Author: Sushil Jajodia

Publication Overview

Publication period start: 2007
Number of co-authors: 15

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Bertino, Elisa, Jajodia, Sushil, Samarati, Pierangela (1999): A flexible authorization mechanism for relational data management systems. In ACM Transactions on Information Systems, 17 (2) pp. 101-140. https://dl.acm.org/doi/10.1145/306686.306687
Jajodia, Sushil, Ammann, Paul, McCollum, Catherine D. (1999): Surviving Information Warfare Attacks. In IEEE Computer, 32 (4) pp. 57-63.
Jajodia, Sushil, McCollum, Catherine D., Ammann, Paul (1999): Trusted Recovery. In Communications of the ACM, 42 (7) pp. 71-75.
Johnson, Neil F., Jajodia, Sushil (1998): Exploring Steganography: Seeing the Unseen. In IEEE Computer, 31 (2) pp. 26-34.
Smith, Kenneth, Swarup, Vipin, Jajodia, Sushil, Faatz, Donald B., Cornett, Todd, Hoyt, Jeff (2003): Securely sharing neuroimagery. In: Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management November 2-8, 2003, New Orleans, Louisiana, USA. pp. 375-377. https://doi.acm.org/10.1145/956863.956934
Noel, Steven, Jacobs, Michael, Kalapa, Pramod, Jajodia, Sushil (2005): Multiple Coordinated Views for Network Attack Graphs. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 12. https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.14
Noel, Steven, Jajodia, Sushil (2004): Managing attack graph complexity through visual hierarchical aggregation. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 109-118. https://doi.acm.org/10.1145/1029208.1029225
Bettini, Claudio, Jajodia, Sushil, Pareschi, Linda (2007): Anonymity and Diversity in LBS: A Preliminary Investigation. In: PerCom Workshops 2007 - Fifth Annual IEEE International Conference on Pervasive Computing and Communications 19-23 March, 2007, White Plains, New York, USA. pp. 577-580. https://dx.doi.org/10.1109/PERCOMW.2007.23
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel stuck? Want Freedom?

Get one powerful email each week, like 325,720 others.

Learn to design a life you love.

Next email in:
5
days
4
hrs
6
mins
20
secs