Sushil
Jajodia
List of Publications 2011 and beyond
- Lingyu Wang, Massimiliano Albanese, Sushil Jajodia,
Network Hardening: An Automated Approach to Improving Network Security,
ISBN 978-3-319-04611-2, SpringerBriefs
in Computer Science, 2014, 60 pages.
- Sushil Jajodia, Pierangela Samarati,
Moti Yung, Encyclopedia of Cryptography, Security & Privacy, 3rd edition, Springer, In
preparation.
Flyer
- Lingyu Wang, Sushil Jajodia, Anoop Singhal, Network
Security Metrics, Springer, In preparation.
- Peng Liu, Sushil Jajodia, Cliff Wang, Recent Advances
in Cyber Situation Awareness, Springer LNCS State-of-the-Art Survey Series,
Vol. 10030, In preparation.
- Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup,
Cliff Wang, eds., Cyber Deception: Building the Scientific Foundation,
ISBN 978-3-319-32697-9, Springer, Switzerland, 2016, 314 pages.
DOI:
10.1007/978-3-319-32699-3
- Sushil Jajodia, Paulo Shakarian, V. S.
Subrahmanian, Vipin Swarup, Cliff Wang, eds.,
Cyber Warfare: Building the Scientific
Foundation, ISBN 978-3-319-1408-4, Springer, Berlin, 2015, 340 pages.
- Sushil Jajodia, Krishna Kant, Pierangela Samarati,
Anoop Singhal, Vipin Swarup, Cliff Wang, eds.,
Secure Cloud Computing, ISBN 978-1-4614-9278-8, Springer, Berlin, 2014,
343 pages.
review
- Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian,
Vipin Swarup, Cliff Wang, X. Sean Wang, eds.,
Moving Target Defense II: Application of Game Theory and Adversarial
Modeling, ISBN 978-1-4614-5415-1, Springer Advances in Information
Security, Vol. 100, Berlin, 2013, 203 pages.
online version
- Henk C. A. van Tilborg, Sushil Jajodia, eds.,
Encyclopedia of Cryptography and Security, 2nd edition, ISBN
978-1-4419-5905-8, Springer, Berlin, 2011, 1435 pages (in 2 volumes).
dblp
- Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff
Wang, X. Sean Wang, eds.,
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats,
ISBN 978-1-4614-0976-2, Springer Advances in Information Security, Vol. 54,
Berlin, 2011, 183 pages.
online
version
Chinese Translation
- Sjouke Mauw, Barbara Kordy, Sushil Jajodia, eds., Graphical Models for
Security, Springer Lecture Notes in Computer Science, Vol. 9390, Springer
International Publishing, Switzerland, 2016.
DOI:
10.1007/978-3-319-29968-6
- Sushil Jajodia, Chandan Mazumdar,
Proceedings of the 11th International Conference on Information System
Security (ICISS), Springer Lecture Notes in
Computer Science, Vol. 9478, Springer, Berlin, 2015. DOI:
10.1007/978-3-319-26961-0
- Raja Akram, Sushil Jajodia, eds.,
Proc. 9th IFIP WG
11.2 International Conference on Information Security Theory and Practice
(WISTP 2015), Springer, 2015, 281 pages. DOI:
10.1007/978-3-319-24018-3
- Sushil Jajodia, Kun Sun, eds.,
Proceedings of the First ACM Workshop on
Moving Target Defense, ACM, 2014. DOI:
10.1145/2660267.2660385
- Nora Cuppens-Boulahia, Frederic
Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans, eds.,
ICT System Security and Privacy Protection - Proc. 29th IFIP TC 11
International Conference, SEC 2014, Springer, 2014.
- Jason Crampton, Sushil Jajodia, Keith Mayes, eds.,
Proceedings of the 18th European Symposium on Research in Computer Security
(ESORICS 2013), Springer Lecture Notes in Computer Science, Vol. 8134,
Springer, Berlin, 2013.
- Sushil Jajodia, Chandan Mazumdar,
Proceedings of the 7th International Conference on Information System
Security (ICISS), ISBN 978-3-642-25559-5, Springer Lecture Notes in
Computer Science, Vol. 7093, Springer, Berlin, 2011, 388 pages.
dblp
- Rajesh Ganesan, Sushil Jajodia,
Hasan Cam, "Optimal scheduling of cybersecurity analysts for
minimizing risk," ACM Trans. on Intelligent
Systems and Technology, To appear.
-
Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "A methodology
to measure and monitor level of operational effectiveness in a CSOC,"
Springer International Journal of Information Security, To appear.
-
Massimiliano Albanese, Sushil Jajodia, "A graphical model to assess the
impact of multi-step attacks," Journal of Defense Modeling and
Simulation, To appear.
-
Sushil Jajodia, Noseong Park, Edoardo Serra, V. S.
Subrahmanian, "Using temporal probabilistic logic for optimal monitoring of
security events with limited resources," Journal of Computer Security,
Vol. 24, No. 6, 2016, pages 735-791.
DOI: 10.3233/JCS-160555
- Rajesh Ganesan, Sushil Jajodia, Ankit Shah,
Hasan Cam, "Dynamic scheduling of cybersecurity analysts for
minimizing risk using reinforcement learning," ACM Trans. on Intelligent
Systems and Technology, Vol. 8, No. 1, 2016.
DOI:
10.1145/2882969
Appendix
-
Sabrina De Capitani di Vimercati, Sara Foresti,
Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati,
"Efficient integrity checks for join queries in the cloud," Journal of
Computer Security, Vol. 24, 2016, papges 347-378. DOI:
10.3233/JCS-160545
- Meixing Le, Krishna Kant, Malek Athamnah,
Sushil Jajodia, "Minimum cost rule enforcement for cooperative database
access," Journal of Computer Security, Vol. 24, 2016, pages
379-403. DOI: 10.3233/JCS-160548
- Mengyuan Zhang, Lingyu Wang, Sushil Jajodia,
Anoop Singhal, Massimiliano Albanese, "Network diversity: A security metric
for evaluating the resilience of networks against zero-day attacks,"
IEEE Trans. on Information Forensics and Security, Vol. 11, No. 5, May
2016, pages 1071-1086.
DOI: 10.1109/TIFS.2016.2516916
- Xin Ruan, Zhenyu Wu, Haining Wang, Sushil
Jajodia, "Profiling online social behaviors for compromised account
detection," IEEE Trans. on Information Forensics and Security, Vol. 11, No. 1,
January 2016, pages 176-187. DOI:
10.1109/TIFS.2015.2482465
- Edoardo Serra, Sushil Jajodia, Andrea
Pugliese, Antonino Rullo, V. S. Subrahmanian, "Pareto-optimal adversarial
defense of enterprise systems," ACM Trans. on Information and System
Security, Vol. 17, No. 3, Article 11, March 2015, 39 pages.
DOI:
10.1145/2699907
-
Sabrina De Capitani di Vimercati, Sara Foresti,
Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati,
"Loose associations to increase utility in data publishing," Journal of
Computer Security, Vol. 23, No. 1, 2015, pages 59-88.
DOI:
10.3233/JCS-140513
-
Sabrina De Capitani di Vimercati, Sara Foresti,
Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati,
"Fragmentation in presence of data dependencies," IEEE Trans. on
Dependable and Secure
Computing, Vol. 11, No. 6, 2014, pages 510-523. DOI:
10.1109/TDSC.2013.2295798
- Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Secure
data aggregation in wireless sensor networks: Filtering out the attacker’s
impact," IEEE Trans. on Information Forensics & Security, Vol.
9, No. 4, April 2014, pages 681-694. DOI:
10.1109/TIFS.2014.2307197
-
Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don
Torrieri, "A probabilistic framework for jammer identification in MANETs,"
Ad Hoc Networks, Vol. 14, 2014, pages 84-94. DOI:
10.1016/j.adhoc.2013.11.007
-
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel,
"k-Zero day safety: A network security metric for measuring the risk of
unknown vulnerabilities," IEEE Trans. on Dependable and Secure
Computing, Vol. 11, No. 1, January/February 2014, pages 30-44.
DOI:
10.1109/TDSC.2013.24
- Meixing Le, Krishna Kant, Sushil Jajodia, "Consistency and enforcement
of access rules in cooperative data sharing environment," Computers &
Security, Vol. 41, 2014, pages 3-18.
-
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia,
Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Integrity for
join queries in the cloud," IEEE Trans. on Cloud Computing, Vol. 1,
No. 2, July-December 2013, pages 187-200.
-
Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos stavrou,
"Providing users' anonymity in mobile hybrid networks," ACM Trans. on
Internet Technology, Vol. 12, No. 3, Article 7, May 2013, 33 pages.
PDF
- Sabrina De Capitani di Vimercati, Sara Foresti,
Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati,
"Enforcing dynamic write privileges in data outsourcing," Computers &
Security, Vol. 39, 2013, pages 47-63.
- Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining
Wang, Sushil Jajodia, "Blog or blog: Detecting blog bots through behavioral
biometrics," Computer Networks, Vol. 57, No. 3, February 2013,
pages 634-646.
- Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di
Pietro, Sushil Jajodia, Luigi Vincenzo Mancini, "Preserving privacy against
external and internal threats in WSN data aggregation," Telecommunication Systems,
Vol. 52, No. 4, 2013, pages 2163-2176.
- Yan Yang, Yulong Zhang, Alex Hai Wang, Wanyu Zang,
Peng Liu, Sushil Jajodia, "Quantitative survivability evaluation of three
virtual machine-based server architectures," Elsevier Jour. of Network
and Computer Applications, Elsevier, Vol. 36, No. 2, March
2013, pages 781-790.
- Sushil Jajodia, Witold Litwin, Thomas Schwarz SJ,
"Recoverable encryption through a noised secret over a large cloud," Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer
Lecture Notes in Computer Science, Vol. 7980, 2013, pages 42-64.
- Sabrina De Capitani di
Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe
Psaila, Pierangela Samarati, "Integrating trust management and access
control in data-intesive web applications," ACM Trans. on the Web
(TWEB), Vol. 6, No. 2, Article 6, May 2012, 43 pages.
PDF
- Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil
Jajodia, "Secure data aggregation in wireless sensor networks," IEEE
Trans. on Information Forensics & Security, Vol. 7, No. 3, June 2012,
pages 1040-1052.
- Zi Chu, Steven Gianvecchio, Haining Wang, Sushil
Jajodia, "Detecting automation of Twitter accounts: Are you a human, bot
or cyborg," IEEE Trans. on Dependable and Secure Computing, Vol. 9,
No. 6, November/December 2012, pages 811-824.
- Sergio Mascetti, Dario
Freni, Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Privacy in geo-social
networks: proximity notification with untrusted service providers and
curious buddies," VLDB Journal, Vol. 20, Number 4, 2011, pages
541-566.
- Sabrina De Capitani di
Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela
Samarati, "Authorization enforcement in distributed query evaluation," Journal of Computer Security,
Vol. 19, No. 4, 2011, pages 751-794.
- Andrea Gabrielli,
Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia, "Securing topology
maintenance protocols for sensor networks," IEEE Transactions on
Dependable and Secure Computing, Vol. 8, No. 3, May/June 2011, pages
450-465.
- Valentina Ciriani, Sabrina De Capitani di
Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela
Samarati, "Selective data outsourcing for enforcing privacy," Journal of
Computer Security, Vol. 19, No. 3, 2011, pages 531-566.
Return to top of the page
-
Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia,
Mason Wright, "A moving target defense approach to mitigate DDoS attacks
against proxy-based architectures,"
IEEE Conf. on Communications and Network Security (CNS),
Philadelphia, PA, October 17-19, 2016 (Acceptance ratio 38/131).
-
Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil
Jajodia, "A moving target defense approach to disrupting stealthy
botnets," Proc. 3rd ACM Workshop on Moving Target Defense (MTD
2016), Vienna, Austria, October 24, 2016 (Acceptance ratio
9/26 for regular papers).
-
Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico,
"AHEAD: A new architecture for active defense," Proc. SafeConfig
2016, Vienna, Austria, October 24, 2016.
-
Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Threat
modeling for cloud data center infrastructures," Proc. 9th
International Symposium on Foundations & Practice of Security (FPS
2016), Springer Lecture Notes in Computer Science, Vol. 101128,
Frederic Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi,
Joaquin Garcia-Alfaro, eds., Quebec, Canada, October 24-26, 2016,
pages 302-319. DOI: 10.1007/978-3-319-51966-1 20
-
Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal,
"Diversifying network services under cost constraints for better
resilience against unknown attacks," Proc. 30th IFIP WG 11.3
Conference on Data and Applications Security and Privacy (DBSEC 2016),
Springer Lecture Notes in Computer Science, Vol. 9766,
S. Ranise and V. Swarup, eds,
Trento, Italy, July 18-21, 2016, pages 295-312. DOI:
10.1007/978-3-319-41483-6 21
-
Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia, "Disrupting
stealthy botnets through strategic placement of detectors,"
IEEE Conf. on Communications and Network Security (CNS),
Florence, Italy, September 28-30, 2015 (Acceptance ratio
48/171). Best Paper Runner-Up Award
-
Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "A deception
based approach for defeating OS and service fingerprinting,"
IEEE Conf. on Communications and Network Security (CNS),
Florence, Italy, September 28-30, 2015 (Acceptance ratio
48/171).
-
Ning Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia, "Now
you see me: Hide and seek in physical address space," Proc. 10th ACM
Symp. on Information, Computer and Communications Security (ASIACCS),
Singapore, April 14-17, 2015, pages 321-331.
DOI:
10.1145/2714576.2714600
-
Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia,
"Keeping intruders at bay: A graph-theoretic approach to reducing the
probability of successful network intrusions," Springer Series on
Communications in Computer and Information Science, Vol. 554, 2015,
pages 191-211.
-
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano
Paraboschi, Pierangela Samarati,
"Integrity for approximate joins on untrusted computational servers,"
Proc. IFIP Int'l. Information Security and Privacy Conf (IFIPSEC),
Hamburg, Germany, May 26-28, 2015, pages 446-459.
- Sushil Jajodia, Witold Litwan, Thomas J. E.
Schwartz, "Numerical SQL value expressions over encrypted cloud
databases," Springer Lecture Notes in Computer Science, Vol. 9262,
2015, pages 455-478.
- George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu,
"Adversarial and uncertain reasoning for adaptive cyber defense:
Building the cyber foundation (invited paper)," Proc. 10th Int'l.
Conf. on Information Systems Security (ICISS), Springer Lecture Notes in
Computer Science, Vol. 8880, Atul Prakash, Rudrapatna
Shyamsundar, eds., Hyderabad, India, December 2014, pages 1-8.
-
Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano
Albanese, "Modeling network diversity for evaluating the robustness of
networks against zero-day attacks,"
Proc. 18th European Symp. on
Research in Computer Security (ESORICS), Part II, Springer Lecture Notes in
Computer Science, Vol. 8713, Miroslaw Kutylowski, Jaideep
Vaidya, eds., Wroclaw, Poland, September 7-11, 2014, pages 494-511
(Acceptance ratio 58/234).
-
He Sun, Kun Sun, Yuewu Wang, Jiwi Jing, Sushil Jajodia, "TrustDump:
Reliable memory acquisition on smartphones"
Proc. 18th European Symp. on
Research in Computer Security (ESORICS), Part I, Springer Lecture Notes in
Computer Science, Vol. 8712, Miroslaw Kutylowski, Jaideep
Vaidya, eds., Wroclaw, Poland, September 7-11, 2014, pages 202-218
(Acceptance ratio 58/234).
-
Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina
Casola, "Manipulating the attacker's view of a system's attack surface,"
IEEE Conf. on Communications and Network Security (CNS), San
Francisco, CA, October 29-31, 2014, pages 472-480 (Acceptance ratio 38/130).
-
Sabrina De Capitani di Vimercati, Sara Foresti,
Sushil Jajodia, Giovanni Liverga, Stefano Paraboschi, Pierangela
Samarati, "Integrity for distributed queries,"
IEEE Conf. on Communications and Network Security (CNS), San
Francisco, CA, October 29-31, 2014, pages 364-372 (Acceptance ratio 38/130).
-
Longquan Li, Sencun Zhu, Don Torrieri, Sushil Jajodia, "Self-healing
wireless networks under insider jamming attacks,"
IEEE Conf. on Communications and Network Security (CNS), San
Francisco, CA, October 29-31, 2014, pages 220-228 (Acceptance ratio 38/130).
-
Kun Sun, Sushil Jajodia, "Protecting
enterprise networks through attack surface expansion (short paper)," Proc.
ACM SafeConfig 2014: Cyber Security Analytics and Automation,
Scottsdale, AZ, November 3, 2014, pages 29-32. DOI:
10.1145/2665936.2665939
-
Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia,
"Keeping intrudors at large: A graph-theoretic approach to
reducing the probability of successful network intrusions,"
Proceedings of the 11th International Conference on Security and
Cryptography (SECRYPT 2014), Vienna, Austria, August 28-30, 2014.
- Massimiliano Albanese, Sushil Jajodia, Anoop
Singhal, Lingyu Wang, "An efficient framework for evaluating the risk of
zero-day vulnerabilities," Springer Series on Communications in
Computer and Information Science, Vol. 456, 2014, pages 322-240.
- Zhang Xu, Haining Wang, Sushil Jajodia, "Gemini:
An emergency line of defense against phishing attacks," Proc. 33rd
IEEE Symp. on Reliable Distributed Systems, Nara, Japan, October
6-9, 2014, pages 11-20. DOI:
10.1109/SRDS.2014.26
-
Sabrina De Capitani di Vimercati, Sara Foresti,
Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati,
"Optimizing integrity checks for join queries in the cloud," Proc.
28th IFIP WG 11.3 Conference on Data and Applications Security and
Privacy (DBSEC 2014), Springer Lecture Notes in Computer Science, Vol.
8566, Vijay Atluri, Gunther Pernul, eds., Vienna, Austria, July 14-16, 2014,
pages 33-48 (Acceptance
ratio 22/63 for full papers).
Best Paper Award
-
Meixing Le, Krishna Kant and Sushil Jajodia, "Consistent
query plan generation in secure cooperative data access,"
Proc.
28th IFIP WG 11.3 Conference on Data and Applications Security and
Privacy (DBSEC 2014), Springer Lecture Notes in Computer Science, Vol.
8566, Vijay Atluri, Gunther Pernul, eds., Vienna, Austria, July 14-16, 2014,
pages 227-242 (Acceptance
ratio 22/63 for full papers).
-
Steven Noel, Sushil Jajodia, "Metrics suite for network attack graph
analytics," Proc. 9th Cyber and Information Security Research
Conference, Oak Ridge, TN, April 8-10, 2014. DOI:
10.1145/2602087.2602117
- Sushil Jajodia, Witold Litwin, Thomas
Schwartz, "Scalable distributed virtual data structure," Proc. 2nd
ASE International Conference on Big Data Science and
Computing(BigDataScience 2014), Stanford, CA, May 27-31, 2014.
-
Sushil Jajodia, "Security and privacy of data in a cloud," Proc.
10th VLDB Workshop on Secure Data Management (SDM), Springer Lecture
Notes in Computer Science, Vol. 8425, Willem Jonker and Milan
Petkovic, eds., Trento, Italy, August 30, 2013, pages 18-22 (Invited
Paper).
-
Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun
Sun, "A moving target defense mechanism for MANETs based on identity
virtualization," Proc. 1st IEEE Conf. on Communications and Network
Security (CNS) , Washington, DC, October 14-16, 2013 (Acceptance
ratio 40/141 papers).
-
Massimiliano Albanese, Sushil Jajodia, Cristian Molinaro, "A logic
framework for flexible and security-aware service composition," Proc. 10th IEEE International Conference on Autonomic and Trusted
Computing (ATC-2013), Vietri sul Mare, Italy, December 18-20, 2013.
- Li Wang, Zhan Wang, Kun Sun, Sushil Jajodia, "Reducing attack surface
with VM-based phantom server," Proc. 32nd MILCOM Conf., San
Diego, CA, November 18-20, 2013.
- William Nzoukou Tankou, Lingyu Wang, Sushil Jajodia and Anoop Singhal,
"A unified framework for measuring a network's mean time-to-compromise,"
Proc. 32nd Int'l. Symp. on Reliable Distributed Systems (SRDS), Braga, Portugal, September 30 - October 3, 2013 (Acceptance ratio
22/67).
- Massimiliano Albanese, Sushil Jajodia, Anoop
Singhal, Lingyu Wang, "An efficient approach to assessing the risk of
zero-day vulnerabilities," Proc. 10th International Conference on
Security and Cryptography (SECRYPT), Reykjavik, Iceland, July
29-31, 2013.
Best Paper Award
- Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing,
"Verification of data redundancy in cloud storage," Proc. ASIACCS
International Workshop on Security in Cloud Computing, Hangzhou,
China, May 8-10, 2013.
- Sabrina De
Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi,
Pierangela Samarati, "On information leakage by indexes over data
fragments," Proc. ICDE
Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB
2013), Brisbane, Australia, April 8, 2013.
- Sabrina De
Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga,
Stefano Paraboschi and Pierangela Samarati, "Extending
loose associations to multiple fragments,"
Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security and Privacy (DBSec), Springer Lecture Notes in
Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds.,
Newark, NJ, July 15-17, 2013, pages 1-16 (Acceptance ratio 16/45 for
full papers). Best Paper Runner-Up Award
-
Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing,
"TerraCheck: Verification of dedicated cloud storage,"
Proc. 27th
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
and Privacy (DBSec),
Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit
Shafiq, eds., Newark, NJ, July 15-17, 2013, pages
113-127 (Acceptance ratio 16/45 for full papers).
-
Meixing Le, Krishna Kant and Sushil Jajodia, "Rule enforcement with
third parties in secure cooperative data access (short paper)," Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and
Applications Security and Privacy (DBSec),
Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit
Shafiq, eds., Newark, NJ, July 15-17, 2013, pages
282-288 (Acceptance ratio 16 full, 6 short /45 papers).
-
Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri,
"Reliable mission deployment in vulnerable distributed systems,"
Proc. IEEE DSN Workshop on Reliability and Security Data Analysis
(RSDN)," Budapest, Hungary, June 2013.
-
Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo
Shakarian, "A probabilistic framework for localization of attackers in
MANETs," Proc. 17th European Symp. on
Research in Computer Security (ESORICS 2012), Springer Lecture Notes in
Computer Science, Vol. 7459, Sara Foresti, Moti Yung, Fabio
Martinelli, eds., Pisa, Italy, September 10-14, 2012, pages 145-162
(Acceptance ratio 50/248).
- Arun Natrajan, Peng Ning, Yao Liu, Sushil
Jajodia, Steve E. Hutchinson, "NSDMine: Automated discovery of network
service dependencies," Proc. 31st Annual Int'l. Conf. on Computer
Communications (INFOCOM 2012), Orlando, FL, March 25-30, 2012,
pages 2507-2515 (Acceptance ratio 278/1547).
- Massimiliano Albanese, Sushil Jajodia, Steven
Noel, "A time-efficient approach to cost-effective network hardening
using attack graphs," Proc. 42nd Annual IEEE/IFIP International
Conference on Dependable Systems and Networks (DSN 2012), Boston,
Mass, June 25-28, 2012.
- Barry Peddycord III, Peng Ning, Sushil Jajodia,
"On the accurate identification of network service dependencies in
distributed systems," Proc. USENIX 26th Large Installation System
Administration Conference (LISA'12), San Diego, CA, December 9-14,
2012.
- Meixing Le, Krishna Kant, Sushil Jajodia,
"Access rule consistency in cooperative data access environment," Proc. 8th IEEE International Conference on Collaborative Computing
(CollaborateCom 2012), Pittsburgh, PA, October 14-17, 2012
(Acceptance ratio 27/110 for full papers).
- Sabrina De Capitani Di Vimercati, Sara
Foresti, Sushil Jajodia,
Giovanni Livraga, "Enforcing
subscription-based authorization policies in cloud scenarios,"
Proc. 26th Annual IFIP WG 11.3 Working
Conference on Data and Applications Security (DBSEC 2012), Springer
Lecture Notes in Computer Science, Vol. 7371, Nora
Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro, eds., Paris,
France, July 11-13, 2012, pages 314-329 (Acceptance ratio 17/50 for full
papers).
- Nelson Nazzicari, Javier Almillategui, Angelos Stavrou and Sushil
Jajodia, "Switchwall: Automated topology fingerprinting & behavior
deviation identification," Proc. 8th International Workshop on
Security and Trust Management (STM 2012), Springer Lecture Notes in
Computer Science Vol. 7783, Pisa, Italy, September 12-14, 2012,
pages 161-176
(Acceptance ratio 20/57).
- Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing,
"Disk storage isolation and verification in cloud," Proc. IEEE
Global Communications Conference (GLOBECOM), Anaheim, CA, December
3-7, 2012.
- Sabrina De Capitani Di Vimercati, Sara Foresti,
Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Support for
write privileges on outsourced data," Proc. 27th IFIP Security and
Privacy Conference (IFIPSEC 2012), Crete, Greece, June 4-6, 2012,
pages 199-210.
- Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop
Singhal, "Aggregating CVSS base scores for semantics-rich network
security metrics,"Proc. 31st International Symposium on Reliable
Distributed Systems (SRDS 2012), Irvine, California, October 8-11, 2012.
- Alessio Di Mauro, Alessandro Mei, Sushil
Jajodia, "Secure file allocation and caching in large-scale distributed
systems," Proceedings of the International Conference on Security
and Cryptography (SECRYPT 2012), Rome, Italy, July 24-27, 2012,
pages 182-191.
- Sushil Jajodia, Witold Litwin, Thomas Schwartz,
"Recoverable encryption through noised secret over large cloud," Proc. 5th International Conf. on Data Management in Cloud, Grid, and P2P
Systems (Globe 2012), Vienna, Austria, September 5-6, 2012.
- Massimiliano Albanese, Sushil Jajodia,
Andrea Pugliese, V. S. Subrahmanian, "Scalable analysis of attack
scenarios," Proc. 16th European Symp. on Research in Computer Security (ESORICS
2011), Springer Lecture Notes in Computer Science, Vol. 6879,
V. Atluri and C. Diaz, eds., Leuven, Belgium, September 12-14, 2011,
pages 416-433 (Acceptance ratio 36/155).
- Massimiliano Albanese, Sushil Jajodia,
Andrea Pugliese, V. S. Subrahmanian, "Scalable detection of cyber
attacks," Proc. 10th International Conference on Computer Information Systems and
Industrial Management Applications (CISIM),
Kolkata, India, December 2011, pages 9-18.
- Krishna Kant, Meixing Le, Sushil Jajodia,
"Security considerations in data center configuration management," Proc. 4th Symp. on Configuration Analytics and Automation (SafeConfig),
Arlington, VA, October 31 - November 1, 2011 (Acceptance ratio 7/29).
- Sushil Jajodia, Steven Noel, Pramod Kalapa,
Massimiliano Albanese, John Williams, "Cauldron: Mission-centric cyber
situational awareness with defence in depth," Proc. MILCOM Conf.,
Baltimore, MD, November 7-10, 2011, pages 1339-1344.
- Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei
Tang, Anoop Singhal, "Automatic security analysis using security
metrics," Proc. MILCOM Conf., Baltimore, MD, November 7-10,
2011, pages 1207-1212.
- Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano
Paraboschi, Pierangela Samarati, "Private data indexes for selective
access to outsourced data," Proc. Workshop on Privacy in the
Electronic Society (WPES), Chicago, IL, October 17, 2011, pages
69-80 (Acceptance ratio 12/73 for long papers).
-
Sushil Jajodia, Witold Litwin, Thomas Schwarz, "Privacy of Data
Outsourced to a Cloud for Selected Readers through Client-Side
Encryption (short paper)," Proc. Workshop on Privacy in the
Electronic Society (WPES), Chicago, IL, October 17, 2011, pages
171-176.
- Meixing Le,
Krishna Kant, Sushil Jajodia, "Cooperative data access in multi-cloud
environments," Proc.25th Annual IFIP WG 11.3 Working Conference on
Data and Applications Security (DBSec), Springer Lecture Notes in
Computer Science, Vol. 6818, Yingiu Li, ed., Richmond, VA, July
11-13, 2011, pages 14-28 (Acceptance ratio 14/37 for full papers).
- Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and
Sushil Jajodia, "Trading elephants for ants: Efficient post-attack
reconstitution (short paper)," Proc. 7th Int'l. ICST Conf. on
Security and Privacy in Communication Networks (SecureComm),
London, September 7-9, 2011.
Return to top of the page
-
Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "Deceiving
attackers by creating a virtual attack surface," in
Cyber
Deception: Building the Scientific Foundation, Sushil Jajodia, V. S.
Subrahmanian, Vipin Swarup, Cliff Wang, eds., Springer, Switzerland, 2016, pages
169-201.
-
Massimiliano Albanese, Sushil Jajodia, "Technological solutions for
improving performance of cyber security analysts," in
Psychosocial Dynamics
of Cyber Security, Stephen J. Zaccaro, Reeshad S. Dalal, Lois E.
Tetrick, Julie A. Steinke, eds., Routledge, NY, 2016, pages 291-304.
-
Massimiliano Albanese, Sushil Jajodia, "Process of awareness," in
Cyber
Defense and Situational Awareness, Alexander Kott, Cliff Wang, Robert Erbacher, eds., Springer Advances in Information Security, Vol. 62, 2014.
-
Sabrina De Capitani Di Vimercati, Robert F. Erbacher, Sara Foresti,
Sushil Jajodia, Giovanni Liverga, Pierangela Samarati, "Encryption and fragmentation for data
confidentiality in the cloud," in
Foundations of Security Analysis and
Design VII - FOSAD Tutorial Lectures, Alessandro Aldini, Javier Lopez, Fabio
Martinelli, eds., Springer Lecture Notes in Computer Science Vol. 8604, 2014, pages
212-243.
-
Massimiliano Albanese, Hasan Cam, Sushil Jajodia, "Automated cyber
situation awareness tools and models for improving analyst performance," in
Cybersecurity
Systems for Human Cognition Augmentation, Robinson E. Pino, Alexander Kott,
Michael Shevenell, eds., Springer Advances in Information Security, Vol. 61, 2014,
pages 47-60.
-
Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia,
Pierangela Samarati, "Database Security and Privacy," in
Computing
Handbook, Third Edition: Information Systems and Information Technology,
Heikki Toppi, Allen Tucker, eds., Chapman and Hall/CRC, May 2014.
-
Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Proof of isolation for
cloud storage," in
Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela
Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer,
2014, pages 95-122.
-
Meixing Le, Krishna Kant, Sushil Jajodia, "Enabling collaborative data
authorization between enterprise clouds," in
Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela
Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer,
2014, pages 149-170.
-
Massimiliano Alabanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri,
"Securing mission-centric operations in the cloud," in
Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela
Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer,
2014, pages 239-260.
-
Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, C. Molinro, Fabio
Persia, Antonio Picariello, Giancarlo Sperli, V. S. Subrahmanian,,
"Recognizing unexplained behavior in network traffic," in
Network Science and Cybersecurity, Robinson E. Pino, ed., Springer
Advances in Information Security, Vol. 55, 2014, pages 39-62.
- Don Torrieri, Sencun Zhu, Sushil Jajodia, "Cyber
maneuver against external adversaries and compromised nodes." in
Moving Target Defense II: Application of Game Theory and Adversarial
Modeling, Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin
Swarup, Cliff Wang, X. Sean Wang, eds., Springer Advances in Information
Security, Vol. 100, 2013, pages 87-96.
- Claudio Bettini, Sergio Mascetti, Dario Freni,
X. Sean Wang, Sushil Jajodia, "Privacy and anonymity in location data
management," in
Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques,
Francesco Bonchi and Elena Ferrari, eds, Chapman & Hall/CRC Data Mining and
Knowledge Discovery Series, 2011, pages 211-238.
Return to top of the page
- Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia,
Angelos Stavrou, "The ephemeral legion: Producing an expert cyber-security
workforce from thin air," Communications of ACM (Virtual Extension),
Vol. 54, No. 1, January 2011, pages 129-131.
Return to top of the page
Return to home page