632011
On the Meaning of SysML Activity Diagrams110.742009
Synergistic Verification And Validation Of Systems And Software Engineering Models00.342009
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams140.732007
A Unified Approach for Verification and Validation of Systems and Software Engineering Models80.602006
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models00.342006