Yosr Jarraya
Concordia University
H-index: 17
North America-Canada
Top articles of Yosr Jarraya
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Warping the Defence Timeline: Non-disruptive Proactive Attack Mitigation for Kubernetes Clusters | Sima Bagheri Hugo Kermabon-Bobinnec Suryadipta Majumdar Yosr Jarraya Lingyu Wang | 2023/5/28 | |
iCAT+: An Interactive Customizable Anonymization Tool using Automated Translation through Deep Learning | IEEE Transactions on Dependable and Secure Computing | Momen Oqaily Mohammad Ekramul Kabir Suryadipta Majumdar Yosr Jarraya Mengyuan Zhang | 2023/9/1 |
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds | Momen Oqaily Suryadipta Majumdar Lingyu Wang Mohammad Ekramul Kabir Yosr Jarraya | 2023/4/24 | |
Dpod: differentially private outsourcing of anomaly detection | 2023/8/31 | ||
Multi-tenancy trusted data anonymization | 2023/1/26 | ||
Multi-tenant anonymization with forensics capabilities (maf) | 2023/7/27 | ||
An Event-Driven Forensic Auditing Framework for Clouds | Habib Louafi Yue Xin Masoud Bozorgi Ronald Ellis Yosr Jarraya | 2023 | |
System for translation-based real-time inconsistency detection in network functions virtualization (nfv) | 2023/7/27 | ||
Cloud S&P 2023 | Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings | Suryadipta Majumdar Cong Wang Irfan Ahmed Chadi Assi Elias Bou-Harb | 2023/10/3 |
Apparatus and method for evaluating multiple aspects of the security for virtualized infrastructure in a cloud environment | 2023/6/13 | ||
Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV) | IEEE Transactions on Dependable and Secure Computing | Sudershan Lakshmanan Mengyuan Zhang Suryadipta Majumdar Yosr Jarraya Makan Pourzandi | 2023/9/29 |
Firewall rule set composition and decomposition | 2022/5/12 | ||
Network link verification | 2022/11/22 | ||
Privacy-preserving data verification | 2022/4/26 | ||
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) | Alaa Oqaily Yosr Jarraya Lingyu Wang Makan Pourzandi Suryadipta Majumdar | 2022/9/24 | |
Partition-based prefix preserving anonymization approach for network traces containing IP addresses | 2022/4/26 | ||
Data anonymization views | 2022/7/7 | ||
Prospec: Proactive security policy enforcement for containers | Hugo Kermabon-Bobinnec Mahmood Gholipourchoubeh Sima Bagheri Suryadipta Majumdar Yosr Jarraya | 2022/4/14 | |
Utility optimized differential privacy system | 2022/7/7 | ||
5gfiver: Functional integrity verification for 5G cloud-native network functions | ASM Asadujjaman Mohammad Ekramul Kabir Hinddeep Purohit Suryadipta Majumdar Lingyu Wang | 2022/12/13 |