


Остановите войну!
for scientists:
Sushil Jajodia
Person information

- affiliation: George Mason University, Fairfax, Virginia, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j208]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j207]Yue Li
, Zeyu Chen, Haining Wang
, Kun Sun
, Sushil Jajodia
:
Understanding Account Recovery in the Wild and its Security Implications. IEEE Trans. Dependable Secur. Comput. 19(1): 620-634 (2022) - [j206]Yanhai Xiong
, Giridhar Ramachandran, Rajesh Ganesan
, Sushil Jajodia
, V. S. Subrahmanian
:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022) - [j205]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
An authorization model for query execution in the cloud. VLDB J. 31(3): 555-579 (2022) - 2021
- [j204]Dorjan Hitaj
, Briland Hitaj, Sushil Jajodia
, Luigi V. Mancini
:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [j203]Prakruthi Karuna
, Hemant Purohit
, Sushil Jajodia
, Rajesh Ganesan
, Özlem Uzuner:
Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility. IEEE Syst. J. 15(1): 835-845 (2021) - [j202]Mengyuan Zhang
, Lingyu Wang
, Sushil Jajodia
, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j201]Tanmoy Chakraborty
, Sushil Jajodia
, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì
, V. S. Subrahmanian
:
A Fake Online Repository Generation Engine for Cyber Deception. IEEE Trans. Dependable Secur. Comput. 18(2): 518-533 (2021) - [c318]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Distributed Query Evaluation over Encrypted Data. DBSec 2021: 96-114 - [c317]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:
PatchDB: A Large-Scale Security Patch Dataset. DSN 2021: 149-160 - [c316]Ouri Wolfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski:
Geographic-Region Monitoring by Drones in Adversarial Environments. SIGSPATIAL/GIS 2021: 480-483 - [c315]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. MILCOM 2021: 595-600 - [c314]Jinsung Jeon, Jing Liu, Jayoung Kim, Jaehoon Lee, Noseong Park, Jamie Jooyeon Lee, Özlem Uzuner, Sushil Jajodia:
Scalable Graph Synthesis with Adj and 1 - Adj. SDM 2021: 307-315 - [i7]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. CoRR abs/2108.03358 (2021) - 2020
- [j200]Haipeng Chen
, Qian Han
, Sushil Jajodia
, Roy Lindelauf, V. S. Subrahmanian
, Yanhai Xiong
:
Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare. IEEE Syst. J. 14(3): 3779-3790 (2020) - [j199]Yubao Zhang
, Jidong Xiao
, Shuai Hao
, Haining Wang
, Sencun Zhu
, Sushil Jajodia
:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j198]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j197]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Pierangela Samarati
, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j196]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020) - [c313]Xinda Wang, Shu Wang
, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
A Machine Learning Approach to Classify Security Patches into Vulnerability Types. CNS 2020: 1-9 - [c312]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [p32]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
An Empirical Study of Secret Security Patch in Open Source Software. Adaptive Autonomous Secure Cyber Systems 2020: 269-289 - [e52]Sushil Jajodia
, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i6]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [j195]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j194]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. Int. J. Inf. Sec. 18(2): 199-218 (2019) - [j193]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j192]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j191]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j190]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [c311]Mengyuan Zhang
, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c310]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. DSN 2019: 485-492 - [c309]Haipeng Chen, Sushil Jajodia, Jing Liu, Noseong Park, Vadim Sokolov, V. S. Subrahmanian:
FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data. IJCAI 2019: 2074-2080 - [p31]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p30]Massimiliano Albanese
, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p29]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - [e51]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j189]Prakruthi Karuna, Hemant Purohit, Rajesh Ganesan, Sushil Jajodia
:
Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception. IEEE Intell. Syst. 33(5): 16-25 (2018) - [j188]Massimiliano Albanese
, Sushil Jajodia
, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. IEEE Secur. Priv. 16(1): 92-97 (2018) - [j187]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j186]Tanmoy Chakraborty, Sushil Jajodia
, Noseong Park, Andrea Pugliese, Edoardo Serra
, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. J. Comput. Secur. 26(5): 615-645 (2018) - [j185]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j184]Noseong Park, Mahmoud Mohammadi
, Kshitij Gorde, Sushil Jajodia
, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. Proc. VLDB Endow. 11(10): 1071-1083 (2018) - [j183]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j182]Ning Zhang
, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou
, Sushil Jajodia
:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - [j181]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia
:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [j180]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [j179]Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. ACM Trans. Internet Techn. 18(3): 30:1-30:41 (2018) - [c308]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [r3]Claudio Bettini, X. Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems (2nd ed.) 2018 - [i5]Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. CoRR abs/1806.03384 (2018) - [i4]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j178]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
An Authorization Model for Multi-Provider Queries. Proc. VLDB Endow. 11(3): 256-268 (2017) - [j177]Sushil Jajodia
, Noseong Park, Fabio Pierazzi
, Andrea Pugliese
, Edoardo Serra
, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. IEEE Trans. Inf. Forensics Secur. 12(11): 2532-2544 (2017) - [j176]Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk. ACM Trans. Intell. Syst. Technol. 8(4): 52:1-52:32 (2017) - [c307]Sridhar Venkatesan, Massimiliano Albanese
, Ankit Shah, Rajesh Ganesan, Sushil Jajodia
:
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. MTD@CCS 2017: 75-85 - [c306]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [p28]Massimiliano Albanese
, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia
, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [p27]Sushil Jajodia
, Massimiliano Albanese
:
An Integrated Framework for Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 29-46 - [e50]Peng Liu, Sushil Jajodia
, Cliff Wang:
Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science 10030, Springer 2017, ISBN 978-3-319-61151-8 [contents] - 2016
- [j175]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi, Pierangela Samarati
:
Efficient integrity checks for join queries in the cloud. J. Comput. Secur. 24(3): 347-378 (2016) - [j174]Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia
:
Minimum cost rule enforcement for cooperative database access. J. Comput. Secur. 24(3): 379-403 (2016) - [j173]Sushil Jajodia
, Noseong Park, Edoardo Serra
, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. J. Comput. Secur. 24(6): 735-791 (2016) - [j172]Paolo Montuschi
, Edward J. McCluskey, Samarjit Chakraborty, Jason Cong, Ramón M. Rodríguez-Dagnino, Fred Douglis, Lieven Eeckhout, Gernot Heiser, Sushil Jajodia, Ruby B. Lee, Dinesh Manocha, Tomás F. Pena, Isabelle Puaut, Hanan Samet, Donatella Sciuto:
State of the Journal. IEEE Trans. Computers 65(7): 2014-2018 (2016) - [j171]Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia
:
Profiling Online Social Behaviors for Compromised Account Detection. IEEE Trans. Inf. Forensics Secur. 11(1): 176-187 (2016) - [j170]Mengyuan Zhang
, Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [j169]Rajesh Ganesan, Sushil Jajodia
, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016) - [c305]Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
Trusted cloud SQL DBS with on-the-fly AES decryption/encryption. IEEE BigData 2016: 3666-3675 - [c304]Sridhar Venkatesan, Massimiliano Albanese
, George Cybenko, Sushil Jajodia
:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c303]Sridhar Venkatesan, Massimiliano Albanese
, Kareem Amin, Sushil Jajodia
, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. CNS 2016: 198-206 - [c302]Daniel Borbor, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c301]Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement. DEXA Workshops 2016: 19-23 - [c300]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - [c299]Fabio De Gaspari
, Sushil Jajodia
, Luigi V. Mancini, Agostino Panico:
AHEAD: A New Architecture for Active Defense. SafeConfig@CCS 2016: 11-16 - [c298]Massimiliano Albanese, Sushil Jajodia, R. Jhawa, Vincenzo Piuri:
Dependable and Resilient Cloud Computing. SOSE 2016: 3 - [p26]Massimiliano Albanese
, Ermanno Battista, Sushil Jajodia
:
Deceiving Attackers by Creating a Virtual Attack Surface. Cyber Deception 2016: 169-201 - [e49]Sushil Jajodia
, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [e48]Sjouke Mauw
, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - 2015
- [j168]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Loose associations to increase utility in data publishing. J. Comput. Secur. 23(1): 59-88 (2015) - [j167]Edoardo Serra
, Sushil Jajodia
, Andrea Pugliese
, Antonino Rullo
, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. ACM Trans. Inf. Syst. Secur. 17(3): 11:1-11:39 (2015) - [c297]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia
:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - [c296]Sridhar Venkatesan, Massimiliano Albanese
, Sushil Jajodia
:
Disrupting stealthy botnets through strategic placement of detectors. CNS 2015: 95-103 - [c295]Massimiliano Albanese
, Ermanno Battista, Sushil Jajodia
:
A deception based approach for defeating OS and service fingerprinting. CNS 2015: 317-325 - [c294]Sushil Jajodia
, Witold Litwin, Thomas J. E. Schwarz:
Numerical SQL Value Expressions Over Encrypted Cloud Databases. DEXA (2) 2015: 455-478 - [c293]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for Approximate Joins on Untrusted Computational Servers. SEC 2015: 446-459 - [e47]Sushil Jajodia
, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3 [contents] - [e46]Raja Naeem Akram, Sushil Jajodia:
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6 [contents] - [e45]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - [i3]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
On-the fly AES Decryption/Encryption for Cloud SQL Databases. CoRR abs/1512.06423 (2015) - 2014
- [b4]Lingyu Wang, Massimiliano Albanese
, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j166]Massimiliano Albanese
, Alessandra De Benedictis
, Sushil Jajodia
, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j165]Meixing Le, Krishna Kant, Sushil Jajodia
:
Consistency and enforcement of access rules in cooperative data sharing environment. Comput. Secur. 41: 3-18 (2014) - [j164]Lingyu Wang, Sushil Jajodia
, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j163]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Fragmentation in Presence of Data Dependencies. IEEE Trans. Dependable Secur. Comput. 11(6): 510-523 (2014) - [j162]Sankardas Roy, Mauro Conti
, Sanjeev Setia, Sushil Jajodia
:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. IEEE Trans. Inf. Forensics Secur. 9(4): 681-694 (2014) - [c292]Sushil Jajodia
, Kun Sun:
MTD 2014: First ACM Workshop on Moving Target Defense. CCS 2014: 1550-1551 - [c291]Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia
:
Self-healing wireless networks under insider jamming attacks. CNS 2014: 220-228 - [c290]Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Integrity for distributed queries. CNS 2014: 364-372 - [c289]Massimiliano Albanese
, Ermanno Battista, Sushil Jajodia
, Valentina Casola
:
Manipulating the attacker's view of a system's attack surface. CNS 2014: 472-480 - [c288]Steven Noel, Sushil Jajodia
:
Metrics suite for network attack graph analytics. CISR 2014: 5-8 - [c287]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia
, Stefano Paraboschi, Pierangela Samarati
:
Optimizing Integrity Checks for Join Queries in the Cloud. DBSec 2014: 33-48 - [c286]Meixing Le, Krishna Kant, Sushil Jajodia
:
Consistent Query Plan Generation in Secure Cooperative Data Access. DBSec 2014: 227-242 - [c285]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia
:
TrustDump: Reliable Memory Acquisition on Smartphones. ESORICS (1) 2014: 202-218 - [c284]Lingyu Wang, Mengyuan Zhang
, Sushil Jajodia
, Anoop Singhal, Massimiliano Albanese
:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - [c283]Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese
, Sushil Jajodia
:
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. ICETE (Selected Papers) 2014: 191-211 - [c282]George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ICISS 2014: 1-8 - [c281]Kun Sun, Sushil Jajodia
:
Protecting Enterprise Networks through Attack Surface Expansion. SafeConfig 2014: 29-32 - [c280]Paulo Shakarian, Damon Paulo, Massimiliano Albanese
, Sushil Jajodia:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. SECRYPT 2014: 19-30 - [c279]Zhang Xu, Haining Wang, Sushil Jajodia
:
Gemini: An Emergency Line of Defense against Phishing Attacks. SRDS 2014: 11-20 - [p25]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati:
Database Security and Privacy. Computing Handbook, 3rd ed. (2) 2014: 53: 1-21 - [p24]Zhan Wang, Kun Sun, Sushil Jajodia
, Jiwu Jing:
Proof of Isolation for Cloud Storage. Secure Cloud Computing 2014: 95-121 - [p23]Meixing Le, Krishna Kant, Sushil Jajodia
:
Enabling Collaborative Data Authorization Between Enterprise Clouds. Secure Cloud Computing 2014: 149-169 - [p22]