default search action
Sushil Jajodia
Person information
- affiliation: George Mason University, Fairfax, Virginia, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j217]Jalal Ghadermazi, Ankit Shah, Sushil Jajodia:
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center. DTRAP 5(2): 19:1-19:23 (2024) - [j216]Youzhi Zhang, Dongkai Chen, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, Yanhai Xiong:
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 21(4): 1967-1980 (2024) - [j215]Chongyang Gao, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
${\sf FakeDB}$FakeDB: Generating Fake Synthetic Databases. IEEE Trans. Dependable Secur. Comput. 21(6): 5553-5564 (2024) - [j214]Alberto Maria Mongardini, Massimo La Morgia, Sushil Jajodia, Luigi Vincenzo Mancini, Alessandro Mei:
DARD: Deceptive Approaches for Robust Defense Against IP Theft. IEEE Trans. Inf. Forensics Secur. 19: 5591-5606 (2024) - [j213]Natalia Denisenko, Youzhi Zhang, Chiara Pulice, Shohini Bhattasali, Sushil Jajodia, Philip Resnik, V. S. Subrahmanian:
A Psycholinguistics-inspired Method to Counter IP Theft Using Fake Documents. ACM Trans. Manag. Inf. Syst. 15(2): 7 (2024) - [i9]Md Athikul Islam, Edoardo Serra, Sushil Jajodia:
GenFighter: A Generative and Evolutive Textual Attack Removal. CoRR abs/2404.11538 (2024) - 2023
- [j212]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Distributed query execution under access restrictions. Comput. Secur. 127: 103056 (2023) - [j211]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, Roberto Sassi:
Sentinels and Twins: Effective Integrity Assessment for Distributed Computation. IEEE Trans. Parallel Distributed Syst. 34(1): 108-122 (2023) - [j210]Ouri Wolfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski:
Geographic-Region Monitoring by Drones in Adversarial Environments. ACM Trans. Spatial Algorithms Syst. 9(3): 22:1-22:36 (2023) - [j209]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. 16(4): 2359-2371 (2023) - [c321]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - 2022
- [j208]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j207]Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia:
Understanding Account Recovery in the Wild and its Security Implications. IEEE Trans. Dependable Secur. Comput. 19(1): 620-634 (2022) - [j206]Yanhai Xiong, Giridhar Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022) - [j205]Haipeng Chen, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. ACM Trans. Internet Techn. 22(3): 67:1-67:24 (2022) - [j204]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
An authorization model for query execution in the cloud. VLDB J. 31(3): 555-579 (2022) - [c320]Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia:
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models. CIKM 2022: 4064-4068 - [i8]Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia:
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models. CoRR abs/2208.08114 (2022) - 2021
- [j203]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [j202]Prakruthi Karuna, Hemant Purohit, Sushil Jajodia, Rajesh Ganesan, Özlem Uzuner:
Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility. IEEE Syst. J. 15(1): 835-845 (2021) - [j201]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j200]Tanmoy Chakraborty, Sushil Jajodia, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
A Fake Online Repository Generation Engine for Cyber Deception. IEEE Trans. Dependable Secur. Comput. 18(2): 518-533 (2021) - [c319]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Distributed Query Evaluation over Encrypted Data. DBSec 2021: 96-114 - [c318]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:
PatchDB: A Large-Scale Security Patch Dataset. DSN 2021: 149-160 - [c317]Ouri Wolfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski:
Geographic-Region Monitoring by Drones in Adversarial Environments. SIGSPATIAL/GIS 2021: 480-483 - [c316]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. MILCOM 2021: 595-600 - [c315]Jinsung Jeon, Jing Liu, Jayoung Kim, Jaehoon Lee, Noseong Park, Jamie Jooyeon Lee, Özlem Uzuner, Sushil Jajodia:
Scalable Graph Synthesis with Adj and 1 - Adj. SDM 2021: 307-315 - [i7]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. CoRR abs/2108.03358 (2021) - 2020
- [j199]Haipeng Chen, Qian Han, Sushil Jajodia, Roy Lindelauf, V. S. Subrahmanian, Yanhai Xiong:
Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare. IEEE Syst. J. 14(3): 3779-3790 (2020) - [j198]Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j197]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j196]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Pierangela Samarati, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j195]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020) - [c314]Xinda Wang, Shu Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
A Machine Learning Approach to Classify Security Patches into Vulnerability Types. CNS 2020: 1-9 - [c313]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [p32]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
An Empirical Study of Secret Security Patch in Open Source Software. Adaptive Autonomous Secure Cyber Systems 2020: 269-289 - [e52]Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i6]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [j194]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j193]Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. Int. J. Inf. Sec. 18(2): 199-218 (2019) - [j192]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j191]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j190]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j189]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [c312]Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c311]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. DSN 2019: 485-492 - [c310]Haipeng Chen, Sushil Jajodia, Jing Liu, Noseong Park, Vadim Sokolov, V. S. Subrahmanian:
FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data. IJCAI 2019: 2074-2080 - [p31]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p30]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p29]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - [e51]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j188]Prakruthi Karuna, Hemant Purohit, Rajesh Ganesan, Sushil Jajodia:
Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception. IEEE Intell. Syst. 33(5): 16-25 (2018) - [j187]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. IEEE Secur. Priv. 16(1): 92-97 (2018) - [j186]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j185]Tanmoy Chakraborty, Sushil Jajodia, Noseong Park, Andrea Pugliese, Edoardo Serra, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. J. Comput. Secur. 26(5): 615-645 (2018) - [j184]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j183]Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. Proc. VLDB Endow. 11(10): 1071-1083 (2018) - [j182]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j181]Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - [j180]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [j179]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [j178]Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. ACM Trans. Internet Techn. 18(3): 30:1-30:41 (2018) - [c309]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [r3]Claudio Bettini, X. Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems (2nd ed.) 2018 - [i5]Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. CoRR abs/1806.03384 (2018) - [i4]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j177]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
An Authorization Model for Multi-Provider Queries. Proc. VLDB Endow. 11(3): 256-268 (2017) - [j176]Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. IEEE Trans. Inf. Forensics Secur. 12(11): 2532-2544 (2017) - [j175]Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk. ACM Trans. Intell. Syst. Technol. 8(4): 52:1-52:32 (2017) - [c308]Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. MTD@CCS 2017: 75-85 - [c307]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [p28]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [p27]Sushil Jajodia, Massimiliano Albanese:
An Integrated Framework for Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 29-46 - [e50]Peng Liu, Sushil Jajodia, Cliff Wang:
Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science 10030, Springer 2017, ISBN 978-3-319-61151-8 [contents] - 2016
- [j174]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Efficient integrity checks for join queries in the cloud. J. Comput. Secur. 24(3): 347-378 (2016) - [j173]Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia:
Minimum cost rule enforcement for cooperative database access. J. Comput. Secur. 24(3): 379-403 (2016) - [j172]Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. J. Comput. Secur. 24(6): 735-791 (2016) - [j171]Paolo Montuschi, Edward J. McCluskey, Samarjit Chakraborty, Jason Cong, Ramón M. Rodríguez-Dagnino, Fred Douglis, Lieven Eeckhout, Gernot Heiser, Sushil Jajodia, Ruby B. Lee, Dinesh Manocha, Tomás F. Pena, Isabelle Puaut, Hanan Samet, Donatella Sciuto:
State of the Journal. IEEE Trans. Computers 65(7): 2014-2018 (2016) - [j170]Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia:
Profiling Online Social Behaviors for Compromised Account Detection. IEEE Trans. Inf. Forensics Secur. 11(1): 176-187 (2016) - [j169]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [j168]Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016) - [c306]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Trusted cloud SQL DBS with on-the-fly AES decryption/encryption. IEEE BigData 2016: 3666-3675 - [c305]Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c304]Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. CNS 2016: 198-206 - [c303]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c302]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement. DEXA Workshops 2016: 19-23 - [c301]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - [c300]Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico:
AHEAD: A New Architecture for Active Defense. SafeConfig@CCS 2016: 11-16 - [c299]Massimiliano Albanese, Sushil Jajodia, R. Jhawa, Vincenzo Piuri:
Dependable and Resilient Cloud Computing. SOSE 2016: 3 - [p26]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
Deceiving Attackers by Creating a Virtual Attack Surface. Cyber Deception 2016: 169-201 - [e49]Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [e48]Sjouke Mauw, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - 2015
- [j167]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Loose associations to increase utility in data publishing. J. Comput. Secur. 23(1): 59-88 (2015) - [j166]Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. ACM Trans. Inf. Syst. Secur. 17(3): 11:1-11:39 (2015) - [c298]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - [c297]Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia:
Disrupting stealthy botnets through strategic placement of detectors. CNS 2015: 95-103 - [c296]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
A deception based approach for defeating OS and service fingerprinting. CNS 2015: 317-325 - [c295]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Numerical SQL Value Expressions Over Encrypted Cloud Databases. DEXA (2) 2015: 455-478 - [c294]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Integrity for Approximate Joins on Untrusted Computational Servers. SEC 2015: 446-459 - [e47]Sushil Jajodia, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3 [contents] - [e46]Raja Naeem Akram, Sushil Jajodia:
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6 [contents] - [e45]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - [i3]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
On-the fly AES Decryption/Encryption for Cloud SQL Databases. CoRR abs/1512.06423 (2015) - 2014
- [b4]Lingyu Wang, Massimiliano Albanese, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j165]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j164]Meixing Le, Krishna Kant, Sushil Jajodia:
Consistency and enforcement of access rules in cooperative data sharing environment. Comput. Secur. 41: 3-18 (2014) - [j163]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j162]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, P