An Entity-centric Approach for Privacy and Identity Management in Cloud Computing P Angin, B Bhargava, R Ranchal, N Singh, M Linderman, L Ben Othmane, ... Reliable Distributed Systems, 2010 29th IEEE Symposium on, 177-183, 2010 | 201 | 2010 |
Secdevops: Is it a marketing buzzword?-mapping research on security in devops V Mohan, LB Othmane 2016 11th international conference on availability, reliability and security …, 2016 | 149 | 2016 |
Protection of Identity Information in Cloud Computing without Trusted Third Party R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ... Reliable Distributed Systems, 2010 29th IEEE Symposium on, 368-372, 2010 | 143 | 2010 |
Secure Information Sharing in Digital Supply Chains B Bhargava, R Ranchal, LB Othmane Proceedings of IEEE IACC, 2013 | 102 | 2013 |
A Survey of Security and Privacy in Connected Vehicles L ben Othmane, H Weffers, MM Mohamad, M Wolf Wireless Sensor and Mobile Ad-Hoc Networks, 217-247, 2015 | 98* | 2015 |
Extending the Agile Development Process to Develop Acceptably Secure Software L Ben Othmane, P Angin, H Weffers, B Bhargava IEEE Transactions on Dependable and Secure Computing 11 (6), 497 - 509, 2014 | 91 | 2014 |
Protecting Privacy of Sensitive Data Dissemination Using Active Bundles L Ben Othmane, L Lilien Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09 …, 2009 | 71 | 2009 |
Identification of dependency-based attacks on node. js B Pfretzschner, L ben Othmane Proceedings of the 12th International Conference on Availability …, 2017 | 52 | 2017 |
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach H Oueslati, MM Rahman, L ben Othmane Proc. of the 10th International Conference on Availability, Reliability and …, 2015 | 49 | 2015 |
Threats to Validity in Empirical Software Security Research DS Cruzes, L ben Othmane Empirical Research for Software Security: Foundations and Experience, 2017 | 48* | 2017 |
Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle L ben Othmane Western Michigan University, 2010 | 47 | 2010 |
Incorporating attacker capabilities in risk estimation and mitigation L Ben Othmane, R Ranchal, R Fernando, B Bhargava, E Bodden Computers & Security 51, 41-61, 2015 | 45 | 2015 |
A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks LT Lilien, L Ben Othmane, P Angin, A DeCarlo, RM Salih, B Bhargava Journal of Network and Computer Applications, 2014 | 45 | 2014 |
BP: security concerns and best practices for automation of software deployment processes: an industrial case study. In 2018 IEEE Cybersecurity Development (SecDev) V Mohan, L ben Othmane, A Kres IEEE Computer Society, 2018 | 42* | 2018 |
Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs M Jedh, L Othmane, N Ahmed, B Bhargava IEEE Transactions on Information Forensics and Security 16, 4133 - 4146, 2021 | 39 | 2021 |
Epics: A framework for enforcing security policies in composite web services R Ranchal, B Bhargava, P Angin, L ben Othmane IEEE Transactions on Services Computing, 2018 | 39 | 2018 |
Towards Extended Safety in Connected Vehicles L ben Othmane, A Al-Fuqaha, E ben Hamida, M van den Brand 16th International IEEE Conference on Intelligent Transportation Systems …, 2013 | 38 | 2013 |
On the Performance of Detecting Injection of Fabricated Messages into the CAN Bus L Ben Othmane, L Dhulipala, N Multari, M Govindarasu IEEE Transactions on Dependable and Secure Computing, 2020 | 33 | 2020 |
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors LB Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker Data Science and Engineering 2 (2), 107–124, 2017 | 32 | 2017 |
An End-to-End Security Auditing Approach for Service Oriented Architectures M Azarmi, B Bhargava, P Angin, R Ranchal, N Ahmed, A Sinclair, ... 31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), 2012 | 29 | 2012 |