CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Recent Publications

[-] 2024

[1] Sarieddine, K., Sayed, M.A., Torabi, S., Atallah, R. & Assi, C. "Edge-based detection and localization of adversarial oscillatory load attacks orchestrated by compromised EV charging stations". International Journal of Electrical Power \& Energy Systems (JEPE), 156:109735, Elsevier, 2024.

Electronic edition     Bibtex   

[2] Zhang, Y., Yan, J., Torabi, S. & Assi, C. "Securing IoT Malware Classifiers: Dynamic Trigger-Based Attack and Mitigation". In To appear in the International Conference on Communications (ICC2024), pages 1-6, 2024.

Electronic edition     Bibtex   

[3] Sarieddine, K., Sayed, M.A., Torabi, S., Jafarigiv, D., Atallah, R., Assi, C. & Debbabi, M. "Uncovering Covert Attacks on EV Charging Infrastructure: How OCPP Backend Vulnerabilities Could Compromise Your System". In To appear in the Proceedings of the 2024 ACM on Asia Conference on Computer and Communications Security (AsiaCCS 2024), pages 1-16, 2024.

Electronic edition     Bibtex   

[4] Denisenko, N., Zhang, Y., Pulice, C., Bhattasali, S., Jajodia, S., Resnik, P. & Subrahmanian, V.S. "A Psycholinguistics-Inspired Method to Counter IP Theft using Fake Documents". ACM Trans. on Management Information Systems, ():, , 2024.(First Online: 6 March 202).

Electronic edition     Bibtex   

[5] Ghadermazi, J., Shah, A. & Jajodia, S. "A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center". ACM Digital Threats: Research and Practice (DTRAP), ():, , 2024.(First Online: 5 February 2024).

Electronic edition     Bibtex   

[6] Albanese, M. "Configuration Security". In Encyclopedia of Cryptography, Security and Privacy, Springer, 2024.

Electronic edition     Bibtex   

[7] Albanese, M. "Vulnerability Metrics". In Encyclopedia of Cryptography, Security and Privacy, Springer, 2024.

Electronic edition     Bibtex   

[8] Bass, E., Albanese, M. & Zampieri, M. "DISC: A Dataset for Information Security Classification". In Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), pages , SciTePress, 2024.(To appear).

Electronic edition     Bibtex   

[9] Adebiyi, O., Albanese, M. & Onovae, F. "CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE Descriptions". In Proceedings of the 21st International Conference on Security and Cryptography (SECRYPT 2024), pages , SciTePress, 2024.(To appear).

Electronic edition     Bibtex   

[+] 2023

[1] Alhozaimy, S., Menascé, D.A. & Albanese, M. "Design and Modeling of Moving Target Defense in Workflow-Based Applications". Cluster Computing, ():, Springer, 2023.(to appear).

Electronic edition     Bibtex   

[2] Albanese, M., Iganibo, I. & Adebiyi, O. "A Framework for Designing Vulnerability Metrics". Computers \& Security, ():, Elsevier, 2023.(To appear).

Electronic edition     Bibtex   

[3] Iganibo, I., Albanese, M., Mosko, M., Bier, E. & Brito, A.E. "An Attack Volume Metric". Security and Privacy, 6(4):e298, Wiley, 2023.

Electronic edition     Bibtex   

[4] Wolfson, O., Giri, P., Jajodia, S. & Trajcevski, G. "Geographic-Region Monitoring by Drones in Adversarial Environments". ACM Trans. on Spatial Algorithms and Systems, ():, , 2023.(To appear. First online 02 August 2023).

Electronic edition     Bibtex   

[5] Zhang, Z., Chen, D., Jajodia, S., Pugliese, A., Subrahmanian, V. & Xiong, Y. "GAIT: A Game-Theoretic Defense Against Intellectual Property Theft". IEEE Trans. on Dependable and Secure Computing (TDSC), ():, , 2023.(First online 26 July 2023).

Electronic edition     Bibtex   

[6] Shah, A., Ganesan, R., Jajodia, S., Cam, H. & Hutchinson, S. "A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center". IEEE Trans. on Services Computing, Vol. 16(No. 4):Pages 2359-2371, IEEE, 2023.(First online 6 March 2023).

Electronic edition     Bibtex   

[7] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Distributed Query Execution Under Access Restrictions". Computers & Security, ():, , 2023.(First online 13 December 2022).

Electronic edition     Bibtex   

[8] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P. & Sassi, R. "Sentinels and Twins: Effective Integrity Assessment for Distributed Computation". IEEE Trans. on Parallel and Distributed Systems (IEEE TPDS), Vol. 34(No. 1):Pages 108-122, IEEE, 2023.(First online 20 October 2022).

Electronic edition     Bibtex   

[9] Molina, R.M.A., Bou-Harb, E., Torabi, S. & Assi, C. "RPM: Ransomware Prevention and Mitigation Using Operating Systems' Sensing Tactics". In ICC 2023-IEEE International Conference on Communications, pages 1-6, 2023.

Electronic edition     Bibtex   

[10] Nasr, T., Torabi, S., Bou-Harb, E., Fachkha, C. & Assi, C. "ChargePrint: A Framework for Internet-Scale Discovery and Security Analysis of EV Charging Management Systems". In The Network and Distributed System Security Symposium (NDSS), 2023.

Electronic edition     Bibtex   

[11] Xing, Y., Wang, X., Torabi, S., Zhang, Z., Lei, L. & Sun, K. "A Hybrid System Call Profiling Approach for Container Protection". IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE, 2023.

Electronic edition     Bibtex   

[12] Sarieddine, K., Sayed, M.A., Torabi, S., Atallah, R. & Assi, C. "Investigating the Security of EV Charging Mobile Applications as an Attack Surface". ACM Transactions on Cyber-Physical Systems (TCPS), 7(4):1-28, ACM, 2023.

Electronic edition     Bibtex   

[13] Sarieddine, K., Sayed, M.A., Assi, C., Atallah, R., Torabi, S., Khoury, J., Pour, M.S. & Bou-Harb, E. "EV Charging Infrastructure Discovery to Contextualize its Deployment Security". IEEE Transactions on Network and Service Management (TNSM), IEEE, 2023.

Electronic edition     Bibtex   

[+] 2022

[1] Xiong, Y., Ramachandran, G.K., Ganesan, R., Jajodia, S. & Subrahmanian, V.S. "Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft". Transactions on Dependable and Secure Computing (TDSC), Vol 19(No. 3):pages 1434-1445, IEEE, 2022.

Electronic edition     Bibtex   

[2] Li, Y., Chen, Z., Wang, H., Sun, K. & Jajodia, S. "A Study of Account Recovery in the Wild and its Security Implications". IEEE Trans. on Dependable and Secure Computing (TDSC), Vol 19(No. 1):pages 620-634, IEEE, 2022.

Electronic edition     Bibtex   

[3] Marasco, E., He, M., Tang, L. & Tao, Y. "Demographic Effects in Latent Fingerprints Matching and their Relation to Image Quality". In ACM International Conference on Machine Learning Technologies (ICMLT), pages 1-14, 2022.(Accepted/To Appear).

Electronic edition     Bibtex   

[4] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "Maintaining the Level of Operational Effectiveness of a CSOC under Adverse Conditions". International Journal of Information Security (IJIS), Vol 21:pages 637-651, Springer, 2022.

Electronic edition     Bibtex   

[5] Chen, H., Duncklee, A., Jajodia, S., Liu, R., McNamara, S. & Subrahmanian, V. "PCAM: A Data-Driven Probabilistic Cyber-Alert Management Framework". ACM Transactions on Internet Technology, Vol 22, Issue 3(Article No. 67):pages 1-24, ACM, 2022.

Electronic edition     Bibtex   

[6] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "An Authorization Model for Query Execution in the Cloud". The VLDB Journal, Vol 31(No. 2):pages 555-579, 2022.

Electronic edition     Bibtex   

[7] Marasco, E., He, M., Tang, L. & Sriram, S. "Demographic-Adapted ROC Curve for Assessing Automated Matching of Latent Fingerprints". SN Computer Science SNCS-D-21-01022R1, pages 1-20, Springer, 2022.(Accepted/To Appear).

Electronic edition     Bibtex   

[8] Iganibo, I., Albanese, M., Turkmen, K., Campbell, T. & Mosko, M. "Mason Vulnerability Scoring Framework: A Customizable Framework for Scoring Common Vulnerabilities and Weaknesses". In Proceedings of the 19th International Conference on Security and Cryptography (SECRYPT 2022), pages 215-225, SciTePress, 2022.(Best Paper Award).

Electronic edition     Bibtex    Award

[9] Albanese, M., Johnsgard, K.L. & Swarup, V. "A Formal Model for Credential Hopping Attacks". In Proceedings of the 27th European Symposium on Research in Computer Security (ESORICS 2022), Part I, 13554:367-386, Springer, 2022.

Electronic edition     Bibtex   

[10] Marasco, E., Albanese, M., Patibandla, V.V.R., Vurity, A. & Sriram, S.S. "Biometric multi-factor authentication: On the usability of the FingerPIN scheme". Security and Privacy, ():, Wiley, 2022.().

Electronic edition     Bibtex   

[11] Hyeong, J., Kim, J., Park, N. & Jajodia, S. "An Empirical Study on the Membership Inference Attack Against Tabular Data Synthesis Models". In Proc. 31st ACM International Conf on Information & Knowledge Management (CIKM '22, ():, ACM, 2022.().

Electronic edition     Bibtex   

[12] Albanese, M. "Dependency Graphs". In Encyclopedia of Cryptography, Security and Privacy, Springer, 2022.

Electronic edition     Bibtex   

[+] 2021

[1] Hitaj, D., Hitaj, B., Jajodia, S. & Mancini, L.V. "Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks". IEEE Intelligent Systems, 36(5):104-112, IEEE, 2021.(First Online: 16 November 2020).

Electronic edition     Bibtex   

[2] Karuna, P., Purohit, H., Jajodia, S., Ganesan, R. & Uzuner, O. "Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility". IEEE Systems Journal, 15(1):835-845, IEEE, 2021.(First Online: 28 April 2020).

Electronic edition     Bibtex   

[3] Chakraborty, T., Jajodia, S., Katz, J., Picariello, A., Sperli, G. & Subrahmanian, V.S. "A Fake Online Repository Generation Engine for Cyber Deception". IEEE Trans. on Dependable and Secure Computing (TDSC), 18(2):518-533, IEEE, 2021.(First Online: 11 February 2019).

Electronic edition     Bibtex   

[4] Zhang, M., Wang, L., Jajodia, S. & Singhal, A. "Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks". IEEE Transactions. on Dependable and Secure Computing (TDSC), 18(1):310-324, IEEE, 2021.(First online 21 December 2018).

Electronic edition     Bibtex   

[5] Connell, W., Menascé, D.A. & Albanese, M. "Performance Modeling of Moving Target Defenses with Reconfiguration Limits". IEEE Transactions on Dependable and Secure Computing, 18(1):205-219, IEEE, 2021.

Electronic edition     Bibtex   

[6] Iganibo, I., Albanese, M., Mosko, M., Bier, E. & Brito, A.E. "Vulnerability Metrics for Graph-based Configuration Security". In Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT 2021), pages 259-270, SciTePress, 2021.

Electronic edition     Bibtex   

[7] Wan, S., Sun, K., Zhang, N. & Li, Y. "Remotely Controlling TrustZone Applications? A Study on Securely and Resiliently Receiving Remote Commands". In WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, ():pgs. 204–215, ACM, 2021.(To appear).

Electronic edition     Bibtex   

[8] Marasco, E., Morelli, M.P., Gulley, J., Floudas, C., Ruppin, E. & Nathan, S. "COVID-19 Real-time Detection via Hyperspectral Analysis of Sweat Metabolite Biometrics". In Division of Biochemical Technology, American Chemical Society (ACS) Meeting, 2021.

Electronic edition     Bibtex   

[9] Marasco, E., Vurity, A. & Otham, A. "Deep Color Spaces for Detecting Fingerphoto Presentation Attacks in Mobile Devices". In IAPR International Conference on Computer Vision & Image Processing (CVIP), 2021.

Electronic edition     Bibtex   

[10] Marasco, E. & Vurity, A. "Fingerphoto Presentation Attack Detection: Generalization in Smartphones". In IEEE Big Data Workshop for Multimodal AI (MMBD), 2021.

Electronic edition     Bibtex   

[11] Wollfson, O., Giri, P., Jajodia, S. & Trajcevski, G. "Geographic-Region Monitoring by Dones in Adversarial Environments". In SIGSPATIAL '21: Proceedings of the 29th Intl Conf on Advances in Geographic Info Systems, pages 480-483, ACM, 2021.

Electronic edition     Bibtex   

[12] Park, N., Liu, J., Kim, J., Jeon, J., Lee, J., Lee, J., Uzuner, O. & Jajodia, S. "Scalable Graph Synthesis with Adj and 1-Adj". In Proceedings of the 2021 SIAM Intl Conference on Data Mining (SDM), pages 307-315, Society for Industrial and Applied Mathematics, 2021.

Electronic edition     Bibtex   

[13] Vimercati, S.D.C.d., Foresti, S., Jajodia, S., Livraga, G., Parboschi, S. & Samarati, P. "Distributed Query Evaluation Over Encrypted Data". In Proceedings of the 35th Annual IFIP Conference on Data and Applications Security (DBSec 2021), Volume 12840:Pages 96-114, Springer Lecture Notes in Computer Science, 2021.

Electronic edition     Bibtex   

[14] Wang, X., Wang, S., Feng, P., Sun, K. & Jajodia, S. "PatchDB: A Large-Scale Security Patch Dataset". In Proceedings of the 51st Annual IEEE/IFIP Intl Conference on Dependable Systems and Networks (DSN), IEEE, 2021.

Electronic edition     Bibtex   

[15] Wang, X., Wang, S., Feng, P., Sun, K., Jajodia, S., Benchaboun, S. & Geck, F. "PatchRNN: A Deep Learning-Based System for Security Patch Identification". In Proceedings of the 2021 IEEE Military Communications Conference (MILCOM), pages 595-600, IEEE, 2021.

Electronic edition     Bibtex   

[16] Jajodia, S., Samarati, P. & Moti Yung, E. "Encyclopedia of Cryptology, Security & Privacy, 3rd Edition". Springer, 2021.(In Preparation).

Electronic edition     Bibtex   

[+] 2020

[1] Shah, A., Sinha, A., Ganesan, R., Jajodia, S. & Cam, H. "Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System". ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 11(No. 3, 2020):pages 32:1-32:20, , 2020.(First Online: April 2020).

Electronic edition     Bibtex   

[2] Zhang, Y., Xiao, J., Hao, S., Wang, H., Zhu, S. & Jajodia, S. "Understanding the Manipulation on Recommender Systems through Web Injection". IEEE Trans. Inf. Forensics Secur., 15:3807-3818, 2020.

Electronic edition     Bibtex   

[3] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center". ACM Trans. Web, 14(1):2:1-2:22, 2020.

Electronic edition     Bibtex   

[4] Shah, A., Ganesan, R., Jajodia, S., Samarati, P. & Cam, H. "Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning". IEEE Trans. Parallel Distributed Syst., 31(1):16-33, 2020.

Electronic edition     Bibtex   

[5] Pham, L.H., Albanese, M., Chadha, R., Chiang, C.Y.J., Venkatesan, S., Kamhoua, C. & Leslie, N. "A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses". In Proceedings of the 8th IEEE Conference on Communications and Network Security (CNS 2020), IEEE, 2020.

Electronic edition     Bibtex   

[6] Soroush, H., Albanese, M., Asgari Mehrabadi, M., Iganibo, I., Mosko, M., Gao, J.H., Fritz, D.J., Rane, S. & Bier, E. "SCIBORG: Secure Configurations for the IoT Based on Optimization and Reasoning on Graphs". In Proceedings of the 8th IEEE Conference on Communications and Network Security (CNS 2020), IEEE, 2020.

Electronic edition     Bibtex   

[7] Cao, J., Xie, R., Sun, K., Li, Q., Gu, G. & Xu, M. "When Match Fields Do Not Need to Match: Buffered Packets Hijacking in SDN". In Network and Distributed System Security Symposium (NDSS), 2020.

Electronic edition     Bibtex   

[8] Li, Y., Chen, Z., Wang, H., Sun, K. & Jajodia, S. "Understanding Account Recovery in the Wild and Its Security Implications". IEEE Transactions on Dependable and Secure Computing, ():1-1, 2020.(First online: 02 March 2020).

Electronic edition     Bibtex   

[9] Sun, J., Sun, K. & Li, Q. "Towards a Believable Decoy System: Replaying Network Activities from Real System". In IEEE Conference on Communications and Network Security (CNS), 2020.(First online: 7 August 2020).

Electronic edition     Bibtex   

[10] Wang, X., Wang, S., Sun, K., Batcheller, A.L. & Jajodia, S. "A Machine Learning Approach to Classify Security Patches into Vulnerability Types". In 8th IEEE Conference on Communications and Network Security, CNS 2020, Avignon, France, June 29 - July 1, 2020, pages 1-9, IEEE, 2020.

Electronic edition     Bibtex   

[11] He, Y., Zhou, Y., Li, Y.Z.a.Q., Sun, K., Gu, Y. & Jiang, Y. "JNI Global References Are Still Vulnerable: Attacks and Defenses". IEEE Transactions on Dependable and Secure Computing, 2020.(First online: 18 May 2020).

Electronic edition     Bibtex   

[12] Wang, S., Cao, J., Sun, K. & Li, Q. "SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems". In International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2020.(to appear).

Electronic edition     Bibtex   

[13] Wang, S., Cao, J., He, X., Sun, K. & Li, Q. "When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition". In ACM Conference on Computer and Communications Security (CCS), 2020.(to appear).

Electronic edition     Bibtex   

[14] Feng, P., Sun, J., Liu, S. & Sun, K. "UBER: Combating Sandbox Evasion via User Behavior Emulators". In Information and Communications Security, pages 34-50, Springer International Publishing, 2020.

Electronic edition     Bibtex   

[15] Marasco, E., He, M., Tang, L. & Sriram, S. "Accounting for Demographic Differentials in Error rate Assessment of Automated Latent Prints Matching via Covariate-Specific ROC Regression". In IAPR International Conference on Computer Vision & Image Processing (CVIP) , pages 1-10, 2020.(Best Paper Award).

Electronic edition     Bibtex    Award

[16] Marasco, E. & Albanese, M. "FingerPIN: An Authentication Mechanism Integrating Fingerprints and Personal Identification Numbers". In IAPR International Conference on Computer Vision & Image Processing (CVIP) , pages 1-10, 2020.

Electronic edition     Bibtex   

[17] Shah, A., Sinha, A., Ganesan, R., Jajodia, S. & Cam, H. "Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System". ACM Trans. on Intelligent Systems and Technology (TIST), Vol. 11(No. 3):pages 32:1-32:20, , 2020.(First Online: April 2020).

Electronic edition     Bibtex   

[18] Chen, H., Han, Q., Jajodia, S., Lindelauf, R., Subrahmanian, V.S. & Xiong, Y. "Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare". IEEE Systems Journal, 14(3):3779-3790, 2020.

Electronic edition     Bibtex   

[19] Alhebaishi, N., Wang, L. & Jajodia, S. "Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)". , 12122:3-23, Springer, 2020.

Electronic edition     Bibtex   

[20] Wang, X., Sun, K., Batcheller, A.L. & Jajodia, S. "An Empirical Study of Secret Security Patch in Open Source Software". In Adaptive Autonomous Secure Cyber Systems, ():269-289, Springer, 2020.(First online 5 February 2020).

Electronic edition     Bibtex   

[+] 2019

[1] Connell, W., Menascé, D.A. & Albanese, M. "Performance Modeling of Moving Target Defenses with Reconfiguration Limits". IEEE Transactions on Dependable and Secure Computing, ():, IEEE, 2019.(to appear).

Electronic edition     Bibtex   

[2] Marasco, E., Cando, S. & Tang, L. "Can Liveness Be Automatically Detected from Latent Fingerprints?". In IEEE Image and Video Forensics (IVF) Workshop in conjunction with WACV, pages 1-7, 2019.(Cando is an undergraduate student at GMU).

Electronic edition     Bibtex   

[3] Marasco, E., Cando, S., Tang, L. & Tabassi, E. "Cross-Sensor Evaluation of Textural Descriptors for Gender Prediction from Fingerprints ". In IEEE Cross Domain Biometric Recognition Workshop in conjunction with WACV, ():1-8, , 2019.(Cando is an undergraduate student at GMU).

Electronic edition     Bibtex   

[4] Soroush, H., Rane, S. & Albanese, M. "Securing Distributed System Configuration through Optimization and Reasoning on Graphs". In Proceedings of the Network and Distributed Systems Security Symposium (NDSS 2019), Internet Society, 2019.(Poster).

Electronic edition     Bibtex   

[5] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC". IEEE Transactions on Information Forensics and Security (TIFS), 14(7):1857-1870, month = July, publisher = IEEE, note = First online: 12 December 2018, doi = 10.1109/TIFS.2018.2886465, 2019.

Electronic edition     Bibtex   

[6] Shah, A., Ganesan, R. & Jajodia, S. "A Methodology for Ensuring Fair Allocation of CSOC effort for Alert Investigation". International Journal of Information Security (IJIS), 18(2):199-218, Springer, 2019.(First online: 9 May 2018).

Electronic edition     Bibtex   

[7] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "Optimal Assignments of Sensors to Analysts in a Cybersecurity Operations Center". IEEE Systems Journal, 13(1):1060-1071, IEEE, 2019.(First online: 5 April 2018).

Electronic edition     Bibtex   

[8] Marasco, E. "Biases in Fingerprint Recognition Systems: Where Are We At?". In IEEE Biometrics: Theory, Applications and Systems - Special Session on Generalizability and Adaptability in Biometrics (BTAS-SS GAPinB), pages 1-5, 2019.

Electronic edition     Bibtex   

[9] Chatterjee, R., Riazi, M.S., Chowdhury, T., Marasco, E., Koushanfar, F. & Juels, A. "Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms". In ACM Conference on Computer and Communications Security, 2019.

Electronic edition     Bibtex   

[10] Jajodia, S., Cybenko, G., Liu, P., Wang, C. & Wellman, M. (eds). "Adversarial and Uncertain Reasoning for Adaptive Cyber-Defense". Springer Lecture Notes in Computer Science (State-of-the-Art Survey Series), Volume 11830, 2019.

Electronic edition     Bibtex   

[11] Shah, A., Farris, K.A., Ganesan, R. & Jajodia, S. "Vulnerability selection for remediation: An empirical analysis". Journal of Defense Modeling and Simulation, 2019.

Electronic edition     Bibtex   

[12] Chakraborty, T., Jajodia, S., Katz, J., Picariello, A., Sperli, G. & Subrahmanian, V.S. "FORGE: A fake online repository generation engine for cyber deception". IEEE Trans. on Dependable and Secure Computing (TDSC), 2019.

Electronic edition     Bibtex   

[13] Chen, H., Jajodia, S., Liu, J., Park, N., Sokolov, V. & Subrahmanian, V.S. "FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data". In Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, Macao, China, August 10-16, 2019, pages 2074-2080, IJCAI, 2019.

Electronic edition     Bibtex   

[14] Wan, S., Li, Y. & Sun, K. "PathMarker: protecting web contents against inside crawlers". Cybersecurity, 2(1):9, 2019.

Electronic edition     Bibtex   

[15] Cao, J., Li, Q., Xie, R., Sun, K., Gu, G., Xu, M. & Yang, Y. "The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links". In USENIX Security Symposium, 2019.

Electronic edition     Bibtex   

[16] Wan, S., Sun, J., Sun, K., Zhang, N. & Li, Q. "SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors". In 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), :289-301, IEEE Computer Society, 2019.

Electronic edition     Bibtex   

[17] Cao, J., Yang, Z., Sun, K., Li, Q., Xu, M. & Han, P. "Fingerprinting SDN Applications via Encrypted Control Traffic". In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), pages 501-515, USENIX Association, 2019.

Electronic edition     Bibtex   

[18] Sun, J., Sun, K. & Shenefiel, C. "Automated IoT Device Fingerprinting Through Encrypted Stream Classification". In Security and Privacy in Communication Networks, pages 147-167, Springer International Publishing, 2019.

Electronic edition     Bibtex   

[19] Cao, J., Sun, K., Li, Q., Xu, M., Yang, Z., Kwak, K.J. & Li, J. "Covert Channels in SDN: Leaking Out Information from Controllers to End Hosts". In Security and Privacy in Communication Networks, pages 429-449, Springer International Publishing, 2019.

Electronic edition     Bibtex   

[20] Chu, D., Wang, Y., Lei, L., Li, Y., Jing, J. & Sun, K. "OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform". In Computer Security --ESORICS 2019, pages 412-438, Springer International Publishing, 2019.

Electronic edition     Bibtex   

[21] Chang, H., Lei, L., Sun, K., wang, y., Jing, J., He, Y. & Wang, P. "Vulnerable Service Invocation And Countermeasures". IEEE Transactions on Dependable and Secure Computing, ():1-1, 2019.

Electronic edition     Bibtex   

[22] Sun, J., Liu, S. & Sun, K. "A Scalable High Fidelity Decoy Framework against Sophisticated Cyber Attacks". In Proceedings of the 6th ACM Workshop on Moving Target Defense, pages 37-46, 2019.

Electronic edition     Bibtex   

[23] Borbor, D., Wang, L., Jajodia, S. & Singhal, A. "Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks". Comput. Commun., 145:96-112, 2019.

Electronic edition     Bibtex   

[24] Alhebaishi, N., Wang, L., Jajodia, S. & Singhal, A. "Mitigating the Insider Threat of Remote Administrators in Clouds through Maintenance Task Assignments". Journal of Computer Security, 27(4):427-458, 2019.

Electronic edition     Bibtex   

[25] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC". IEEE Trans. Inf. Forensics Secur., 14(5):1155-1170, 2019.

Electronic edition     Bibtex   

[26] Zhang, M., Xin, Y., Wang, L., Jajodia, S. & Singhal, A. "CASFinder: Detecting Common Attack Surface". In Data and Applications Security and Privacy XXXIII - 33rd Annual IFIP WG 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings, 11559:338-358, Springer, 2019.

Electronic edition     Bibtex   

[27] Chen, P., Hu, Z., Xu, J., Zhu, M., Erbacher, R., Jajodia, S. & Liu, P. "MTD Techniques for Memory Protection Against Zero-Day Attacks". In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, 11830():129-155, Springer, 2019.(First online: 31 August 2019).

Electronic edition     Bibtex   

[28] Albanese, M., Jajodia, S., Venkatesan, S., Cybenko, G. & Nguyen, T. "Adaptive Cyber Defenses for Botnet Detection and Mitigation". In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, 11830:156-205, Springer, 2019.

Electronic edition     Bibtex   

[29] Ganesan, R., Shah, A., Jajodia, S. & Cam, H. "Optimizing Alert Data Management Processes at a Cyber Security Operations Center". In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security, 11830:206-231, Springer, 2019.

Electronic edition     Bibtex   

[+] 2018

[1] Farris, K.A., Shah, A., Cybenko, G., Ganesan, R. & Jajodia, S. "VULCON - A system for vulnerability prioritization, mitigation, and management". ACM Transactions on Privacy and Security (TOPS), 21(4):16:1-16:28, ACM, 2018.().

Electronic edition     Bibtex   

[2] Zhang, N., Sun, K., Shands, D., Lou, W. & Hou, T. "TruSense: Information Leakage from TrustZone". In To appear in IEEE International Conference on Computer Communications (INFOCOM), 2018.

Electronic edition     Bibtex   

[3] Jajodia, S., Park, N., Serra, E. & Subrahmanian, V.S. "SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine". ACM Transactions on Internet Technology, 18(3):30:1-30:41, ACM, 2018.().

Electronic edition     Bibtex   

[4] Albanese, M. & Jajodia, S. "A Graphical Model to Assess the Impact of Multi-Step Attacks". Journal of Defense Modeling and Simulation, 15(1):79-93, SAGE Publications, 2018.(Selected by the Guest Editor, Alexander Kott, as an article of particular value).

Electronic edition     Bibtex   

[5] Wallace, K., Zhou, G. & Sun, K. "CADET: Investigating a Collaborative and Distributed Entropy Transfer Protocol". In To appear in the 38th IEEE International Conference on Distributed Computing Systems (ICDCS), 2018.

Electronic edition     Bibtex   

[6] Albanese, M., Jajodia, S. & Venkatesan, S. "Defending from Stealthy Botnets Using Moving Target Defenses". IEEE Security and Privacy Magazine, 16(1):92-97, IEEE, 2018.

Electronic edition     Bibtex   

[7] Li, Y., Wang, H. & Sun, K. "Email as a Master Key: Analyzing Account Recovery in the Wild". In To appear in IEEE International Conference on Computer Communications (INFOCOM), 2018.

Electronic edition     Bibtex   

[8] Marasco, E., Cando, S., Tang, L., Ghiani, L. & Marcialis, G.L. "A Look At Non-Cooperative Presentation Attacks in Fingerprint Systems". In IEEE International Conference on Image Processing Theory, Tools and Applications (IPTA), pages 1-6, 2018.(Stefany Cando is currently an undergraduate student at GMU).

Electronic edition     Bibtex   

[9] Zhang, N., Zhang, R., Sun, K., Lou, W., Hou, Y.T. & Jajodia, S. "Memory Forensic Challenges Under Misused Architectural Features". IEEE Transactions on Information Forensics Security, 13(9):2345-2358, IEEE, 2018.().

Electronic edition     Bibtex   

[10] Marasco, E., Feldman, A. & Romine, K. "Enhancing Optical Cross-Sensor Fingerprint Matching Using Local Textural Features". IEEE Cross-Domain Biometric Recognition (CDBR) Workshop, 2018.(accepted /to appear. Feldman and Romine are currently undergraduate students).

Electronic edition     Bibtex   

[11] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "A methodology to measure and monitor level of operational effectiveness of a CSOC". International Journal of Information Security, 17(2):121-134, Springer, 2018.

Electronic edition     Bibtex   

[12] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions". ACM Transactions on Intelligent Systems and Technology, 9(5):51:1-51:20, ACM, 2018.().

Electronic edition     Bibtex   

[13] Pham, L.H., Albanese, M. & Priest, B.W. "A Quantitative Framework to Model Advanced Persistent Threats". In Proceedings of the 15th International Conference on Security and Cryptography (SECRYPT 2018), pages 282-293, SciTePress, 2018.(Best Paper Award).

Electronic edition     Bibtex    Award

[14] Sugrim, S., Venkatesan, S., Youzwak, J., Chiang, C.Y., Chadha, R., Albanese, M. & Cam, H. "Measuring the Effectiveness of Network Deception". In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2018), pages 142-147, IEEE, 2018.

Electronic edition     Bibtex   

[15] Albanese, M. "From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field". In From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday, 11170:1-23, Springer, 2018.

Electronic edition     Bibtex   

[16] Venkatesan, S., Albanese, M., Chiang, C.Y.J., Sapello, A. & Chadha, R. "DeBot: A Novel Network-based Mechanism to Detect Exfiltration by Architectural Stealthy Botnets". Security and Privacy, 1(6), Wiley, 2018.

Electronic edition     Bibtex   

[17] Lin, X., Lei, L., Wang, Y., Jing, J., Sun, K. & Zhou, Q. "A Measurement Study on Linux Container Security: Attacks and Countermeasures". In Proceedings of the 34th Annual Computer Security Applications Conference, pages 418-429, Association for Computing Machinery, 2018.

Electronic edition     Bibtex   

[18] Karuna, P., Purohit, H., Ganesan, R. & Jajodia, S. "Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception". IEEE Intell. Syst., 33(5):16-25, 2018.

Electronic edition     Bibtex   

[19] Chakraborty, T., Jajodia, S., Park, N., Pugliese, A., Serra, E. & Subrahmanian, V.S. "Hybrid Adversarial Defense: Merging Honeypots and Traditional Security Methods". Journal of Computer Security, 26(5):615-645, 2018.

Electronic edition     Bibtex   

[20] Borbor, D., Wang, L., Jajodia, S. & Singhal, A. "Surviving Unpatchable Vulnerabilities through Heterogeneous Network Hardening Options". Journal of Computer Security, 26(6):761-789, 2018.

Electronic edition     Bibtex   

[21] Park, N., Mohammadi, M., Gorde, K., Jajodia, S., Park, H. & Kim, Y. "Data Synthesis based on Generative Adversarial Networks". Proc. VLDB Endow., 11(10):1071-1083, 2018.

Electronic edition     Bibtex   

[22] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "Adaptive Reallocation of Cybersecurity Analysts to Sensors for Balancing Risk between Sensors". Serv. Oriented Comput. Appl., 12(2):123-135, 2018.

Electronic edition     Bibtex   

[23] Bettini, C., Wang, X.S. & Jajodia, S. "Temporal Granularity". In Encyclopedia of Database Systems, Second Edition, Springer, 2018.

Electronic edition     Bibtex   

[+] 2017

[1] Jajodia, S., Park, N., Pierazzi, F., Pugliese, A., Serra, E., Simari, G.I. & Subrahmanian, V.S. "A probabilistic logic of cyber deception". IEEE Trans. on Information Forensics and Security, 12(11):2532-2544, 2017.

Electronic edition     Bibtex   

[2] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "An authorization model for multi-provider queries". Proc. of the VLDB Endownment, 11(3):256-268, 2017.

Electronic edition     Bibtex   

[3] Wang, L., Jajodia, S. & Singhal, A. "Network Security Metrics". Springer, pages 1-207, 2017.(ISBN 978-3-319-66504-7).

Electronic edition     Bibtex   

[4] Gu, Y., Sun, K., Su, P., Li, Q., Lu, Y., Ying, L. & Feng, D. "JGRE: An Analysis of JNI Global Reference Exhaustion Vulnerabilities in Android". In 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), ():427-438, 2017.

Electronic edition     Bibtex   

[5] Venkatesan, S., Albanese, M., Shah, A., Ganesan, R. & Jajodia, S. "Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning". In Proceedings of the 4th ACM Workshop on Moving Target Defense (MTD 2017), pages 75-85, ACM, 2017.

Electronic edition     Bibtex   

[6] Wan, S., Li, Y. & Sun, K. "Protecting web contents against persistent distributed crawlers". In 2017 IEEE International Conference on Communications (ICC), ():1-6, 2017.

Electronic edition     Bibtex   

[7] Lei, L., He, Y., Sun, K., Jing, J., Wang, Y., Li, Q. & Weng, J. "Vulnerable Implicit Service: A Revisit". In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 1051-1063, 2017.

Electronic edition     Bibtex   

[8] Jajodia, S. & Albanese, M. "An Integrated Framework for Cyber Situation Awareness". In Theory and Models for Cyber Situation Awareness, 10030:29-46, Springer, 2017.

Electronic edition     Bibtex   

[9] Li, Y., Zheng, N., Wang, H., Sun, K. & Fang, H. "A measurement study on Amazon wishlist and its privacy exposure". In 2017 IEEE International Conference on Communications (ICC), ():1-7, 2017.

Electronic edition     Bibtex   

[10] Hyun, S., Sun, K. & Ning, P. "FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes". Computer Communications, 104:191-203, 2017.

Electronic edition     Bibtex   

[11] Albanese, M., Cooke, N., González, C., Hall, D., Healey, C., Jajodia, S., Liu, P., McNeese, M.D., Ning, P., Reeves, D., Subrahmanian, V.S., Wang, C. & Yen, J. "Computer-Aided Human Centric Cyber Situation Awareness". In Theory and Models for Cyber Situation Awareness, 10030:3-25, Springer, 2017.

Electronic edition     Bibtex   

[12] Connell, W., Menascé, D.A. & Albanese, M. "Performance Modeling of Moving Target Defenses". In Proceedings of the 4th ACM Workshop on Moving Target Defense (MTD 2017), pages 53-63, ACM, 2017.

Electronic edition     Bibtex   

[13] Sun, J., Sun, K. & Li, Q. "CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms". In 2017 IEEE Conference on Communications and Network Security (CNS), ():1-9, 2017.

Electronic edition     Bibtex   

[14] Lei, L., Sun, J., Sun, K., Shenefiel, C., Ma, R., Wang, Y. & Li, Q. "SPEAKER: Split-Phase Execution of Application Containers". In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 230-251, Springer International Publishing, 2017.

Electronic edition     Bibtex   

[15] Ganesan, R., Jajodia, S. & Cam, H. "Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk". ACM Transactions on Intelligent Systems and Technology (TIST), 8(4):52, ACM, 2017.

Electronic edition     Bibtex   

[16] Connell, W., Albanese, M. & Venkatesan, S. "A Framework for Moving Target Defense Quantification". In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), pages 124-138, Springer, 2017.

Electronic edition     Bibtex   

[17] Li, Y., Wang, H. & Sun, K. "Personal Information in Passwords and Its Security Implications". IEEE Transactions on Information Forensics and Security, 12(10):2320-2333, 2017.

Electronic edition     Bibtex   

[18] Liu, P., Jajodia, S. & Wang, C. "Theory and Models for Cyber Situation Awareness". Springer Lecture Notes in Computer Science, 2017.

Electronic edition     Bibtex   

[19] Shah, A., Ganesan, R., Jajodia, S. & Cam, H. "A methodology to measure and monitor level of operational effectiveness of a CSOC". International Journal of Information Security, pages 1-14, Springer, 2017.

Electronic edition     Bibtex   

[20] Albanese, M. & Jajodia, S. "A graphical model to assess the impact of multi-step attacks". Journal of Defense Modeling and Simulation, 2017.

Electronic edition     Bibtex   

[+] 2016

[1] Venkatesan, S., Albanese, M., Cybenko, G. & Jajodia, S. "A Moving Target Defense Approach to Disrupting Stealthy Botnets". In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016), pages 37-46, ACM, 2016.

Electronic edition     Bibtex   

[2] Jajodia, S., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Deception: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2016.

Electronic edition     Bibtex   

[3] Pham, L.H., Albanese, M. & Venkatesan, S. "A Quantitative Risk Assessment Framework for Adaptive Intrusion Detection in the Cloud". In In Proceedings of the Second IEEE Workship on Security and Privacy in the Cloud (SPC 2016), 2016.(to appear).

Electronic edition     Bibtex   

[4] De Gaspari, F., Jajodia, S., Mancini, L.V. & Panico, A. "AHEAD: A New Architecture for Active Defense". In Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, pages 11-16, 2016.

Electronic edition     Bibtex   

[5] Zhang, N., Sun, K., Lou, W. & Hou, Y.T. "CaSE: Cache-Assisted Secure Execution on ARM Processors". In 2016 IEEE Symposium on Security and Privacy (SP), ():72-90, 2016.

Electronic edition     Bibtex   

[6] Ruan, X., Wu, Z., Wang, H. & Jajodia, S. "Profiling Online Social Behaviors for Compromised Account Detection". IEEE Transactions on Information Forensics and Security, 11(1):176-187, IEEE, 2016.

Electronic edition     Bibtex   

[7] Zhang, N., Sun, H., Sun, K., Lou, W. & Hou, Y.T. "CacheKit: Evading Memory Introspection Using Cache Incoherence". In 2016 IEEE European Symposium on Security and Privacy (EuroS P), ():337-352, 2016.

Electronic edition     Bibtex   

[8] Zhang, M., Wang, L., Jajodia, S., Singhal, A. & Albanese, M. "Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks". IEEE Transactions on Information Forensics and Security, 11(5):1071-1086, IEEE, 2016.

Electronic edition     Bibtex   

[9] Jajodia, S., Park, N., Serra, E. & Subrahmanian, V. "Using temporal probabilistic logic for optimal monitoring of security events with limited resources". Journal of Computer Security pages 1-57, IOS Press, 2016.

Electronic edition     Bibtex   

[10] Le, M., Kant, K., Athamnah, M. & Jajodia, S. "Minimum cost rule enforcement for cooperative database access". Journal of Computer Security pages 1-25, IOS Press, 2016.

Electronic edition     Bibtex   

[11] Ganesan, R., Jajodia, S., Shah, A. & Cam, H. "Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning". ACM Transactions on Intelligent Systems and Technology (TIST), 8(1):4, ACM, 2016.

Electronic edition     Bibtex   

[12] Wright, M., Venkatesan, S., Albanese, M. & Wellman, M.P. "Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis". In Proceedings of the 3rd ACM Workshop on Moving Target Defense (MTD 2016), pages 93-104, ACM, 2016.

Electronic edition     Bibtex   

[13] Li, Y., Wang, H. & Sun, K. "A study of personal information in human-chosen passwords and its security implications". In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, ():1-9, 2016.

Electronic edition     Bibtex   

[14] Venkatesan, S., Albanese, M., Amin, K., Jajodia, S. & Wright, M. "A moving target defense approach to mitigate DDoS attacks against proxy-based architectures". In IEEE Conference on Communications and Network Security, 2016.

Electronic edition     Bibtex   

[15] Borbor, D., Wang, L., Jajodia, S. & Singhal, A. "Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks". In IFIP Annual Conference on Data and Applications Security and Privacy, pages 295-312, 2016.

Electronic edition     Bibtex   

[16] Wallace, K., Moran, K., Novak, E., Zhou, G. & Sun, K. "Toward Sensor-Based Random Number Generation for Mobile and IoT Devices". IEEE Internet of Things Journal, 3(6):1189-1201, 2016.

Electronic edition     Bibtex   

[17] Guan, C., Sun, K., Wang, Z. & Zhu, W. "Privacy Breach by Exploiting postMessage in HTML5: Identification, Evaluation, and Countermeasure". In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pages 629-640, ACM, 2016.

Electronic edition     Bibtex   

[18] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Efficient Integrity Checks for Join Queries in the Cloud". Journal of Computer Security pages 1-32, IOS Press, 2016.

Electronic edition     Bibtex   

[19] Sun, J. & Sun, K. "DESIR: Decoy-enhanced seamless IP randomization". In IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, ():1-9, 2016.

Electronic edition     Bibtex   

[20] Wang, L., Li, Y. & Sun, K. "Amnesia: A Bilateral Generative Password Manager". In 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), ():313-322, 2016.

Electronic edition     Bibtex   

[21] Wright, M., Venkatesan, S., Albanese, M. & Wellman, M. "Moving target defense against DDoS attacks: An empirical game-theoretic analysis". In 2016 IEEE Conference on Communications and Network Security (IEEE CNS 2016), 2016.(to appear).

Electronic edition     Bibtex   

[22] Venkatesan, S., Albanese, M., Cybenko, G. & Jajodia, S. "A Moving Target Defense Approach to Disrupting Stealthy Botnets". In Proceedings of the 2016 ACM Workshop on Moving Target Defense, pages 37-46, 2016.

Electronic edition     Bibtex   

[+] 2015

[1] Venkatesan, S., Albanese, M. & Jajodia, S. "Disrupting stealthy botnets through strategic placement of detectors". In 2015 IEEE Conference on Communications and Network Security (IEEE CNS 2015), pages 95-103, 2015.(Best Paper Runner-Up Award).

Electronic edition     Bibtex    Award

[2] Deliri, S. & Albanese, M. "Security and privacy issues in social networks". In Data Management in Pervasive Systems, pages 195-209, Springer, 2015.

Electronic edition     Bibtex   

[3] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for Approximate Joins on Untrusted Computational Servers". In ICT Systems Security and Privacy Protection, 455:446-459, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[4] Albanese, M., Battista, E. & Jajodia, S. "A deception based approach for defeating OS and service fingerprinting". In 2015 IEEE Conference on Communications and Network Security (CNS), pages 253-261, 2015.

Electronic edition     Bibtex   

[5] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Loose Associations to Increase Utility in Data Publishing". Journal of Computer Security, 23(1):59-88, IOS Press, 2015.

Electronic edition     Bibtex   

[6] Sun, H., Sun, K., Wang, Y. & Jing, J. "Reliable and Trustworthy Memory Acquisition on Smartphones". IEEE Transactions on Information Forensics and Security, 10(12):2547-2561, 2015.

Electronic edition     Bibtex   

[7] Clark, A., Sun, K., Bushnell, L. & Poovendran, R. "A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense". In Decision and Game Theory for Security, pages 3-21, Springer International Publishing, 2015.

Electronic edition     Bibtex   

[8] Zhang, N., Sun, K., Lou, W., Hou, Y.T. & Jajodia, S. "Now You See Me: Hide and Seek in Physical Address Space". In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS '15), pages 321-331, ACM, 2015.

Electronic edition     Bibtex   

[9] Serra, E., Jajodia, S., Pugliese, A., Rullo, A. & Subrahmanian, V.S. "Pareto-Optimal Adversarial Defense of Enterprise Systems". ACM Trans. on Information and System Security, 17(3):11:1-11:39, ACM, 2015.

Electronic edition     Bibtex   

[10] Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. & Wang, C. "Cyber Warfare: Building the Scientific Foundation". Springer Publishing Company, Incorporated, 2015.

Electronic edition     Bibtex   

[+] 2014

[1] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Fragmentation in presence of data dependencies". IEEE Transactions on Dependable and Secure Computing, 11(6):510-523, IEEE, 2014.

Electronic edition     Bibtex   

[2] Sun, H., Sun, K., Wang, Y., Jing, J. & Jajodia, S. "TrustDump: Reliable Memory Acquisition on Smartphones". In Computer Security-ESORICS 2014, pages 202-218, Springer, 2014.

Electronic edition     Bibtex   

[3] Li, L., Zhu, S., Torrieri, D. & Jajodia, S. "Self-healing wireless networks under insider jamming attacks". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 220-228, 2014.

Electronic edition     Bibtex   

[4] Albanese, M., Molinaro, C., Persia, F., Picariello, A. & Subrahmanian, V. "Discovering the top-k unexplained sequences in time-stamped observation data". IEEE Transactions on Knowledge and Data Engineering, 26(3):577-594, IEEE, 2014.

Electronic edition     Bibtex   

[5] Wang, L., Zhang, M., Jajodia, S., Singhal, A. & Albanese, M. "Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks". In Computer Security-ESORICS 2014, pages 494-511, Springer, 2014.

Electronic edition     Bibtex   

[6] Le, M., Kant, K. & Jajodia, S. "Consistency and enforcement of access rules in cooperative data sharing environment". Computers & Security, 41:3-18, Elsevier, 2014.

Electronic edition     Bibtex   

[7] Cybenko, G., Jajodia, S., Wellman, M.P. & Liu, P. "Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation (invited paper)". In Information Systems Security, pages 1-8, Springer, 2014.

Electronic edition     Bibtex   

[8] De Capitani Di Vimercati, S., Erbacher, R.F., Foresti, S., Jajodia, S., Livraga, G. & Samarati, P. "Encryption and Fragmentation for Data Confidentiality in the Cloud". In Foundations of Security Analysis and Design VII, pages 212-243, Springer, 2014.

Electronic edition     Bibtex   

[9] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities". In E-Business and Telecommunications, pages 322-340, Springer, 2014.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Integrity for distributed queries". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 364-372, 2014.

Electronic edition     Bibtex   

[11] Jajodia, S., Kant, K., Samarati, P., Singhal, A., Swarup, V. & Wang, C. "Secure cloud computing". Springer, 2014.

Electronic edition     Bibtex   

[12] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Securing Mission-Centric Operations in the Cloud". In Secure Cloud Computing, pages 239-259, Springer, 2014.

Electronic edition     Bibtex   

[13] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Optimizing integrity checks for join queries in the cloud". In Data and Applications Security and Privacy XXVIII, pages 33-48, Springer, 2014.(Best Paper Award).

Electronic edition     Bibtex    Award

[14] Sun, K. & Jajodia, S. "Protecting enterprise networks through attack surface expansion". In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, pages 29-32, 2014.

Electronic edition     Bibtex   

[15] Xu, Z., Wang, H. & Jajodia, S. "Gemini: An Emergency Line of Defense against Phishing Attacks". In 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (SRDS), pages 11-20, 2014.

Electronic edition     Bibtex   

[16] Shakarian, P., Paulo, D., Albanese, M. & Jajodia, S. "Keeping Intruders at Large: A Graph-Theoretic Approach to Reducing the Probability of Successful Network Intrusions". In Proc. 11th International Conference on Security and Cryptography (SECRYPT 2014), Vienna, Austria, August, 2014.

Electronic edition     Bibtex   

[17] Albanese, M., Battista, E., Jajodia, S. & Casola, V. "Manipulating the attacker's view of a system's attack surface". In 2014 IEEE Conference on Communications and Network Security (CNS), pages 472-480, 2014.

Electronic edition     Bibtex   

[18] Albanese, M. & Jajodia, S. "Formation of Awareness". In Cyber Defense and Situational Awareness, pages 47-62, Springer, 2014.

Electronic edition     Bibtex   

[19] Casola, V., De Benedictis, A. & Albanese, M. "A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices". In Integration of Reusable Systems, pages 299-324, Springer, 2014.

Electronic edition     Bibtex   

[20] Albanese, M., Erbacher, R.F., Jajodia, S., Molinaro, C., Persia, F., Picariello, A., Sperli, G. & Subrahmanian, V. "Recognizing Unexplained Behavior in Network Traffic". In Network Science and Cybersecurity, pages 39-62, Springer, 2014.

Electronic edition     Bibtex   

[21] Roy, S., Conti, M., Setia, S. & Jajodia, S. "Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact". IEEE Transactions on Information Forensics and Security, IEEE, 2014.

Electronic edition     Bibtex   

[22] Le, M., Kant, K. & Jajodia, S. "Enabling Collaborative Data Authorization Between Enterprise Clouds". In Secure Cloud Computing, pages 149-169, Springer, 2014.

Electronic edition     Bibtex   

[23] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Proof of Isolation for Cloud Storage". In Secure Cloud Computing, pages 95-121, Springer, 2014.

Electronic edition     Bibtex   

[24] Jajodia, S., Litwin, W. & SJ, T.S. "Scalable Distributed Virtual Data Structures". Academy of Science and Engineering (ASE), USA,copyright ASE 2014, 2014.

Electronic edition     Bibtex   

[25] Wang, L., Jajodia, S., Singhal, A., Cheng, P. & Noel, S. "k-Zero day safety: A network security metric for measuring the risk of unknown vulnerabilities". IEEE Transactions on Dependable and Secure Computing, 11(1):30-44, IEEE, 2014.

Electronic edition     Bibtex   

[26] Wang, L., Albanese, M. & Jajodia, S. "Network Hardening". Springer, 2014.

Electronic edition     Bibtex   

[27] Albanese, M., Cam, H. & Jajodia, S. "Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance". In Cybersecurity Systems for Human Cognition Augmentation, pages 47-60, Springer, 2014.

Electronic edition     Bibtex   

[28] De Capitani Di Vimercati, S., Foresti, S., Jajodia, S. & Samarati, P. "Database security and privacy". Chapman and Hall/CRC, 2014.

Electronic edition     Bibtex   

[29] Le, M., Kant, K. & Jajodia, S. "Consistent Query Plan Generation in Secure Cooperative Data Access". In Data and Applications Security and Privacy XXVIII, pages 227-242, Springer, 2014.

Electronic edition     Bibtex   

[30] Albanese, M., De Benedictis, A., Jajodia, S. & Torrieri, D. "A probabilistic framework for jammer identification in MANETs". Ad Hoc Networks, 14:84-94, Elsevier, 2014.

Electronic edition     Bibtex   

[31] Noel, S. & Jajodia, S. "Metrics suite for network attack graph analytics". In Proceedings of the 9th Annual Cyber and Information Security Research Conference, pages 5-8, 2014.

Electronic edition     Bibtex   

[+] 2013

[1] Albanese, M., Fayzullin, M., Shakarian, J. & Subrahmanian, V. "Automated Coding of Decision Support Variables". In Handbook of Computational Approaches to Counterterrorism, pages 69-80, Springer, 2013.

Electronic edition     Bibtex   

[2] Le, M., Kant, K. & Jajodia, S. "Rule enforcement with third parties in secure cooperative data access". In Data and Applications Security and Privacy XXVII, pages 282-288, Springer, 2013.

Electronic edition     Bibtex   

[3] Albanese, M. "Measuring trust in big data". In Algorithms and Architectures for Parallel Processing, pages 241-248, Springer, 2013.

Electronic edition     Bibtex   

[4] Albanese, M., Pugliese, A. & Subrahmanian, V. "Fast activity detection: Indexing for temporal stochastic automaton-based activity models". IEEE Transactions on Knowledge and Data Engineering, 25(2):360-373, IEEE, 2013.

Electronic edition     Bibtex   

[5] Wang, L., Wang, Z., Sun, K. & Jajodia, S. "Reducing Attack Surface with VM-Based Phantom Server". In 2013 IEEE Military Communications Conference, MILCOM 2013, pages 1429-1435, 2013.

Electronic edition     Bibtex   

[6] Nzoukou, W., Wang, L., Jajodia, S. & Singhal, A. "A Unified Framework for Measuring a Network's Mean Time-to-Compromise". In 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (SRDS), pages 215-224, 2013.

Electronic edition     Bibtex   

[7] Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S. & Mancini, L.V. "Preserving privacy against external and internal threats in WSN data aggregation". Telecommunication Systems, 52(4):2163-2176, Springer, 2013.

Electronic edition     Bibtex   

[8] di Vimercati, S.D.C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Enforcing dynamic write privileges in data outsourcing". Computers & security, 39:47-63, Elsevier, 2013.

Electronic edition     Bibtex   

[9] Casola, V., De Benedictis, A. & Albanese, M. "A moving target defense approach for protecting resource-constrained distributed devices". In 2013 IEEE 14th International Conference on Information Reuse and Integration (IRI), pages 22-29, 2013.

Electronic edition     Bibtex   

[10] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S. & Samarati, P. "Extending loose associations to multiple fragments". In Data and Applications Security and Privacy XXVII, pages 1-16, Springer, 2013.

Electronic edition     Bibtex   

[11] Yang, Y., Zhang, Y., Wang, A.H., Yu, M., Zang, W., Liu, P. & Jajodia, S. "Quantitative survivability evaluation of three virtual machine-based server architectures". Journal of Network and Computer Applications, 36(2):781-790, Elsevier, 2013.

Electronic edition     Bibtex   

[12] Xiao, Z. & Xiao, Y. "Security and privacy in cloud computing". IEEE Communications Surveys & Tutorials, 15(2):843-859, IEEE, 2013.

Electronic edition     Bibtex   

[13] Jajodia, S., Ghosh, A.K., Subrahmanian, V., Swarup, V., Wang, C. & Wang, X.S. "Moving Target Defense II". Springer, 2013.

Electronic edition     Bibtex   

[14] Albanese, M., Jajodia, S., Singhal, A. & Wang, L. "An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.". In SECRYPT, pages 207-218, 2013.(Best Paper Award).

Electronic edition     Bibtex    Award

[15] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "On information leakage by indexes over data fragments". In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pages 94-98, 2013.

Electronic edition     Bibtex   

[16] Jajodia, S., Litwin, W. & SJ, T.S. "Recoverable encryption through a noised secret over a large cloud". In Transactions on Large-Scale Data-and Knowledge-Centered Systems IX, pages 42-64, Springer, 2013.

Electronic edition     Bibtex   

[17] Chu, Z., Gianvecchio, S., Koehl, A., Wang, H. & Jajodia, S. "Blog or block: Detecting blog bots through behavioral biometrics". Computer Networks, 57(3):634-646, Elsevier, 2013.

Electronic edition     Bibtex   

[18] Albanese, M., Jajodia, S., Jhawar, R. & Piuri, V. "Reliable mission deployment in vulnerable distributed systems". In 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), pages 1-8, 2013.

Electronic edition     Bibtex   

[19] Deliri, S. & Albanese, M. "Security-Aware Scheduling of Mission Tasks under Temporal Constraints". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 452-457, 2013.

Electronic edition     Bibtex   

[20] Wang, Z., Sun, K., Jing, J. & Jajodia, S. "Verification of data redundancy in cloud storage". In Proceedings of the 2013 international workshop on Security in cloud computing, pages 11-18, 2013.

Electronic edition     Bibtex   

[21] De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S. & Samarati, P. "Integrity for join queries in the cloud". IEEE Transactions on Cloud Computing, 1(2):187-200, IEEE, 2013.

Electronic edition     Bibtex   

[22] Ardagna, C.A., Jajodia, S., Samarati, P. & Stavrou, A. "Providing users' anonymity in mobile hybrid networks". ACM Transactions on Internet Technology (TOIT), 12(3):7, ACM, 2013.

Electronic edition     Bibtex   

[23] De Benedictis, A., Koosha, B., Albanese, M. & Casola, V. "A probabilistic framework for distributed localization of attackers in manets". In Security and Trust Management, pages 49-64, Springer, 2013.

Electronic edition     Bibtex   

[24] Albanese, M., d'Acierno, A., Moscato, V., Persia, F. & Picariello, A. "A multimedia recommender system". ACM Transactions on Internet Technology (TOIT), 13(1):3, ACM, 2013.

Electronic edition     Bibtex   

[25] Albanese, M., Jajodia, S. & Molinaro, C. "A Logic Framework for Flexible and Security-Aware Service Composition". In 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pages 337-346, 2013.

Electronic edition     Bibtex   

[26] Albanese, M., De Benedictis, A., Jajodia, S. & Sun, K. "A moving target defense mechanism for manets based on identity virtualization". In 2013 IEEE Conference on Communications and Network Security (CNS), pages 278-286, 2013.

Electronic edition     Bibtex   

[27] Wang, Z., Sun, K., Jajodia, S. & Jing, J. "Terracheck: Verification of dedicated cloud storage". In Data and Applications Security and Privacy XXVII, pages 113-127, Springer, 2013.

Electronic edition     Bibtex