Follow
Mengyuan Zhang
Mengyuan Zhang
Verified email at polyu.edu.hk
Title
Cited by
Cited by
Year
Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks
M Zhang, L Wang, S Jajodia, A Singhal, M Albanese
IEEE Transactions on Information Forensics and Security 11 (5), 1071-1086, 2016
1602016
Modeling network diversity for evaluating the robustness of networks against zero-day attacks
L Wang, M Zhang, S Jajodia, A Singhal, M Albanese
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
622014
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks’ Resilience Against Zero-Day Attacks
M Zhang, L Wang, S Jajodia, A Singhal
IEEE Transactions on Dependable and Secure Computing 18 (1), 310-324, 2018
332018
Large-scale empirical study of important features indicative of discovered vulnerabilities to assess application security
M Zhang, XDC De Carnavalet, L Wang, A Ragab
IEEE Transactions on Information Forensics and Security 14 (9), 2315-2330, 2019
282019
R2dp: A universal and automated approach to optimizing the randomization mechanisms of differential privacy for utility metrics with no known optimal distributions
M Mohammady, S Xie, Y Hong, M Zhang, L Wang, M Pourzandi, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
192020
Modeling NFV deployment to identify the cross-level inconsistency vulnerabilities
SL Thirunavukkarasu, M Zhang, A Oqaily, GS Chawla, L Wang, ...
2019 IEEE International Conference on Cloud Computing Technology and Science …, 2019
182019
Hierarchical community detection based on partial matrix convergence using random walks
W Zhang, F Kong, L Yang, Y Chen, M Zhang
Tsinghua Science and Technology 23 (1), 35-46, 2018
162018
ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).
A Tabiban, H Zhao, Y Jarraya, M Pourzandi, M Zhang, L Wang
NDSS, 2022
122022
Quantic: Distance metrics for evaluating multi-tenancy threats in public cloud
T Madi, M Zhang, Y Jarraya, A Alimohammadifar, M Pourzandi, L Wang, ...
2018 IEEE International Conference on Cloud Computing Technology and Science …, 2018
102018
Factor of security (FoS): quantifying the security effectiveness of redundant smart grid subsystems
O Duman, M Zhang, L Wang, M Debbabi, RF Atallah, B Lebel
IEEE Transactions on Dependable and Secure Computing 19 (2), 1018-1035, 2020
92020
NFVGuard: Verifying the security of multilevel network functions virtualization (NFV) stack
A Oqaily, LT Sudershan, Y Jarraya, S Majumdar, M Zhang, M Pourzandi, ...
2020 IEEE International Conference on Cloud Computing Technology and Science …, 2020
72020
Measuring the security posture of IEC 61850 substations with redundancy against zero day attacks
O Duman, M Zhang, L Wang, M Debbabi
2017 IEEE International Conference on Smart Grid Communications …, 2017
72017
Towards 5G-ready security metrics
L Zhao, MS Oshman, M Zhang, FF Moghaddam, S Chander, M Pourzandi
ICC 2021-IEEE International Conference on Communications, 1-6, 2021
52021
VMGuard: State-based proactive verification of virtual network isolation with application to NFV
GS Chawla, M Zhang, S Majumdar, Y Jarraya, M Pourzandi, L Wang, ...
IEEE Transactions on Dependable and Secure Computing 18 (4), 1553-1567, 2020
52020
Catching falling dominoes: cloud management-level provenance analysis with application to OpenStack
A Tabiban, Y Jarraya, M Zhang, M Pourzandi, L Wang, M Debbabi
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
52020
Apparatus and method for evaluating multiple aspects of the security for virtualized infrastructure in a cloud environment
M Taous, M Zhang, Y Jarraya, L Wang, M Pourzandi, M Debbabi
US Patent 11,677,762, 2023
42023
iCAT: An Interactive Customizable Anonymization Tool
M Oqaily, Y Jarraya, M Zhang, L Wang, M Pourzandi, M Debbabi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
42019
Network security metrics: From known vulnerabilities to zero day attacks
L Wang, M Zhang, A Singhal
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
42018
Malchain: Virtual application behaviour profiling by aggregated microservice data exchange graph
MM Ghorbani, FF Moghaddam, M Zhang, M Pourzandi, KK Nguyen, ...
2020 IEEE International Conference on Cloud Computing Technology and Science …, 2020
32020
Evaluating the network diversity of networks against zero-day attacks
L Wang, S Jajodia, A Singhal, M Zhang, L Wang, S Jajodia, A Singhal
Network Security Metrics, 117-140, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20