Sushil Jajodia 
List of Publications 2011 - 2015


Authored Books  Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles      


Click here for Free Access to all my ACM Publications


AUTHORED BOOKS

  1. Lingyu Wang, Massimiliano Albanese, Sushil Jajodia, Network Hardening: An Automated Approach to Improving Network Security, ISBN 978-3-319-04611-2, SpringerBriefs in Computer Science, 2014, 60 pages.  

EDITED BOOKS

  1. Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Cyber Warfare: Building the Scientific Foundation, ISBN 978-3-319-1408-4, Springer, Berlin, 2015, 340 pages.
  2. Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Secure Cloud Computing, ISBN 978-1-4614-9278-8, Springer, Berlin, 2014, 343 pages. review
  3. Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang, eds., Moving Target Defense II: Application of Game Theory and Adversarial Modeling, ISBN 978-1-4614-5415-1, Springer Advances in Information Security, Vol. 100, Berlin, 2013, 203 pages.  online version  Chinese Translation
  4. Henk C. A. van Tilborg, Sushil Jajodia, eds., Encyclopedia of Cryptography and Security, 2nd edition, ISBN 978-1-4419-5905-8, Springer, Berlin, 2011, 1435 pages (in 2 volumes).  dblp
  5. Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang, eds., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, ISBN 978-1-4614-0976-2, Springer Advances in Information Security, Vol. 54, Berlin, 2011, 183 pages.  online version Chinese Translation

EDITED PROCEEDINGS

  1. Sushil Jajodia, Chandan Mazumdar, Proceedings of the 11th International Conference on Information System Security (ICISS), Springer Lecture Notes in Computer Science, Vol. 9478, Springer, Berlin, 2015.  DOI: 10.1007/978-3-319-26961-0
  2. Raja Akram, Sushil Jajodia, eds., Proc. 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice (WISTP 2015), Springer, 2015, 281 pages.  DOI: 10.1007/978-3-319-24018-3
  3. Sushil Jajodia, Kun Sun, eds., Proceedings of the First ACM Workshop on Moving Target Defense, ACM, 2014.  DOI: 10.1145/2660267.2660385
  4. Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans, eds.,  ICT System Security and Privacy Protection - Proc. 29th IFIP TC 11 International Conference, SEC 2014, Springer, 2014.
  5. Jason Crampton, Sushil Jajodia, Keith Mayes, eds., Proceedings of the 18th European Symposium on Research in Computer Security (ESORICS 2013), Springer Lecture Notes in Computer Science, Vol. 8134, Springer, Berlin, 2013.
  6. Sushil Jajodia, Chandan Mazumdar, Proceedings of the 7th International Conference on Information System Security (ICISS), ISBN 978-3-642-25559-5, Springer Lecture Notes in Computer Science, Vol. 7093, Springer, Berlin, 2011, 388 pages. dblp

JOURNAL ARTICLES

  1. Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian, "Pareto-optimal adversarial defense of enterprise systems," ACM Trans. on Information and System Security, Vol. 17, No. 3, Article 11, March 2015, 39 pages.  DOI: 10.1145/2699907
  2. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Loose associations to increase utility in data publishing," Journal of Computer Security, Vol. 23, No. 1, 2015, pages 59-88.  DOI: 10.3233/JCS-140513
  3. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Fragmentation in presence of data dependencies," IEEE Trans. on Dependable and Secure Computing, Vol. 11, No. 6, 2014, pages 510-523.  DOI: 10.1109/TDSC.2013.2295798
  4. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact," IEEE Trans. on Information Forensics & Security, Vol. 9, No. 4, April 2014, pages 681-694.  DOI: 10.1109/TIFS.2014.2307197
  5. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don Torrieri, "A probabilistic framework for jammer identification in MANETs," Ad Hoc Networks, Vol. 14, 2014, pages 84-94.  DOI: 10.1016/j.adhoc.2013.11.007 
  6. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel, "k-Zero day safety:  A network security metric for measuring the risk of unknown vulnerabilities," IEEE Trans. on Dependable and Secure Computing, Vol. 11, No. 1, January/February 2014, pages 30-44.  DOI:  10.1109/TDSC.2013.24
  7. Meixing Le, Krishna Kant, Sushil Jajodia, "Consistency and enforcement of access rules in cooperative data sharing environment," Computers & Security, Vol. 41, 2014, pages 3-18.
  8. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Integrity for join queries in the cloud," IEEE Trans. on Cloud Computing, Vol. 1, No. 2, July-December 2013, pages 187-200.
  9. Claudio Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos stavrou, "Providing users'  anonymity in mobile hybrid networks," ACM Trans. on Internet Technology, Vol. 12, No. 3, Article 7, May 2013, 33 pages.  PDF
  10. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liveraga, Stefano Paraboschi, Pierangela Samarati, "Enforcing dynamic write privileges in data outsourcing," Computers & Security, Vol. 39, 2013, pages 47-63.
  11. Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia, "Blog or block: Detecting blog bots through behavioral biometrics," Computer Networks, Vol. 57, No. 3, February 2013, pages 634-646.  DOI: 10.1016/j.comnet.2012.10.005/
  12. Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini, "Preserving privacy against external and internal threats in WSN data aggregation," Telecommunication Systems, Vol. 52, No. 4, 2013, pages 2163-2176.
  13. Yan Yang, Yulong Zhang, Alex Hai Wang, Wanyu Zang, Peng Liu, Sushil Jajodia, "Quantitative survivability evaluation of three virtual machine-based server architectures," Elsevier Jour. of Network and Computer Applications, Elsevier, Vol. 36, No. 2, March 2013, pages 781-790.
  14. Sushil Jajodia, Witold Litwin, Thomas Schwarz SJ, "Recoverable encryption through a noised secret over a large cloud," Transactions on Large-Scale Data- and Knowledge-Centered Systems, Springer Lecture Notes in Computer Science, Vol. 7980, 2013, pages 42-64.
  15. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe Psaila, Pierangela Samarati, "Integrating trust management and access control in data-intesive web applications," ACM Trans. on the Web (TWEB), Vol. 6, No. 2, Article 6, May 2012, 43 pages.  PDF
  16. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Secure data aggregation in wireless sensor networks," IEEE Trans. on Information Forensics & Security, Vol. 7, No. 3, June 2012, pages 1040-1052.
  17. Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia, "Detecting automation of Twitter accounts:   Are you a human, bot or cyborg," IEEE Trans. on Dependable and Secure Computing, Vol. 9, No. 6, November/December 2012, pages 811-824.
  18. Sergio Mascetti, Dario Freni, Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies," VLDB Journal, Vol. 20, Number 4, 2011, pages 541-566.
  19. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Authorization enforcement in distributed query evaluation," Journal of Computer Security, Vol. 19, No. 4, 2011, pages 751-794.
  20. Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia, "Securing topology maintenance protocols for sensor networks," IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 3, May/June 2011, pages 450-465.
  21. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Selective data outsourcing for enforcing privacy," Journal of Computer Security, Vol. 19, No. 3, 2011, pages 531-566.

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia, "Disrupting stealthy botnets through strategic placement of detectors," IEEE Conf. on Communications and Network Security (CNS), Florence, Italy, September 28-30, 2015 (Acceptance ratio 48/171). Best Paper Runner-Up Award
  2. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "A deception based approach for defeating OS and service fingerprinting," IEEE Conf. on Communications and Network Security (CNS), Florence, Italy, September 28-30, 2015 (Acceptance ratio 48/171).
  3. Ning Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia, "Now you see me: Hide and seek in physical address space," Proc. 10th ACM Symp. on Information, Computer and Communications Security (ASIACCS), Singapore, April 14-17, 2015, pages 321-331.  DOI: 10.1145/2714576.2714600
  4. Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia, "Keeping intruders at bay: A graph-theoretic approach to reducing the probability of successful network intrusions," Springer Series on Communications in Computer and Information Science, Vol. 554, 2015, pages 191-211.  
  5. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Integrity for approximate joins on untrusted computational servers," Proc. IFIP Int'l. Information Security and Privacy Conf (IFIPSEC),  Hamburg, Germany, May 26-28, 2015, pages 446-459.
  6. Sushil Jajodia, Witold Litwan, Thomas J. E. Schwartz, "Numerical SQL value expressions over encrypted cloud databases," Springer Lecture Notes in Computer Science, Vol. 9262, 2015, pages 455-478.
  7. George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu, "Adversarial and uncertain reasoning for adaptive cyber defense: Building the cyber foundation (invited paper)," Proc. 10th Int'l. Conf. on Information Systems Security (ICISS), Springer Lecture Notes in Computer Science, Vol. 8880,  Atul Prakash, Rudrapatna Shyamsundar, eds., Hyderabad, India, December 2014, pages 1-8.
  8. Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, "Modeling network diversity for evaluating the robustness of networks against zero-day attacks," Proc. 18th European Symp. on Research in Computer Security (ESORICS), Part II, Springer Lecture Notes in Computer Science, Vol. 8713, Miroslaw Kutylowski, Jaideep Vaidya,  eds., Wroclaw, Poland, September 7-11, 2014, pages 494-511 (Acceptance ratio 58/234).
  9. He Sun, Kun Sun, Yuewu Wang, Jiwi Jing, Sushil Jajodia, "TrustDump: Reliable memory acquisition on smartphones" Proc. 18th European Symp. on Research in Computer Security (ESORICS), Part I, Springer Lecture Notes in Computer Science, Vol. 8712, Miroslaw Kutylowski, Jaideep Vaidya,  eds., Wroclaw, Poland, September 7-11, 2014, pages 202-218 (Acceptance ratio 58/234).
  10. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola, "Manipulating the attacker's view of a system's attack surface," IEEE Conf. on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014, pages 472-480 (Acceptance ratio 38/130).
  11. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Liverga, Stefano Paraboschi, Pierangela Samarati, "Integrity for distributed queries," IEEE Conf. on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014, pages 364-372 (Acceptance ratio 38/130).
  12. Longquan Li, Sencun Zhu, Don Torrieri, Sushil Jajodia, "Self-healing wireless networks under insider jamming attacks," IEEE Conf. on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014, pages 220-228 (Acceptance ratio 38/130).
  13. Kun Sun, Sushil Jajodia, "Protecting enterprise networks through attack surface expansion (short paper)," Proc. ACM SafeConfig 2014: Cyber Security Analytics and Automation, Scottsdale, AZ, November 3, 2014, pages 29-32.  DOI: 10.1145/2665936.2665939
  14. Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia, "Keeping intrudors at large:  A graph-theoretic approach to reducing the probability of successful network intrusions," Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August 28-30, 2014.
  15. Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang, "An efficient framework for evaluating the risk of zero-day vulnerabilities," Springer Series on Communications in Computer and Information Science, Vol. 456, 2014, pages 322-240.  
  16. Zhang Xu, Haining Wang, Sushil Jajodia, "Gemini: An emergency line of defense against phishing attacks," Proc. 33rd IEEE Symp. on Reliable Distributed Systems, Nara, Japan, October 6-9, 2014, pages 11-20.  DOI: 10.1109/SRDS.2014.26
  17. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Optimizing integrity checks for join queries in the cloud," Proc. 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2014), Springer Lecture Notes in Computer Science, Vol. 8566, Vijay Atluri, Gunther Pernul, eds., Vienna, Austria, July 14-16, 2014, pages 33-48 (Acceptance ratio 22/63 for full papers).  Best Paper Award
  18. Meixing Le, Krishna Kant and Sushil Jajodia, "Consistent query plan generation in secure cooperative data access," Proc. 28th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2014), Springer Lecture Notes in Computer Science, Vol. 8566, Vijay Atluri, Gunther Pernul, eds., Vienna, Austria, July 14-16, 2014, pages 227-242 (Acceptance ratio 22/63 for full papers).
  19. Steven Noel, Sushil Jajodia, "Metrics suite for network attack graph analytics," Proc. 9th Cyber and Information Security Research Conference, Oak Ridge, TN, April 8-10, 2014.  DOI: 10.1145/2602087.2602117
  20. Sushil Jajodia, Witold Litwin, Thomas Schwartz, "Scalable distributed virtual data structure," Proc. 2nd ASE International Conference on Big Data Science and Computing(BigDataScience 2014), Stanford, CA, May 27-31, 2014.
  21. Sushil Jajodia, "Security and privacy of data in a cloud," Proc. 10th VLDB Workshop on Secure Data Management (SDM), Springer Lecture Notes in Computer Science, Vol. 8425, Willem Jonker and  Milan Petkovic, eds.,  Trento, Italy, August 30, 2013, pages 18-22 (Invited Paper).
  22. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun, "A moving target defense mechanism for MANETs based on identity virtualization," Proc. 1st IEEE Conf. on Communications and Network Security (CNS) , Washington, DC, October 14-16, 2013 (Acceptance ratio 40/141 papers).
  23. Massimiliano Albanese,  Sushil Jajodia,  Cristian Molinaro, "A logic framework for flexible and security-aware service composition," Proc. 10th IEEE International Conference on Autonomic and Trusted Computing (ATC-2013), Vietri sul Mare, Italy, December 18-20, 2013.
  24. Li Wang, Zhan Wang, Kun Sun, Sushil Jajodia, "Reducing attack surface with VM-based phantom server," Proc. 32nd MILCOM Conf., San Diego, CA, November 18-20, 2013.
  25. William Nzoukou Tankou, Lingyu Wang, Sushil Jajodia and Anoop Singhal, "A unified framework for measuring a network's mean time-to-compromise," Proc. 32nd Int'l. Symp. on Reliable Distributed Systems (SRDS), Braga, Portugal, September 30 - October 3, 2013 (Acceptance ratio 22/67).
  26. Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang, "An efficient approach to assessing the risk of zero-day vulnerabilities," Proc. 10th International Conference on Security and Cryptography (SECRYPT), Reykjavik, Iceland, July 29-31, 2013.  Best Paper Award
  27. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Verification of data redundancy in cloud storage,"  Proc. ASIACCS International Workshop on Security in Cloud Computing, Hangzhou, China, May 8-10, 2013.
  28. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "On information leakage by indexes over data fragments," Proc. ICDE Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB 2013), Brisbane, Australia, April 8, 2013.
  29. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi and Pierangela Samarati, "Extending loose associations to multiple fragments,"  Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds., Newark, NJ, July 15-17, 2013, pages 1-16 (Acceptance ratio 16/45 for full papers).  Best Paper Runner-Up Award
  30. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "TerraCheck: Verification of dedicated cloud storage," Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds., Newark, NJ, July 15-17, 2013, pages 113-127 (Acceptance ratio 16/45 for full papers).
  31. Meixing Le, Krishna Kant and Sushil Jajodia, "Rule enforcement with third parties in secure cooperative data access (short paper)," Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), Springer Lecture Notes in Computer Science, Vol. 7964, Lingu Wang, Basit Shafiq, eds., Newark, NJ, July 15-17, 2013, pages 282-288 (Acceptance ratio 16 full, 6 short /45 papers).
  32. Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri, "Reliable mission deployment in vulnerable distributed systems," Proc. IEEE DSN Workshop on Reliability and Security Data Analysis (RSDN)," Budapest, Hungary, June 2013.
  33. Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian, "A probabilistic framework for localization of attackers in MANETs," Proc. 17th European Symp. on Research in Computer Security (ESORICS 2012), Springer Lecture Notes in Computer Science, Vol. 7459, Sara Foresti, Moti Yung, Fabio Martinelli,  eds., Pisa, Italy, September 10-14, 2012, pages 145-162 (Acceptance ratio 50/248).
  34. Arun Natrajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson, "NSDMine: Automated discovery of network service dependencies,"  Proc. 31st Annual Int'l. Conf. on Computer Communications (INFOCOM 2012), Orlando, FL, March 25-30, 2012, pages 2507-2515 (Acceptance ratio 278/1547).
  35. Massimiliano Albanese, Sushil Jajodia, Steven Noel, "A time-efficient approach to cost-effective network hardening using attack graphs," Proc. 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, Mass, June 25-28, 2012. 
  36. Barry Peddycord III, Peng Ning, Sushil Jajodia, "On the accurate identification of network service dependencies in distributed systems," Proc. USENIX 26th Large Installation System Administration Conference (LISA'12), San Diego, CA, December 9-14, 2012.
  37. Meixing Le, Krishna Kant, Sushil Jajodia, "Access rule consistency in cooperative data access environment," Proc. 8th IEEE International Conference on Collaborative Computing (CollaborateCom 2012), Pittsburgh, PA, October 14-17, 2012 (Acceptance ratio 27/110 for full papers).
  38. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, "Enforcing subscription-based authorization policies in cloud scenarios," Proc. 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC 2012), Springer Lecture Notes in Computer Science, Vol. 7371, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro, eds., Paris, France, July 11-13, 2012, pages 314-329 (Acceptance ratio 17/50 for full papers).
  39. Nelson Nazzicari, Javier Almillategui, Angelos Stavrou and Sushil Jajodia, "Switchwall: Automated topology fingerprinting & behavior deviation identification," Proc. 8th International Workshop on Security and Trust Management (STM 2012), Springer Lecture Notes in Computer Science Vol. 7783, Pisa, Italy, September 12-14, 2012, pages 161-176 (Acceptance ratio 20/57).
  40. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Disk storage isolation and verification in cloud," Proc. IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, December 3-7, 2012.
  41. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Support for write privileges on outsourced data," Proc. 27th IFIP Security and Privacy Conference (IFIPSEC 2012), Crete, Greece, June 4-6, 2012, pages 199-210.
  42. Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Aggregating CVSS base scores for semantics-rich network security metrics,"Proc. 31st International Symposium on Reliable Distributed Systems (SRDS 2012), Irvine, California, October 8-11, 2012.
  43. Alessio Di Mauro, Alessandro Mei, Sushil Jajodia, "Secure file allocation and caching in large-scale distributed systems," Proceedings of the International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy, July 24-27, 2012, pages 182-191.
  44. Sushil Jajodia, Witold Litwin, Thomas Schwartz, "Recoverable encryption through noised secret over large cloud," Proc. 5th International Conf. on Data Management in Cloud, Grid, and P2P Systems (Globe 2012), Vienna, Austria, September 5-6, 2012.
  45. Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, "Scalable analysis of attack scenarios," Proc. 16th European Symp. on Research in Computer Security (ESORICS 2011), Springer Lecture Notes in Computer Science, Vol. 6879, V. Atluri and C. Diaz, eds., Leuven, Belgium, September 12-14, 2011, pages 416-433 (Acceptance ratio 36/155).
  46. Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, "Scalable detection of cyber attacks," Proc. 10th International Conference on Computer Information Systems and Industrial Management Applications (CISIM), Kolkata, India, December 2011, pages 9-18.
  47. Krishna Kant, Meixing Le, Sushil Jajodia, "Security considerations in data center configuration management," Proc. 4th Symp. on Configuration Analytics and Automation (SafeConfig), Arlington, VA, October 31 - November 1, 2011 (Acceptance ratio 7/29).
  48. Sushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams, "Cauldron: Mission-centric cyber situational awareness with defence in depth," Proc. MILCOM Conf., Baltimore, MD, November 7-10, 2011, pages 1339-1344.
  49. Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang, Anoop Singhal, "Automatic security analysis using security metrics," Proc. MILCOM Conf., Baltimore, MD, November 7-10, 2011, pages 1207-1212.
  50. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Private data indexes for selective access to outsourced data," Proc. Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, October 17, 2011, pages 69-80 (Acceptance ratio 12/73 for long papers).
  51. Sushil Jajodia, Witold Litwin, Thomas Schwarz, "Privacy of Data Outsourced to a Cloud for Selected Readers through Client-Side Encryption (short paper)," Proc. Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, October 17, 2011, pages 171-176.
  52. Meixing Le, Krishna Kant, Sushil Jajodia, "Cooperative data access in multi-cloud environments," Proc.25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Springer Lecture Notes in Computer Science, Vol. 6818, Yingiu Li, ed., Richmond, VA, July 11-13, 2011, pages 14-28 (Acceptance ratio 14/37 for full papers).
  53. Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup Ghosh and Sushil Jajodia, "Trading elephants for ants: Efficient post-attack reconstitution (short paper)," Proc. 7th Int'l. ICST Conf. on Security and Privacy in Communication Networks (SecureComm), London, September 7-9, 2011.

Return to top of the page


BOOK CHAPTERS

  1. Massimiliano Albanese, Sushil Jajodia, "Process of awareness," in Cyber Defense and Situational Awareness, Alexander Kott, Cliff Wang, Robert Erbacher, eds., Springer Advances in Information Security, Vol. 62, 2014.
  2. Sabrina De Capitani Di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Liverga, Pierangela Samarati, "Encryption and fragmentation for data confidentiality in the cloud," in Foundations of Security Analysis and Design VII - FOSAD Tutorial Lectures, Alessandro Aldini, Javier Lopez, Fabio Martinelli, eds., Springer Lecture Notes in Computer Science Vol. 8604, 2014, pages 212-243.
  3. Massimiliano Albanese, Hasan Cam, Sushil Jajodia, "Automated cyber situation awareness tools and models for improving analyst performance," in Cybersecurity Systems for Human Cognition Augmentation, Robinson E. Pino, Alexander Kott, Michael Shevenell, eds., Springer Advances in Information Security, Vol. 61, 2014, pages 47-60.
  4. Sabrina De Capitani Di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati, "Database Security and Privacy," in Computing Handbook, Third Edition: Information Systems and Information Technology, Heikki Toppi, Allen Tucker, eds., Chapman and Hall/CRC, May 2014.
  5. Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing, "Proof of isolation for cloud storage," in Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer, 2014, pages 95-122.
  6. Meixing Le, Krishna Kant, Sushil Jajodia, "Enabling collaborative data authorization between enterprise clouds," in Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer, 2014, pages 149-170.
  7. Massimiliano Alabanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri, "Securing mission-centric operations in the cloud," in Secure Cloud Computing, Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang, eds., Springer, 2014, pages 239-260.
  8. Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, C. Molinro, Fabio Persia, Antonio Picariello, Giancarlo Sperli, V. S. Subrahmanian,, "Recognizing unexplained behavior in network traffic," in Network Science and Cybersecurity, Robinson E. Pino, ed., Springer Advances in Information Security, Vol. 55, 2014, pages 39-62.
  9. Don Torrieri, Sencun Zhu, Sushil Jajodia, "Cyber maneuver against external adversaries and compromised nodes." in Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, X. Sean Wang, eds., Springer Advances in Information Security, Vol. 100, 2013, pages 87-96.
  10. Claudio Bettini, Sergio Mascetti, Dario Freni, X. Sean Wang, Sushil Jajodia, "Privacy and anonymity in location data management," in Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, Francesco Bonchi and Elena Ferrari, eds, Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, 2011, pages 211-238.

 

Return to top of the page

 


OTHER ARTICLES

  1. Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou, "The ephemeral legion: Producing an expert cyber-security workforce from thin air," Communications of ACM (Virtual Extension), Vol. 54, No. 1, January 2011, pages 129-131.

Return to top of the page



Home Page | Biography | Publications | Patents | Projects | Professional Activities | Students | Academic Lineage | Favorites