CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Recent Publications

[-] 2018

[1] Farris, K.A., Shah, A., Cybenko, G., Ganesan, R. & Jajodia, S. "VULCON - A system for vulnerability prioritization, mitigation, and management". ACM Transactions on Privacy and Security (TOPS), 21(4):, , 2018.().

Electronic edition     Bibtex   

[2] Zhang, N., Sun, K., Shands, D., Lou, W. & Hou, T. "TruSense: Information Leakage from TrustZone". In To appear in IEEE International Conference on Computer Communications (INFOCOM), 2018.

Electronic edition     Bibtex   

[3] Jajodia, S., Park, N., Serra, E. & Subrahmanian, V.S. "SHARE: A Stackelberg honey-based adversarial reasoning engine". ACM Trans. on Internet Technology, 18(3):30:1-30:41, 2018.

Electronic edition     Bibtex   

[4] Albanese, M. & Jajodia, S. "A Graphical Model to Assess the Impact of Multi-Step Attacks". Journal of Defense Modeling and Simulation, 15(1):79-93, SAGE Publications, 2018.(Selected by the Guest Editor, Alexander Kott, as an article of particular value).

Electronic edition     Bibtex   

[5] Wallace, K., Zhou, G. & Sun, K. "CADET: Investigating a Collaborative and Distributed Entropy Transfer Protocol". In To appear in the 38th IEEE International Conference on Distributed Computing Systems (ICDCS), 2018.

Electronic edition     Bibtex   

[6] Albanese, M., Jajodia, S. & Venkatesan, S. "Defending from Stealthy Botnets Using Moving Target Defenses". IEEE Security and Privacy Magazine, 16(1):92-97, IEEE, 2018.

Electronic edition     Bibtex   

[7] Li, Y., Wang, H. & Sun, K. "Email as a Master Key: Analyzing Account Recovery in the Wild". In To appear in IEEE International Conference on Computer Communications (INFOCOM), 2018.

Electronic edition     Bibtex   

[8] Zhang, N., Zhang, R., Sun, K., Lou, W. & Hou, T. "Memory Forensic Challenges under Misused Architectural Features". To appear in IEEE Transactions on Information Forensics and Security (TIFS), 2018.

Electronic edition     Bibtex   

[9] Marasco, E., Feldman, A. & Romine, K. "Enhancing Optical Cross-Sensor Fingerprint Matching Using Local Textural Features". IEEE Cross-Domain Biometric Recognition (CDBR) Workshop, 2018.(accepted /to appear. Feldman and Romine are currently undergraduate students).

Electronic edition     Bibtex   

[10] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "A methodology to measure and monitor level of operational effectiveness of a CSOC". International Journal of Information Security, 17(2):121-134, Springer, 2018.

Electronic edition     Bibtex   

[11] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions". ACM Trans. on Intelligent Systems and Technology, 2018.(To appear).

Electronic edition     Bibtex   

[12] Pham, L.H., Albanese, M. & Priest, B.W. "A Quantitative Framework to Model Advanced Persistent Threats". In Proceedings of the 15th International Conference on Security and Cryptography (SECRYPT 2018), pages 282-293, SciTePress, 2018.(Best Paper Award).

Electronic edition     Bibtex    Award

[+] 2017

[1] Jajodia, S., Park, N., Pierazzi, F., Pugliese, A., Serra, E., Simari, G.I. & Subrahmanian, V.S. "A probabilistic logic of cyber deception". IEEE Trans. on Information Forensics and Security, 12(11):2532-2544, 2017.

Electronic edition     Bibtex   

[2] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "An authorization model for multi-provider queries". Proc. of the VLDB Endownment, 11(3):256-268, 2017.

Electronic edition     Bibtex   

[3] Wang, L., Jajodia, S. & Singhal, A. "Network Security Metrics". Springer, 2017.

Electronic edition     Bibtex   

[4] Gu, Y., Sun, K., Su, P., Li, Q., Lu, Y., Ying, L. & Feng, D. "JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android". In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), ():427-438, 2017.

Electronic edition     Bibtex   

[5] Venkatesan, S., Albanese, M., Shah, A., Ganesan, R. & Jajodia, S. "Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning". In Proceedings of the 4th ACM Workshop on Moving Target Defense (MTD 2017), pages 75-85, ACM, 2017.

Electronic edition     Bibtex   

[6] Wan, S., Li, Y. & Sun, K. "Protecting web contents against persistent distributed crawlers". In 2017 IEEE International Conference on Communications (ICC), ():1-6, 2017.

Electronic edition     Bibtex   

[7] Lei, L., He, Y., Sun, K., Jing, J., Wang, Y., Li, Q. & Weng, J. "Vulnerable Implicit Service: A Revisit". In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1051-1063, 2017.

Electronic edition     Bibtex   

[8] Jajodia, S. & Albanese, M. "An Integrated Framework for Cyber Situation Awareness". In Theory and Models for Cyber Situation Awareness, 10030:29-46, Springer, 2017.

Electronic edition     Bibtex   

[9] Li, Y., Zheng, N., Wang, H., Sun, K. & Fang, H. "A measurement study on Amazon wishlist and its privacy exposure". In 2017 IEEE International Conference on Communications (ICC), ():1-7, 2017.

Electronic edition     Bibtex   

[10] Hyun, S., Sun, K. & Ning, P. "FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes". Computer Communications, 104:191-203, 2017.

Electronic edition     Bibtex   

[11] Albanese, M., Cooke, N., González, C., Hall, D., Healey, C., Jajodia, S., Liu, P., McNeese, M.D., Ning, P., Reeves, D., Subrahmanian, V.S., Wang, C. & Yen, J. "Computer-Aided Human Centric Cyber Situation Awareness". In Theory and Models for Cyber Situation Awareness, 10030:3-25, Springer, 2017.

Electronic edition     Bibtex   

[12] Connell, W., Menascé, D.A. & Albanese, M. "Performance Modeling of Moving Target Defenses". In Proceedings of the 4th ACM Workshop on Moving Target Defense (MTD 2017), pages 53-63, ACM, 2017.

Electronic edition     Bibtex   

[13] Sun, J., Sun, K. & Li, Q. "CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms". In 2017 IEEE Conference on Communications and Network Security (CNS), ():1-9, 2017.

Electronic edition     Bibtex   

[14] Lei, L., Sun, J., Sun, K., Shenefiel, C., Ma, R., Wang, Y. & Li, Q. "SPEAKER: Split-Phase Execution of Application Containers". In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 230-251, Springer International Publishing, 2017.

Electronic edition     Bibtex   

[15] Ganesan, R., Jajodia, S. & Cam, H. "Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk". ACM Transactions on Intelligent Systems and Technology (TIST), 8(4):52, ACM, 2017.

Electronic edition     Bibtex   

[16] Connell, W., Albanese, M. & Venkatesan, S. "A Framework for Moving Target Defense Quantification". In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), pages 124-138, Springer, 2017.

Electronic edition     Bibtex   

[17] Li, Y., Wang, H. & Sun, K. "Personal Information in Passwords and Its Security Implications". IEEE Transactions on Information Forensics and Security, 12(10):2320-2333, 2017.

Electronic edition     Bibtex   

[18] Liu, P., Jajodia, S. & Wang, C. "Theory and Models for Cyber Situation Awareness". Springer Lecture Notes in Computer Science, 2017.

Electronic edition     Bibtex   

[+] 2016

[1] Venkatesan, S., Albanese, M., Cybenko, G. & Jajodia, S. "A Moving Target Defense Approach to Disrupting Stealthy Botnets". In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016), pages 37-46, ACM, 2016.

Electronic edition     Bibtex   

[2] Jajodia, S., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Deception: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2016.

Electronic edition     Bibtex   

[3] Pham, L.H., Albanese, M. & Venkatesan, S. "A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud". In Communications and Network Security (CNS), 2016 IEEE Conference on, pages 489-497, 2016.

Electronic edition     Bibtex   

[4] De Gaspari, F., Jajodia, S., Mancini, L.V. & Panico, A. "AHEAD: A New Architecture for Active Defense". In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 11-16, 2016.

Electronic edition     Bibtex   

[5] Zhang, N., Sun, K., Lou, W. & Hou, Y.T. "CaSE: Cache-Assisted Secure Execution on ARM Processors". In 2016 IEEE Symposium on Security and Privacy (SP), ():72-90, 2016.

Electronic edition     Bibtex   

[6] Ruan, X., Wu, Z., Wang, H. & Jajodia, S. "Profiling Online Social Behaviors for Compromised Account Detection". IEEE Transactions on Information Forensics and Security, 11(1):176-187, IEEE, 2016.

Electronic edition     Bibtex   

[7] Zhang, N., Sun, H., Sun, K., Lou, W. & Hou, Y.T. "CacheKit: Evading Memory Introspection Using Cache Incoherence". In 2016 IEEE European Symposium on Security and Privacy (EuroS P), ():337-352, 2016.

Electronic edition     Bibtex   

[8] Zhang, M., Wang, L., Jajodia, S., Singhal, A. & Albanese, M. "Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks". IEEE Transactions on Information Forensics and Security, 11(5):1071-1086, IEEE, 2016.

Electronic edition     Bibtex   

[9] Jajodia, S., Park, N., Serra, E. & Subrahmanian, V. "Using temporal probabilistic logic for optimal monitoring of security events with limited resources". Journal of Computer Security pages 1-57, IOS Press, 2016.

Electronic edition     Bibtex   

[10] Le, M., Kant, K., Athamnah, M. & Jajodia, S. "Minimum cost rule enforcement for cooperative database access". Journal of Computer Security pages 1-25, IOS Press, 2016.

Electronic edition     Bibtex   

[11] Ganesan, R., Jajodia, S., Shah, A. & Cam, H. "Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning". ACM Transactions on Intelligent Systems and Technology (TIST), 8(1):4, ACM, 2016.

Electronic edition     Bibtex   

[12] Wright, M., Venkatesan, S., Albanese, M. & Wellman, M.P. "Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis". In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016), pages 93-104, ACM, 2016.

Electronic edition     Bibtex   

[13] Li, Y., Wang, H. & Sun, K. "A study of personal information in human-chosen passwords and its security implications". In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, ():1-9, 2016.

Electronic edition     Bibtex   

[14] Venkatesan, S., Albanese, M., Amin, K., Jajodia, S. & Wright, M. "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures". In IEEE Conference on Communications and Network Security, 2016.

Electronic edition     Bibtex   

[15] Borbor, D., Wang, L., Jajodia, S. & Singhal, A. "Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks". In IFIP Annual Conference on Data and Applications Security and Privacy, pages 295-312, 2016.

Electronic edition     Bibtex   

[16] Wallace, K., Moran, K., Novak, E., Zhou, G. & Sun, K. "Toward Sensor-Based Random Number Generation for Mobile and IoT Devices". IEEE Internet of Things Journal, 3(6):1189-1201, 2016.

Electronic edition     Bibtex   

[17] Guan, C., Sun, K., Wang, Z. & Zhu, W. "Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure". In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 629-640, ACM, 2016.

Electronic edition     Bibtex   

[18] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Efficient Integrity Checks for Join Queries in the Cloud". Journal of Computer Security pages 1-32, IOS Press, 2016.

Electronic edition     Bibtex   

[19] Sun, J. & Sun, K. "DESIR: Decoy-enhanced seamless IP randomization". In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, ():1-9, 2016.

Electronic edition     Bibtex   

[20] Wang, L., Li, Y. & Sun, K. "Amnesia: A Bilateral Generative Password Manager". In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ():313-322, 2016.

Electronic edition     Bibtex   

[+] 2015

[1] Venkatesan, S., Albanese, M. & Jajodia, S. "Disrupting stealthy botnets through strategic placement of detectors". In 2015 IEEE Conference on Communications and Network Security (IEEE CNS 2015), pages 95-103, 2015.(Best Paper Runner-Up Award).

Electronic edition     Bibtex    Award

[2] Deliri, S. & Albanese, M. "Security and privacy issues in social networks". In Data Management in Pervasive Systems, pages 195-209, Springer, 2015.

Electronic edition     Bibtex   

[3] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for Approximate Joins on Untrusted Computational Servers". In ICT Systems Security and Privacy Protection, 455:446-459, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[4] Albanese, M., Battista, E. & Jajodia, S. "A deception based approach for defeating OS and service fingerprinting". In 2015 IEEE Conference on Communications and Network Security (CNS), pages 253-261, 2015.

Electronic edition     Bibtex   

[5] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Loose Associations to Increase Utility in Data Publishing". Journal of Computer Security, 23(1):59-88, IOS Press, 2015.

Electronic edition     Bibtex   

[6] Sun, H., Sun, K., Wang, Y. & Jing, J. "Reliable and Trustworthy Memory Acquisition on Smartphones". IEEE Transactions on Information Forensics and Security, 10(12):2547-2561, 2015.

Electronic edition     Bibtex   

[7] Clark, A., Sun, K., Bushnell, L. & Poovendran, R. "A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense". In Decision and Game Theory for Security, pages 3-21, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[8] Zhang, N., Sun, K., Lou, W., Hou, Y.T. & Jajodia, S. "Now You See Me: Hide and Seek in Physical Address Space". In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS '15), pages 321-331, ACM, 2015.

Electronic edition     Bibtex   

[9] Serra, E., Jajodia, S., Pugliese, A., Rullo, A. & Subrahmanian, V.S. "Pareto-Optimal Adversarial Defense of Enterprise Systems". ACM Trans. on Information and System Security, 17(3):11:1-11:39, ACM, 2015.

Electronic edition     Bibtex   

[10] Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Warfare: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2015.

Electronic edition     Bibtex   

[+] 2014

[1] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Fragmentation in presence of data dependencies". IEEE Transactions on Dependable and Secure Computing, 11(6):510-523, IEEE, 2014.

Electronic edition     Bibtex   

[2] Sun, H., Sun, K., Wang, Y., Jing, J. & Jajodia, S. "TrustDump: Reliable Memory Acquisition on Smartphones". In Computer Security-ESORICS 2014, pages 202-218, Springer, 2014.

Electronic edition     Bibtex   

[3] Li, L., Zhu, S., Torrieri, D. & Jajodia, S. "Self-healing wireless networks under insider jamming attacks". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 220-228, 2014.

Electronic edition     Bibtex   

[4] Albanese, M., Molinaro, C., Persia, F., Picariello, A. & Subrahmanian, V. "Discovering the top-k unexplained sequences in time-stamped observation data". IEEE Transactions on Knowledge and Data Engineering, 26(3):577-594, IEEE, 2014.

Electronic edition     Bibtex   

[5] Wang, L., Zhang, M., Jajodia, S., Singhal, A. & Albanese, M. "Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks". In Computer Security-ESORICS 2014, pages 494-511, Springer, 2014.

Electronic edition     Bibtex   

[6] Le, M., Kant, K. & Jajodia, S. "Consistency and enforcement of access rules in cooperative data sharing environment". Computers & Security, 41:3-18, Elsevier, 2014.

Electronic edition     Bibtex   

[7] Cybenko, G., Jajodia, S., Wellman, M.P. & Liu, P. "Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation". In Proceedings of the 10th International Conference on Information Systems Security (ICISS 2014), 8880:1-8, Springer, 2014.

Electronic edition     Bibtex   

[8] De Capitani Di Vimercati, S., Erbacher, R.F., Foresti, S., Jajodia, S., Livraga, G. & Samarati, P. "Encryption and Fragmentation for Data Confidentiality in the Cloud". In Foundations of Security Analysis and Design VII, pages 212-243, Springer, 2014.

Electronic edition     Bibtex   

[9] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities". In E-Business and Telecommunications, pages 322-340, Springer, 2014.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Integrity for distributed queries". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 364-372, 2014.

Electronic edition     Bibtex   

[11] Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V. & Wang, C. "Secure cloud computing". Springer, 2014.

Electronic edition     Bibtex   

[12] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Securing Mission-Centric Operations in the Cloud". In Secure Cloud Computing, pages 239-259, Springer, 2014.

Electronic edition     Bibtex   

[13] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Optimizing integrity checks for join queries in the cloud". In Data and Applications Security and Privacy XXVIII, pages 33-48, Springer, 2014.(Best Paper Award).

Electronic edition     Bibtex    Award

[14] Sun, K. & Jajodia, S. "Protecting enterprise networks through attack surface expansion". In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, pages 29-32, 2014.

Electronic edition     Bibtex   

[15] Xu, Z., Wang, H. & Jajodia, S. "Gemini: An Emergency Line of Defense against Phishing Attacks". In 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (SRDS), pages 11-20, 2014.

Electronic edition     Bibtex   

[16] Shakarian, P., Paulo, D., Albanese, M. & Jajodia, S. "Keeping Intruders at Large: A Graph-Theoretic Approach to Reducing the Probability of Successful Network Intrusions". In Proc. 11th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August, 2014.

Electronic edition     Bibtex   

[17] Albanese, M., Battista, E., Jajodia, S. & Casola, V. "Manipulating the attacker's view of a system's attack surface". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 472-480, 2014.

Electronic edition     Bibtex   

[18] Albanese, M. & Jajodia, S. "Formation of Awareness". In Cyber Defense and Situational Awareness, pages 47-62, Springer, 2014.

Electronic edition     Bibtex   

[19] Casola, V., De Benedictis, A. & Albanese, M. "A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices". In Integration of Reusable Systems, pages 299-324, Springer, 2014.

Electronic edition     Bibtex   

[20] Albanese, M., Erbacher, R.F., Jajodia, S., Molinaro, C., Persia, F., Picariello, A., Sperli, G. & Subrahmanian, V. "Recognizing Unexplained Behavior in Network Traffic". In Network Science and Cybersecurity, pages 39-62, Springer, 2014.

Electronic edition     Bibtex   

[21] Roy, S., Conti, M., Setia, S. & Jajodia, S. "Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact". IEEE Transactions on Information Forensics and Security, IEEE, 2014.

Electronic edition     Bibtex   

[22] Le, M., Kant, K. & Jajodia, S. "Enabling Collaborative Data Authorization Between Enterprise Clouds". In Secure Cloud Computing, pages 149-169, Springer, 2014.

Electronic edition     Bibtex   

[23] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Proof of Isolation for Cloud Storage". In Secure Cloud Computing, pages 95-121, Springer, 2014.

Electronic edition     Bibtex   

[24] Jajodia, S., Litwin, W. & SJ, T.S. "Scalable Distributed Virtual Data Structures". Academy of Science and Engineering (ASE), USA,copyright ASE 2014, 2014.

Electronic edition     Bibtex   

[25] Wang, L., Jajodia, S., Singhal, A., Cheng, P. & Noel, S. "k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities". IEEE Transactions on Dependable and Secure Computing, 11(1):30-44, IEEE, 2014.

Electronic edition     Bibtex   

[26] Wang, L., Albanese, M. & Jajodia, S. "Network Hardening". Springer, 2014.

Electronic edition     Bibtex   

[27] Albanese, M., Cam, H. & Jajodia, S. "Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance". In Cybersecurity Systems for Human Cognition Augmentation, pages 47-60, Springer, 2014.

Electronic edition     Bibtex   

[28] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S. & Samarati, P. "Database security and privacy". Chapman and Hall/CRC, 2014.

Electronic edition     Bibtex   

[29] Le, M., Kant, K. & Jajodia, S. "Consistent Query Plan Generation in Secure Cooperative Data Access". In Data and Applications Security and Privacy XXVIII, pages 227-242, Springer, 2014.

Electronic edition     Bibtex   

[30] Albanese, M., De Benedictis, A., Jajodia, S. & Torrieri, D. "A probabilistic framework for jammer identification in MANETs". Ad Hoc Networks, 14:84-94, Elsevier, 2014.

Electronic edition     Bibtex   

[31] Noel, S. & Jajodia, S. "Metrics suite for network attack graph analytics". In Proceedings of the 9th Annual Cyber and Information Security Research Conference, pages 5-8, 2014.

Electronic edition     Bibtex   

[+] 2013

[1] Albanese, M., Fayzullin, M., Shakarian, J. & Subrahmanian, V. "Automated Coding of Decision Support Variables". In Handbook of Computational Approaches to Counterterrorism, pages 69-80, Springer, 2013.

Electronic edition     Bibtex   

[2] Le, M., Kant, K. & Jajodia, S. "Rule enforcement with third parties in secure cooperative data access". In Data and Applications Security and Privacy XXVII, pages 282-288, Springer, 2013.

Electronic edition     Bibtex   

[3] Albanese, M. "Measuring trust in big data". In Algorithms and Architectures for Parallel Processing, pages 241-248, Springer, 2013.

Electronic edition     Bibtex   

[4] Albanese, M., Pugliese, A. & Subrahmanian, V. "Fast activity detection: Indexing for temporal stochastic automaton-based activity models". IEEE Transactions on Knowledge and Data Engineering, 25(2):360-373, IEEE, 2013.

Electronic edition     Bibtex   

[5] Wang, L., Wang, Z., Sun, K. & Jajodia, S. "Reducing Attack Surface with VM-Based Phantom Server". In 2013 IEEE Military Communications Conference, MILCOM 2013, pages 1429-1435, 2013.

Electronic edition     Bibtex   

[6] Nzoukou, W., Wang, L., Jajodia, S. & Singhal, A. "A Unified Framework for Measuring a Network's Mean Time-to-Compromise". In 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (SRDS), pages 215-224, 2013.

Electronic edition     Bibtex   

[7] Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S. & Mancini, L.V. "Preserving privacy against external and internal threats in WSN data aggregation". Telecommunication Systems, 52(4):2163-2176, Springer, 2013.

Electronic edition     Bibtex   

[8] di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Enforcing dynamic write privileges in data outsourcing". Computers & security, 39:47-63, Elsevier, 2013.

Electronic edition     Bibtex   

[9] Casola, V., De Benedictis, A. & Albanese, M. "A moving target defense approach for protecting resource-constrained distributed devices". In 2013 IEEE 14th International Conference on Information Reuse and Integration (IRI), pages 22-29, 2013.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Extending loose associations to multiple fragments". In Data and Applications Security and Privacy XXVII, pages 1-16, Springer, 2013.

Electronic edition     Bibtex   

[11] Yang, Y., Zhang, Y., Wang, A.H., Yu, M., Zang, W., Liu, P. & Jajodia, S. "Quantitative survivability evaluation of three virtual machine-based server architectures". Journal of Network and Computer Applications, 36(2):781-790, Elsevier, 2013.

Electronic edition     Bibtex   

[12] Xiao, Z. & Xiao, Y. "Security and privacy in cloud computing". IEEE Communications Surveys & Tutorials, 15(2):843-859, IEEE, 2013.

Electronic edition     Bibtex   

[13] Jajodia, S., Ghosh, A.K., Subrahmanian, V., Swarup, V., Wang, C. & Wang, X.S. "Moving Target Defense II". Springer, 2013.

Electronic edition     Bibtex   

[14] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.". In SECRYPT, pages 207-218, 2013.(Best Paper Award).

Electronic edition     Bibtex    Award

[15] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "On information leakage by indexes over data fragments". In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pages 94-98, 2013.

Electronic edition     Bibtex   

[16] Jajodia, S., Litwin, W. & SJ, T.S. "Recoverable encryption through a noised secret over a large cloud". In Transactions on Large-Scale Data-and Knowledge-Centered Systems IX, pages 42-64, Springer, 2013.

Electronic edition     Bibtex   

[17] Chu, Z., Gianvecchio, S., Koehl, A., Wang, H. & Jajodia, S. "Blog or block: Detecting blog bots through behavioral biometrics". Computer Networks, 57(3):634-646, Elsevier, 2013.

Electronic edition     Bibtex   

[18] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Reliable mission deployment in vulnerable distributed systems". In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pages 1-8, 2013.

Electronic edition     Bibtex   

[19] Deliri, S. & Albanese, M. "Security-Aware Scheduling of Mission Tasks under Temporal Constraints". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 452-457, 2013.

Electronic edition     Bibtex   

[20] Wang, Z., Sun, K., Jing, J. & Jajodia, S. "Verification of data redundancy in cloud storage". In Proceedings of the 2013 international workshop on Security in cloud computing, pages 11-18, 2013.

Electronic edition     Bibtex   

[21] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for join queries in the cloud". IEEE Transactions on Cloud Computing, 1(2):187-200, IEEE, 2013.

Electronic edition     Bibtex   

[22] Ardagna, C.A., Jajodia, S., Samarati, P. & Stavrou, A. "Providing users' anonymity in mobile hybrid networks". ACM Transactions on Internet Technology (TOIT), 12(3):7, ACM, 2013.

Electronic edition     Bibtex   

[23] De Benedictis, A., Koosha, B., Albanese, M. & Casola, V. "A probabilistic framework for distributed localization of attackers in manets". In Security and Trust Management, pages 49-64, Springer, 2013.

Electronic edition     Bibtex   

[24] Albanese, M., d'Acierno, A., Moscato, V., Persia, F. & Picariello, A. "A multimedia recommender system". ACM Transactions on Internet Technology (TOIT), 13(1):3, ACM, 2013.

Electronic edition     Bibtex   

[25] Albanese, M., Jajodia, S. & Molinaro, C. "A Logic Framework for Flexible and Security-Aware Service Composition". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 337-346, 2013.

Electronic edition     Bibtex   

[26] Albanese, M., De Benedictis, A., Jajodia, S. & Sun, K. "A moving target defense mechanism for manets based on identity virtualization". In 2013 IEEE Conference on Communications and Network Security (CNS), pages 278-286, 2013.

Electronic edition     Bibtex   

[27] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Terracheck: Verification of dedicated cloud storage". In Data and Applications Security and Privacy XXVII, pages 113-127, Springer, 2013.

Electronic edition     Bibtex