Makan Pourzandi

Orcid: 0000-0001-9775-6231

According to our database1, Makan Pourzandi authored at least 105 papers between 1996 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection.
Comput. Secur., 2025

2024
Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense.
IEEE Internet Things Mag., November, 2024

AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery.
IEEE Trans. Netw. Serv. Manag., October, 2024

ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters.
IEEE Trans. Inf. Forensics Secur., 2024

Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024

iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024

ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
Proceedings of the 33rd USENIX Security Symposium, 2024

Inter-Slice Defender: An Anomaly Detection Solution for Distributed Slice Mobility Attacks.
Proceedings of the IFIP Networking Conference, 2024

Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2023
A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture.
IEEE Commun. Mag., January, 2023

A Survey on Threat Hunting in Enterprise Networks.
IEEE Commun. Surv. Tutorials, 2023

5GShield: HTTP/2 Anomaly Detection in 5G Service-Based Architecture.
Proceedings of the IFIP Networking Conference, 2023

Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023

Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
ProSAS: Proactive Security Auditing System for Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack.
Proceedings of the Secure IT Systems, 2022

ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022

ProSPEC: Proactive Security Policy Enforcement for Containers.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

A Hybrid Decision-making Approach to Security Metrics Aggregation in Cloud Environments.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

Cloud Native Applications Profiling using a Graph Neural Networks Approach.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization.
ACM Trans. Priv. Secur., 2021

SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021

VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021

NFV security survey in 5G networks: A three-dimensional threat taxonomy.
Comput. Networks, 2021

Towards 5G-ready Security Metrics.
Proceedings of the ICC 2021, 2021

AutoGuard: A Dual Intelligence Proactive Anomaly Detection at Application-Layer in 5G Networks.
Proceedings of the Computer Security - ESORICS 2021, 2021

Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

DistAppGaurd: Distributed Application Behaviour Profiling in Cloud-Based Environment.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
R<sup>2</sup>DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
CoRR, 2020

Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

Malchain: Virtual Application Behaviour Profiling by Aggregated Microservice Data Exchange Graph.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

R2DP: A Universal and Automated Approach to Optimizing the Randomization Mechanisms of Differential Privacy for Utility Metrics with No Known Optimal Distributions.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns.
IEEE Trans. Serv. Comput., 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019

iCAT: An Interactive Customizable Anonymization Tool.
Proceedings of the Computer Security - ESORICS 2019, 2019

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Level Proactive Security Auditing for Clouds.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Modeling NFV Deployment to Identify the Cross-Level Inconsistency Vulnerabilities.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

A framework for enabling security services collaboration across multiple domains.
Comput. Electr. Eng., 2018

Dynamic Security Orchestration for CDN Edge-Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

A Security Orchestration System for CDN Edge Servers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Demonstration of a framework for enabling security services collaboration across multiple domains.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

Fingerprinting Crowd Events in Content Delivery Networks: A Semi-supervised Methodology.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

QuantiC: Distance Metrics for Evaluating Multi-Tenancy Threats in Public Cloud.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

Preserving Both Privacy and Utility in Network Trace Anonymization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privacy-Preserving Querying on Privately Encrypted Data in the Cloud.
Trans. Large Scale Data Knowl. Centered Syst., 2017

Return Oriented Programming - Exploit Implementation using functions.
CoRR, 2017

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Aspect-oriented modeling framework for security hardening.
Innov. Syst. Softw. Eng., 2016

Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing.
J. Netw. Comput. Appl., 2015

Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015

Optimal placement of sequentially ordered virtual security appliances in the cloud.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

2014
Preservation of Security Configurations in the Cloud.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks.
Secur. Commun. Networks, 2013

Communication security for smart grid distribution networks.
IEEE Commun. Mag., 2013

Emergency Mobile Access to Personal Health Records Stored on an Untrusted Cloud.
Proceedings of the Health Information Science - Second International Conference, 2013

2012
A quantitative analysis of current security concerns and solutions for cloud computing.
J. Cloud Comput., 2012

Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Studying Impacts of Prefix Interception Attack by Exploring BGP AS-PATH Prepending.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Cloud calculus: Security verification in elastic cloud computing platform.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

On SPIM detection in LTE networks.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
A Taxonomy Model for Cloud Computing Services.
Proceedings of the CLOSER 2011, 2011

2010
Verification of the Correctness in Composed UML Behavioural Diagrams.
Proceedings of the Software Engineering Research, 2010

Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.
Proceedings of the Software Engineering Research, 2010

Aspect Weaving in UML Activity Diagrams: A Semantic and Algorithmic Framework.
Proceedings of the Formal Aspects of Component Software - 7th International Workshop, 2010

Aspect weaver: a model transformation approach for UML models.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2009
Usability of Security Specification Approaches for UML Design: A Survey.
J. Object Technol., 2009

Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Weaving security aspects into UML 2.0 design models.
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009

Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Security for Context-Aware ad-hoc Networking Applications.
Proceedings of the Advances in Ad Hoc Networking, 2008

Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA).
Proceedings of the LCN 2008, 2008

2006
Multiple personal security domains.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

The Service Availability Forum Security Service (SEC): Status and Future Directions.
Proceedings of the Service Availability, 2006

Work in Progress: RASS Framework for a Cluster-Aware SELinux.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Secure Software Development by Example.
IEEE Secur. Priv., 2005

Software Performance Analysis
CoRR, 2005

Clusters and security: distributed security for distributed systems.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

Feasibility study and early experimental results towards cluster survivability.
Proceedings of the 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 2005

2004
Security in Carrier Class Server Applications for All-IP Networks
CoRR, 2004

XML distributed security policy for clusters.
Comput. Secur., 2004

DigSig: Runtime Authentication of Binaries at Kernel Level.
Proceedings of the 18th Conference on Systems Administration (LISA 2004), 2004

2003
Distributed Access Control for Carrier Class Clusters.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2003

2002
A New Architecture for Secure Carrier-Class Clusters.
Proceedings of the 2002 IEEE International Conference on Cluster Computing (CLUSTER 2002), 2002

1996
Parallel Implementation of RBF Neural Networks.
Proceedings of the Euro-Par '96 Parallel Processing, 1996


  Loading...