Follow
Sushil Jajodia
Sushil Jajodia
University Professor, BDM International Professor, and Director, Center for Secure Information
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
LEAP+ Efficient security mechanisms for large-scale distributed sensor networks
S Zhu, S Setia, S Jajodia
ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006
27732006
Exploring steganography: Seeing the unseen
NF Johnson, S Jajodia
Computer 31 (2), 26-34, 1998
25951998
Temporal databases: theory, design, and implementation
AU Tansel, J Clifford, S Gadia, S Jajodia, A Segev, R Snodgrass
Benjamin-Cummings Publishing Co., Inc., 1993
11861993
Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures
NF Johnson, Z Duric, S Jajodia
Springer Science & Business Media, 2001
9582001
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012
9502012
Flexible support for multiple access control policies
S Jajodia, P Samarati, ML Sapino, VS Subrahmanian
ACM Transactions on Database Systems (TODS) 26 (2), 214-260, 2001
9152001
Encyclopedia of cryptography and security
HCA Van Tilborg, S Jajodia
Springer Science & Business Media, 2014
8622014
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
8312004
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
7832010
A logical language for expressing authorizations
S Jajodia, P Samarati, VS Subrahmanian
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
6921997
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’berry
Managing Cyber Threats: Issues, Approaches, and Challenges, 247-266, 2005
6662005
Steganalysis of images created using current steganography software
NF Johnson, S Jajodia
International Workshop on Information Hiding, 273-289, 1998
6631998
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
6562011
Over-encryption: Management of access control evolution on outsourced data
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 33rd international conference on Very large data bases …, 2007
6042007
An adaptive data replication algorithm
O Wolfson, S Jajodia, Y Huang
ACM Transactions on Database Systems (TODS) 22 (2), 255-314, 1997
5631997
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal, S Jajodia
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
5542008
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
5462005
Data synthesis based on generative adversarial networks
N Park, M Mohammadi, K Gorde, S Jajodia, H Park, Y Kim
arXiv preprint arXiv:1806.03384, 2018
5402018
Balancing confidentiality and efficiency in untrusted relational DBMSs
E Damiani, SDC Vimercati, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 10th ACM conference on Computer and communications …, 2003
5272003
Detecting novel network intrusions using bayes estimators
D Barbara, N Wu, S Jajodia
Proceedings of the 2001 SIAM International Conference on Data Mining, 1-17, 2001
4922001
The system can't perform the operation now. Try again later.
Articles 1–20