แว่นขยาย
ตัวโหลดการค้นหา

ผู้เขียน: Lingyu Wang

สนับสนุน
​ Suryadipta Majumdar is currently an Assistant Professor in the Information Security and Digital Forensics department at University at Albany – SUNY. Suryadipta received his Ph.D. on cloud security auditing from Concordia University, Canada. His research mainly focuses on cloud security, Software Defined Network (SDN) security and Internet of Things (Io T) security. Taous Madi is currently an Experienced Researcher at Ericsson Canada. She holds a Ph.D. in Information Systems Engineering from Concordia University, Montreal. Previously, she finished her M.Sc. in mobile computing from the University of Science and Technology Houari Boumedien (USTHB), Algiers. Her research interests include cloud computing, network function virtualization security, software-defined networking security, internet of things security, machine learning and formal methods. Yushun Wang completed his MASc in Information System Security from Concordia University. Previously, he worked as a customer network support engineer, Ericsson (China) for 12 years. He is currently working as a developer at Above Security Canada. Azadeh Tabiban is currently a Ph.D. student at Concordia Institute for Information Systems Engineering (CIISE). She obtained her Master”s degree in Information Systems Security from Concordia University, where she contributed to several research projects on cloud security auditing. Her research interest focuses on the development of more accountable and transparent virtualized environments; particularly on cloud and NFV provenance, intrusion detection, proactive auditing and secure virtualization in untrusted cloud infrastructures. Momen Oqaily is currently working toward the Ph.D. degree in information and systems engineering at the Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada. He received his B.S. degree in network engineering and security and the master’s degree in Information Systems Engineering. His research interests include privacy and cloud computing security auditing. Amir Alimohammadifar completed his BSc in Information Technology in 2010. He received his first master’s in Information Technology, communication and computer networks from Sharif University of Technology, 2012, and his second master’s in Information Systems Security from Concordia University. He is currently working as a security Dev Ops engineer at Gameloft Canada. Yosr Jarraya is currently a researcher in security at Ericsson. Before that, she had a two-year MITACS postdoctoral fellowship with the company. She was previously Research Associate and Postdoctoral Fellow at Concordia University, Montreal. She received a Ph.D. in Electrical and Computer Engineering from Concordia University. She is the co-author of more than 30 research paperson topics including cloud security, network and software security, formal verification and SDN. Makan Pourzandi is a research leader at Ericsson, Canada. He received his Ph.D. degree in Computer Science from the University of Lyon I Claude Bernard, France and a M.Sc. in parallel computing from École Normale Supérieure de Lyon, France. He has more than 20 years of experience in the fields of cyber security, Telecom and distributed systems. He co-authored a book on software security published by Springer on 2015 and is the co-inventor of 19 granted US patents. He has published more than 65 research papers in peer-reviewed scientific journals and conferences. Lingyu Wang is a Professor at the Concordia Institute for Information Systems Engineering (CIISE) at Concordia University, Montreal, Canada. He holds the NSERC/Ericsson Senior Industrial Research Chair in SDN/NFV Security. He received his Ph.D. degree in Information Technology in 2006 from George Mason University. His research interests include cloud computing security, SDN/NFV security, security metrics, software security, and privacy. He has co-authored five books, two patents, and over 120 refereed conference and journal articles at reputable venues including TOPS, TIFS, TDSC, TMC, JCS, S&P, CCS, NDSS, ESORICS, PETS, ICDT, etc.  Mourad Debbabi is a Full Professor at the Concordia Institute for Information Systems Engineering and Associate Dean Research and Graduate Studies at the Faculty of Engineering and Computer Science. He holds the NSERC/Hydro-Québec Thales Senior Industrial Research Chair in Smart Grid Security and the Concordia Research Chair Tier I in Information Systems Security. Dr. Debbabi holds Ph.D. and M.Sc. degrees in computer science from Paris-XI Orsay, University, France. He published three books and more than 260 peer-reviewed research articles in international journals and conferences on cyber security, cyber forensics, privacy, cryptographic protocols, threat intelligence generation, malware analysis, reverse engineering, specification and verification of safety-critical systems, smart grid, programming languages and type theory.




12 หนังสืออิเล็กทรอนิกส์โดย Lingyu Wang

Lingyu Wang & Sushil Jajodia: Preserving Privacy in On-Line Analytical Processing (OLAP)
Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sen …
PDF
อังกฤษ
€96.29
Suryadipta Majumdar & Taous Madi: Cloud Security Auditing
This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while …
PDF
อังกฤษ
€96.29
Lingyu Wang & Massimiliano Albanese: Network Hardening
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though …
PDF
อังกฤษ
€53.49
Djedjiga Mouheb & Mourad Debbabi: Aspect-Oriented Security Hardening of UML Design Models
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the …
PDF
อังกฤษ
€53.49
Wen Ming Liu & Lingyu Wang: Preserving Privacy Against Side-Channel Leaks
This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. This book then applies the framework in three concrete domains.  …
PDF
อังกฤษ
€96.29
Lingyu Wang & Sushil Jajodia: Network Security Metrics
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the …
PDF
อังกฤษ
€96.29
Frederic Cuppens & Yves Deswarte: Security and Protection in Information Processing Systems
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging …
PDF
อังกฤษ
DRM
€55.67
Frederic Cuppens & Yves Deswarte: Information Security Management, Education and Privacy
This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The …
PDF
อังกฤษ
DRM
€110.75
Frederic Cuppens & Nora Cuppens-Boulahia: Foundations and Practice of Security
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in …
EPUB
อังกฤษ
DRM
€56.60
Basit Shafiq & Lingyu Wang: Data and Applications Security and Privacy XXVII
This book constitutes the refereed proceedings of the 27th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2013, held in Newark, NJ, USA in July 2013. The …
PDF
อังกฤษ
DRM
€56.03
Robert Deng & Zhou Li: Applied Cryptography and Network Security Workshops
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June …
EPUB
อังกฤษ
DRM
€56.58
Saed Alrabaee & Mourad Debbabi: Binary Code Fingerprinting for Cybersecurity
This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several so …
PDF
อังกฤษ
€149.79