![]() | ![]() |
Concordia University
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2008 | ||
---|---|---|
34 | EE | Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli: Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 |
33 | EE | Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli: Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 |
32 | EE | Marcel Frigault, Lingyu Wang: Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703 |
31 | EE | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 |
30 | EE | Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 |
29 | EE | Bo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 |
28 | EE | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 |
27 | EE | Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30 |
26 | EE | Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 |
25 | EE | Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 |
24 | EE | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 |
23 | EE | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008) |
22 | EE | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008) |
2007 | ||
21 | EE | Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 |
20 | EE | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 |
19 | EE | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54 |
18 | EE | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 |
17 | EE | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) |
2006 | ||
16 | EE | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 |
15 | EE | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 |
14 | EE | Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006) |
13 | EE | Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006) |
2005 | ||
12 | EE | Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 |
2004 | ||
11 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
10 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
9 | EE | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 |
8 | EE | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- |
7 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) | |
2003 | ||
6 | EE | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 |
2002 | ||
5 | EE | Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567 |
4 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 | |
3 | EE | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 |
2 | EE | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 |
1 | EE | Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 |
1 | Prabir Bhattacharya | [23] [24] [25] |
2 | Alexander Brodsky | [31] |
3 | Frédéric Cuppens | [10] [11] |
4 | Mourad Debbabi | [23] [24] [25] [28] |
5 | Yves Deswarte | [10] [11] |
6 | Rachida Dssouli | [33] [34] |
7 | Marcel Frigault | [27] [32] |
8 | Benjamin C. M. Fung | [28] |
9 | Yuan Hong | [33] [34] |
10 | Tania Islam | [30] |
11 | Sushil Jajodia | [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [22] [27] [30] [31] |
12 | Wei Li | [26] |
13 | Yingjiu Li | [1] [2] [5] [6] [17] |
14 | Anyi Liu | [12] [14] |
15 | Qian Liu | [33] [34] |
16 | Tao Long | [30] |
17 | Shuo Lu | [33] [34] |
18 | Noman Mohammed | [23] [24] [25] |
19 | Steven Noel | [13] |
20 | Hadi Otrok | [23] [24] [25] |
21 | Kui Ren | [29] |
22 | Anoop Singhal | [16] [19] [20] [22] [27] [30] |
23 | Ke Wang | [28] |
24 | Xiaoyang Sean Wang | [5] [15] |
25 | Duminda Wijesekera | [3] [4] [6] [7] [8] [9] [17] [18] |
26 | Xuxin Xu | [21] |
27 | Chao Yao | [15] [16] [22] |
28 | Amr M. Youssef | [21] |
29 | Lei Zhang | [26] [31] |
30 | Bo Zhu | [21] [26] [29] |
31 | Sencun Zhu | [2] |