Yosr Jarraya
Title
Cited by
Cited by
Year
A survey and a layered taxonomy of software-defined networking
Y Jarraya, T Madi, M Debbabi
IEEE communications surveys & tutorials 16 (4), 1955-1980, 2014
3472014
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
M Debbabi, F HassaÔne, Y Jarraya, A Soeanu, L Alawneh
Springer, 2010
942010
Automatic verification and performance analysis of time-constrained sysml activity diagrams
Y Jarraya, A Soeanu, M Debbabi, F Hassaine
14th Annual IEEE International Conference and Workshops on the Engineering†…, 2007
602007
Efficient provisioning of security service function chaining using network security defense patterns
AS Sendi, Y Jarraya, M Pourzandi, M Cheriet
IEEE Transactions on Services Computing, 2016
452016
A unified approach for verification and validation of systems and software engineering models
L Alawneh, M Debbabi, F Hassaine, Y Jarraya, A Soeanu
13th Annual IEEE International Symposium and Workshop on Engineering of†…, 2006
402006
Auditing security compliance of the virtualized infrastructure in the cloud: Application to openstack
T Madi, S Majumdar, Y Wang, Y Jarraya, M Pourzandi, L Wang
Proceedings of the Sixth ACM Conference on Data and Application Security and†…, 2016
362016
Cloud calculus: Security verification in elastic cloud computing platform
Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang, M Pourzandi
2012 international conference on collaboration technologies and systems (CTS†…, 2012
352012
On the meaning of SysML activity diagrams
Y Jarraya, M Debbabi, J Bentahar
2009 16th Annual IEEE International Conference and Workshop on the†…, 2009
292009
Security compliance auditing of identity and access management in the cloud: Application to OpenStack
S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ...
2015 IEEE 7th International Conference on Cloud Computing Technology and†…, 2015
262015
Proactive verification of security compliance for clouds through pre-computation: Application to OpenStack
S Majumdar, Y Jarraya, T Madi, A Alimohammadifar, M Pourzandi, ...
European Symposium on Research in Computer Security, 47-66, 2016
222016
Leaps: Learning-based proactive security auditing for clouds
S Majumdar, Y Jarraya, M Oqaily, A Alimohammadifar, M Pourzandi, ...
European Symposium on Research in Computer Security, 265-285, 2017
182017
Model-based systems security quantification
S Ouchani, Y Jarraya, OA Mohamed
2011 Ninth Annual International Conference on Privacy, Security and Trust†…, 2011
172011
User-level runtime security auditing for the cloud
S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ...
IEEE Transactions on Information Forensics and Security 13 (5), 1185-1199, 2017
122017
Tenantguard: Scalable runtime verification of cloud-wide vm-level network isolation
Y Wang
Concordia University, 2017
122017
Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud
Shameli-Sendi A., J Y., Fekih-Ahmed M., P M., T C., C M.
The 14th IFIP/IEEE Symposium on Integrated Network and Service Management†…, 2015
112015
Formal specification and probabilistic verification of SysML activity diagrams
Y Jarraya, M Debbabi
2012 Sixth International Symposium on Theoretical Aspects of Software†…, 2012
102012
Stealthy probing-based verification (SPV): an active approach to defending software defined networks against topology poisoning attacks
A Alimohammadifar, S Majumdar, T Madi, Y Jarraya, M Pourzandi, ...
European Symposium on Research in Computer Security, 463-484, 2018
92018
Formal verification of security preservation for migrating virtual machines in the cloud
Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang, M Pourzandi
Symposium on Self-Stabilizing Systems, 111-125, 2012
92012
Verification of Firewall Reconfiguration for Virtual Machines Migrations in the Cloud
Y Jarraya, A Eghtesadi, S Sadri, M Debbabi, M Pourzandi
Computer Networks, 2015
82015
Multistage ocdo: Scalable security provisioning optimization in sdn-based cloud
Y Jarraya, A Shameli-Sendi, M Pourzandi, M Cheriet
2015 IEEE 8th International Conference on Cloud Computing, 572-579, 2015
82015
The system can't perform the operation now. Try again later.
Articles 1–20