Year |
Citation |
Score |
2020 |
Zhang Y, Xiao J, Hao S, Wang H, Zhu S, Jajodia S. Understanding the Manipulation on Recommender Systems through Web Injection Ieee Transactions On Information Forensics and Security. 15: 3807-3818. DOI: 10.1109/Tifs.2019.2954737 |
0.342 |
|
2020 |
Li Y, Chen Z, Wang H, Sun K, Jajodia S. Understanding Account Recovery in the Wild and Its Security Implications Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.2975789 |
0.35 |
|
2020 |
Chen H, Han Q, Jajodia S, Lindelauf R, Subrahmanian VS, Xiong Y. Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare Ieee Systems Journal. 14: 3779-3790. DOI: 10.1109/Jsyst.2020.2964985 |
0.33 |
|
2019 |
Shah A, Farris KA, Ganesan R, Jajodia S. Vulnerability Selection for Remediation: An Empirical Analysis: The Journal of Defense Modeling and Simulation. 154851291987412. DOI: 10.1177/1548512919874129 |
0.388 |
|
2019 |
Shah A, Ganesan R, Jajodia S, Cam H. A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC Ieee Transactions On Information Forensics and Security. 14: 1857-1870. DOI: 10.1109/Tifs.2018.2886465 |
0.336 |
|
2019 |
Shah A, Ganesan R, Jajodia S, Cam H. Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC Ieee Transactions On Information Forensics and Security. 14: 1155-1170. DOI: 10.1109/Tifs.2018.2871744 |
0.345 |
|
2019 |
Chakraborty T, Jajodia S, Katz J, Picariello A, Sperli G, Subrahmanian VS. FORGE: A Fake Online Repository Generation Engine for Cyber Deception Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2898661 |
0.325 |
|
2019 |
Zhang M, Wang L, Jajodia S, Singhal A. Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2889086 |
0.371 |
|
2019 |
Borbor D, Wang L, Jajodia S, Singhal A. Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks Computer Communications. 145: 96-112. DOI: 10.1016/J.Comcom.2019.06.004 |
0.353 |
|
2019 |
Shah A, Ganesan R, Jajodia S. A methodology for ensuring fair allocation of CSOC effort for alert investigation International Journal of Information Security. 18: 199-218. DOI: 10.1007/S10207-018-0407-3 |
0.313 |
|
2018 |
Chakraborty T, Jajodia S, Park N, Pugliese A, Serra E, Subrahmanian V. Hybrid adversarial defense: Merging honeypots and traditional security methods1 Journal of Computer Security. 26: 615-645. DOI: 10.3233/Jcs-171094 |
0.356 |
|
2018 |
Albanese M, Jajodia S. A Graphical Model to Assess the Impact of Multi-Step Attacks: The Journal of Defense Modeling and Simulation. 15: 79-93. DOI: 10.1177/1548512917706043 |
0.304 |
|
2018 |
Shah A, Ganesan R, Jajodia S, Cam H. Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions Acm Transactions On Intelligent Systems and Technology. 9: 1-20. DOI: 10.1145/3173457 |
0.308 |
|
2018 |
Jajodia S, Park N, Serra E, Subrahmanian VS. SHARE Acm Transactions On Internet Technology. 18: 1-41. DOI: 10.1145/3137571 |
0.372 |
|
2018 |
Karuna P, Purohit H, Ganesan R, Jajodia S. Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception Ieee Intelligent Systems. 33: 16-25. DOI: 10.1109/Mis.2018.2877277 |
0.366 |
|
2017 |
Jajodia S, Park N, Pierazzi F, Pugliese A, Serra E, Simari GI, Subrahmanian VS. A Probabilistic Logic of Cyber Deception Ieee Transactions On Information Forensics and Security. 12: 2532-2544. DOI: 10.1109/Tifs.2017.2710945 |
0.379 |
|
2017 |
Shah A, Ganesan R, Jajodia S, Cam H. A methodology to measure and monitor level of operational effectiveness of a CSOC International Journal of Information Security. 17: 121-134. DOI: 10.1007/S10207-017-0365-1 |
0.308 |
|
2016 |
Jajodia S, Park N, Serra E, Subrahmanian V. Using temporal probabilistic logic for optimal monitoring of security events with limited resources Journal of Computer Security. 24: 735-791. DOI: 10.3233/Jcs-160555 |
0.35 |
|
2016 |
Le M, Kant K, Athamnah M, Jajodia S. Minimum cost rule enforcement for cooperative database access Journal of Computer Security. 24: 379-403. DOI: 10.3233/Jcs-160548 |
0.405 |
|
2016 |
Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P. Efficient integrity checks for join queries in the cloud Journal of Computer Security. 24: 347-378. DOI: 10.3233/Jcs-160545 |
0.393 |
|
2016 |
Zhang M, Wang L, Jajodia S, Singhal A, Albanese M. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks Ieee Transactions On Information Forensics and Security. 11: 1071-1086. DOI: 10.1109/Tifs.2016.2516916 |
0.415 |
|
2015 |
Vimercati SDCd, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P. Loose associations to increase utility in data publishing Journal of Computer Security. 23: 59-88. DOI: 10.3233/Jcs-140513 |
0.351 |
|
2015 |
Serra E, Jajodia S, Pugliese A, Rullo A, Subrahmanian VS. Pareto-optimal adversarial defense of enterprise systems Acm Transactions On Information and System Security. 17. DOI: 10.1145/2699907 |
0.396 |
|
2014 |
Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact Ieee Transactions On Information Forensics and Security. 9: 681-694. DOI: 10.1109/Tifs.2014.2307197 |
0.383 |
|
2014 |
Wang L, Jajodia S, Singhal A, Cheng P, Noel S. K-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities Ieee Transactions On Dependable and Secure Computing. 11: 30-44. DOI: 10.1109/Tdsc.2013.24 |
0.424 |
|
2014 |
Vimercati SDCd, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P. Fragmentation in Presence of Data Dependencies Ieee Transactions On Dependable and Secure Computing. 11: 510-523. DOI: 10.1109/Tdsc.2013.2295798 |
0.382 |
|
2014 |
Le M, Kant K, Jajodia S. Consistency and Enforcement of Access Rules in Cooperative Data Sharing Environment Computers & Security. 41: 3-18. DOI: 10.1016/J.Cose.2013.08.011 |
0.65 |
|
2013 |
Ardagna CA, Jajodia S, Samarati P, Stavrou A. Providing users' anonymity in mobile hybrid networks Acm Transactions On Internet Technology. 12. DOI: 10.1145/2461321.2461322 |
0.386 |
|
2013 |
Yang Y, Zhang Y, Wang AH, Yu M, Zang W, Liu P, Jajodia S. Quantitative survivability evaluation of three virtual machine-based server architectures Journal of Network and Computer Applications. 36: 781-790. DOI: 10.1016/J.Jnca.2012.12.006 |
0.306 |
|
2013 |
Vimercati SDCD, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P. Enforcing dynamic write privileges in data outsourcing Computers & Security. 39: 47-63. DOI: 10.1016/J.Cose.2013.01.008 |
0.408 |
|
2013 |
Chu Z, Gianvecchio S, Koehl A, Wang H, Jajodia S. Blog or block: Detecting blog bots through behavioral biometrics Computer Networks. 57: 634-646. DOI: 10.1016/J.Comnet.2012.10.005 |
0.359 |
|
2013 |
Zhang L, Zhang H, Conti M, Pietro R, Jajodia S, Mancini LV. Preserving privacy against external and internal threats in WSN data aggregation Telecommunication Systems. 52: 2163-2176. DOI: 10.1007/S11235-011-9539-8 |
0.366 |
|
2012 |
Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Psaila G, Samarati P. Integrating trust management and access control in data-intensive Web applications Acm Transactions On the Web. 6: 6. DOI: 10.1145/2180861.2180863 |
0.406 |
|
2012 |
Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks Ieee Transactions On Information Forensics and Security. 7: 1040-1052. DOI: 10.1109/Tifs.2012.2189568 |
0.356 |
|
2012 |
Chu Z, Gianvecchio S, Wang H, Jajodia S. Detecting automation of Twitter accounts: Are you a human, bot, or cyborg? Ieee Transactions On Dependable and Secure Computing. 9: 811-824. DOI: 10.1109/Tdsc.2012.75 |
0.335 |
|
2012 |
Le M, Wang Z, Jia Q, Stavrou A, Ghosh AK, Jajodia S. Trading elephants for ants: Efficient post-attack reconstitution Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 96: 460-469. DOI: 10.1007/978-3-642-31909-9_27 |
0.302 |
|
2012 |
Di Mauro A, Mei A, Jajodia S. Secure file allocation and caching in large-scale distributed systems Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 182-191. |
0.321 |
|
2011 |
Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective data outsourcing for enforcing privacy Journal of Computer Security. 19: 531-566. DOI: 10.3233/Jcs-2011-0422 |
0.388 |
|
2011 |
Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P. Authorization enforcement in distributed query evaluation Journal of Computer Security. 19: 751-794. DOI: 10.3233/Jcs-2010-0413 |
0.403 |
|
2011 |
Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764 |
0.331 |
|
2011 |
Gabrielli A, Mancini LV, Setia S, Jajodia S. Securing Topology Maintenance Protocols for Sensor Networks Ieee Transactions On Dependable and Secure Computing. 8: 450-465. DOI: 10.1109/Tdsc.2009.46 |
0.335 |
|
2011 |
Albanese M, Jajodia S, Pugliese A, Subrahmanian VS. Scalable detection of cyber attacks Communications in Computer and Information Science. 245: 9-18. DOI: 10.1007/978-3-642-27245-5_4 |
0.335 |
|
2010 |
Ciriani V, Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Combining fragmentation and encryption to protect privacy in data storage Acm Transactions On Information and System Security. 13: 22. DOI: 10.1145/1805974.1805978 |
0.415 |
|
2010 |
Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Encryption policies for regulating access to outsourced data Acm Transactions On Database Systems. 35: 12. DOI: 10.1145/1735886.1735891 |
0.408 |
|
2010 |
Zhu B, Setia S, Jajodia S, Roy S, Wang L. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks Ieee Transactions On Mobile Computing. 9: 913-926. DOI: 10.1109/Tmc.2010.40 |
0.335 |
|
2010 |
Zhu B, Setia S, Jajodia S, Wang L. Providing Witness Anonymity Under Peer-to-Peer Settings Ieee Transactions On Information Forensics and Security. 5: 324-336. DOI: 10.1109/Tifs.2010.2041821 |
0.386 |
|
2010 |
Chen S, Chen S, Wang X, Zhang Z, Jajodia S. An Application-Level Data Transparent Authentication Scheme without Communication Overhead Ieee Transactions On Computers. 59: 943-954. DOI: 10.1109/Tc.2010.80 |
0.58 |
|
2010 |
Ardagna CA, Vimercati SDCD, Foresti S, Grandison TW, Jajodia S, Samarati P. Access control for smarter healthcare using policy spaces Computers & Security. 29: 848-858. DOI: 10.1016/J.Cose.2010.07.001 |
0.362 |
|
2010 |
Jajodia S, Noel S. Topological vulnerability analysis Advances in Information Security. 46: 139-154. DOI: 10.1007/978-1-4419-0140-8_7 |
0.353 |
|
2009 |
Yao C, Wang L, Wang XS, Bettini C, Jajodia S. Evaluating privacy threats in released database views by symmetric indistinguishability Journal of Computer Security. 17: 5-42. DOI: 10.3233/Jcs-2009-0317 |
0.387 |
|
2009 |
Ren K, Lou W, Zhu B, Jajodia S. Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation Ieee Transactions On Vehicular Technology. 58: 2018-2029. DOI: 10.1109/Tvt.2008.2003961 |
0.389 |
|
2009 |
Fernández-Medina E, Jurjens J, Trujillo J, Jajodia S. Editorial: Model-Driven Development for secure information systems Information & Software Technology. 51: 809-814. DOI: 10.1016/J.Infsof.2008.05.010 |
0.342 |
|
2009 |
Ardagna CA, Jajodia S, Samarati P, Stavrou A. Privacy preservation over untrusted mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5599: 84-105. DOI: 10.1007/978-3-642-03511-1_4 |
0.39 |
|
2009 |
Bettini C, Mascetti S, Wang XS, Freni D, Jajodia S. Anonymity and Historical-Anonymity in Location-Based Services Lecture Notes in Computer Science. 5599: 1-30. DOI: 10.1007/978-3-642-03511-1_1 |
0.363 |
|
2009 |
Bettini C, Jajodia S, Samarati P, Wang XS. Privacy in Location-Based Applications Lecture Notes in Computer Science. 5599. DOI: 10.1007/978-3-642-03511-1 |
0.323 |
|
2009 |
Conti M, Zhang L, Roy S, Pietro RD, Jajodia S, Mancini LV. Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks Security and Communication Networks. 2: 195-213. DOI: 10.1002/Sec.95 |
0.343 |
|
2008 |
Wang L, Yao C, Singhal A, Jajodia S. Implementing interactive analysis of attack graphs using relational databases Journal of Computer Security. 16: 419-437. DOI: 10.3233/Jcs-2008-0327 |
0.567 |
|
2008 |
Chen S, Chen S, Guo H, Shen B, Jajodia S. Achieving simultaneous distribution control and privacy protection for Internet media delivery Acm Transactions On Multimedia Computing, Communications, and Applications. 4: 9. DOI: 10.1145/1352012.1352013 |
0.585 |
|
2008 |
Sengar H, Wang H, Wijesekera D, Jajodia S. Detecting voIP floods using the hellinger distance Ieee Transactions On Parallel and Distributed Systems. 19: 794-805. DOI: 10.1109/Tpds.2007.70786 |
0.362 |
|
2008 |
Noel S, Jajodia S. Optimal IDS sensor placement and alert prioritization using attack graphs Journal of Network and Systems Management. 16: 259-275. DOI: 10.1007/S10922-008-9109-X |
0.307 |
|
2007 |
Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401 |
0.528 |
|
2007 |
Zhu S, Setia S, Jajodia S, Ning P. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks Acm Transactions On Sensor Networks. 3: 14. DOI: 10.1145/1267060.1267062 |
0.383 |
|
2007 |
Guo H, Li Y, Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data Information Sciences. 177: 281-298. DOI: 10.1016/J.Ins.2006.03.014 |
0.572 |
|
2007 |
Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective Data Encryption in Outsourced Dynamic Environments Electronic Notes in Theoretical Computer Science. 168: 127-142. DOI: 10.1016/J.Entcs.2006.11.003 |
0.415 |
|
2007 |
Zhu S, Yao C, Liu D, Setia S, Jajodia S. Efficient security mechanisms for overlay multicast based content delivery Computer Communications. 30: 793-806. DOI: 10.1016/J.Comcom.2006.10.003 |
0.608 |
|
2007 |
Wang L, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 98-112. |
0.324 |
|
2006 |
Zhu S, Setia S, Xu S, Jajodia S. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks Journal of Computer Security. 14: 301-325. DOI: 10.3233/Jcs-2006-14401 |
0.387 |
|
2006 |
Zhu B, Jajodia S, Kankanhalli MS. Building trust in peer-to-peer systems: a review International Journal of Security and Networks. 1: 103-112. DOI: 10.1504/Ijsn.2006.010827 |
0.333 |
|
2006 |
Zhu S, Setia S, Jajodia S. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks Acm Transactions On Sensor Networks. 2: 500-528. DOI: 10.1145/1218556.1218559 |
0.366 |
|
2006 |
Pamula J, Jajodia S, Ammann P, Swarup V. A weakest-adversary security metric for network configuration security analysis Proceedings of the 2nd Acm Workshop On Quality of Protection, Qop'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 31-38. DOI: 10.1145/1179494.1179502 |
0.3 |
|
2006 |
Chen S, Wang X, Jajodia S. On the anonymity and traceability of peer-to-peer VoIP calls Ieee Network. 20: 32-37. DOI: 10.1109/Mnet.2006.1705881 |
0.57 |
|
2006 |
Farkas C, Brodsky A, Jajodia S. Unauthorized inferences in semistructured databases Information Sciences. 176: 3269-3299. DOI: 10.1016/J.Ins.2006.01.004 |
0.404 |
|
2006 |
Guo H, Li Y, Liu A, Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations Information Sciences. 176: 1350-1378. DOI: 10.1016/J.Ins.2005.06.003 |
0.571 |
|
2006 |
Li Y, Zhu S, Wang XS, Jajodia S. Looking into the seeds of time: Discovering temporal patterns in large transaction sets Information Sciences. 176: 1003-1031. DOI: 10.1016/J.Ins.2005.01.019 |
0.516 |
|
2006 |
Wang L, Noel S, Jajodia S. Minimum-cost network hardening using attack graphs Computer Communications. 29: 3812-3824. DOI: 10.1016/J.Comcom.2006.06.018 |
0.36 |
|
2006 |
Wang L, Liu A, Jajodia S. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts Computer Communications. 29: 2917-2933. DOI: 10.1016/J.Comcom.2006.04.001 |
0.34 |
|
2006 |
Singhal A, Jajodia S. Data warehousing and data mining techniques for intrusion detection systems Distributed and Parallel Databases. 20: 149-166. DOI: 10.1007/S10619-006-9496-5 |
0.4 |
|
2006 |
Zannone N, Jajodia S, Wijesekera D. Creating objects in the flexible authorization framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 1-14. DOI: 10.1007/11805588_1 |
0.383 |
|
2005 |
Ceselli A, Damiani E, Vimercati SDCD, Jajodia S, Paraboschi S, Samarati P. Modeling and assessing inference exposure in encrypted databases Acm Transactions On Information and System Security. 8: 119-152. DOI: 10.1145/1053283.1053289 |
0.458 |
|
2005 |
Li Y, Swarup V, Jajodia S. Fingerprinting relational databases: schemes and specialties Ieee Transactions On Dependable and Secure Computing. 2: 34-45. DOI: 10.1109/Tdsc.2005.12 |
0.54 |
|
2005 |
Bettini C, Wang XS, Jajodia S. Information release control: A learning-based architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3360: 176-198. DOI: 10.1007/978-3-540-30567-5_7 |
0.321 |
|
2004 |
Smith K, Jajodia S, Swarup V, Hoyt J, Hamilton G, Faatz D, Cornett T. Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility. Neuroimage. 22: 1646-56. PMID 15275921 DOI: 10.1016/J.Neuroimage.2004.03.048 |
0.392 |
|
2004 |
Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in data cubes Journal of Computer Security. 12: 655-692. DOI: 10.3233/Jcs-2004-12501 |
0.391 |
|
2004 |
Bettini C, Jajodia S, Wang XS, Wijesekera D. Reasoning with advanced policy rules and its application to access control International Journal On Digital Libraries. 4: 156-170. DOI: 10.1007/S00799-004-0078-8 |
0.344 |
|
2004 |
Zhu S, Jajodia S. Scalable Group Rekeying for Secure Multicast: A Survey Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2918: 1-10. DOI: 10.1007/978-3-540-24604-6_1 |
0.349 |
|
2004 |
Wang L, Jajodia S, Wijesekera D. Securing OLAP data cubes against privacy breaches Proceedings - Ieee Symposium On Security and Privacy. 2004: 161-175. |
0.347 |
|
2003 |
Barbará D, Goel R, Jajodia S. A checksum-based corruption detection technique Journal of Computer Security. 11: 315-329. DOI: 10.3233/Jcs-2003-11303 |
0.759 |
|
2003 |
Wijesekera D, Jajodia S, Parisi-Presicce F, Hagström A. Removing permissions in the flexible authorization framework Acm Transactions On Database Systems. 28: 209-229. DOI: 10.1145/937598.937599 |
0.332 |
|
2003 |
Wijesekera D, Jajodia S. A propositional policy algebra for access control Acm Transactions On Information and System Security. 6: 286-325. DOI: 10.1145/762476.762481 |
0.335 |
|
2003 |
Mei A, Mancini LV, Jajodia S. Secure dynamic fragment and replica allocation in large-scale distributed file systems Ieee Transactions On Parallel and Distributed Systems. 14: 885-896. DOI: 10.1109/Tpds.2003.1233711 |
0.384 |
|
2003 |
Zhu S, Setia S, Jajodia S. Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast Lecture Notes in Computer Science. 107-118. DOI: 10.1007/978-3-540-39405-1_10 |
0.378 |
|
2002 |
Li Y, Wu N, Sean Wang X, Jajodia S. Enhancing profiles for anomaly detection using time granularities Journal of Computer Security. 10: 137-157. DOI: 10.3233/Jcs-2002-101-206 |
0.636 |
|
2002 |
Farkas C, Jajodia S. The inference problem: a survey Sigkdd Explorations. 4: 6-11. DOI: 10.1145/772862.772864 |
0.371 |
|
2002 |
Ammann P, Jajodia S, Liu P. Recovery from malicious transactions Ieee Transactions On Knowledge and Data Engineering. 14: 1167-1185. DOI: 10.1109/Tkde.2002.1033782 |
0.377 |
|
2002 |
Ning P, Wang XS, Jajodia S. An algebraic representation of calendars Annals of Mathematics and Artificial Intelligence. 36: 5-38. DOI: 10.1023/A:1015835418881 |
0.303 |
|
2002 |
Bettini C, Wang XS, Jajodia S. Temporal reasoning in workflow systems Distributed and Parallel Databases. 11: 269-306. DOI: 10.1023/A:1014048800604 |
0.302 |
|
2002 |
Setia S, Zhu S, Jajodia S. A comparative performance analysis of reliable group rekey transport protocols for secure multicast Performance Evaluation. 49: 21-41. DOI: 10.1016/S0166-5316(02)00130-X |
0.377 |
|
2002 |
Ning P, Jajodia S, Wang XS. Design and implementation of a decentralized prototype system for detecting distributed attacks Computer Communications. 25: 1374-1391. DOI: 10.1016/S0140-3664(02)00039-7 |
0.358 |
|
2002 |
Bettini C, Wang XS, Jajodia S. Solving multi-granularity temporal constraint networks Artificial Intelligence. 140: 107-152. DOI: 10.1016/S0004-3702(02)00223-0 |
0.361 |
|
2001 |
Samarati P, Reiter MK, Jajodia S. An authorization model for a public key management service Acm Transactions On Information and System Security. 4: 453-482. DOI: 10.1145/503339.503343 |
0.387 |
|
2001 |
Ning P, Jajodia S, Wang XS. Abstraction-based intrusion detection in distributed environments Acm Transactions On Information and System Security. 4: 407-452. DOI: 10.1145/503339.503342 |
0.399 |
|
2001 |
Jajodia S, Samarati P, Sapino ML, Subrahmanian VS. Flexible support for multiple access control policies Acm Transactions On Database Systems. 26: 214-260. DOI: 10.1145/383891.383894 |
0.354 |
|
2001 |
Jajodia S, Wijesekera D. Security in Federated Database Systems Information Security Technical Report. 6: 69-79. DOI: 10.1016/S1363-4127(01)00208-4 |
0.363 |
|
2001 |
Barbará D, Goel R, Jajodia S. Protecting file systems against corruption using checksums Ifip Advances in Information and Communication Technology. 73: 113-124. |
0.352 |
|
2000 |
Brodsky A, Farkas C, Jajodia S. Secure databases: constraints, inference channels, and monitoring disclosures Ieee Transactions On Knowledge and Data Engineering. 12: 900-919. DOI: 10.1109/69.895801 |
0.39 |
|
2000 |
Ray I, Mancini LV, Jajodia S, Bertino E. ASEP: a secure and flexible commit protocol for MLS distributed database systems Ieee Transactions On Knowledge and Data Engineering. 12: 880-899. DOI: 10.1109/69.895800 |
0.4 |
|
2000 |
Mancini LV, Ray I, Jajodia S, Bertino E. Flexible Transaction Dependencies in Database Systems Distributed and Parallel Databases. 8: 399-446. DOI: 10.1023/A:1008738705440 |
0.398 |
|
2000 |
Liu P, Ammann P, Jajodia S. Rewriting histories: Recovering from malicious transactions Distributed and Parallel Databases. 8: 7-40. DOI: 10.1023/A:1008731200105 |
0.367 |
|
2000 |
Ning P, Wang XS, Jajodia S. Modeling requests among cooperating intrusion detection systems Computer Communications. 23: 1702-1715. DOI: 10.1016/S0140-3664(00)00256-5 |
0.43 |
|
2000 |
Ray I, Ammann P, Jajodia S. Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity Information Sciences. 129: 155-195. DOI: 10.1016/S0020-0255(00)00062-1 |
0.361 |
|
2000 |
Liu P, Jajodia S, McCollum CD. Intrusion confinement by isolation in information systems Journal of Computer Security. 8: 243-279. DOI: 10.1007/978-0-387-35508-5_1 |
0.366 |
|
2000 |
Barbara D, Goel R, Jajodia S. Using checksums to detect data corruption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1777: 136-149. |
0.31 |
|
1999 |
Bertino E, Jajodia S, Samarati P. A flexible authorization mechanism for relational data management systems Acm Transactions On Information Systems. 17: 101-140. DOI: 10.1145/306686.306687 |
0.325 |
|
1999 |
Jajodia S, Ammann P, McCollum CD. Surviving information warfare attacks Computer. 32. DOI: 10.1109/2.755006 |
0.345 |
|
1999 |
Zhang C, Lam KY, Jajodia S. Scalable threshold closure Theoretical Computer Science. 226: 185-206. DOI: 10.1016/S0304-3975(99)00072-9 |
0.374 |
|
1998 |
Ray I, Ammann P, Jajodia S. A semantic-based transaction processing model for multilevel transactions[1]An earlier version of this paper appeared in IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 74-84. Journal of Computer Security. 6: 181-217. DOI: 10.3233/Jcs-980108 |
0.419 |
|
1998 |
Wang XS, Jajodia S, Mohavni S. Temporal Mediators: Supporting Uniform Accesses To Heterogeneous Temporal Information International Journal On Artificial Intelligence Tools. 7: 319-339. DOI: 10.1142/S0218213098000159 |
0.335 |
|
1998 |
Johnson NF, Jajodia S. Steganalysis: the investigation of hidden information Information Technology. 113-116. DOI: 10.1109/It.1998.713394 |
0.325 |
|
1998 |
Ammann P, Jajodia S, Liu P. A fault tolerance approach to survivability Computational Statistics & Data Analysis. 204-212. DOI: 10.1109/Csda.1998.798367 |
0.329 |
|
1998 |
Bettini C, Wang XS, Jajodia S. Temporal semantic assumptions and their use in databases Ieee Transactions On Knowledge and Data Engineering. 10: 277-296. DOI: 10.1109/69.683757 |
0.408 |
|
1998 |
Bettini C, Wang XS, Jajodia S, Lin J-. Discovering frequent event patterns with multiple granularities in time sequences Ieee Transactions On Knowledge and Data Engineering. 10: 222-237. DOI: 10.1109/69.683754 |
0.311 |
|
1998 |
Bertino E, Jajodia S, Mancini L, Ray I. Advanced transaction processing in multilevel secure file stores Ieee Transactions On Knowledge and Data Engineering. 10: 120-135. DOI: 10.1109/69.667095 |
0.402 |
|
1998 |
Bettini C, Wang XS, Jajodia S. A general framework for time granularity and its application to temporal reasoning Annals of Mathematics and Artificial Intelligence. 22: 29-58. DOI: 10.1023/A:1018938007511 |
0.348 |
|
1998 |
Jensen CS, Dyreson CE, Bohlen M, Clifford J, Elmasri R, Gadia SK, Grandi F, Hayes P, Jajodia S, Käfer W, Kline N, Lorentzos N, Mitsopoulos Y, Montanari A, Nonen D, et al. The consensus glossary of temporal database concepts - february 1998 version Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1399: 367-405. DOI: 10.1007/Bfb0053710 |
0.341 |
|
1998 |
Wu Y, Jajodia S, Wang XS. Temporal database bibliography update Lecture Notes in Computer Science. 338-366. DOI: 10.1007/Bfb0053709 |
0.311 |
|
1997 |
Wolfson O, Jajodia S, Huang Y. An Adaptive Data Replication Algorithm Acm Transactions On Database Systems. 22: 255-314. DOI: 10.1145/249978.249982 |
0.328 |
|
1997 |
Ammann P, Jajodia S, Ray I. Applying formal methods to semantic-based decomposition of transactions Acm Transactions On Database Systems. 22: 215-254. DOI: 10.1145/249978.249981 |
0.397 |
|
1997 |
Wang XS, Bettini C, Brodsky A, Jajodia S. Logical design for temporal databases with multiple granularities Acm Transactions On Database Systems. 22: 115-170. DOI: 10.1145/249978.249979 |
0.324 |
|
1997 |
Atluri V, Jajodia S, Bertino E. Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions Ieee Transactions On Knowledge and Data Engineering. 9: 697-708. DOI: 10.1109/69.634749 |
0.407 |
|
1997 |
Bertino E, Samarati P, Jajodia S. An extended authorization model for relational databases Ieee Transactions On Knowledge and Data Engineering. 9: 85-101. DOI: 10.1109/69.567051 |
0.354 |
|
1997 |
Ammann P, Jajodia S. Semantics-based transaction processing: Satisfying conflicting objectives Ieee Concurrency. 5: 8-10. DOI: 10.1109/4434.588269 |
0.344 |
|
1996 |
Jajodia S. Managing security and privacy of information Acm Computing Surveys. 28: 79. DOI: 10.1145/242224.242327 |
0.34 |
|
1996 |
Jajodia S. Database security and privacy Acm Computing Surveys. 28: 129-131. DOI: 10.1145/234313.234370 |
0.394 |
|
1996 |
Ammann P, Jajodia S, Frankl PG. Globally consistent event ordering in one-directional distributed environments Ieee Transactions On Parallel and Distributed Systems. 7: 665-670. DOI: 10.1109/71.506704 |
0.339 |
|
1996 |
Atluri V, Jajodia S, Bertino E. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases Ieee Transactions On Knowledge and Data Engineering. 8: 839-854. DOI: 10.1109/69.542034 |
0.452 |
|
1996 |
Samarati P, Bertino E, Jajodia S. An authorization model for a distributed hypertext system Ieee Transactions On Knowledge and Data Engineering. 8: 555-562. DOI: 10.1109/69.536249 |
0.364 |
|
1996 |
Smith KP, Blaustein BT, Jajodia S, Notargiacomo L. Correctness criteria for multilevel secure transactions Ieee Transactions On Knowledge and Data Engineering. 8: 32-45. DOI: 10.1109/69.485627 |
0.455 |
|
1995 |
Ammann P, Jaeckle F, Jajodia S. Concurrency control in a secure multilevel database via a two-snapshot algorithm Journal of Computer Security. 3. DOI: 10.3233/Jcs-1994/1995-32-302 |
0.383 |
|
1995 |
Ammann P, Jajodia S, Mavuluri P. On-The-FIy Reading of Entire Databases Ieee Transactions On Knowledge and Data Engineering. 7: 834-838. DOI: 10.1109/69.469836 |
0.362 |
|
1995 |
Ammann P, Jajodia S, Atluri V. The Partitioned Synchronization Rule for Planar Extendible Partial Orders Ieee Transactions On Knowledge and Data Engineering. 7: 797-808. DOI: 10.1109/69.469819 |
0.386 |
|
1995 |
Bertino E, Jajodia S, Samarati P. Database security: Research and practice Information Systems. 20: 537-556. DOI: 10.1016/0306-4379(95)00029-4 |
0.41 |
|
1995 |
Sean Wang X, Jajodia S, Subrahmanian VS. Temporal modules: An approach toward federated temporal databases Information Sciences. 82: 103-128. DOI: 10.1016/0020-0255(94)00062-G |
0.32 |
|
1995 |
Wolfson O, Jajodia S. An algorithm for dynamic data allocation in distributed systems Information Processing Letters. 53: 113-119. DOI: 10.1016/0020-0190(94)00182-X |
0.329 |
|
1993 |
Atluri V, Jajodia S, Bertino E. Achieving stricter correctness requirements in multilevel secure database management systems Journal of Computer Security. 2: 311-351. DOI: 10.3233/Jcs-1993-2404 |
0.439 |
|
1993 |
Ammann P, Jajodia S. Distributed Timestamp Generation in Planar Lattice Networks Acm Transactions On Computer Systems (Tocs). 11: 205-225. DOI: 10.1145/152864.152865 |
0.35 |
|
1993 |
Sandhu RS, Jajodia S. Limitations of relational data base access controls Information Systems Security. 2: 57-72. DOI: 10.1080/19393559308551345 |
0.383 |
|
1993 |
Jajodia S, Mukkamala R. Measuring the effect of commutative transactions on distributed database performance Information Sciences. 68: 91-111. DOI: 10.1016/0020-0255(93)90023-F |
0.35 |
|
1992 |
Sandhu RS, Jajodia S. Eliminating polyinstantiation securely Computers and Security. 11: 547-562. DOI: 10.1016/0167-4048(92)90191-S |
0.365 |
|
1991 |
Sandhu R, Jajodia S. Integrity principles and mechanisms in database management systems Computers and Security. 10: 413-427. DOI: 10.1016/0167-4048(91)90068-O |
0.345 |
|
1991 |
Jajodia S, Mutchler D. A short technical paper: Determining whether a vote assignment is dominated Information Sciences. 56: 279-282. DOI: 10.1016/0020-0255(91)90034-R |
0.302 |
|
1990 |
Jajodia S, Mutchler D. Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database Acm Transactions On Database Systems (Tods). 15: 230-280. DOI: 10.1145/78922.78926 |
0.314 |
|
1989 |
Jajodia S, Mutchler D. A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting Ieee Transactions On Knowledge and Data Engineering. 1: 459-469. DOI: 10.1109/69.43421 |
0.368 |
|
1989 |
Jajodia S, Mutchler D. A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability Ieee Transactions On Software Engineering. 15: 39-46. DOI: 10.1109/32.21724 |
0.333 |
|
1986 |
Jajodia S. RECOGNIZING MULTIVALUED DEPENDENCIES IN RELATION SCHEMAS Computer Journal. 29: 458-459. DOI: 10.1093/Comjnl/29.5.458 |
0.316 |
|
Show low-probability matches. |