default search action
Duminda Wijesekera
Person information
- affiliation: George Mason University, Fairfax, Virginia, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c160]Bikram Adhikari, Zoran Duric, Duminda Wijesekera, Bo Yu:
Comparative Study of Attention among Drivers with Varying Driving Experience. IV 2024: 1353-1360 - [c159]Mahbubul Alam Palash, Duminda Wijesekera:
Benchmarking the Performance of 5G CV2X for Connected Vehicles based Adaptive Traffic Signal. IV 2024: 1853-1858 - 2023
- [c158]Mahbubul Alam Palash, Duminda Wijesekera:
Adaptive Traffic Signal Control using CV2X. VTC Fall 2023: 1-7 - 2022
- [j44]James Bret Michael, George W. Dinolt, Frederick B. Cohen, Duminda Wijesekera:
Can You Trust Zero Trust? Computer 55(8): 103-105 (2022) - [j43]Howard D. Grimes, Gabriela F. Ciocarlie, Bo Yu, Duminda Wijesekera, Gregory E. Shannon, Wayne Austad, Charles Fracchia, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. IEEE Secur. Priv. 20(6): 53-65 (2022) - [c157]Matthew Jablonski, Duminda Wijesekera, Anoop Singhal:
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory. SAT-CPS@CODASPY 2022: 13-20 - [c156]Rami Alnafrani, Duminda Wijesekera:
AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System. ISDFS 2022: 1-6 - [c155]Rami Alnafrani, Duminda Wijesekera:
An Automated Framework for Generating Attack Graphs Using Known Security Threats. ISDFS 2022: 1-6 - [c154]Thabet Kacem, Alexandre B. Barreto, Paulo Costa, Duminda Wijesekera:
A Key Management Module for Secure ADS-B. ITSC 2022: 1784-1789 - 2021
- [j42]Matthew Lanoue, Chad A. Bollmann, James Bret Michael, John D. Roth, Duminda Wijesekera:
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities. Computer 54(4): 76-84 (2021) - [j41]James Bret Michael, Doron Drusinsky, Duminda Wijesekera:
Formal Verification of Cyberphysical Systems. Computer 54(9): 15-24 (2021) - [j40]James Bret Michael, Doron Drusinsky, Duminda Wijesekera:
Formal Methods in Cyberphysical Systems. Computer 54(9): 25-29 (2021) - [c153]Thabet Kacem, Aydin Kaya, Ali Seydi Keçeli, Cagatay Catal, Duminda Wijesekera, Paulo Costa:
ADS-B Attack Classification using Machine Learning Techniques. IV Workshops 2021: 7-12 - [c152]Yongxin Wang, Duminda Wijesekera:
Pixel Invisibility: Detect Object Unseen in Color Domain. VEHITS 2021: 201-210 - 2020
- [c151]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments. IFIP Int. Conf. Digital Forensics 2020: 161-180 - [i1]Yongxin Wang, Duminda Wijesekera:
Pixel Invisibility: Detecting Objects Invisible in Color Images. CoRR abs/2006.08383 (2020)
2010 – 2019
- 2019
- [j39]Michael P. Heinl, Bo Yu, Duminda Wijesekera:
A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond. J. Digit. Forensics Secur. Law 14(1): 2:1-2:19 (2019) - [c150]Paul Seymer, Chaitanya Yavvari, Duminda Wijesekera, Cing-Dao Kan:
Coordinating AV Dispatch with Smart Remote Parking. CAVS 2019: 1-7 - [c149]Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt, Duminda Wijesekera:
An Attack-Fault Tree Analysis of a Movable Railroad Bridge. Critical Infrastructure Protection 2019: 51-71 - [c148]Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera:
DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS. IFIP Int. Conf. Digital Forensics 2019: 253-272 - [c147]Paul Seymer, Duminda Wijesekera, Cing-Dao Kan:
Smart Parking Zones Using Meshed Bluetooth Sensor Networks. SMARTGREENS/VEHITS (Selected Papers) 2019: 245-269 - [c146]Paul Seymer, Duminda Wijesekera, Cing-Dao Kan:
Smart Parking Zones using Dual Mode Routed Bluetooth Fogged Meshes. VEHITS 2019: 211-222 - [c145]Paul Seymer, Duminda Wijesekera, Cing-Dao Kan:
Secure Outdoor Smart Parking Using Dual Mode Bluetooth Mesh Networks. VTC Spring 2019: 1-7 - [c144]Chaitanya Yavvari, Duminda Wijesekera, Zoran Duric:
Stable and Safe Automated Driving Using 3-D Road Geometric Features. VTC Spring 2019: 1-7 - 2018
- [j38]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa:
ADS-Bsec: A Holistic Framework to Secure ADS-B. IEEE Trans. Intell. Veh. 3(4): 511-521 (2018) - [j37]Satish Kolli, Joshua Lilly, Duminda Wijesekera:
Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness. IEEE Veh. Technol. Mag. 13(3): 48-60 (2018) - [c143]Mohammad Ababneh, Malik Qasaimeh, Duminda Wijesekera, Paulo C. G. Costa:
Performance of Generating Dialogs from Ontology and Context. AICCSA 2018: 1-6 - [c142]Michael Reep, Bo Yu, Duminda Wijesekera, Paulo C. G. Costa:
Sharing Genetic Data under US Privacy Laws. HEALTHINF 2018: 349-360 - [c141]Eniye Tebekaemi, Duminda Wijesekera:
A Communications Model for Decentralized Autonomous Control of the Power Grid. ICC 2018: 1-6 - [c140]Eniye Tebekaemi, Duminda Wijesekera, Paulo C. G. Costa:
An Integrated Control and Intrusion Detection System for Smart Grid Security. Critical Infrastructure Protection 2018: 243-264 - [c139]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis. IFIP Int. Conf. Digital Forensics 2018: 263-289 - [c138]Chaitanya Yavvari, Zoran Duric, Duminda Wijesekera:
Cooperative Collision Avoidance by Sharing Vehicular Subsystem Data. Intelligent Vehicles Symposium 2018: 1346-1353 - [c137]Santos Jha, Chaitanya Yavvari, Duminda Wijesekera:
Pseudonym Certificate Validations under Heavy Vehicular Traffic Loads. VNC 2018: 1-7 - 2017
- [j36]Thabet Kacem, Alexandre Barreto, Duminda Wijesekera, Paulo C. G. Costa:
ADS-Bsec: A novel framework to secure ADS-B. ICT Express 3(4): 160-163 (2017) - [c136]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A layered graphical model for mission attack impact analysis. CNS 2017: 602-609 - [c135]Eniye Tebekaemi, Edward Colbert, Duminda Wijesekera:
Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback. Critical Infrastructure Protection 2017: 45-62 - [c134]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. IFIP Int. Conf. Digital Forensics 2017: 111-130 - [c133]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa:
Key distribution scheme for aircraft equipped with secure ADS-B IN. ITSC 2017: 1-6 - [c132]Chaitanya Yavvari, Zoran Duric, Duminda Wijesekera:
Vehicular dynamics based plausibility checking. ITSC 2017: 1-8 - [c131]KamalEldin Mohamed, Duminda Wijesekera, Paulo Cesar G. da Costa:
An Authentication Mechanism for Accessing Mobile Web Services. MobiWIS 2017: 147-162 - [p4]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. Research Advances in Cloud Computing 2017: 371-391 - 2016
- [c130]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Probabilistic Network Forensic Model for Evidence Analysis. IFIP Int. Conf. Digital Forensics 2016: 189-210 - [c129]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa, Alexandre Barreto:
Secure ADS-B framework "ADS-Bsec". ITSC 2016: 2681-2686 - [c128]Michael Reep, Bo Yu, Duminda Wijesekera, Paulo C. G. Costa:
Sharing Data under Genetic Privacy Laws. STIDS 2016: 46-54 - [c127]Thabet Kacem, Duminda Wijesekera, Paulo Cesar G. da Costa, Alexandre Barreto:
An ADS-B Intrusion Detection System. Trustcom/BigDataSE/ISPA 2016: 544-551 - 2015
- [c126]Anoop Singhal, Changwei Liu, Duminda Wijesekera:
POSTER: A Logic Based Network Forensics Model for Evidence Analysis. CCS 2015: 1677 - [c125]Marcio Monteiro, Alexandre Barreto, Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa:
Detecting malicious ADS-B transmitters using a low-bandwidth sensor network. FUSION 2015: 1696-1701 - [c124]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa, Jeronymo M. A. Carvalho, Marcio Monteiro, Alexandre Barreto:
Secure ADS-B design & evaluation. ICVES 2015: 213-218 - [c123]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Logic-Based Network Forensic Model for Evidence Analysis. IFIP Int. Conf. Digital Forensics 2015: 129-145 - [c122]Bo Yu, Duminda Wijesekera, Paulo C. G. Costa, Sharath Hiremegalore:
Genetic Counseling Using Workflow-based EMRs. STIDS 2015: 66-73 - [c121]Alonza Mumford, Duminda Wijesekera, Paulo C. G. Costa:
Toward Representing and Recognizing Cyber-Physical Autonomous Agents in Competition Using Event Semantics. STIDS 2015: 82-89 - 2014
- [j35]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Security requirement derivation by noun-verb analysis of use-misuse case relationships: a case study using positive train control. Innov. Syst. Softw. Eng. 10(2): 103-122 (2014) - [j34]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction. J. Digit. Forensics Secur. Law 9(2): 181-196 (2014) - [j33]Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera:
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes. IEEE Trans. Software Eng. 40(2): 154-166 (2014) - [c120]Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo C. G. Costa:
An Automated Dialog System for Conducting Security Interviews for Access Control. Critical Infrastructure Protection 2014: 111-125 - [c119]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Model Towards Using Evidence from Security Events for Network Attack Analysis. WOSIS 2014: 83-95 - [c118]Alonza Mumford, Duminda Wijesekera:
Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions. STIDS 2014: 32-39 - [c117]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa, Alexandre Barreto:
Security Requirements Analysis of ADS-B Networks. STIDS 2014: 40-47 - [c116]Bo Yu, Duminda Wijesekera, Paulo C. G. Costa:
An Ontology for Medical Treatment Consent. STIDS 2014: 72-79 - 2013
- [j32]Andre Abadie, Duminda Wijesekera:
An approach for risk assessment and mitigation in cognitive radio technologies. Int. J. Inf. Priv. Secur. Integr. 1(4): 344-359 (2013) - [c115]Andre B. Bondi, Damindra Bandara, Michael Smith, Rajni Goel, Duminda Wijesekera:
Timely Delivery of Messages in Positive Train Control. Critical Infrastructure Protection 2013: 139-152 - [c114]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Creating Integrated Evidence Graphs for Network Forensics. IFIP Int. Conf. Digital Forensics 2013: 227-241 - [c113]Murad Mehmet, Murat Günestas, Duminda Wijesekera:
Dynamic Risk Model of Money Laundering. RISK@ICTSS 2013: 3-20 - [c112]Murad Mehmet, Duminda Wijesekera:
Data Analytics to Detect Evolving Money Laundering. STIDS 2013: 71-78 - [c111]Mohammad Ababneh, Duminda Wijesekera:
An Ontological Inference Driven Interactive Voice Recognition System. STIDS 2013: 125-132 - [c110]Paul Ngo, Duminda Wijesekera:
Navigation Assistance Framework for Emergencies. STIDS 2013: 149-156 - 2012
- [j31]Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael:
Securing the ZigBee Protocol in the Smart Grid. Computer 45(4): 92-94 (2012) - [c109]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Using Attack Graphs in Forensic Examinations. ARES 2012: 596-603 - [c108]Andre Abadie, Duminda Wijesekera:
Leveraging an Inventory of the Cognitive Radio Attack Surface. CyberSecurity 2012: 136-143 - [c107]Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera:
Forensics filesystem with cluster-level identifiers for efficient data recovery. ICITST 2012: 411-415 - [c106]Paul Ngo, Duminda Wijesekera:
Emergency Messages in the Commercial Mobile Alert System. Critical Infrastructure Protection 2012: 171-184 - [c105]Andre Abadie, Duminda Wijesekera:
Cognitive radio technologies: Envisioning the realization of network-centric warfare. MilCIS 2012: 1-7 - [c104]KamalEldin Mohamed, Duminda Wijesekera:
A Lightweight Framework for Web Services Implementations on Mobile Devices. IEEE MS 2012: 64-71 - [c103]Mohammad Ababneh, Duminda Wijesekera, James Bret Michael:
A Policy-Based Dialogue System for Physical Access Control. STIDS 2012: 57-63 - [c102]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Mapping evidence graphs to attack graphs. WIFS 2012: 121-126 - [c101]KamalEldin Mohamed, Duminda Wijesekera:
Performance Analysis of Web Services on Mobile Devices. ANT/MobiWIS 2012: 744-751 - [p3]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Transportation. Critical Infrastructure Protection 2012: 330-355 - 2011
- [j30]Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services Framework. IT Prof. 13(3): 31-37 (2011) - [j29]Min Xu, Duminda Wijesekera, Xinwen Zhang:
Runtime Administration of an RBAC Profile for XACML. IEEE Trans. Serv. Comput. 4(4): 286-299 (2011) - [c100]Bo Yu, J. Varga, Duminda Wijesekera, Angelos Stavrou, Anoop Singhal:
Specifying Time-Out Points in Surgical EMRs-Work in Progress. CENTERIS (3) 2011: 165-174 - [c99]Paul Ngo, Duminda Wijesekera:
Enhancing the Usability of the Commercial Mobile Alert System. Critical Infrastructure Protection 2011: 137-149 - [c98]Ahmed Al-Faresi, Duminda Wijesekera:
Preemptive mechanism to prevent health data privacy leakage. MEDES 2011: 17-24 - 2010
- [j28]Ahmed Alazzawe, Anis Alazzawe, Duminda Wijesekera, Ram Dantu:
A testbed for large mobile social computing experiments. Int. J. Sens. Networks 8(2): 89-97 (2010) - [c97]Vikram Chandrasekaran, Ram Dantu, Neeraj K. Gupta, Xiaohui Yang, Duminda Wijesekera:
Efficiency of social connection-based routing in P2P VoIP networks. COMSNETS 2010: 1-6 - [c96]Anoop Singhal, Duminda Wijesekera:
Ontologies for modeling enterprise level security metrics. CSIIRW 2010: 58 - [c95]Mark Hartong, Rajni Goel, Duminda Wijesekera:
U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials. Critical Infrastructure Protection 2010: 141-155 - [c94]Murat Gunestas, Murad Mehmet, Duminda Wijesekera:
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services. IFIP Int. Conf. Digital Forensics 2010: 133-150 - [c93]Ahmed Al-Faresi, Duminda Wijesekera, Khalid Moidu:
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules. IHI 2010: 637-646 - [c92]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100 - [c91]Xiaohui Yang, Angelos Stavrou, Ram Dantu, Duminda Wijesekera:
Small World VoIP. MobiCASE 2010: 137-155 - [c90]Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia:
QoP and QoS Policy Cognizant Module Composition. POLICY 2010: 77-86 - [c89]Murad Mehmet, Duminda Wijesekera:
Ontological Constructs to Create Money Laundering Schemes. STIDS 2010: 21-29 - [c88]Paul Ngo, Duminda Wijesekera:
Using Ontological Information to Enhance Responder Availability in Emergency Response. STIDS 2010: 42-49 - [c87]Ahmed A. L. Faresi, Bo Yu, Khalid Moidu, Angelos Stavrou, Duminda Wijesekera, Anoop Singhal:
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract. HealthSec 2010
2000 – 2009
- 2009
- [c86]Xiaohui Yang, Ram Dantu, Duminda Wijesekera:
Achieving Peer-to-Peer Telecommunication Services through Social Hashing. CCNC 2009: 1-2 - [c85]Murat Gunestas, Duminda Wijesekera:
Online detection of web choreography misuses. CollaborateCom 2009: 1-10 - [c84]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Meta-models for misuse cases. CSIIRW 2009: 33 - [c83]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Secure Cross-Domain Train Scheduling. Critical Infrastructure Protection 2009: 199-211 - [c82]Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Online detection of network traffic anomalies using behavioral distance. IWQoS 2009: 1-9 - [c81]Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray:
Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 - [c80]Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou:
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 - [c79]Min Xu, Duminda Wijesekera:
A role-based XACML administration and delegation profile and its enforcement architecture. SWS 2009: 53-60 - [c78]Randall J. Arvay, Duminda Wijesekera, James Bret Michael:
Using RuleML to specify cross-domain information flow control policies. SoSE 2009: 1-6 - [c77]Murat Gunestas, Duminda Wijesekera, Ahmed Elkhodary:
An evidence generation model for web services. SoSE 2009: 1-6 - [c76]Anis Alazzawe, Ahmed Alazzawe, Duminda Wijesekera, Ram Dantu:
A testbed for mobile social computing. TRIDENTCOM 2009: 1-6 - [c75]Xiaohui Yang, Ram Dantu, Duminda Wijesekera:
A society-integrated testbed architecture for peer-to-peer telecommunications. TRIDENTCOM 2009: 1-6 - 2008
- [j27]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Security and the US rail infrastructure. Int. J. Crit. Infrastructure Prot. 1: 15-28 (2008) - [j26]Khaled Alghathbar, Duminda Wijesekera:
Enforcing Security Policies in Requirements Engineering Using AFUML. Int. J. Comput. Their Appl. 15(4): 237-251 (2008) - [j25]Steve Barker, Marek J. Sergot, Duminda Wijesekera:
Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): 1:1-1:47 (2008) - [j24]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distributed Syst. 19(6): 794-805 (2008) - [c74]Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera:
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685 - [c73]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera:
Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345 - [c72]Jon Whittle, Duminda Wijesekera, Mark Hartong:
Executable misuse cases for modeling security concerns. ICSE 2008: 121-130 - [c71]Murat Gunestas, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176 - [c70]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260 - [c69]Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 - [c68]Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera:
Voice pharming attack and the trust of VoIP. SecureComm 2008: 24 - [e2]Kathryn Blackmond Laskey, Duminda Wijesekera:
Towards Effective Exploitation and Integration of Intelligence Resources, Proceedings of the Third International Ontology for the Intelligence Community Conference, OIC 2008, Fairfax, VA, USA, December 3-4, 2008. CEUR Workshop Proceedings 440, CEUR-WS.org 2008 [contents] - 2007
- [b1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180 - [j23]