CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Recent Publications

[-] 2017

[1] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "A methodology to measure and monitor level of operational effectiveness of a CSOC". International Journal of Information Security, pages 1-14, Springer, 2017.

Electronic edition     Bibtex   

[2] Albanese, M. & Jajodia, S. "A graphical model to assess the impact of multi-step attacks". Journal of Defense Modeling and Simulation, 2017.

Electronic edition     Bibtex   

[3] Ganesan, R., Jajodia, S. & Cam, H. "Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk". ACM Transactions on Intelligent Systems and Technology (TIST), 8(4):52, ACM, 2017.

Electronic edition     Bibtex   

[4] Connell, W., Albanese, M. & Venkatesan, S. "A Framework for Moving Target Defense Quantification". In IFIP International Information Security Conference, 2017.(to appear).

Electronic edition     Bibtex   

[+] 2016

[1] Jajodia, S., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Deception: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2016.

Electronic edition     Bibtex   

[2] Pham, L.H., Albanese, M. & Venkatesan, S. "A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud". In Communications and Network Security (CNS), 2016 IEEE Conference on, pages 489-497, 2016.

Electronic edition     Bibtex   

[3] De Gaspari, F., Jajodia, S., Mancini, L.V. & Panico, A. "AHEAD: A New Architecture for Active Defense". In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 11-16, 2016.

Electronic edition     Bibtex   

[4] Ruan, X., Wu, Z., Wang, H. & Jajodia, S. "Profiling Online Social Behaviors for Compromised Account Detection". IEEE Transactions on Information Forensics and Security, 11(1):176-187, IEEE, 2016.

Electronic edition     Bibtex   

[5] Zhang, M., Wang, L., Jajodia, S., Singhal, A. & Albanese, M. "Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks". IEEE Transactions on Information Forensics and Security, 11(5):1071-1086, IEEE, 2016.

Electronic edition     Bibtex   

[6] Jajodia, S., Park, N., Serra, E. & Subrahmanian, V. "Using temporal probabilistic logic for optimal monitoring of security events with limited resources". Journal of Computer Security pages 1-57, IOS Press, 2016.

Electronic edition     Bibtex   

[7] Le, M., Kant, K., Athamnah, M. & Jajodia, S. "Minimum cost rule enforcement for cooperative database access". Journal of Computer Security pages 1-25, IOS Press, 2016.

Electronic edition     Bibtex   

[8] Wright, M., Venkatesan, S., Albanese, M. & Wellman, M.P. "Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis". In Proceedings of the 2016 ACM Workshop on Moving Target Defense, pages 93-104, 2016.

Electronic edition     Bibtex   

[9] Ganesan, R., Jajodia, S., Shah, A. & Cam, H. "Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning". ACM Transactions on Intelligent Systems and Technology (TIST), 8(1):4, ACM, 2016.

Electronic edition     Bibtex   

[10] Venkatesan, S., Albanese, M., Cybenko, G. & Jajodia, S. "A Moving Target Defense Approach to Disrupting Stealthy Botnets". In Proceedings of the 2016 ACM Workshop on Moving Target Defense, pages 37-46, 2016.

Electronic edition     Bibtex   

[11] Venkatesan, S., Albanese, M., Amin, K., Jajodia, S. & Wright, M. "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures". In IEEE Conference on Communications and Network Security, 2016.

Electronic edition     Bibtex   

[12] Borbor, D., Wang, L., Jajodia, S. & Singhal, A. "Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks". In IFIP Annual Conference on Data and Applications Security and Privacy, pages 295-312, 2016.

Electronic edition     Bibtex   

[13] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Efficient Integrity Checks for Join Queries in the Cloud". Journal of Computer Security pages 1-32, IOS Press, 2016.

Electronic edition     Bibtex   

[+] 2015

[1] Venkatesan, S., Albanese, M. & Jajodia, S. "Disrupting stealthy botnets through strategic placement of detectors". In 2015 IEEE Conference on Communications and Network Security (IEEE CNS 2015), pages 95-103, 2015.(Best Paper Runner-Up Award).

Electronic edition     Bibtex    Award

[2] Deliri, S. & Albanese, M. "Security and privacy issues in social networks". In Data Management in Pervasive Systems, pages 195-209, Springer, 2015.

Electronic edition     Bibtex   

[3] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for Approximate Joins on Untrusted Computational Servers". In ICT Systems Security and Privacy Protection, 455:446-459, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[4] Albanese, M., Battista, E. & Jajodia, S. "A deception based approach for defeating OS and service fingerprinting". In 2015 IEEE Conference on Communications and Network Security (CNS), pages 253-261, 2015.

Electronic edition     Bibtex   

[5] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Loose Associations to Increase Utility in Data Publishing". Journal of Computer Security, 23(1):59-88, IOS Press, 2015.

Electronic edition     Bibtex   

[6] Zhang, N., Sun, K., Lou, W., Hou, Y.T. & Jajodia, S. "Now You See Me: Hide and Seek in Physical Address Space". In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS '15), pages 321-331, ACM, 2015.

Electronic edition     Bibtex   

[7] Serra, E., Jajodia, S., Pugliese, A., Rullo, A. & Subrahmanian, V.S. "Pareto-Optimal Adversarial Defense of Enterprise Systems". ACM Trans. on Information and System Security, 17(3):11:1-11:39, ACM, 2015.

Electronic edition     Bibtex   

[8] Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Warfare: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2015.

Electronic edition     Bibtex   

[+] 2014

[1] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Fragmentation in presence of data dependencies". IEEE Transactions on Dependable and Secure Computing, 11(6):510-523, IEEE, 2014.

Electronic edition     Bibtex   

[2] Sun, H., Sun, K., Wang, Y., Jing, J. & Jajodia, S. "TrustDump: Reliable Memory Acquisition on Smartphones". In Computer Security-ESORICS 2014, pages 202-218, Springer, 2014.

Electronic edition     Bibtex   

[3] Li, L., Zhu, S., Torrieri, D. & Jajodia, S. "Self-healing wireless networks under insider jamming attacks". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 220-228, 2014.

Electronic edition     Bibtex   

[4] Albanese, M., Molinaro, C., Persia, F., Picariello, A. & Subrahmanian, V. "Discovering the top-k unexplained sequences in time-stamped observation data". IEEE Transactions on Knowledge and Data Engineering, 26(3):577-594, IEEE, 2014.

Electronic edition     Bibtex   

[5] Wang, L., Zhang, M., Jajodia, S., Singhal, A. & Albanese, M. "Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks". In Computer Security-ESORICS 2014, pages 494-511, Springer, 2014.

Electronic edition     Bibtex   

[6] Le, M., Kant, K. & Jajodia, S. "Consistency and enforcement of access rules in cooperative data sharing environment". Computers & Security, 41:3-18, Elsevier, 2014.

Electronic edition     Bibtex   

[7] Cybenko, G., Jajodia, S., Wellman, M.P. & Liu, P. "Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation (invited paper)". In Information Systems Security, pages 1-8, Springer, 2014.

Electronic edition     Bibtex   

[8] De Capitani Di Vimercati, S., Erbacher, R.F., Foresti, S., Jajodia, S., Livraga, G. & Samarati, P. "Encryption and Fragmentation for Data Confidentiality in the Cloud". In Foundations of Security Analysis and Design VII, pages 212-243, Springer, 2014.

Electronic edition     Bibtex   

[9] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities". In E-Business and Telecommunications, pages 322-340, Springer, 2014.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Integrity for distributed queries". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 364-372, 2014.

Electronic edition     Bibtex   

[11] Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V. & Wang, C. "Secure cloud computing". Springer, 2014.

Electronic edition     Bibtex   

[12] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Securing Mission-Centric Operations in the Cloud". In Secure Cloud Computing, pages 239-259, Springer, 2014.

Electronic edition     Bibtex   

[13] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Optimizing integrity checks for join queries in the cloud". In Data and Applications Security and Privacy XXVIII, pages 33-48, Springer, 2014.(Best Paper Award).

Electronic edition     Bibtex    Award

[14] Sun, K. & Jajodia, S. "Protecting enterprise networks through attack surface expansion". In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, pages 29-32, 2014.

Electronic edition     Bibtex   

[15] Xu, Z., Wang, H. & Jajodia, S. "Gemini: An Emergency Line of Defense against Phishing Attacks". In 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (SRDS), pages 11-20, 2014.

Electronic edition     Bibtex   

[16] Shakarian, P., Paulo, D., Albanese, M. & Jajodia, S. "Keeping Intruders at Large: A Graph-Theoretic Approach to Reducing the Probability of Successful Network Intrusions". In Proc. 11th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August, 2014.

Electronic edition     Bibtex   

[17] Albanese, M., Battista, E., Jajodia, S. & Casola, V. "Manipulating the attacker's view of a system's attack surface". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 472-480, 2014.

Electronic edition     Bibtex   

[18] Albanese, M. & Jajodia, S. "Formation of Awareness". In Cyber Defense and Situational Awareness, pages 47-62, Springer, 2014.

Electronic edition     Bibtex   

[19] Casola, V., De Benedictis, A. & Albanese, M. "A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices". In Integration of Reusable Systems, pages 299-324, Springer, 2014.

Electronic edition     Bibtex   

[20] Albanese, M., Erbacher, R.F., Jajodia, S., Molinaro, C., Persia, F., Picariello, A., Sperli, G. & Subrahmanian, V. "Recognizing Unexplained Behavior in Network Traffic". In Network Science and Cybersecurity, pages 39-62, Springer, 2014.

Electronic edition     Bibtex   

[21] Roy, S., Conti, M., Setia, S. & Jajodia, S. "Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact". IEEE Transactions on Information Forensics and Security, IEEE, 2014.

Electronic edition     Bibtex   

[22] Le, M., Kant, K. & Jajodia, S. "Enabling Collaborative Data Authorization Between Enterprise Clouds". In Secure Cloud Computing, pages 149-169, Springer, 2014.

Electronic edition     Bibtex   

[23] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Proof of Isolation for Cloud Storage". In Secure Cloud Computing, pages 95-121, Springer, 2014.

Electronic edition     Bibtex   

[24] Jajodia, S., Litwin, W. & SJ, T.S. "Scalable Distributed Virtual Data Structures". Academy of Science and Engineering (ASE), USA,copyright ASE 2014, 2014.

Electronic edition     Bibtex   

[25] Wang, L., Jajodia, S., Singhal, A., Cheng, P. & Noel, S. "k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities". IEEE Transactions on Dependable and Secure Computing, 11(1):30-44, IEEE, 2014.

Electronic edition     Bibtex   

[26] Wang, L., Albanese, M. & Jajodia, S. "Network Hardening". Springer, 2014.

Electronic edition     Bibtex   

[27] Albanese, M., Cam, H. & Jajodia, S. "Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance". In Cybersecurity Systems for Human Cognition Augmentation, pages 47-60, Springer, 2014.

Electronic edition     Bibtex   

[28] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S. & Samarati, P. "Database security and privacy". Chapman and Hall/CRC, 2014.

Electronic edition     Bibtex   

[29] Le, M., Kant, K. & Jajodia, S. "Consistent Query Plan Generation in Secure Cooperative Data Access". In Data and Applications Security and Privacy XXVIII, pages 227-242, Springer, 2014.

Electronic edition     Bibtex   

[30] Albanese, M., De Benedictis, A., Jajodia, S. & Torrieri, D. "A probabilistic framework for jammer identification in MANETs". Ad Hoc Networks, 14:84-94, Elsevier, 2014.

Electronic edition     Bibtex   

[31] Noel, S. & Jajodia, S. "Metrics suite for network attack graph analytics". In Proceedings of the 9th Annual Cyber and Information Security Research Conference, pages 5-8, 2014.

Electronic edition     Bibtex   

[+] 2013

[1] Albanese, M., Fayzullin, M., Shakarian, J. & Subrahmanian, V. "Automated Coding of Decision Support Variables". In Handbook of Computational Approaches to Counterterrorism, pages 69-80, Springer, 2013.

Electronic edition     Bibtex   

[2] Le, M., Kant, K. & Jajodia, S. "Rule enforcement with third parties in secure cooperative data access". In Data and Applications Security and Privacy XXVII, pages 282-288, Springer, 2013.

Electronic edition     Bibtex   

[3] Albanese, M. "Measuring trust in big data". In Algorithms and Architectures for Parallel Processing, pages 241-248, Springer, 2013.

Electronic edition     Bibtex   

[4] Albanese, M., Pugliese, A. & Subrahmanian, V. "Fast activity detection: Indexing for temporal stochastic automaton-based activity models". IEEE Transactions on Knowledge and Data Engineering, 25(2):360-373, IEEE, 2013.

Electronic edition     Bibtex   

[5] Wang, L., Wang, Z., Sun, K. & Jajodia, S. "Reducing Attack Surface with VM-Based Phantom Server". In 2013 IEEE Military Communications Conference, MILCOM 2013, pages 1429-1435, 2013.

Electronic edition     Bibtex   

[6] Nzoukou, W., Wang, L., Jajodia, S. & Singhal, A. "A Unified Framework for Measuring a Network's Mean Time-to-Compromise". In 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (SRDS), pages 215-224, 2013.

Electronic edition     Bibtex   

[7] Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S. & Mancini, L.V. "Preserving privacy against external and internal threats in WSN data aggregation". Telecommunication Systems, 52(4):2163-2176, Springer, 2013.

Electronic edition     Bibtex   

[8] di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Enforcing dynamic write privileges in data outsourcing". Computers & security, 39:47-63, Elsevier, 2013.

Electronic edition     Bibtex   

[9] Casola, V., De Benedictis, A. & Albanese, M. "A moving target defense approach for protecting resource-constrained distributed devices". In 2013 IEEE 14th International Conference on Information Reuse and Integration (IRI), pages 22-29, 2013.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Extending loose associations to multiple fragments". In Data and Applications Security and Privacy XXVII, pages 1-16, Springer, 2013.

Electronic edition     Bibtex   

[11] Yang, Y., Zhang, Y., Wang, A.H., Yu, M., Zang, W., Liu, P. & Jajodia, S. "Quantitative survivability evaluation of three virtual machine-based server architectures". Journal of Network and Computer Applications, 36(2):781-790, Elsevier, 2013.

Electronic edition     Bibtex   

[12] Xiao, Z. & Xiao, Y. "Security and privacy in cloud computing". IEEE Communications Surveys & Tutorials, 15(2):843-859, IEEE, 2013.

Electronic edition     Bibtex   

[13] Jajodia, S., Ghosh, A.K., Subrahmanian, V., Swarup, V., Wang, C. & Wang, X.S. "Moving Target Defense II". Springer, 2013.

Electronic edition     Bibtex   

[14] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.". In SECRYPT, pages 207-218, 2013.(Best Paper Award).

Electronic edition     Bibtex    Award

[15] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "On information leakage by indexes over data fragments". In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pages 94-98, 2013.

Electronic edition     Bibtex   

[16] Jajodia, S., Litwin, W. & SJ, T.S. "Recoverable encryption through a noised secret over a large cloud". In Transactions on Large-Scale Data-and Knowledge-Centered Systems IX, pages 42-64, Springer, 2013.

Electronic edition     Bibtex   

[17] Chu, Z., Gianvecchio, S., Koehl, A., Wang, H. & Jajodia, S. "Blog or block: Detecting blog bots through behavioral biometrics". Computer Networks, 57(3):634-646, Elsevier, 2013.

Electronic edition     Bibtex   

[18] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Reliable mission deployment in vulnerable distributed systems". In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pages 1-8, 2013.

Electronic edition     Bibtex   

[19] Deliri, S. & Albanese, M. "Security-Aware Scheduling of Mission Tasks under Temporal Constraints". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 452-457, 2013.

Electronic edition     Bibtex   

[20] Wang, Z., Sun, K., Jing, J. & Jajodia, S. "Verification of data redundancy in cloud storage". In Proceedings of the 2013 international workshop on Security in cloud computing, pages 11-18, 2013.

Electronic edition     Bibtex   

[21] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for join queries in the cloud". IEEE Transactions on Cloud Computing, 1(2):187-200, IEEE, 2013.

Electronic edition     Bibtex   

[22] Ardagna, C.A., Jajodia, S., Samarati, P. & Stavrou, A. "Providing users' anonymity in mobile hybrid networks". ACM Transactions on Internet Technology (TOIT), 12(3):7, ACM, 2013.

Electronic edition     Bibtex   

[23] De Benedictis, A., Koosha, B., Albanese, M. & Casola, V. "A probabilistic framework for distributed localization of attackers in manets". In Security and Trust Management, pages 49-64, Springer, 2013.

Electronic edition     Bibtex   

[24] Albanese, M., d'Acierno, A., Moscato, V., Persia, F. & Picariello, A. "A multimedia recommender system". ACM Transactions on Internet Technology (TOIT), 13(1):3, ACM, 2013.

Electronic edition     Bibtex   

[25] Albanese, M., Jajodia, S. & Molinaro, C. "A Logic Framework for Flexible and Security-Aware Service Composition". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 337-346, 2013.

Electronic edition     Bibtex   

[26] Albanese, M., De Benedictis, A., Jajodia, S. & Sun, K. "A moving target defense mechanism for manets based on identity virtualization". In 2013 IEEE Conference on Communications and Network Security (CNS), pages 278-286, 2013.

Electronic edition     Bibtex   

[27] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Terracheck: Verification of dedicated cloud storage". In Data and Applications Security and Privacy XXVII, pages 113-127, Springer, 2013.

Electronic edition     Bibtex