Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Cuppens, F., Wang, L., Boulahia Cuppens, N., Tawbi, N., & García-Alfaro, J. (eds.) (2017). 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link
Deswarte, Y., Cuppens, F., Jajodia, S., & Wang, L. (eds.) (2004). Information Security Management, Education and Privacy : IFIP 18th World Computer Congress TC11, 19th International Information Security Workshops, 22–27 August 2004, Toulouse, France. External link
Deswarte, Y., Cuppens, F., Jajodia, S., & Wang, L. (eds.) (2004). Security and Protection in Information Processing Systems : IFIP 18th World Computer Congress TC11, 19th International Information Security Conference, 22–27 August 2004, Toulouse, France. External link
Shameli-Sendi, A., Dagenais, M., & Wang, L. (2018). Realtime intrusion risk assessment model based on attack and service dependency graphs. Computer Communications, 116, 253-272. External link
Zhang, M., Carné de Carnavalet, X., Wang, L., & Ragab, A. (2019). Large-Scale Empirical Study of Important Features Indicative of Discovered Vulnerabilities to Assess Application Security. IEEE Transactions on Information Forensics and Security, 14(9), 2315-2330. External link