Duminda Wijesekera
Duminda Wijesekera
Verified email at gmu.edu - Homepage
TitleCited byYear
Scalable, graph-based network vulnerability analysis
P Ammann, D Wijesekera, S Kaushik
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
8952002
A logic-based framework for attribute based access control
L Wang, D Wijesekera, S Jajodia
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
3092004
Detecting VoIP floods using the Hellinger distance
H Sengar, H Wang, D Wijesekera, S Jajodia
IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008
1722008
A propositional policy algebra for access control
D Wijesekera, S Jajodia
ACM Transactions on Information and System Security (TISSEC) 6 (2), 286-325, 2003
1352003
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
Proceedings of the 28th international conference on Very Large Data Bases …, 2002
1322002
Model-based covert timing channels: Automated modeling and evasion
S Gianvecchio, H Wang, D Wijesekera, S Jajodia
International Workshop on Recent Advances in Intrusion Detection, 211-230, 2008
1272008
VoIP intrusion detection through interacting protocol state machines
H Sengar, D Wijesekera, H Wang, S Jajodia
International Conference on Dependable Systems and Networks (DSN'06), 393-402, 2006
1232006
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
1192002
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
A Liu, Y Yuan, D Wijesekera, A Stavrou
Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009
1042009
Securing OLAP data cubes against privacy breaches
L Wang, S Jajodia, D Wijesekera
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 161-175, 2004
1032004
Experimental evaluation of loss perception in continuous media
D Wijesekera, J Srivastava, A Nerode, M Foresti
Multimedia systems 7 (6), 486-499, 1999
1031999
Constructive modal logics I
D Wijesekera
Annals of Pure and Applied Logic 50 (3), 271-301, 1990
991990
Quality of service (QoS) metrics for continuous media
D Wijesekera, J Srivastava
Multimedia Tools and Applications 3 (2), 127-166, 1996
901996
DNPSec: Distributed network protocol version 3 (DNP3) security framework
M Majdalawieh, F Parisi-Presicce, D Wijesekera
Advances in Computer, Information, and Systems Sciences, and Engineering …, 2007
872007
Revocations-a classification
A Hagstrom, S Jajodia, F Parisi-Presicce, D Wijesekera
Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 44-58, 2001
712001
Implementing security policies in software development tools
KS Alghathbar, D Wijesekera
US Patent 7,340,469, 2008
692008
Executable misuse cases for modeling security concerns
J Whittle, D Wijesekera, M Hartong
Proceedings of the 30th international conference on Software engineering …, 2008
672008
Provisions and obligations in policy rule management
C Bettini, S Jajodia, XS Wang, D Wijesekera
Journal of Network and Systems Management 11 (3), 351-372, 2003
672003
Fast detection of denial-of-service attacks on IP telephony
H Sengar, H Wang, D Wijesekera, S Jajodia
200614th IEEE International Workshop on Quality of Service, 199-208, 2006
632006
Implementing Security Policies in Software Development Tools
K Alghathbar, D Wijesekera
US Patent App. 11/969,513, 2009
542009
The system can't perform the operation now. Try again later.
Articles 1–20