Sushil Jajodia 
List of Publications 2016 and beyond


Authored Books  Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles      


Click here for Free Access to all my ACM Publications


AUTHORED BOOKS


EDITED BOOKS

  1. Sushil Jajodia, Pierangela Samarati, Moti Yung, eds., Encyclopedia of Cryptography, Security & Privacy, 3rd edition, Springer, In preparation.  Flyer
  2. Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds., Network Security Metrics, Springer, In production.  DOI: 10.1007/978-3-319-66505-4
  3. Peng Liu, Sushil Jajodia, Cliff Wang, eds., Theory and Models for Cyber Situation Awareness, Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017. DOI: 10.1007/978-3-319-61152-5_z 
  4. Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Cyber Deception: Building the Scientific Foundation, ISBN 978-3-319-32697-9, Springer, Switzerland, 2016, 314 pages. DOI: 10.1007/978-3-319-32699-3  Chinese Translation

EDITED PROCEEDINGS

  1. Sjouke Mauw, Barbara Kordy, Sushil Jajodia, eds., Graphical Models for Security, Springer Lecture Notes in Computer Science, Vol. 9390, Springer International Publishing, Switzerland, 2016.  DOI: 10.1007/978-3-319-29968-6

JOURNAL ARTICLES

  1. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "SHARE: A Stackelberg honey-based adversarial reasoning engine," ACM Trans. on Internet Technology, To appear.
  2. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "A methodology to measure and monitor level of operational effectiveness in a CSOC," Springer International Journal of Information Security, 2017DOI: 10.1007/s10207-017-0365-1
  3. Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Optimal scheduling  of cybersecurity analysts for minimizing risk," ACM Trans. on Intelligent Systems and Technology, Vol. 8, No. 4, 2017, pages 52:1-52:32. DOI:  10.1145/2914795 Designated by ACM as a paper with practical content
  4. Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian, "A probabilistic logic of cyber deception," IEEE Trans. on Information Forensics and Security, Vol. 12, No. 11, November 2017, pages 2532-2544.  DOI:  10.1109/TIFS.2017.2710945
  5. Massimiliano Albanese, Sushil Jajodia, "A graphical model to assess the impact of multi-step attacks," Journal of Defense Modeling and Simulation, 2017. DOI: 10.1177/1548512917706043
  6. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "Using temporal probabilistic logic for optimal monitoring of security events with limited resources," Journal of Computer Security, Vol. 24, No. 6, 2016, pages 735-791.  DOI:  10.3233/JCS-160555
  7. Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam, "Dynamic scheduling  of cybersecurity analysts for minimizing risk using reinforcement learning," ACM Trans. on Intelligent Systems and Technology, Vol. 8, No. 1, 2016.  DOI: 10.1145/2882969 Appendix
  8. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Efficient integrity checks for join queries in the cloud," Journal of Computer Security, Vol. 24, 2016, papges 347-378.  DOI: 10.3233/JCS-160545
  9. Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia, "Minimum cost rule enforcement for cooperative database access," Journal of Computer Security, Vol. 24, 2016, pages 379-403.  DOI: 10.3233/JCS-160548
  10. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, "Network diversity: A security metric for evaluating the resilience of networks against zero-day attacks,"  IEEE Trans. on Information Forensics and Security, Vol. 11, No. 5, May 2016, pages 1071-1086.  DOI: 10.1109/TIFS.2016.2516916
  11. Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia, "Profiling online social behaviors for compromised account detection," IEEE Trans. on Information Forensics and Security, Vol. 11, No. 1, January 2016, pages 176-187.  DOI: 10.1109/TIFS.2015.2482465

 

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia, "Detecting stealthy botnets in a resource-constrained environment using reinforcement learning," Proc. 4th ACM Workshop on Moving Target Defense (MTD 2017), Dallas, TX, October 30, 2017.
  2. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Securing networks against unpatchable and unknown vulnerabilities using heterogeneous hardening options," Proc. 31st IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2017), Springer Lecture Notes in Computer Science, Vol. 10359, Giovanni Livraga and Sencun Zhu, eds. Philadelphia, July 19-21, 2017, pages 509-528.  DOI: 10.1007/978-3-319-61176-1 28
  3. Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright, "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures," IEEE Conf. on Communications and Network Security (CNS), Philadelphia, PA, October 17-19, 2016 (Acceptance ratio 38/131).
  4. Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia, "A moving target defense approach to disrupting stealthy botnets," Proc. 3rd ACM Workshop on Moving Target Defense (MTD 2016), Vienna, Austria, October 24, 2016 (Acceptance ratio 9/26 for regular papers).
  5. Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico, "AHEAD: A new architecture for active defense," Proc. SafeConfig 2016, Vienna, Austria, October 24, 2016.
  6. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Threat modeling for cloud data center infrastructures," Proc. 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer Lecture Notes in Computer Science, Vol. 101128, Frederic Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro, eds., Quebec, Canada, October 24-26, 2016, pages 302-319.  DOI: 10.1007/978-3-319-51966-1 20
  7. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Diversifying network services under cost constraints for better resilience against unknown attacks," Proc. 30th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2016), Springer Lecture Notes in Computer Science, Vol. 9766, S. Ranise and V. Swarup, eds, Trento, Italy, July 18-21, 2016, pages 295-312.  DOI: 10.1007/978-3-319-41483-6 21

 

Return to top of the page


BOOK CHAPTERS

  1. Sushil Jajodia, Massimiliano Albanese,, "An integrated framework for cyber situation awareness," in  Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wag, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017, pages 29-46.  DOI: 10.1007/978-3-319-61152-5_2
  2. Massimiliano Albanese, Nancy Cooke, Gonz├ílez Coty, David Hall, Christopher Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas Reeves, V. S. Subrahmanian, Cliff Wang. John Yen, "Computer-aided human centric cyber situation awareness," in  Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wag, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017, pages 3-25.  DOI: 10.1007/978-3-319-61152-5_1 
  3. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "Deceiving attackers by creating a virtual attack surface," in Cyber Deception: Building the Scientific Foundation, Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Springer, Switzerland, 2016, pages 169-201. 
  4. Massimiliano Albanese, Sushil Jajodia, "Technological solutions for improving performance of cyber security analysts," in Psychosocial Dynamics of Cyber Security,  Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke, eds., Routledge, NY, 2016, pages 291-304.

 

Return to top of the page

 


OTHER ARTICLES

Return to top of the page


Return to home page