Yosr Jarraya
Orcid: 0009-0000-6194-5321
According to our database1,
Yosr Jarraya
authored at least 55 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters.
IEEE Trans. Inf. Forensics Secur., 2024
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024
ChainPatrol: Balancing Attack Detection and Classification with Performance Overhead for Service Function Chains Using Virtual Trailers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack.
Proceedings of the Secure IT Systems, 2022
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
Catching Falling Dominoes: Cloud Management-Level Provenance Analysis with Application to OpenStack.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
2019
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns.
IEEE Trans. Serv. Comput., 2019
ACM Trans. Priv. Secur., 2019
Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Verification of firewall reconfiguration for virtual machines migrations in the cloud.
Comput. Networks, 2015
Towards migrating security policies of virtual machines in Software Defined Networks.
Proceedings of the 1st IEEE Conference on Network Softwarization, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Int. J. Softw. Tools Technol. Transf., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
2012
J. Softw., 2012
Proceedings of the Sixth International Symposium on Theoretical Aspects of Software Engineering, 2012
Formal Verification of Security Preservation for Migrating Virtual Machines in the Cloud.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
2010
Verification and Validation in Systems Engineering - Assessing UML / SysML Design Models.
Springer, ISBN: 978-3-642-15227-6, 2010
2009
Int. J. Gen. Syst., 2009
Proceedings of the 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, 2009
2007
Automatic Verification and Performance Analysis of Time-Constrained SysML Activity Diagrams.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007
2006
Towards a Unified Paradigm for Verification and Validation of Systems Engineering Design Models.
Proceedings of the IASTED International Conference on Software Engineering, 2006
A Unified Approach for Verification and Validation of Systems and Software Engineering Models.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006