Sushil Jajodia 
List of Publications 2016 and beyond


Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles      


Click here for Free Access to all my ACM Publications


EDITED BOOKS

  1. Sushil Jajodia, Pierangela Samarati, Moti Yung, eds., Encyclopedia of Cryptography, Security, and Privacy, 3rd edition, Springer, In print.  Book Cover  First Online:  February 2021.  DOI:  10.1007/978-3-642-27739-9
  2. Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman, eds., Adaptive Autonomous Secure Cyber Systems, Springer, 2020, 289 pages.  DOI:  10.1007/978-3-030-33432-1
  3. Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman, eds., Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense, Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 11830, 2019.  DOI: 10.1007/978-3-030-30719-6
  4. Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds., Network Security Metrics, Springer, 2017.  DOI: 10.1007/978-3-319-66505-4
  5. Peng Liu, Sushil Jajodia, Cliff Wang, eds., Theory and Models for Cyber Situation Awareness, Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017. DOI: 10.1007/978-3-319-61152-5_z  Chinese Translation
  6. Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Cyber Deception: Building the Scientific Foundation, ISBN 978-3-319-32697-9, Springer, Switzerland, 2016, 314 pages. DOI: 10.1007/978-3-319-32699-3  Chinese Translation

EDITED PROCEEDINGS

  1. Sjouke Mauw, Barbara Kordy, Sushil Jajodia, eds., Graphical Models for Security, Springer Lecture Notes in Computer Science, Vol. 9390, Springer International Publishing, Switzerland, 2016.  DOI: 10.1007/978-3-319-29968-6

JOURNAL ARTICLES

  1. Janet Layne, Qudrat E. Alahy Ratul, Edoardo Serra, Sushil Jajodia, "Analyzing robustness of automatic scientific verification tools against adversarial rephrasing attacks," ACM Trans. on Intelligent Systems and Technology (ACM TIST), 2024. 
  2. Chongyang Gao, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, "FakeDB: Generating fake synthetic databases," IEEE Trans. on Dependable and Secure Computing (IEEE TDSC),  2024.  First Online:  19 March 2024.  DOI:   10.1109/TDSC.2024.3379434
  3. Natalia Denisenko, Youzhi Zhang, Chiara Pulice, Shohini Bhattasali, Sushil Jajodia, Philip Resnik, V. S. Subrahmanian, "A psycholinguistics-inspired method to counter IP theft using fake documents, ACM Trans. on Management Information Systems,2024.   First Online: 6 March 2024.  DOI:  https://dl.acm.org/doi/10.1145/3651313     
  4. Jalal Ghadermazi, Ankit Shah, Sushil Jajodia, "A machine learning and optimization framework for efficient alert management in a cybersecurity operations center," ACM Digital Threats: Research and Practice (DTRAP),  January 2024. First Online: 5 February 2024. DOI:  10.1145/3644393
  5. Ouri Wolfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski, "Geographic-region monitoring by drones in adversarial environments,"  ACM Trans. on Spatial Algorithms and Systems, 2023.  First Online:  02 August 2023. DOI:  10.1145/3611009
  6. Youzhi Zhang, Dongkai Chen, Sushil Jajodia, Andrea Pugliese, V.S. Subrahmanian, and Yanhai Xiong,  "GAIT: A game-theoretic defense Against intellectual property theft." IEEE Trans. on Dependable and Secure Computing (TDSC), 2023.  First Online: 26 July 2023. DOI:  10.1109/TDSC.2023.3299225
  7. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, Steve Hutchinson, "A novel team formation framework based on performance in a cybersecurity operations center," IEEE Trans. on Services Computing, Vol. 16, No. 4, July/August 2023, pages 2359-2371.  First online: 6 March 2023.  DOI: 10.1109/TSC.2023.3253307                     
  8. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati,   "Distributed query execution under access restrictions," Computers & Security, 2023First  Online:  13 December 2022.  DOI:  10.1016/j.cose.2022.103056
  9. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati, Roberto Sassi,  "Sentinels and twins: Effective integrity assessment for distributed computation," IEEE Trans. on Parallel and Distributed Systems (IEEE TPDS), Vol. 34, No. 1, January 2023, pages 108-122First  Online:  20 October 2022.  DOI:  10.1109/TPDS.2022.3215863
  10. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Maintaining the level of operational effectiveness of a CSOC under adverse conditions," Springer International Journal of Information Security (IJIS), Vol. 21, 2022, pages 637-651.  First Online: 22 November 2021.  DOI:  10.1007/s10207-021-00573-4   Download
  11. Yanhai Xiong, Giridhar Kaushik Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian, "Generating realistic fake equations in order to reduce intellectual property theft," IEEE Trans. on Dependable and Secure Computing (TDSC), Vol. 19, No. 3, May/June 2022, pages 1434-1445 . First Online: 16 November 2020. DOI: 10.1109/TDSC.2020.3038132
  12. Haipeng Chen, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean McNamara, V. S. Subrahmanian, "PCAM: A data-driven probabilistic cyber-alert management framework, ACM Transactions on Internet Technology (ACM TOIT), Vol. 22, No. 3, January 2022.  DOI: 10.1145/3511101
  13. Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia, "A study of account recovery in the wild and its security implications," IEEE Trans. on Dependable and Secure Computing (TDSC), Vol. 19, No. 1, January/February 2022, pages 620-634.  First Online:  02 March 2020.  DOI:  10.1109/TDSC.2020.2975789
  14. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati, "An authorization model for query execution in the cloud," The VLDB Journal,     Vol. 31, No. 2, 2022, pages 555-579. First Online: 06 November 2021. DOI: 10.1007/s00778-021-00709-x
  15. Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini, "Capture the bot: Using adversarial examples to improve CAPTCHA robustness to bot attacks," IEEE Intelligent Systems, Vol. 36, No. 5, Sept.-Oct., 2021, pages 104-112.  First Online:  16 November 2020.  DOI:  10.1109/MIS.2020.3036156
  16. Tanmoy Chakraborty, Sushil Jajodia, Jonathan Katz, Antonio Picariello, Giancarlo Sperli, V. S. Subrahmanian, "A fake online repository generation engine for cyber deception," IEEE Trans. on Dependable and Secure Computing (TDSC), Vol. 18, No. 2, March/April 2021, pages 518-533. First Online: 11 February 2019.  DOI:  10.1109/TDSC.2019.2898661
  17. Prakruthi Karuna, Hemant Purohit, Sushil Jajodia, Rajesh Ganesan, Ozlem Uzuner, "Fake document generation for cyber deception by manipulating text comprehensibility," IEEE Systems Journal, Vol. 15, No. 1, March 2021, pages 835-845.  DOI:   10.1109/JSYST.2020.2980177
  18. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Network attack surface: Lifting the concept of attack surface to the network level for evaluating networks' resilience against zero-day attacks," IEEE Trans. on Dependable and Secure Computing (TDSC), Vol. 18, No. 1, January/February 2021, pages 310-324.   First Online:  21 December 2018.  DOI: 10.1109/TDSC.2018.2889086
  19. Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Two can play that game: An adversarial evaluation of a cyber-alert inspection system," ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 11, No. 3, 2020, pages 32:1-32:20.  First Online:  April 2020.  DOI: 10.1145/3377554   Designated by ACM as a paper with practical content
  20. Haiping Chen, Qian Han, Sushil Jajodia, Roy Lindelauf, V. S. Subrahmanian, Yanhai Xiong, "Disclose or exploit? A game theoretic approach to strategic decision making in cyber warfare," IEEE Systems Journal, Vol. 14, No. 3, 2020, pages 3779-3790.   First Online: 23 January 2020.  DOI: 10.1109/JSYST.2020.2964985
  21. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "An outsourcing model for alert analysis in a cybersecurity operations center," ACM Trans. on the Web (TWEB), Vol. 14, No. 1, January 2020.  DOI: 10.1145/3372498
  22. Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia, "Understanding the manipulation on recommender systems through web injection," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 15, 2020, pages 3807-3818, First Online: 20 November 2019.  DOI: 10.1109/TIFS.2019.2954737
  23. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Pierangela Samarati, Hasan Cam, "Adaptive alert management for balancing optimal performance among distributed CSOCs using reinforcement learning," IEEE Trans. on Parallel and Distributed Systems (TPDS), Vol. 31, No. 1, January 2020, Pages 16-33.  First Online: 15 July 2019.  DOI: 10.1109/TPDS.2019.2927977
  24. Ankit Shah, Katheryn A. Farris, Rajesh Ganesan, Sushil Jajodia, "Vulnerability selection for remediation: An empirical analysis," Journal of Defense Modeling and Simulation, 2019.  First Online:  September 17, 2019.  DOI:  10.1177/1548512919874129
  25. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Mitigating the insider threat of remote administrators in clouds through maintenance task assignments," Journal of Computer Security,  Vol. 27, No. 4, July 2019, pages 427-458.  DOI: 10.3233/JCS-191306
  26. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Optimizing the network diversity to improve the resilience of networks against the unknown attacks," Computer Communications, Vol. 145, 2019, pages 96-112.  First Online:  21 June 2019. DOI:  10.1016/j.comcom.2019.06.004
  27. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "A two-step approach to optimal selection of alerts for investigation in a CSOC," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 14, No. 7, July 2019, pages 1857-1870.  First Online: 12 December 2018.  DOI:  10.1109/TIFS.2018.2886465
  28. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, "A methodology for ensuring fair allocation of CSOC effort for alert investigation," Springer International Journal of Information Security (IJIS), Vol. 18, No. 2, 2019, pages 199-218.  First Online:  09 May 2018.  DOI: 10.1007/s10207-018-0407-3
  29. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Understanding trade-offs between throughput, quality, and cost of alert analysis in a CSOC," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 14, No. 5, May 2019, pages 1155-1170.  First Online: 24 September 2018.  DOI: 10.1109/TIFS.2018.2871744
  30. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Optimal assignments of sensors to analysts in a cybersecurity operations center,"  IEEE Systems Journal, Vol. 13, No. 1, March 2019, pages 1060-1071. First Online: 05 April 2018. DOI: 10.1109/JSYST.2018.2809506
  31. Prakruthi Karuna, Hemant Purohit, Rajesh Ganesan, Sushil Jajodia, "Generating hard to comprehend fake documents for defensive cyber deception," IEEE Intelligent Systems, Vol. 33, No. 5, September/October 2018, pages 16-25.  DOI: 10.1109/MIS.2018.2877277
  32. Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia, "VULCON - A system for vulnerability prioritization, mitigation, and management," ACM Transactions on Privacy and Security (TOPS), Vol. 21, No. 4, May 2018, pages 16:1-16:28.   DOI:  10.1145/3196884
  33. Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Oark, Youngmin Kim "Data synthesis based on generative adversarial networks queries," Proc. of the VLDB Endowment (PVLDB), Vol. 11, No. 10, 2018, pages 1070-1083.  DOI:  10.14778/3231751.3231757
  34. Tanmoy Chakraborty, Sushil Jajodia, Noseong Park, Andrea Pugliese, Edoardo Serra, V. S. Subrahmanian, "Hybrid adversarial defense: Merging honeypots and traditional security methods," Journal of Computer Security (JCS),  Vol. 26, No. 5, 2018, pages 615-645.  DOI: 10.3233/JCS-171094
  35. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions,"  ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 9, No. 5, 2018.  DOI:  10.1145/3173457
  36. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "SHARE: A Stackelberg honey-based adversarial reasoning engine," ACM Trans. on Internet Technology (TOIT), Vol. 18, No. 3, March 2018, pages 30:1-30:41. DOI:  10.1145/3137571
  37. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Adaptive reallocation of cybersecurity analysts to sensors for balancing risks between sensors," Springer Service Oriented Computing and Applications (SOCA), Vol. 12, No. 2, 2018, pages 123-135.  DOI: 10.1007/s11761-018-0235-3  PDF
  38. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Surviving unpatchable vulnerabilities through heterogeneous network hardening options," Journal of Computer Security (JCS), Vol. 26, No. 6, 2018, pages 761-789.DOI: 10.3233/JCS-171106
  39. Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "A methodology to measure and monitor level of operational effectiveness in a CSOC," Springer International Journal of Information Security (IJIS), Vol. 17, No. 2, 2018. pages 121-134.  DOI10.1007/s10207-017-0365-1
  40. Massimiliano Albanese, Sushil Jajodia, "A graphical model to assess the impact of multi-step attacks," Journal of Defense Modeling and Simulation, Vol. 15, No. 1, 2018, pages 79-93.. DOI: 10.1177/1548512917706043 Selected by the Guest Editor, Dr. Alexander Kott, as an article of particular value
  41. Ning Zhang, Ruide Zhang, Kun sun, Wenjing Lou, Y. Thomas Hu, Sushil Jajodia, "Memory forensic challenges under misused architectural features," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 13, No. 9, September 2018, pages 2345-2358.  DOI:  10.1109/TIFS.2018.2819119
  42. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati, "An authorization model for multi-provider queries," Proc. of the VLDB Endowment (PVLDB), Vol. 11, No. 3, 2017, pages 256-268.  DOI: 10.14778/3157794.3157796
  43. Rajesh Ganesan, Sushil Jajodia, Hasan Cam, "Optimal scheduling  of cybersecurity analysts for minimizing risk," ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 8, No. 4, 2017, pages 52:1-52:32. DOI:  10.1145/2914795 Designated by ACM as a paper with practical content
  44. Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian, "A probabilistic logic of cyber deception," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 12, No. 11, November2017, pages 2532-2544.  DOI:  10.1109/TIFS.2017.2710945
  45. Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian, "Using temporal probabilistic logic for optimal monitoring of security events with limited resources," Journal of Computer Security (JCS), Vol. 24, No. 6, 2016, pages 735-791.  DOI:  10.3233/JCS-160555
  46. Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam, "Dynamic scheduling  of cybersecurity analysts for minimizing risk using reinforcement learning," ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 8, No. 1, 2016.  DOI: 10.1145/2882969 Appendix
  47. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Efficient integrity checks for join queries in the cloud," Journal of Computer Security (JCS), Vol. 24, 2016, papges 347-378.  DOI: 10.3233/JCS-160545
  48. Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia, "Minimum cost rule enforcement for cooperative database access," Journal of Computer Security (JCS), Vol. 24, 2016, pages 379-403.  DOI: 10.3233/JCS-160548
  49. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese, "Network diversity: A security metric for evaluating the resilience of networks against zero-day attacks,"  IEEE Trans. on Information Forensics and Security (TIFS), Vol. 11, No. 5, May 2016, pages 1071-1086.  DOI: 10.1109/TIFS.2016.2516916
  50. Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia, "Profiling online social behaviors for compromised account detection," IEEE Trans. on Information Forensics and Security (TIFS), Vol. 11, No. 1, January 2016, pages 176-187.  DOI: 10.1109/TIFS.2015.2482465

ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li, "GraphSPD: Graph-based security patch detection with enriched code semantics," Proc. 44th IEEE Symposium on Security and Privacy, San Francisco, CA, May 22-26, 2023.  DOI: 10.1145/3511808.3557546
  2. Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia, "An empirical study on the membership inference attack against tabular data synthesis models," Proc. 31st ACM International Conf. on Information and Knowledge Management (CIKM ’22), October 17–21, 2022. DOI: 10.1145/3511808.3557546
  3. Ouri Wollfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski, "Geographic  region monitoring by drones in adversarial environments," (Poster Paper), Proc. 29th ACM International Conf. on Advances in Geographic Information Systems (SIGSPATIAL '21)," November 2-5, 2021, pages 480-483.  DOI: 10.1145/3474717.3484216  
  4. Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck, "PatchRNN: A deep learning-based system for security patch identification," Proc. IEEE Military Communication Conference (MILCOM 2021), December 2021, pages 595-600.  DOI: 10.1109/MILCOM52596.2021.9652940
  5. Noseong Park, Jing Liu, Jayoung Kim, Jinsung Jeon, Jaehoon Lee, Jooyeon Leee, Ozlem Uzuner, Sushil Jajodia, "Scalable graph synthesis with Adj and 1 - Adj," Proc. SIAM Intenational Conf. on Data Mining (SDM21), April 29 - May 1, 2021 (Acceptance ratio 85/400).  DOI:    10.1137/1.9781611976700.35
  6. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Parabosci, Pierangela Samarati, "Distributed query evaluation over encrypted data," Proc. 35th Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC 2021), Springer Lecture Notes in Computer Science, Vol. 12840, K. Barker, K. Ghazinour, ed., 2021, pages 96-114. DOI:  10.1007/978-3-030-81242-3_6
  7. Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, "PatchDB: A large-scale security patch dataset,"  Proc. 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 21-24, 2021.  DOI:  10.1109/DSN48987.2021.00030
  8. Xinda Wang, Shu Wang, Kun Sun, Archer Batcheller, Sushil Jajodia, "A machine learning approach to classify security patches into vulnerability types," IEEE Conf. on Communications and Network Security (CNS), 2020.  DOI: 10.1109/CNS48642.2020.9162237
  9. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, "Modeling and mitigating security threats in network functions virtulations(NFV)," Proc. 34th Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC), Springer Lecture Notes in Computer Science, Vol. 11212, A. Singhal, J. Vaidya, eds, 2020, pages 3-23. DOI: 10.1007/978-3-030-22479-0_18 
  10. Haipeng Chen, Sushil Jajodia, Jing Liu, Noseong Park, Vadim Sokolov, V. S. Subrahmanian, "FakeTables: Using GANs to generate functional dependency preserving tables with bounded real data," Proc. 28th International Joint Conference on Artificial Intelligence (IJCAI), Macao, China, August 10-16, 2019, pages 2074-2080. DOI: 10.24963/ijcai.2019/287
  11. Xinda Wang, Kun Sun, Archer Batcheller, Sushil Jajodia. "Detecting "0-Day" vulnerability: An empirical study of secret security patch in OSS (short paper)," Proc. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, Oregon, June 24-27, 2019, pages 485-492 (Acceptance ratio 54/252).  DOI: 10.1109/DSN.2019.00056
  12. Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "CASFinder: Detecting Common Attack Surface," Proc. 33rd Annual IFIP WG 11.3 Conference on Data and Applications Security (DBSEC 2019), Springer Lecture Notes in Computer Science, Vol. 11559, S. N. Foley, ed., Charlston, SC, July 15-17, 2019, pages 338-358. DOI: 10.1007/978-3-030-22479-0_18  BEST PAPER AWARD
  13. Prakruthi Karuna, Hemant Purohit, Ozlem Uzuner, Sushil Jajodia and Rajesh Ganesan, "Enhancing cohesion and coherence of fake text to improve believability for deceiving cyber attackers,"Proc. International Workshop on Language, Cognition and Computational Models (LCCM), Santa Fe, New Mexico, August 20, 2018, pages 31-40. DOI: 10.18653/v1/P17  
  14. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Modeling and mitigating the insider threat of remote administrators in clouds," Proc. 32nd IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2018), Springer Lecture Notes in Computer Science, Vol. 10980, F. Kerschbaum and S. Paraboschi, eds.,Bergamo, Italy, July 16-18, 2018, pages 3-20.   DOI: 10.1007/978-3-319-95729-6_1 BEST STUDENT PAPER AWARD
  15. Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia, "Detecting stealthy botnets in a resource-constrained environment using reinforcement learning," Proc. 4th ACM Workshop on Moving Target Defense (MTD 2017), Dallas, TX, October 30, 2017. DOI: 10.1145/3140549.3140552
  16. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Securing networks against unpatchable and unknown vulnerabilities using heterogeneous hardening options," Proc. 31st IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2017), Springer Lecture Notes in Computer Science, Vol. 10359, Giovanni Livraga and Sencun Zhu, edsPhiladelphia, July 19-21, 2017, pages 509-528.  DOI: 10.1007/978-3-319-61176-1 28
  17. Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright, "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures," IEEE Conf. on Communications and Network Security (CNS), Philadelphia, PA, October 17-19, 2016 (Acceptance ratio 38/131).  DOI:  10.1109/CNS.2016.7860486
  18. Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia, "A moving target defense approach to disrupting stealthy botnets," Proc. 3rd ACM Workshop on Moving Target Defense (MTD 2016), Vienna, Austria,October 24, 2016 (Acceptance ratio 9/26 for regular papers).  DOI: 10.1145/2995272.2995280
  19. Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico, "AHEAD: A new architecture for active defense," Proc. SafeConfig 2016, Vienna, Austria,October 24, 2016.  DOI: 10.1145/2994475.2994481
  20. Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Threat modeling for cloud data center infrastructures," Proc. 9th International Symposium on Foundations & Practice of Security (FPS 2016), Springer Lecture Notes in Computer Science, Vol. 101128, Frederic Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquin Garcia-Alfaro, eds.,Quebec, Canada, October 24-26, 2016, pages 302-319.  DOI: 10.1007/978-3-319-51966-1_20
  21. Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Diversifying network services under cost constraints for better resilience against unknown attacks," Proc. 30th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2016), Springer Lecture Notes in Computer Science, Vol. 9766, S. Ranise and V. Swarup, eds, Trento, Italy, July 18-21, 2016, pages 295-312.  DOI: 10.1007/978-3-319-41483-6_21

BOOK CHAPTERS

  1. Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia, "An empirical study of secret security patch in open source software,: in Adaptive Autonomous Secure Cyber Systems, Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman, eds., Springer, 2020, pages 269-289.  DOI:  10.1007/978-3-030-33432-1_13
  2. Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, and Peng Liu, "MTD techniques for memory protection against zero-day attacks," in Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense, Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 11830, 2019, pages 129-155.  DOI: 10.1007/978-3-030-30719-6_7  
  3. Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Nguyen, "Adaptive cyber defenses for botnet detection and mitigation," in Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense, Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 11830, 2019, pages 156-205.  DOI: 10.1007/978-3-030-30719-6_8
  4. Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam, "Optimizing alert data management process at a cyber security operations center," in Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense, Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael Wellman, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 11830, 2019, pages 206-231.  DOI: 10.1007/978-3-030-30719-6_9
  5. Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Giulio Pagnotta, "Towards intelligent cyber deception systems," in Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThingsEhab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang, eds., Springer, 2018, pages 21-34.  DOI:  10.1007/978-3-030-02110-8_2
  6. Marcel Frigault, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Measuring the overall network security by combining CVSS scores based on attack graphs and Bayesian networks," in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 1-23.  DOI: 10.1007/978-3-319-66505-4_1
  7. Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Refining CVSS-based network security metrics by examining the base scores," in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 25-52.  DOI: 10.1007/978-3-319-66505-4_2
  8. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel, "k-Zero day safety: Evaluating the resilience of networks against unknown attacks" in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 75-93.  DOI: 10.1007/978-3-319-66505-4_4
  9. Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, "Evaluating the network diversity of networks against zero-day attacks," in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 117-140.  DOI: 10.1007/978-3-319-66505-4_6
  10. Steven Noel, Sushil Jajodia, "A suite of metrics for network attack graph analytics,"  in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 141-176.  DOI: 10.1007/978-3-319-66505-4_7
  11. Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam, "A novel metric for measuring operational effectiveness of a cybersecurity operations center,"  in Network Security Metrics, Lingyu Wang, Sushil Jajodia, Anoop Singhal, eds.,Springer, 2017, pages 177-207.  DOI: 10.1007/978-3-319-66505-4_8
  12. Sushil Jajodia, Massimiliano Albanese,, "An integrated framework for cyber situation awareness," in  Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wang, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017, pages 29-46.  DOI: 10.1007/978-3-319-61152-5_2
  13. Massimiliano Albanese, Nancy Cooke, González Coty, David Hall, Christopher Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas Reeves, V. S. Subrahmanian, Cliff Wang. John Yen, "Computer-aided human centric cyber situation awareness," in  Theory and Models for Cyber Situation Awareness, Peng Liu, Sushil Jajodia, Cliff Wang, eds., Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Vol. 10030, 2017, pages 3-25.  DOI: 10.1007/978-3-319-61152-5_1 
  14. Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, "Deceiving attackers by creating a virtual attack surface," in Cyber Deception: Building the Scientific Foundation, Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, eds., Springer, Switzerland, 2016, pages 169-201. 
  15. Massimiliano Albanese, Sushil Jajodia, "Technological solutions for improving performance of cyber security analysts," in Psychosocial Dynamics of Cyber Security,  Stephen J. Zaccaro, Reeshad S. Dalal, Lois E. Tetrick, Julie A. Steinke, eds., Routledge, NY, 2016, pages 291-304.

OTHER ARTICLES

  1. Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, "Defending from stealthy botnets using moving target defenses," IEEE Security & Privacy, Vol. 16, No. 1, January/February 2018, pages 92-97.  DOI: 10.1109/MSP.2018.1331034


Home Page | Biography | Publications | Patents | Projects | Professional Activities | Students | Academic Lineage | Favorites