Pourzandi, Makan
70  results:
Search for persons X
?
3

Caught-in-Translation (CiT): Detecting Cross-Level Inconsis..:

Lakshmanan, Sudershan ; Zhang, Mengyuan ; Majumdar, Suryadipta...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2964-2981 , 2024
 
?
4

iCAT+: An Interactive Customizable Anonymization Tool Using..:

Oqaily, Momen ; Kabir, Mohammad Ekramul ; Majumdar, Suryadipta...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2799-2817 , 2024
 
?
5

CCSM: Building Cross-Cluster Security Models for Edge-Core ..:

, In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy,
 
?
6

Evaluating the Security Posture of 5G Networks by Combining..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Hoq, Md Nazmul ; Yao, Jia Wei ; Majumdar, Suryadipta... - p. 123-144 , 2024
 
?
7

A Survey on Threat Hunting in Enterprise Networks:

Nour, Boubakr ; Pourzandi, Makan ; Debbabi, Mourad
IEEE Communications Surveys & Tutorials.  25 (2023)  4 - p. 2299-2324 , 2023
 
?
8

Warping the Defence Timeline: Non-Disruptive Proactive Atta..:

, In: ICC 2023 - IEEE International Conference on Communications,
 
?
 
?
10

A Tenant-based Two-stage Approach to Auditing the Integrity..:

, In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy,
 
?
12

VinciDecoder: Automatically Interpreting Provenance Graphs ..:

, In: Secure IT Systems; Lecture Notes in Computer Science,
Tabiban, Azadeh ; Zhao, Heyang ; Jarraya, Yosr.. - p. 346-367 , 2022
 
?
13

A Hybrid Decision-making Approach to Security Metrics Aggre..:

, In: 2022 IEEE International Conference on Cloud Computing Technology and Science (CloudCom),
Lei, Ming ; Zhao, Lianying ; Pourzandi, Makan. - p. 178-185 , 2022
 
?
14

Cloud Native Applications Profiling using a Graph Neural Ne..:

, In: 2022 IEEE Future Networks World Forum (FNWF),
 
?
15

ProSPEC: Proactive Security Policy Enforcement for Containe..:

, In: Proceedings of the Twelveth ACM Conference on Data and Application Security and Privacy,
 
1-15