Follow
Sushil Jajodia
Sushil Jajodia
University Professor, BDM International Professor, and Director, Center for Secure Information
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
LEAP+ Efficient security mechanisms for large-scale distributed sensor networks
S Zhu, S Setia, S Jajodia
ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006
27792006
Exploring steganography: Seeing the unseen
NF Johnson, S Jajodia
Computer 31 (2), 26-34, 1998
26241998
Temporal databases: theory, design, and implementation
AU Tansel, J Clifford, S Gadia, S Jajodia, A Segev, R Snodgrass
Benjamin-Cummings Publishing Co., Inc., 1993
11881993
Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures
NF Johnson, Z Duric, S Jajodia
Springer Science & Business Media, 2001
9662001
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012
9602012
Flexible support for multiple access control policies
S Jajodia, P Samarati, ML Sapino, VS Subrahmanian
ACM Transactions on Database Systems (TODS) 26 (2), 214-260, 2001
9162001
Encyclopedia of cryptography and security
HCA Van Tilborg, S Jajodia
Springer Science & Business Media, 2014
8722014
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Zhu, S Setia, S Jajodia, P Ning
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004
8352004
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
7882010
A logical language for expressing authorizations
S Jajodia, P Samarati, VS Subrahmanian
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
6921997
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’berry
Managing Cyber Threats: Issues, Approaches, and Challenges, 247-266, 2005
6752005
Steganalysis of images created using current steganography software
NF Johnson, S Jajodia
International Workshop on Information Hiding, 273-289, 1998
6661998
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
6642011
Over-encryption: Management of access control evolution on outsourced data
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 33rd international conference on Very large data bases …, 2007
6062007
Data synthesis based on generative adversarial networks
N Park, M Mohammadi, K Gorde, S Jajodia, H Park, Y Kim
arXiv preprint arXiv:1806.03384, 2018
5802018
An adaptive data replication algorithm
O Wolfson, S Jajodia, Y Huang
ACM Transactions on Database Systems (TODS) 22 (2), 255-314, 1997
5621997
An attack graph-based probabilistic security metric
L Wang, T Islam, T Long, A Singhal, S Jajodia
Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008
5592008
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
5472005
Balancing confidentiality and efficiency in untrusted relational DBMSs
E Damiani, SDC Vimercati, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 10th ACM conference on Computer and communications …, 2003
5252003
Detecting novel network intrusions using bayes estimators
D Barbara, N Wu, S Jajodia
Proceedings of the 2001 SIAM International Conference on Data Mining, 1-17, 2001
4932001
The system can't perform the operation now. Try again later.
Articles 1–20