


Остановите войну!
for scientists:


default search action
Sushil Jajodia
Person information

- affiliation: George Mason University, Fairfax, Virginia, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j212]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Distributed query execution under access restrictions. Comput. Secur. 127: 103056 (2023) - [j211]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
, Roberto Sassi
:
Sentinels and Twins: Effective Integrity Assessment for Distributed Computation. IEEE Trans. Parallel Distributed Syst. 34(1): 108-122 (2023) - [j210]Ouri Wolfson
, Prabin Giri
, Sushil Jajodia
, Goce Trajcevski
:
Geographic-Region Monitoring by Drones in Adversarial Environments. ACM Trans. Spatial Algorithms Syst. 9(3): 22:1-22:36 (2023) - [j209]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. 16(4): 2359-2371 (2023) - [c321]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - 2022
- [j208]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j207]Yue Li
, Zeyu Chen, Haining Wang
, Kun Sun
, Sushil Jajodia
:
Understanding Account Recovery in the Wild and its Security Implications. IEEE Trans. Dependable Secur. Comput. 19(1): 620-634 (2022) - [j206]Yanhai Xiong
, Giridhar Ramachandran, Rajesh Ganesan
, Sushil Jajodia
, V. S. Subrahmanian
:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022) - [j205]Haipeng Chen, Andrew Duncklee, Sushil Jajodia
, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. ACM Trans. Internet Techn. 22(3): 67:1-67:24 (2022) - [j204]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
An authorization model for query execution in the cloud. VLDB J. 31(3): 555-579 (2022) - [c320]Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia:
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models. CIKM 2022: 4064-4068 - [i8]Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia:
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models. CoRR abs/2208.08114 (2022) - 2021
- [j203]Dorjan Hitaj
, Briland Hitaj
, Sushil Jajodia
, Luigi V. Mancini
:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [j202]Prakruthi Karuna
, Hemant Purohit
, Sushil Jajodia
, Rajesh Ganesan
, Özlem Uzuner:
Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility. IEEE Syst. J. 15(1): 835-845 (2021) - [j201]Mengyuan Zhang
, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j200]Tanmoy Chakraborty
, Sushil Jajodia
, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian
:
A Fake Online Repository Generation Engine for Cyber Deception. IEEE Trans. Dependable Secur. Comput. 18(2): 518-533 (2021) - [c319]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Distributed Query Evaluation over Encrypted Data. DBSec 2021: 96-114 - [c318]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:
PatchDB: A Large-Scale Security Patch Dataset. DSN 2021: 149-160 - [c317]Ouri Wolfson
, Prabin Giri
, Sushil Jajodia, Goce Trajcevski:
Geographic-Region Monitoring by Drones in Adversarial Environments. SIGSPATIAL/GIS 2021: 480-483 - [c316]Xinda Wang, Shu Wang
, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. MILCOM 2021: 595-600 - [c315]Jinsung Jeon, Jing Liu, Jayoung Kim, Jaehoon Lee, Noseong Park, Jamie Jooyeon Lee, Özlem Uzuner, Sushil Jajodia:
Scalable Graph Synthesis with Adj and 1 - Adj. SDM 2021: 307-315 - [i7]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. CoRR abs/2108.03358 (2021) - 2020
- [j199]Haipeng Chen
, Qian Han
, Sushil Jajodia
, Roy Lindelauf, V. S. Subrahmanian
, Yanhai Xiong
:
Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare. IEEE Syst. J. 14(3): 3779-3790 (2020) - [j198]Yubao Zhang
, Jidong Xiao
, Shuai Hao
, Haining Wang
, Sencun Zhu
, Sushil Jajodia
:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j197]Ankit Shah, Arunesh Sinha
, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j196]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Pierangela Samarati
, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j195]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020) - [c314]Xinda Wang, Shu Wang
, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
A Machine Learning Approach to Classify Security Patches into Vulnerability Types. CNS 2020: 1-9 - [c313]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [p32]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
An Empirical Study of Secret Security Patch in Open Source Software. Adaptive Autonomous Secure Cyber Systems 2020: 269-289 - [e52]Sushil Jajodia
, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i6]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [j194]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j193]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. Int. J. Inf. Sec. 18(2): 199-218 (2019) - [j192]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j191]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j190]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j189]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [c312]Mengyuan Zhang
, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c311]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. DSN 2019: 485-492 - [c310]Haipeng Chen, Sushil Jajodia, Jing Liu, Noseong Park, Vadim Sokolov, V. S. Subrahmanian:
FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data. IJCAI 2019: 2074-2080 - [p31]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p30]Massimiliano Albanese
, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p29]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - [e51]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j188]Prakruthi Karuna, Hemant Purohit, Rajesh Ganesan, Sushil Jajodia
:
Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception. IEEE Intell. Syst. 33(5): 16-25 (2018) - [j187]Massimiliano Albanese
, Sushil Jajodia
, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. IEEE Secur. Priv. 16(1): 92-97 (2018) - [j186]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j185]Tanmoy Chakraborty
, Sushil Jajodia
, Noseong Park, Andrea Pugliese, Edoardo Serra
, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. J. Comput. Secur. 26(5): 615-645 (2018) - [j184]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j183]Noseong Park, Mahmoud Mohammadi
, Kshitij Gorde, Sushil Jajodia
, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. Proc. VLDB Endow. 11(10): 1071-1083 (2018) - [j182]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j181]Ning Zhang
, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou
, Sushil Jajodia
:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - [j180]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia
:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [j179]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [j178]Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. ACM Trans. Internet Techn. 18(3): 30:1-30:41 (2018) - [c309]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [r3]Claudio Bettini, X. Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems (2nd ed.) 2018 - [i5]Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. CoRR abs/1806.03384 (2018) - [i4]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j177]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
An Authorization Model for Multi-Provider Queries. Proc. VLDB Endow. 11(3): 256-268 (2017) - [j176]Sushil Jajodia
, Noseong Park, Fabio Pierazzi
, Andrea Pugliese
, Edoardo Serra
, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. IEEE Trans. Inf. Forensics Secur. 12(11): 2532-2544 (2017) - [j175]Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk. ACM Trans. Intell. Syst. Technol. 8(4): 52:1-52:32 (2017) - [c308]Sridhar Venkatesan, Massimiliano Albanese
, Ankit Shah, Rajesh Ganesan, Sushil Jajodia
:
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. MTD@CCS 2017: 75-85 - [c307]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [p28]Massimiliano Albanese
, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia
, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [p27]Sushil Jajodia
, Massimiliano Albanese
:
An Integrated Framework for Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 29-46 - [e50]Peng Liu, Sushil Jajodia
, Cliff Wang:
Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science 10030, Springer 2017, ISBN 978-3-319-61151-8 [contents] - 2016
- [j174]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi, Pierangela Samarati
:
Efficient integrity checks for join queries in the cloud. J. Comput. Secur. 24(3): 347-378 (2016) - [j173]Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia
:
Minimum cost rule enforcement for cooperative database access. J. Comput. Secur. 24(3): 379-403 (2016) - [j172]Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. J. Comput. Secur. 24(6): 735-791 (2016) - [j171]Paolo Montuschi
, Edward J. McCluskey, Samarjit Chakraborty, Jason Cong, Ramón M. Rodríguez-Dagnino, Fred Douglis, Lieven Eeckhout, Gernot Heiser, Sushil Jajodia, Ruby B. Lee, Dinesh Manocha, Tomás F. Pena, Isabelle Puaut, Hanan Samet, Donatella Sciuto:
State of the Journal. IEEE Trans. Computers 65(7): 2014-2018 (2016) - [j170]Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia
:
Profiling Online Social Behaviors for Compromised Account Detection. IEEE Trans. Inf. Forensics Secur. 11(1): 176-187 (2016) - [j169]Mengyuan Zhang
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [j168]Rajesh Ganesan, Sushil Jajodia
, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016) - [c306]Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
Trusted cloud SQL DBS with on-the-fly AES decryption/encryption. IEEE BigData 2016: 3666-3675 - [c305]Sridhar Venkatesan, Massimiliano Albanese
, George Cybenko, Sushil Jajodia
:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c304]Sridhar Venkatesan, Massimiliano Albanese
, Kareem Amin, Sushil Jajodia
, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. CNS 2016: 198-206 - [c303]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c302]Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement. DEXA Workshops 2016: 19-23 - [c301]Nawaf Alhebaishi
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - [c300]Fabio De Gaspari
, Sushil Jajodia
, Luigi V. Mancini, Agostino Panico:
AHEAD: A New Architecture for Active Defense. SafeConfig@CCS 2016: 11-16 - [c299]Massimiliano Albanese, Sushil Jajodia, R. Jhawa, Vincenzo Piuri:
Dependable and Resilient Cloud Computing. SOSE 2016: 3 - [p26]Massimiliano Albanese
, Ermanno Battista, Sushil Jajodia
:
Deceiving Attackers by Creating a Virtual Attack Surface. Cyber Deception 2016: 169-201 - [e49]Sushil Jajodia
, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [e48]Sjouke Mauw
, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - 2015
- [j167]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Loose associations to increase utility in data publishing. J. Comput. Secur. 23(1): 59-88 (2015) - [j166]Edoardo Serra
, Sushil Jajodia
, Andrea Pugliese
, Antonino Rullo
, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. ACM Trans. Inf. Syst. Secur. 17(3): 11:1-11:39 (2015) - [c298]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia
:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - [c297]Sridhar Venkatesan, Massimiliano Albanese
, Sushil Jajodia
:
Disrupting stealthy botnets through strategic placement of detectors. CNS 2015: 95-103 - [c296]Massimiliano Albanese
, Ermanno Battista, Sushil Jajodia
:
A deception based approach for defeating OS and service fingerprinting. CNS 2015: 317-325 - [c295]Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
Numerical SQL Value Expressions Over Encrypted Cloud Databases. DEXA (2) 2015: 455-478 - [c294]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for Approximate Joins on Untrusted Computational Servers. SEC 2015: 446-459 - [e47]Sushil Jajodia
, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3 [contents] - [e46]Raja Naeem Akram, Sushil Jajodia:
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6 [contents] - [e45]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - [i3]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
On-the fly AES Decryption/Encryption for Cloud SQL Databases. CoRR abs/1512.06423 (2015) - 2014
- [b4]Lingyu Wang, Massimiliano Albanese
, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j165]Massimiliano Albanese
, Alessandra De Benedictis
, Sushil Jajodia
, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j164]Meixing Le, Krishna Kant, Sushil Jajodia
:
Consistency and enforcement of access rules in cooperative data sharing environment. Comput. Secur. 41: 3-18 (2014) - [j163]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j162]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Fragmentation in Presence of Data Dependencies. IEEE Trans. Dependable Secur. Comput. 11(6): 510-523 (2014) - [j161]Sankardas Roy, Mauro Conti
, Sanjeev Setia, Sushil Jajodia
:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. IEEE Trans. Inf. Forensics Secur. 9(4): 681-694 (2014) - [c293]Sushil Jajodia
, Kun Sun:
MTD 2014: First ACM Workshop on Moving Target Defense. CCS 2014: 1550-1551 - [c292]Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia
:
Self-healing wireless networks under insider jamming attacks. CNS 2014: 220-228 - [c291]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for distributed queries. CNS 2014: 364-372 - [c290]