![]() |
Concordia University
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
| 2008 | ||
|---|---|---|
| 34 | EE | Qian Liu, Shuo Lu, Yuan Hong, Lingyu Wang, Rachida Dssouli: Securing Telehealth Applications in a Web-Based e-Health Portal. ARES 2008: 3-9 |
| 33 | EE | Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang, Rachida Dssouli: Preserving Privacy in E-health Systems Using Hippocratic Databases. COMPSAC 2008: 692-697 |
| 32 | EE | Marcel Frigault, Lingyu Wang: Measuring Network Security Using Bayesian Network-Based Attack Graphs. COMPSAC 2008: 698-703 |
| 31 | EE | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 |
| 30 | EE | Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 |
| 29 | EE | Bo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 |
| 28 | EE | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 |
| 27 | EE | Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30 |
| 26 | EE | Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 |
| 25 | EE | Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET. WCNC 2008: 2816-2821 |
| 24 | EE | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs. WiMob 2008: 608-612 |
| 23 | EE | Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya: A game-theoretic intrusion detection model for mobile ad hoc networks. Computer Communications 31(4): 708-721 (2008) |
| 22 | EE | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008) |
| 2007 | ||
| 21 | EE | Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 |
| 20 | EE | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 |
| 19 | EE | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54 |
| 18 | EE | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 |
| 17 | EE | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) |
| 2006 | ||
| 16 | EE | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 |
| 15 | EE | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 |
| 14 | EE | Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006) |
| 13 | EE | Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006) |
| 2005 | ||
| 12 | EE | Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 |
| 2004 | ||
| 11 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
| 10 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
| 9 | EE | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 |
| 8 | EE | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- |
| 7 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) | |
| 2003 | ||
| 6 | EE | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 |
| 2002 | ||
| 5 | EE | Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567 |
| 4 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 | |
| 3 | EE | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 |
| 2 | EE | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 |
| 1 | EE | Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 |
| 1 | Prabir Bhattacharya | [23] [24] [25] |
| 2 | Alexander Brodsky | [31] |
| 3 | Frédéric Cuppens | [10] [11] |
| 4 | Mourad Debbabi | [23] [24] [25] [28] |
| 5 | Yves Deswarte | [10] [11] |
| 6 | Rachida Dssouli | [33] [34] |
| 7 | Marcel Frigault | [27] [32] |
| 8 | Benjamin C. M. Fung | [28] |
| 9 | Yuan Hong | [33] [34] |
| 10 | Tania Islam | [30] |
| 11 | Sushil Jajodia | [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [22] [27] [30] [31] |
| 12 | Wei Li | [26] |
| 13 | Yingjiu Li | [1] [2] [5] [6] [17] |
| 14 | Anyi Liu | [12] [14] |
| 15 | Qian Liu | [33] [34] |
| 16 | Tao Long | [30] |
| 17 | Shuo Lu | [33] [34] |
| 18 | Noman Mohammed | [23] [24] [25] |
| 19 | Steven Noel | [13] |
| 20 | Hadi Otrok | [23] [24] [25] |
| 21 | Kui Ren | [29] |
| 22 | Anoop Singhal | [16] [19] [20] [22] [27] [30] |
| 23 | Ke Wang | [28] |
| 24 | Xiaoyang Sean Wang | [5] [15] |
| 25 | Duminda Wijesekera | [3] [4] [6] [7] [8] [9] [17] [18] |
| 26 | Xuxin Xu | [21] |
| 27 | Chao Yao | [15] [16] [22] |
| 28 | Amr M. Youssef | [21] |
| 29 | Lei Zhang | [26] [31] |
| 30 | Bo Zhu | [21] [26] [29] |
| 31 | Sencun Zhu | [2] |