Sushil Jajodia 
List of Publications 2016 and beyond


Authored Books  Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles      


Click here for Free Access to all my ACM Publications


AUTHORED BOOKS


EDITED BOOKS

  1. Sushil Jajodia, Pierangela Samarati, Moti Yung, eds., Encyclopedia of Cryptography, Security & Privacy, 3rd edition, Springer, In preparation.  Flyer
  2. Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds., Network Security Metrics, Springer, 2017.  DOI: 10.1007/978-3-319-66505-4
  3. Peng Liu, Sushil Jajodia, Cliff Wang, eds., Theory and Models for Cyber Situation Awareness, Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017. DOI: 10.1007/978-3-319-61152-5_z 
  4. Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Cyber Deception: Building the Scientific Foundation, ISBN 978-3-319-32697-9, Springer, Switzerland, 2016, 314 pages. DOI: 10.1007/978-3-319-32699-3  Chinese Translation

EDITED PROCEEDINGS

  1. Sjouke Mauw, Barbara Kordy, Sushil Jajodia, eds., Graphical Models for Security, Springer Lecture Notes in Computer Science, Vol. 9390, Springer International Publishing, Switzerland, 2016.  DOI: 10.1007/978-3-319-29968-6

JOURNAL ARTICLES

  1. Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia, "VULCON - A system for vulnerability prioritization, mitigation, and management," ACM Transactions on Privacy and Security (TOPS), To appear.
  2. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, "A methodology for ensuring fair allocation of CSOC effort for alert investigation," Springer International Journal of Information Security (IJIS), To appear
  3. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions,"  ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 9, No. 5, 2018.  DOI:  10.1145/3173457
  4. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "SHARE: A Stackelberg honey-based adversarial reasoning engine," ACM Trans. on Internet Technology (TOIT), Vol. 18, No. 3, March 2018, pages 30:1-30:41.  DOI:  10.1145/3137571
  5. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Adaptive reallocation of cybersecurity analysts to sensors for balancing risks between sensors," Springer Service Oriented Computing and Applications (SOCA), To appear.  DOI: 10.1007/s11761-018-0235-3  Download
  6. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Surviving unpatchable vulnerabilities through heterogeneous network hardening options," Journal of Computer security (JCS), To appear.  DOI: 10.3233/JCS-171106
  7. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Optimal assignments of sensors to analysts in a cybersecurity operations center,"  IEEE Systems Journal, To appear. DOI: 10.1109/JSYST.2018.2809506
  8. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "A methodology to measure and monitor level of operational effectiveness in a CSOC," Springer International Journal of Information Security (IJIS), Vol. 17, No. 2, 2018. pages 121-134DOI: 10.1007/s10207-017-0365-1
  9. Massimiliano Albanese, Sushil Jajodia, "A graphical model to assess the impact of multi-step attacks," Journal of Defense Modeling and Simulation, Vol. 15, No. 1, 2018, pages 79-93.. DOI: 10.1177/1548512917706043
  10. Ning Zhang, Ruide Zhang, Kun sun, Wenjing Lou, Y. Thomas Hu, Sushil Jajodia, "Memory forensic challenges under misused architectural features," IEEE Trans. on Information Forensics and Security (TIFS), To appear.  DOI:  10.1109/TIFS.2018.2819119
  11. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati, "An authorization model for multi-provider queries," Proc. of the VLDB Endowment (PVLDB), Vol. 11, No. 3, 2017, pages 256-268.  DOI: 10.14778/3157794.3157796
  12. Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Optimal scheduling  of cybersecurity analysts for minimizing risk," ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 8, No. 4, 2017, pages 52:1-52:32. DOI:  10.1145/2914795 Designated by ACM as a paper with practical content
  13. Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian, "A probabilistic logic of cyber deception," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 12, No. 11, November 2017, pages 2532-2544.  DOI:  10.1109/TIFS.2017.2710945
  14. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "Using temporal probabilistic logic for optimal monitoring of security events with limited resources," Journal of Computer Security (JCS), Vol. 24, No. 6, 2016, pages 735-791.  DOI:  10.3233/JCS-160555
  15. Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam, "Dynamic scheduling  of cybersecurity analysts for minimizing risk using reinforcement learning," ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 8, No. 1, 2016.  DOI: 10.1145/2882969 Appendix
  16. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Efficient integrity checks for join queries in the cloud," Journal of Computer Security (JCS), Vol. 24, 2016, papges 347-378.  DOI: 10.3233/JCS-160545
  17. Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia, "Minimum cost rule enforcement for cooperative database access," Journal of Computer Security (JCS), Vol. 24, 2016, pages 379-403.  DOI: 10.3233/JCS-160548
  18. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, "Network diversity: A security metric for evaluating the resilience of networks against zero-day attacks,"  IEEE Trans. on Information Forensics and Security (TIFS), Vol. 11, No. 5, May 2016, pages 1071-1086.  DOI: 10.1109/TIFS.2016.2516916
  19. Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia, "Profiling online social behaviors for compromised account detection," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 11, No. 1, January 2016, pages 176-187.  DOI: 10.1109/TIFS.2015.2482465

 

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia, "Detecting stealthy botnets in a resource-constrained environment using reinforcement learning," Proc. 4th ACM Workshop on Moving Target Defense (MTD 2017), Dallas, TX, October 30, 2017. DOI: https://doi.org/10.1145/3140549.3140552
  2. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Securing networks against unpatchable and unknown vulnerabilities using heterogeneous hardening options," Proc. 31st IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2017), Springer Lecture Notes in Computer Science, Vol. 10359, Giovanni Livraga and Sencun Zhu, eds. Philadelphia, July 19-21, 2017, pages 509-528.  DOI: 10.1007/978-3-319-61176-1 28
  3. Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright, "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures," IEEE Conf. on Communications and Network Security (CNS), Philadelphia, PA, October 17-19, 2016 (Acceptance ratio 38/131).
  4. Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia, "A moving target defense approach to disrupting stealthy botnets," Proc. 3rd ACM Workshop on Moving Target Defense (MTD 2016), Vienna, Austria, October 24, 2016 (Acceptance ratio 9/26 for regular papers).
  5. Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico, "AHEAD: A new architecture for active defense," Proc. SafeConfig 2016, Vienna, Austria, October 24, 2016.
  6. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Threat modeling for cloud data center infrastructures," Proc. 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer Lecture Notes in Computer Science, Vol. 101128, Frederic Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro, eds., Quebec, Canada, October 24-26, 2016, pages 302-319.  DOI: 10.1007/978-3-319-51966-1 20
  7. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Diversifying network services under cost constraints for better resilience against unknown attacks," Proc. 30th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2016), Springer Lecture Notes in Computer Science, Vol. 9766, S. Ranise and V. Swarup, eds, Trento, Italy, July 18-21, 2016, pages 295-312.  DOI: 10.1007/978-3-319-41483-6 21

 

Return to top of the page


BOOK CHAPTERS

  1. Marcel Frigault, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Measuring the overall network security by combining CVSS scores based on attack graphs and Bayesian networks," in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 1-23.  DOI: 10.1007/978-3-319-66505-4_1
  2. Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Refining CVSS-based network security metrics by examining the base scores," in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 25-52.  DOI: 10.1007/978-3-319-66505-4_2
  3. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel, "k-Zero day safety: Evaluating the resilience of networks against unknown attacks" in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 75-93.  DOI: 10.1007/978-3-319-66505-4_4
  4. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Evaluating the network diversity of networks against zero-day attacks," in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 117-140.  DOI: 10.1007/978-3-319-66505-4_6
  5. Steven Noel, Sushil Jajodia, "A suite of metrics for network attack graph analytics,"  in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 141-176.  DOI: 10.1007/978-3-319-66505-4_7
  6. Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam, "A novel metric for measuring operational effectiveness of a cybersecurity operations center,"  in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 177-207.  DOI: 10.1007/978-3-319-66505-4_8
  7. Sushil Jajodia, Massimiliano Albanese,, "An integrated framework for cyber situation awareness," in  Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wang, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017, pages 29-46.  DOI: 10.1007/978-3-319-61152-5_2
  8. Massimiliano Albanese, Nancy Cooke, Gonz├ílez Coty, David Hall, Christopher Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas Reeves, V. S. Subrahmanian, Cliff Wang. John Yen, "Computer-aided human centric cyber situation awareness," in  Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wang, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017, pages 3-25.  DOI: 10.1007/978-3-319-61152-5_1 
  9. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "Deceiving attackers by creating a virtual attack surface," in Cyber Deception: Building the Scientific Foundation, Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Springer, Switzerland, 2016, pages 169-201. 
  10. Massimiliano Albanese, Sushil Jajodia, "Technological solutions for improving performance of cyber security analysts," in Psychosocial Dynamics of Cyber Security,  Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke, eds., Routledge, NY, 2016, pages 291-304.

 

Return to top of the page

 


OTHER ARTICLES

  1. Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, "Defending from stealthy botnets using moving target defenses," IEEE Security & Privacy, Vol. 16, No. 1, January/February 2018, pages 92-97.  DOI: 10.1109/MSP.2018.1331034

Return to top of the page


Return to home page