Follow
Lingyu Wang
Title
Cited by
Cited by
Year
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal, S Jajodia
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
5542008
A logic-based framework for attribute based access control
L Wang, D Wijesekera, S Jajodia
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
3862004
Measuring network security using dynamic bayesian network
M Frigault, L Wang, A Singhal, S Jajodia
Proceedings of the 4th ACM workshop on Quality of protection, 23-30, 2008
3672008
Minimum-cost network hardening using attack graphs
L Wang, S Noel, S Jajodia
Computer Communications 29 (18), 3812-3824, 2006
3472006
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
3372010
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts
L Wang, A Liu, S Jajodia
Computer communications 29 (15), 2917-2933, 2006
3032006
Measuring network security using bayesian network-based attack graphs
M Frigault, L Wang
2008 32nd Annual IEEE International Computer Software and Applications …, 2008
2592008
Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage
B Cui, Z Liu, L Wang
IEEE Transactions on computers 65 (8), 2374-2385, 2016
2512016
k-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities
L Wang, S Jajodia, A Singhal, P Cheng, S Noel
IEEE Transactions on Dependable and Secure Computing 11 (1), 30-44, 2014
2132014
Toward measuring network security using attack graphs
L Wang, A Singhal, S Jajodia
Proceedings of the 2007 ACM workshop on Quality of protection, 49-54, 2007
2132007
Measuring the overall security of network configurations using attack graphs
L Wang, A Singhal, S Jajodia
Data and Applications Security XXI: 21st Annual IFIP WG 11.3 Working …, 2007
2102007
Security risk analysis of enterprise networks using probabilistic attack graphs
L Wang, S Jajodia, A Singhal, A Singhal, X Ou
Network security metrics, 53-73, 2017
2082017
Measuring security risk of networks using attack graphs
S Noel, S Jajodia, L Wang, A Singhal
International Journal of Next-Generation Computing 1 (1), 135-147, 2010
1812010
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks
M Zhang, L Wang, S Jajodia, A Singhal, M Albanese
IEEE Transactions on Information Forensics and Security 11 (5), 1071-1086, 2016
1642016
Mechanism design-based secure leader election model for intrusion detection in MANET
N Mohammed, H Otrok, L Wang, M Debbabi, P Bhattacharya
IEEE transactions on dependable and secure computing 8 (1), 89-103, 2011
1612011
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks
L Wang, S Jajodia, A Singhal, S Noel
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
1482010
Localized multicast: efficient and distributed replica detection in large-scale sensor networks
B Zhu, S Setia, S Jajodia, S Roy, L Wang
IEEE Transactions on Mobile Computing 9 (7), 913-926, 2010
1282010
A game-theoretic intrusion detection model for mobile ad hoc networks
H Otrok, N Mohammed, L Wang, M Debbabi, P Bhattacharya
Computer communications 31 (4), 708-721, 2008
1262008
Securing OLAP data cubes against privacy breaches
L Wang, S Jajodia, D Wijesekera
Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 161-175, 2004
1242004
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
J Vaidya, SA Chun, L Wang, B Shafiq
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2013
112*2013
The system can't perform the operation now. Try again later.
Articles 1–20