Sushil Jajodia 
List of Publications 2011 and beyond


Authored Books  Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles      


Click here for Free Access to all my ACM Publications


AUTHORED BOOKS

  1. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia, Network Hardening: An Automated Approach to Improving Network Security, ISBN 978-3-319-04611-2, SpringerBriefs in Computer Science, 2014, 60 pages.  

EDITED BOOKS

  1. Sushil Jajodia, Pierangela Samarati, Moti Yung, Encyclopedia of Cryptography, Security & Privacy, 3rd edition, Springer, In preparation.  Flyer
  2. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Network Security Metrics, Springer, In preparation.
  3. Peng Liu, Sushil Jajodia, Cliff Wang, Recent Advances in Cyber Situation Awareness, Springer LNCS State-of-the-Art Survey Series, Vol. 10030, In preparation.
  4. Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Cyber Deception: Building the Scientific Foundation, ISBN 978-3-319-32697-9, Springer, Switzerland, 2016, 314 pages. DOI: 10.1007/978-3-319-32699-3
  5. Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Cyber Warfare: Building the Scientific Foundation, ISBN 978-3-319-1408-4, Springer, Berlin, 2015, 340 pages.
  6. Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Secure Cloud Computing, ISBN 978-1-4614-9278-8, Springer, Berlin, 2014, 343 pages. review
  7. Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang, eds., Moving Target Defense II: Application of Game Theory and Adversarial Modeling, ISBN 978-1-4614-5415-1, Springer Advances in Information Security, Vol. 100, Berlin, 2013, 203 pages.  online version
  8. Henk C. A. van Tilborg, Sushil Jajodia, eds., Encyclopedia of Cryptography and Security, 2nd edition, ISBN 978-1-4419-5905-8, Springer, Berlin, 2011, 1435 pages (in 2 volumes).  dblp
  9. Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang, eds., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, ISBN 978-1-4614-0976-2, Springer Advances in Information Security, Vol. 54, Berlin, 2011, 183 pages.  online version Chinese Translation

EDITED PROCEEDINGS

  1. Sjouke Mauw, Barbara Kordy, Sushil Jajodia, eds., Graphical Models for Security, Springer Lecture Notes in Computer Science, Vol. 9390, Springer International Publishing, Switzerland, 2016.  DOI: 10.1007/978-3-319-29968-6
  2. Sushil Jajodia, Chandan Mazumdar, Proceedings of the 11th International Conference on Information System Security (ICISS), Springer Lecture Notes in Computer Science, Vol. 9478, Springer, Berlin, 2015.  DOI: 10.1007/978-3-319-26961-0
  3. Raja Akram, Sushil Jajodia, eds., Proc. 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice (WISTP 2015), Springer, 2015, 281 pages.  DOI: 10.1007/978-3-319-24018-3
  4. Sushil Jajodia, Kun Sun, eds., Proceedings of the First ACM Workshop on Moving Target Defense, ACM, 2014.  DOI: 10.1145/2660267.2660385
  5. Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans, eds.,  ICT System Security and Privacy Protection - Proc. 29th IFIP TC 11 International Conference, SEC 2014, Springer, 2014.
  6. Jason Crampton, Sushil Jajodia, Keith Mayes, eds., Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS 2013), Springer Lecture Notes in Computer Science, Vol. 8134, Springer, Berlin, 2013.
  7. Sushil Jajodia, Chandan Mazumdar, Proceedings of the 7th International Conference on Information System Security (ICISS), ISBN 978-3-642-25559-5, Springer Lecture Notes in Computer Science, Vol. 7093, Springer, Berlin, 2011, 388 pages. dblp

JOURNAL ARTICLES

  1. Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Optimal scheduling  of cybersecurity analysts for minimizing risk," ACM Trans. on Intelligent Systems and Technology, To appear.
  2. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "A methodology to measure and monitor level of operational effectiveness in a CSOC," Springer International Journal of Information Security, To appear.
  3. Massimiliano Albanese, Sushil Jajodia, "A graphical model to assess the impact of multi-step attacks," Journal of Defense Modeling and Simulation, To appear.
  4. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "Using temporal probabilistic logic for optimal monitoring of security events with limited resources," Journal of Computer Security, Vol. 24, No. 6, 2016, pages 735-791.  DOI: 10.3233/JCS-160555
  5. Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam, "Dynamic scheduling  of cybersecurity analysts for minimizing risk using reinforcement learning," ACM Trans. on Intelligent Systems and Technology, Vol. 8, No. 1, 2016.  DOI: 10.1145/2882969 Appendix
  6. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Efficient integrity checks for join queries in the cloud," Journal of Computer Security, Vol. 24, 2016, papges 347-378.  DOI: 10.3233/JCS-160545
  7. Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia, "Minimum cost rule enforcement for cooperative database access," Journal of Computer Security, Vol. 24, 2016, pages 379-403.  DOI: 10.3233/JCS-160548
  8. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, "Network diversity: A security metric for evaluating the resilience of networks against zero-day attacks,"  IEEE Trans. on Information Forensics and Security, Vol. 11, No. 5, May 2016, pages 1071-1086DOI: 10.1109/TIFS.2016.2516916
  9. Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia, "Profiling online social behaviors for compromised account detection," IEEE Trans. on Information Forensics and Security, Vol. 11, No. 1, January 2016, pages 176-187.  DOI: 10.1109/TIFS.2015.2482465
  10. Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian, "Pareto-optimal adversarial defense of enterprise systems," ACM Trans. on Information and System Security, Vol. 17, No. 3, Article 11, March 2015, 39 pages.  DOI: 10.1145/2699907
  11. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Loose associations to increase utility in data publishing," Journal of Computer Security, Vol. 23, No. 1, 2015, pages 59-88.  DOI: 10.3233/JCS-140513
  12. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Fragmentation in presence of data dependencies," IEEE Trans. on Dependable and Secure Computing, Vol. 11, No. 6, 2014, pages 510-523.  DOI: 10.1109/TDSC.2013.2295798
  13. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact," IEEE Trans. on Information Forensics & Security, Vol. 9, No. 4, April 2014, pages 681-694.  DOI: 10.1109/TIFS.2014.2307197
  14. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don Torrieri, "A probabilistic framework for jammer identification in MANETs," Ad Hoc Networks, Vol. 14, 2014, pages 84-94.  DOI: 10.1016/j.adhoc.2013.11.007 
  15. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel, "k-Zero day safety:  A network security metric for measuring the risk of unknown vulnerabilities," IEEE Trans. on Dependable and Secure Computing, Vol. 11, No. 1, January/February 2014, pages 30-44.  DOI:  10.1109/TDSC.2013.24
  16. Meixing Le, Krishna Kant, Sushil Jajodia, "Consistency and enforcement of access rules in cooperative data sharing environment," Computers & Security, Vol. 41, 2014, pages 3-18.
  17. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Integrity for join queries in the cloud," IEEE Trans. on Cloud Computing, Vol. 1, No. 2, July-December 2013, pages 187-200.
  18. Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos stavrou, "Providing users'  anonymity in mobile hybrid networks," ACM Trans. on Internet Technology, Vol. 12, No. 3, Article 7, May 2013, 33 pages.  PDF
  19. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Enforcing dynamic write privileges in data outsourcing," Computers & Security, Vol. 39, 2013, pages 47-63.
  20. Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia, "Blog or blog: Detecting blog bots through behavioral biometrics," Computer Networks, Vol. 57, No. 3, February 2013, pages 634-646.
  21. Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini, "Preserving privacy against external and internal threats in WSN data aggregation," Telecommunication Systems, Vol. 52, No. 4, 2013, pages 2163-2176.
  22. Yan Yang, Yulong Zhang, Alex Hai Wang, Wanyu Zang, Peng Liu, Sushil Jajodia, "Quantitative survivability evaluation of three virtual machine-based server architectures," Elsevier Jour. of Network and Computer Applications, Elsevier, Vol. 36, No. 2, March 2013, pages 781-790.
  23. Sushil Jajodia, Witold Litwin, Thomas Schwarz SJ, "Recoverable encryption through a noised secret over a large cloud," Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Lecture Notes in Computer Science, Vol. 7980, 2013, pages 42-64.
  24. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe Psaila, Pierangela Samarati, "Integrating trust management and access control in data-intesive web applications," ACM Trans. on the Web (TWEB), Vol. 6, No. 2, Article 6, May 2012, 43 pages.  PDF
  25. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Secure data aggregation in wireless sensor networks," IEEE Trans. on Information Forensics & Security, Vol. 7, No. 3, June 2012, pages 1040-1052.
  26. Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia, "Detecting automation of Twitter accounts:   Are you a human, bot or cyborg," IEEE Trans. on Dependable and Secure Computing, Vol. 9, No. 6, November/December 2012, pages 811-824.
  27. Sergio Mascetti, Dario Freni, Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies," VLDB Journal, Vol. 20, Number 4, 2011, pages 541-566.
  28. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Authorization enforcement in distributed query evaluation," Journal of Computer Security, Vol. 19, No. 4, 2011, pages 751-794.
  29. Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia, "Securing topology maintenance protocols for sensor networks," IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 3, May/June 2011, pages 450-465.
  30. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Selective data outsourcing for enforcing privacy," Journal of Computer Security, Vol. 19, No. 3, 2011, pages 531-566.

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright, "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures," IEEE Conf. on Communications and Network Security (CNS), Philadelphia, PA, October 17-19, 2016 (Acceptance ratio 38/131).
  2. Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia, "A moving target defense approach to disrupting stealthy botnets," Proc. 3rd ACM Workshop on Moving Target Defense (MTD 2016), Vienna, Austria, October 24, 2016 (Acceptance ratio 9/26 for regular papers).
  3. Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico, "AHEAD: A new architecture for active defense," Proc. SafeConfig 2016, Vienna, Austria, October 24, 2016.
  4. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Threat modeling for cloud data center infrastructures," Proc. 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer Lecture Notes in Computer Science, Vol. 101128, Frederic Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro, eds., Quebec, Canada, October 24-26, 2016, pages 302-319.  DOI: 10.1007/978-3-319-51966-1 20
  5. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Diversifying network services under cost constraints for better resilience against unknown attacks," Proc. 30th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2016), Springer Lecture Notes in Computer Science, Vol. 9766, S. Ranise and V. Swarup, eds, Trento, Italy, July 18-21, 2016, pages 295-312.  DOI: 10.1007/978-3-319-41483-6 21
  6. Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia, "Disrupting stealthy botnets through strategic placement of detectors," IEEE Conf. on Communications and Network Security (CNS), Florence, Italy, September 28-30, 2015 (Acceptance ratio 48/171). Best Paper Runner-Up Award
  7. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "A deception based approach for defeating OS and service fingerprinting," IEEE Conf. on Communications and Network Security (CNS), Florence, Italy, September 28-30, 2015 (Acceptance ratio 48/171).
  8. Ning Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia, "Now you see me: Hide and seek in physical address space," Proc. 10th ACM Symp. on Information, Computer and Communications Security (ASIACCS), Singapore, April 14-17, 2015, pages 321-331.  DOI: 10.1145/2714576.2714600
  9. Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia, "Keeping intruders at bay: A graph-theoretic approach to reducing the probability of successful network intrusions," Springer Series on Communications in Computer and Information Science, Vol. 554, 2015, pages 191-211.  
  10. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Integrity for approximate joins on untrusted computational servers," Proc. IFIP Int'l. Information Security and Privacy Conf (IFIPSEC),  Hamburg, Germany, May 26-28, 2015, pages 446-459.
  11. Sushil Jajodia, Witold Litwan, Thomas J. E. Schwartz, "Numerical SQL value expressions over encrypted cloud databases," Springer Lecture Notes in Computer Science, Vol. 9262, 2015, pages 455-478.
  12. George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu, "Adversarial and uncertain reasoning for adaptive cyber defense: Building the cyber foundation (invited paper)," Proc. 10th Int'l. Conf. on Information Systems Security (ICISS), Springer Lecture Notes in Computer Science, Vol. 8880,  Atul Prakash, Rudrapatna Shyamsundar, eds., Hyderabad, India, December 2014, pages 1-8.
  13. Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, "Modeling network diversity for evaluating the robustness of networks against zero-day attacks," Proc. 18th European Symp. on Research in Computer Security (ESORICS), Part II, Springer Lecture Notes in Computer Science, Vol. 8713, Miroslaw Kutylowski, Jaideep Vaidya,  eds., Wroclaw, Poland, September 7-11, 2014, pages 494-511 (Acceptance ratio 58/234).
  14. He Sun, Kun Sun, Yuewu Wang, Jiwi Jing, Sushil Jajodia, "TrustDump: Reliable memory acquisition on smartphones" Proc. 18th European Symp. on Research in Computer Security (ESORICS), Part I, Springer Lecture Notes in Computer Science, Vol. 8712, Miroslaw Kutylowski, Jaideep Vaidya,  eds., Wroclaw, Poland, September 7-11, 2014, pages 202-218 (Acceptance ratio 58/234).
  15. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola, "Manipulating the attacker's view of a system's attack surface," IEEE Conf. on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014, pages 472-480 (Acceptance ratio 38/130).
  16. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liverga, Stefano Paraboschi, Pierangela Samarati, "Integrity for distributed queries," IEEE Conf. on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014, pages 364-372 (Acceptance ratio 38/130).
  17. Longquan Li, Sencun Zhu, Don Torrieri, Sushil Jajodia, "Self-healing wireless networks under insider jamming attacks," IEEE Conf. on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014, pages 220-228 (Acceptance ratio 38/130).
  18. Kun Sun, Sushil Jajodia, "Protecting enterprise networks through attack surface expansion (short paper)," Proc. ACM SafeConfig 2014: Cyber Security Analytics and Automation, Scottsdale, AZ, November 3, 2014, pages 29-32.  DOI: 10.1145/2665936.2665939
  19. Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia, "Keeping intrudors at large:  A graph-theoretic approach to reducing the probability of successful network intrusions," Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August 28-30, 2014.
  20. Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang, "An efficient framework for evaluating the risk of zero-day vulnerabilities," Springer Series on Communications in Computer and Information Science, Vol. 456, 2014, pages 322-240.  
  21. Zhang Xu, Haining Wang, Sushil Jajodia, "Gemini: An emergency line of defense against phishing attacks," Proc. 33rd IEEE Symp. on Reliable Distributed Systems, Nara, Japan, October 6-9, 2014, pages 11-20.  DOI: 10.1109/SRDS.2014.26
  22. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Optimizing integrity checks for join queries in the cloud," Proc. 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2014), Springer Lecture Notes in Computer Science, Vol. 8566, Vijay Atluri, Gunther Pernul, eds., Vienna, Austria, July 14-16, 2014, pages 33-48 (Acceptance ratio 22/63 for full papers).  Best Paper Award
  23. Meixing Le, Krishna Kant and Sushil Jajodia, "Consistent query plan generation in secure cooperative data access," Proc. 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2014), Springer Lecture Notes in Computer Science, Vol. 8566, Vijay Atluri, Gunther Pernul, eds., Vienna, Austria, July 14-16, 2014, pages 227-242 (Acceptance ratio 22/63 for full papers).
  24. Steven Noel, Sushil Jajodia, "Metrics suite for network attack graph analytics," Proc. 9th Cyber and Information Security Research Conference, Oak Ridge, TN, April 8-10, 2014.  DOI: 10.1145/2602087.2602117
  25. Sushil Jajodia, Witold Litwin, Thomas Schwartz, "Scalable distributed virtual data structure," Proc. 2nd ASE International Conference on Big Data Science and Computing(BigDataScience 2014), Stanford, CA, May 27-31, 2014.
  26. Sushil Jajodia, "Security and privacy of data in a cloud," Proc. 10th VLDB Workshop on Secure Data Management (SDM), Springer Lecture Notes in Computer Science, Vol. 8425, Willem Jonker and  Milan Petkovic, eds.,  Trento, Italy, August 30, 2013, pages 18-22 (Invited Paper).
  27. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun, "A moving target defense mechanism for MANETs based on identity virtualization," Proc. 1st IEEE Conf. on Communications and Network Security (CNS) , Washington, DC, October 14-16, 2013 (Acceptance ratio 40/141 papers).
  28. Massimiliano Albanese,  Sushil Jajodia,  Cristian Molinaro, "A logic framework for flexible and security-aware service composition," Proc. 10th IEEE International Conference on Autonomic and Trusted Computing (ATC-2013), Vietri sul Mare, Italy, December 18-20, 2013.
  29. Li Wang, Zhan Wang, Kun Sun, Sushil Jajodia, "Reducing attack surface with VM-based phantom server," Proc. 32nd MILCOM Conf., San Diego, CA, November 18-20, 2013.
  30. William Nzoukou Tankou, Lingyu Wang, Sushil Jajodia and Anoop Singhal, "A unified framework for measuring a network's mean time-to-compromise," Proc. 32nd Int'l. Symp. on Reliable Distributed Systems (SRDS), Braga, Portugal, September 30 - October 3, 2013 (Acceptance ratio 22/67).
  31. Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang, "An efficient approach to assessing the risk of zero-day vulnerabilities," Proc. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland, July 29-31, 2013.  Best Paper Award
  32. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Verification of data redundancy in cloud storage,"  Proc. ASIACCS International Workshop on Security in Cloud Computing, Hangzhou, China, May 8-10, 2013.
  33. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "On information leakage by indexes over data fragments," Proc. ICDE Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB 2013), Brisbane, Australia, April 8, 2013.
  34. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati, "Extending loose associations to multiple fragments,"  Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds., Newark, NJ, July 15-17, 2013, pages 1-16 (Acceptance ratio 16/45 for full papers).  Best Paper Runner-Up Award
  35. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "TerraCheck: Verification of dedicated cloud storage," Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds., Newark, NJ, July 15-17, 2013, pages 113-127 (Acceptance ratio 16/45 for full papers).
  36. Meixing Le, Krishna Kant and Sushil Jajodia, "Rule enforcement with third parties in secure cooperative data access (short paper)," Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds., Newark, NJ, July 15-17, 2013, pages 282-288 (Acceptance ratio 16 full, 6 short /45 papers).
  37. Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri, "Reliable mission deployment in vulnerable distributed systems," Proc. IEEE DSN Workshop on Reliability and Security Data Analysis (RSDN)," Budapest, Hungary, June 2013.
  38. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian, "A probabilistic framework for localization of attackers in MANETs," Proc. 17th European Symp. on Research in Computer Security (ESORICS 2012), Springer Lecture Notes in Computer Science, Vol. 7459, Sara Foresti, Moti Yung, Fabio Martinelli,  eds., Pisa, Italy, September 10-14, 2012, pages 145-162 (Acceptance ratio 50/248).
  39. Arun Natrajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson, "NSDMine: Automated discovery of network service dependencies,"  Proc. 31st Annual Int'l. Conf. on Computer Communications (INFOCOM 2012), Orlando, FL, March 25-30, 2012, pages 2507-2515 (Acceptance ratio 278/1547).
  40. Massimiliano Albanese, Sushil Jajodia, Steven Noel, "A time-efficient approach to cost-effective network hardening using attack graphs," Proc. 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, Mass, June 25-28, 2012. 
  41. Barry Peddycord III, Peng Ning, Sushil Jajodia, "On the accurate identification of network service dependencies in distributed systems," Proc. USENIX 26th Large Installation System Administration Conference (LISA'12), San Diego, CA, December 9-14, 2012.
  42. Meixing Le, Krishna Kant, Sushil Jajodia, "Access rule consistency in cooperative data access environment," Proc. 8th IEEE International Conference on Collaborative Computing (CollaborateCom 2012), Pittsburgh, PA, October 14-17, 2012 (Acceptance ratio 27/110 for full papers).
  43. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, "Enforcing subscription-based authorization policies in cloud scenarios," Proc. 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2012), Springer Lecture Notes in Computer Science, Vol. 7371, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro, eds., Paris, France, July 11-13, 2012, pages 314-329 (Acceptance ratio 17/50 for full papers).
  44. Nelson Nazzicari, Javier Almillategui, Angelos Stavrou and Sushil Jajodia, "Switchwall: Automated topology fingerprinting & behavior deviation identification," Proc. 8th International Workshop on Security and Trust Management (STM 2012), Springer Lecture Notes in Computer Science Vol. 7783, Pisa, Italy, September 12-14, 2012, pages 161-176 (Acceptance ratio 20/57).
  45. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Disk storage isolation and verification in cloud," Proc. IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, December 3-7, 2012.
  46. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Support for write privileges on outsourced data," Proc. 27th IFIP Security and Privacy Conference (IFIPSEC 2012), Crete, Greece, June 4-6, 2012, pages 199-210.
  47. Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Aggregating CVSS base scores for semantics-rich network security metrics,"Proc. 31st International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, California, October 8-11, 2012.
  48. Alessio Di Mauro, Alessandro Mei, Sushil Jajodia, "Secure file allocation and caching in large-scale distributed systems," Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy, July 24-27, 2012, pages 182-191.
  49. Sushil Jajodia, Witold Litwin, Thomas Schwartz, "Recoverable encryption through noised secret over large cloud," Proc. 5th International Conf. on Data Management in Cloud, Grid, and P2P Systems (Globe 2012), Vienna, Austria, September 5-6, 2012.
  50. Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, "Scalable analysis of attack scenarios," Proc. 16th European Symp. on Research in Computer Security (ESORICS 2011), Springer Lecture Notes in Computer Science, Vol. 6879, V. Atluri and C. Diaz, eds., Leuven, Belgium, September 12-14, 2011, pages 416-433 (Acceptance ratio 36/155).
  51. Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, "Scalable detection of cyber attacks," Proc. 10th International Conference on Computer Information Systems and Industrial Management Applications (CISIM), Kolkata, India, December 2011, pages 9-18.
  52. Krishna Kant, Meixing Le, Sushil Jajodia, "Security considerations in data center configuration management," Proc. 4th Symp. on Configuration Analytics and Automation (SafeConfig), Arlington, VA, October 31 - November 1, 2011 (Acceptance ratio 7/29).
  53. Sushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams, "Cauldron: Mission-centric cyber situational awareness with defence in depth," Proc. MILCOM Conf., Baltimore, MD, November 7-10, 2011, pages 1339-1344.
  54. Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang, Anoop Singhal, "Automatic security analysis using security metrics," Proc. MILCOM Conf., Baltimore, MD, November 7-10, 2011, pages 1207-1212.
  55. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Private data indexes for selective access to outsourced data," Proc. Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, October 17, 2011, pages 69-80 (Acceptance ratio 12/73 for long papers).
  56. Sushil Jajodia, Witold Litwin, Thomas Schwarz, "Privacy of Data Outsourced to a Cloud for Selected Readers through Client-Side Encryption (short paper)," Proc. Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, October 17, 2011, pages 171-176.
  57. Meixing Le, Krishna Kant, Sushil Jajodia, "Cooperative data access in multi-cloud environments," Proc.25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Springer Lecture Notes in Computer Science, Vol. 6818, Yingiu Li, ed., Richmond, VA, July 11-13, 2011, pages 14-28 (Acceptance ratio 14/37 for full papers).
  58. Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and Sushil Jajodia, "Trading elephants for ants: Efficient post-attack reconstitution (short paper)," Proc. 7th Int'l. ICST Conf. on Security and Privacy in Communication Networks (SecureComm), London, September 7-9, 2011.

Return to top of the page


BOOK CHAPTERS

  1. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "Deceiving attackers by creating a virtual attack surface," in Cyber Deception: Building the Scientific Foundation, Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Springer, Switzerland, 2016, pages 169-201. 
  2. Massimiliano Albanese, Sushil Jajodia, "Technological solutions for improving performance of cyber security analysts," in Psychosocial Dynamics of Cyber Security,  Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke, eds., Routledge, NY, 2016, pages 291-304.
  3. Massimiliano Albanese, Sushil Jajodia, "Process of awareness," in Cyber Defense and Situational Awareness, Alexander Kott, Cliff Wang, Robert Erbacher, eds., Springer Advances in Information Security, Vol. 62, 2014.
  4. Sabrina De Capitani Di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Liverga, Pierangela Samarati, "Encryption and fragmentation for data confidentiality in the cloud," in Foundations of Security Analysis and Design VII - FOSAD Tutorial Lectures, Alessandro Aldini, Javier Lopez, Fabio Martinelli, eds., Springer Lecture Notes in Computer Science Vol. 8604, 2014, pages 212-243.
  5. Massimiliano Albanese, Hasan Cam, Sushil Jajodia, "Automated cyber situation awareness tools and models for improving analyst performance," in Cybersecurity Systems for Human Cognition Augmentation, Robinson E. Pino, Alexander Kott, Michael Shevenell, eds., Springer Advances in Information Security, Vol. 61, 2014, pages 47-60.
  6. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati, "Database Security and Privacy," in Computing Handbook, Third Edition: Information Systems and Information Technology, Heikki Toppi, Allen Tucker, eds., Chapman and Hall/CRC, May 2014.
  7. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Proof of isolation for cloud storage," in Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer, 2014, pages 95-122.
  8. Meixing Le, Krishna Kant, Sushil Jajodia, "Enabling collaborative data authorization between enterprise clouds," in Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer, 2014, pages 149-170.
  9. Massimiliano Alabanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri, "Securing mission-centric operations in the cloud," in Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer, 2014, pages 239-260.
  10. Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, C. Molinro, Fabio Persia, Antonio Picariello, Giancarlo Sperli, V. S. Subrahmanian,, "Recognizing unexplained behavior in network traffic," in Network Science and Cybersecurity, Robinson E. Pino, ed., Springer Advances in Information Security, Vol. 55, 2014, pages 39-62.
  11. Don Torrieri, Sencun Zhu, Sushil Jajodia, "Cyber maneuver against external adversaries and compromised nodes." in Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang, eds., Springer Advances in Information Security, Vol. 100, 2013, pages 87-96.
  12. Claudio Bettini, Sergio Mascetti, Dario Freni, X. Sean Wang, Sushil Jajodia, "Privacy and anonymity in location data management," in Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, Francesco Bonchi and Elena Ferrari, eds, Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 2011, pages 211-238.

 

Return to top of the page

 


OTHER ARTICLES

  1. Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou, "The ephemeral legion: Producing an expert cyber-security workforce from thin air," Communications of ACM (Virtual Extension), Vol. 54, No. 1, January 2011, pages 129-131.

Return to top of the page


Return to home page