Sushil Jajodia
Sushil Jajodia
University Professor, BDM International Professor, and Director, Center for Secure Information
Verified email at gmu.edu - Homepage
TitleCited byYear
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
S Zhu, S Setia, S Jajodia
ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006
23332006
Exploring steganography: Seeing the unseen
NF Johnson, S Jajodia
Computer 31 (2), 26-34, 1998
18951998
Temporal databases: theory, design, and implementation
AU Tansel, J Clifford, S Gadia, S Jajodia, A Segev, R Snodgrass
Benjamin-Cummings Publishing Co., Inc., 1993
10141993
Flexible support for multiple access control policies
S Jajodia, P Samarati, ML Sapino, VS Subrahmanian
ACM Transactions on Database Systems (TODS) 26 (2), 214-260, 2001
8122001
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures
NF Johnson, Z Duric, S Jajodia
Springer Science & Business Media, 2001
7902001
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S Lee
7122006
The consensus glossary of temporal database concepts—February 1998 version
CS Jensen, CE Dyreson, M Böhlen, J Clifford, R Elmasri, SK Gadia, ...
Temporal Databases: Research and Practice, 367-405, 1998
630*1998
A logical language for expressing authorizations
S Jajodia, P Samarati, VS Subrahmanian
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
6281997
Steganalysis of images created using current steganography software
NF Johnson, S Jajodia
International Workshop on Information Hiding, 273-289, 1998
5621998
An adaptive data replication algorithm
O Wolfson, S Jajodia, Y Huang
ACM Transactions on Database Systems (TODS) 22 (2), 255-314, 1997
5181997
Encyclopedia of cryptography and security
HCA Van Tilborg, S Jajodia
Springer Science & Business Media, 2014
5052014
Topological analysis of network attack vulnerability
S Jajodia, S Noel, B O’berry
Managing Cyber Threats, 247-266, 2005
4862005
Who is tweeting on Twitter: human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
Proceedings of the 26th annual computer security applications conference, 21-30, 2010
4762010
Over-encryption: management of access control evolution on outsourced data
SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 33rd international conference on Very large data bases …, 2007
4662007
Balancing confidentiality and efficiency in untrusted relational DBMSs
E Damiani, S Vimercati, S Jajodia, S Paraboschi, P Samarati
Proceedings of the 10th ACM conference on Computer and communications …, 2003
4432003
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
S Zhu, S Xu, S Setia, S Jajodia
11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003
4412003
Detecting novel network intrusions using bayes estimators
D Barbara, N Wu, S Jajodia
Proceedings of the 2001 SIAM International Conference on Data Mining, 1-17, 2001
4102001
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
4032005
A unified framework for enforcing multiple access control policies
S Jajodia, P Samarati, VS Subrahmanian, E Bertino
ACM Sigmod Record 26 (2), 474-485, 1997
4001997
Detecting automation of twitter accounts: Are you a human, bot, or cyborg?
Z Chu, S Gianvecchio, H Wang, S Jajodia
IEEE Transactions on Dependable and Secure Computing 9 (6), 811-824, 2012
3882012
The system can't perform the operation now. Try again later.
Articles 1–20