Makan Pourzandi
Orcid: 0000-0001-9775-6231
According to our database1,
Makan Pourzandi
authored at least 105 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
IEEE Internet Things Mag., November, 2024
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery.
IEEE Trans. Netw. Serv. Manag., October, 2024
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters.
IEEE Trans. Inf. Forensics Secur., 2024
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Inter-Slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks.
Proceedings of the IFIP Networking Conference, 2024
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
IEEE Commun. Mag., January, 2023
IEEE Commun. Surv. Tutorials, 2023
Proceedings of the IFIP Networking Conference, 2023
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack.
Proceedings of the Secure IT Systems, 2022
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
Proceedings of the 2022 IEEE Future Networks World Forum, 2022
2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021
Comput. Networks, 2021
AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns.
IEEE Trans. Serv. Comput., 2019
ACM Trans. Priv. Secur., 2019
Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Comput. Electr. Eng., 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Demonstration of a framework for enabling security services collaboration across multiple domains.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018
Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Trans. Large Scale Data Knowl. Centered Syst., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Innov. Syst. Softw. Eng., 2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
J. Netw. Comput. Appl., 2015
Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
Springer, ISBN: 978-3-319-16106-8, 2015
2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Secur. Commun. Networks, 2013
Proceedings of the Health Information Science - Second International Conference, 2013
2012
A quantitative analysis of current security concerns and solutions for cloud computing.
J. Cloud Comput., 2012
Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
2011
A Taxonomy Model for Cloud Computing Services.
Proceedings of the CLOSER 2011, 2011
2010
Proceedings of the Software Engineering Research, 2010
Proceedings of the Software Engineering Research, 2010
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
2009
J. Object Technol., 2009
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Advances in Ad Hoc Networking, 2008
Proceedings of the LCN 2008, 2008
2006
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006
Proceedings of the Service Availability, 2006
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006
2005
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005
2004
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004
2003
Distributed Access Control for Carrier Class Clusters.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003
2002
Proceedings of the 2002 IEEE International Conference on Cluster Computing (CLUSTER 2002), 2002
1996
Proceedings of the Euro-Par '96 Parallel Processing, 1996