Follow
Yosr Jarraya
Yosr Jarraya
Master Researcher, Ericsson Canada, Research Security
Verified email at ericsson.com
Title
Cited by
Cited by
Year
A survey and a layered taxonomy of software-defined networking
Y Jarraya, T Madi, M Debbabi
IEEE communications surveys & tutorials 16 (4), 1955-1980, 2014
4922014
Verification and Validation in Systems Engineering: Assessing UML/SysML Design Models
M Debbabi, F Hassaïne, Y Jarraya, A Soeanu, L Alawneh
Springer, 2010
1352010
Efficient provisioning of security service function chaining using network security defense patterns
A Shameli-Sendi, Y Jarraya, M Pourzandi, M Cheriet
IEEE Transactions on Services Computing 12 (4), 534-549, 2016
882016
Automatic verification and performance analysis of time-constrained sysml activity diagrams
Y Jarraya, A Soeanu, M Debbabi, F Hassaine
14th Annual IEEE International Conference and Workshops on the Engineering …, 2007
722007
Auditing security compliance of the virtualized infrastructure in the cloud: Application to OpenStack
T Madi, S Majumdar, Y Wang, Y Jarraya, M Pourzandi, L Wang
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
552016
Security compliance auditing of identity and access management in the cloud: Application to OpenStack
S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ...
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
442015
Cloud calculus: Security verification in elastic cloud computing platform
Y Jarraya, A Eghtesadi, M Debbabi, Y Zhang, M Pourzandi
2012 international conference on collaboration technologies and systems (CTS …, 2012
422012
A unified approach for verification and validation of systems and software engineering models
L Alawneh, M Debbabi, F Hassaine, Y Jarraya, A Soeanu
13th Annual IEEE International Symposium and Workshop on Engineering of …, 2006
412006
Proactive verification of security compliance for clouds through pre-computation: Application to OpenStack
S Majumdar, Y Jarraya, T Madi, A Alimohammadifar, M Pourzandi, ...
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
372016
On the meaning of SysML activity diagrams
Y Jarraya, M Debbabi, J Bentahar
2009 16th Annual IEEE International Conference and Workshop on the …, 2009
352009
User-level runtime security auditing for the cloud
S Majumdar, T Madi, Y Wang, Y Jarraya, M Pourzandi, L Wang, ...
IEEE Transactions on Information Forensics and Security 13 (5), 1185-1199, 2017
332017
Leaps: Learning-based proactive security auditing for clouds
S Majumdar, Y Jarraya, M Oqaily, A Alimohammadifar, M Pourzandi, ...
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
332017
Stealthy probing-based verification (SPV): An active approach to defending software defined networks against topology poisoning attacks
A Alimohammadifar, S Majumdar, T Madi, Y Jarraya, M Pourzandi, ...
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
322018
Tenantguard: Scalable runtime verification of cloud-wide vm-level network isolation
Y Wang
Concordia University, 2017
312017
ISOTOP: auditing virtual networks isolation across cloud layers in OpenStack
T Madi, Y Jarraya, A Alimohammadifar, S Majumdar, Y Wang, ...
ACM Transactions on Privacy and Security (TOPS) 22 (1), 1-35, 2018
272018
Model-based systems security quantification
S Ouchani, Y Jarraya, OA Mohamed
2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011
202011
Optimal Placement of Sequentially Ordered Virtual Security Appliances in the Cloud
Shameli-Sendi A., J Y., Fekih-Ahmed M., P M., T C., C M.
The 14th IFIP/IEEE Symposium on Integrated Network and Service Management …, 2015
172015
Learning probabilistic dependencies among events for proactive security auditing in clouds
S Majumdar, A Tabiban, Y Jarraya, M Oqaily, A Alimohammadifar, ...
Journal of Computer Security 27 (2), 165-202, 2019
152019
Verification of Firewall Reconfiguration for Virtual Machines Migrations in the Cloud
Y Jarraya, A Eghtesadi, S Sadri, M Debbabi, M Pourzandi
Computer Networks, 2015
142015
Prospec: Proactive security policy enforcement for containers
H Kermabon-Bobinnec, M Gholipourchoubeh, S Bagheri, S Majumdar, ...
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20