Sushil Jajodia
Sushil Jajodia
University Professor, BDM International Professor, and Director, Center for Secure Information
Geverifieerd e-mailadres voor gmu.edu - Homepage
Geciteerd door
Geciteerd door
LEAP+ Efficient security mechanisms for large-scale distributed sensor networks
S Zhu, S Setia, S Jajodia
ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006
Exploring steganography: Seeing the unseen
NF Johnson, S Jajodia
Computer 31 (2), 26-34, 1998
Temporal databases: theory, design, and implementation
AU Tansel, J Clifford, S Gadia, S Jajodia, A Segev, R Snodgrass
Benjamin-Cummings Publishing Co., Inc., 1993
Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures
NF Johnson, Z Duric, S Jajodia
Springer Science & Business Media, 2001
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012
Flexible support for multiple access control policies
S Jajodia, P Samarati, ML Sapino, VS Subrahmanian
ACM Transactions on Database Systems (TODS) 26 (2), 214-260, 2001
Encyclopedia of cryptography and security
HCA Van Tilborg, S Jajodia
Springer Science & Business Media, 2014
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
A logical language for expressing authorizations
S Jajodia, P Samarati, VS Subrahmanian
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’berry
Managing Cyber Threats: Issues, Approaches, and Challenges, 247-266, 2005
Steganalysis of images created using current steganography software
NF Johnson, S Jajodia
International Workshop on Information Hiding, 273-289, 1998
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
Over-encryption: Management of access control evolution on outsourced data
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 33rd international conference on Very large data bases …, 2007
An adaptive data replication algorithm
O Wolfson, S Jajodia, Y Huang
ACM Transactions on Database Systems (TODS) 22 (2), 255-314, 1997
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal, S Jajodia
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
Balancing confidentiality and efficiency in untrusted relational DBMSs
E Damiani, SDC Vimercati, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Data synthesis based on generative adversarial networks
N Park, M Mohammadi, K Gorde, S Jajodia, H Park, Y Kim
arXiv preprint arXiv:1806.03384, 2018
Detecting novel network intrusions using bayes estimators
D Barbara, N Wu, S Jajodia
Proceedings of the 2001 SIAM International Conference on Data Mining, 1-17, 2001
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20