Lingyu Wang
Lingyu Wang
Verified email at ciise.concordia.ca - Homepage
TitleCited byYear
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal, S Jajodia
IFIP Annual Conference on Data and Applications Security and Privacy, 283-296, 2008
3212008
A logic-based framework for attribute based access control
L Wang, D Wijesekera, S Jajodia
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
3092004
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
2732006
Measuring network security using dynamic bayesian network
M Frigault, L Wang, A Singhal, S Jajodia
Proceedings of the 4th ACM workshop on Quality of protection, 23-30, 2008
2522008
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
2492010
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer communications 29 (15), 2917-2933, 2006
2252006
Measuring network security using bayesian network-based attack graphs
M Frigault, L Wang
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
1672008
Toward measuring network security using attack graphs
L Wang, A Singhal, S Jajodia
Proceedings of the 2007 ACM workshop on Quality of protection, 49-54, 2007
1602007
Measuring the overall security of network configurations using attack graphs
L Wang, A Singhal, S Jajodia
IFIP Annual Conference on Data and Applications Security and Privacy, 98-112, 2007
1592007
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2011
1162011
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2014
1072014
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1062010
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010
1052010
Securing OLAP data cubes against privacy breaches
L Wang, S Jajodia, D Wijesekera
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 161-175, 2004
1032004
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
972008
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
B Cui, Z Liu, L Wang
IEEE Transactions on computers 65 (8), 2374-2385, 2016
962016
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
European Symposium on Research in Computer Security, 573-587, 2010
782010
Secure collaboration in global design and supply chain environment: Problem analysis and literature review
Y Zeng, L Wang, X Deng, X Cao, N Khundker
Computers in Industry 63 (6), 545-556, 2012
702012
Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages
V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi
Electronic Notes in Theoretical Computer Science 254, 143-160, 2009
652009
Privacy-preserving data publishing for cluster analysis.
BCM Fung, K Wang, L Wang, PCK Hung
Data Knowl. Eng. 68 (6), 552-575, 2009
632009
The system can't perform the operation now. Try again later.
Articles 1–20