Duminda Wijesekera - Publications

Affiliations: 
George Mason University, Washington, DC 
Area:
Computer Science

183 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Heinl MP, Yu B, Wijesekera D. A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond The Journal of Digital Forensics, Security and Law. 14: 2. DOI: 10.15394/Jdfsl.2019.1546  0.32
2017 Kacem T, Barreto A, Wijesekera D, Costa P. ADS-Bsec: A novel framework to secure ADS-B Ict Express. 3: 160-163. DOI: 10.1016/J.Icte.2017.11.006  0.6
2016 Kacem T, Wijesekera D, Costa P, Carvalho J, Monteiro M, Barreto A. Secure ADS-B design & evaluation 2015 Ieee International Conference On Vehicular Electronics and Safety, Icves 2015. 213-218. DOI: 10.1109/ICVES.2015.7396920  1
2016 Hazzazi N, Albasri J, Yu B, Wijesekera D, Costa P. Using Temporal Logic to Verify the Blood Supply Chain Safety Emerging Trends in Applications and Infrastructures For Computational Biology, Bioinformatics, and Systems Biology: Systems and Applications. 467-492. DOI: 10.1016/B978-0-12-804203-8.00031-6  1
2015 Kacem T, Carvalho J, Wijesekera D, Costa P, Monteiro M, Barreto A. Risk-adaptive Engine for Secure ADS-B Broadcasts Sae Technical Papers. 2015. DOI: 10.4271/2015-01-2520  1
2015 Singhal A, Liu C, Wijesekera D. A logic based network forensics model for evidence analysis Proceedings of the Acm Conference On Computer and Communications Security. 2015: 1677. DOI: 10.1145/2810103.2810106  1
2015 Kodali N, Farkas C, Wijesekera D. Creating non-decomposable stream bundles in multimedia web services using uSMIL Proceedings of the 2004 Workshop On Secure Web Service, Sws 2004. 67-76. DOI: 10.1145/1111348.1111356  1
2015 Kacem T, Wijesekera D, Costa P, Carvalho J, Monteiro M, Barreto A. Key distribution mechanism in secure ADS-B networks Icns 2015 - Innovation in Operations, Implementation Benefits and Integration of the Cns Infrastructure, Conference Proceedings. DOI: 10.1109/ICNSURV.2015.7121326  1
2015 Kacem T, Wijesekera D, Costa P. Integrity and authenticity of ADS-B broadcasts Ieee Aerospace Conference Proceedings. 2015. DOI: 10.1109/AERO.2015.7119293  1
2015 Liu C, Singhal A, Wijesekera D. A logic-based network forensic model for evidence analysis Ifip Advances in Information and Communication Technology. 462: 129-145. DOI: 10.1007/978-3-319-24123-4_8  1
2015 Jajodia S, Wijesekera D. Preface Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3654.  1
2015 Mumford A, Wijesekera D, Costa P. Toward representing and recognizing cyber-physical elements in competition using event semantics Ceur Workshop Proceedings. 1523: 82-89.  1
2015 Yu B, Wijesekera D, Costa P, Hiremagalore S. Genetic counseling using workflow-based EMRs Ceur Workshop Proceedings. 1523: 66-73.  1
2015 Monteiro M, Barreto A, Kacem T, Wijesekera D, Costa P. Detecting malicious ADS-B transmitters using a low-bandwidth sensor network 2015 18th International Conference On Information Fusion, Fusion 2015. 1696-1701.  1
2014 Abadie A, Bandara D, Wijesekera D. Risk engine design as a key security enhancement to the standard architecture for cognitive radio Handbook of Research On Software-Defined and Cognitive Radio Technologies For Dynamic Spectrum Management. 2: 792-812. DOI: 10.4018/978-1-4666-6571-2.ch030  1
2014 Liu C, Singhal A, Wijesekera D. Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction The Journal of Digital Forensics, Security and Law. 9: 181-196. DOI: 10.15394/Jdfsl.2014.1180  0.32
2014 Abadie A, Bandara D, Wijesekera D. A composite risk model for railroad operations utilizing positive train control (PTC) 2014 Joint Rail Conference, Jrc 2014. DOI: 10.1115/JRC2014-3730  1
2014 Schumann MA, Drusinsky D, Michael JB, Wijesekera D. Modeling human-in-the-loop security analysis and decision-making processes Ieee Transactions On Software Engineering. 40: 154-166. DOI: 10.1109/Tse.2014.2302433  1
2014 Abadie A, Bandara D, Wijesekera D. Instituting a risk engine in cognitive radio Proceedings - 2014 National Wireless Research Collaboration Symposium: Rapidly Transitioning Wireless Spectrum-Using Research to Deployable Innovations, Nwrcs 2014. 43-48. DOI: 10.1109/NWRCS.2014.12  1
2014 Yu B, Wijesekera D, Costa P. Consent-based Workflow Control in EMRs☆ Procedia Technology. 16: 1434-1445. DOI: 10.1016/J.Protcy.2014.10.163  0.6
2014 Hartong M, Goel R, Wijesekera D. Security requirement derivation by noun-verb analysis of use-misuse case relationships: A case study using positive train control Innovations in Systems and Software Engineering. 10: 103-122. DOI: 10.1007/S11334-013-0227-6  1
2014 Mehmet M, Güneştaş M, Wijesekera D. Dynamic risk model of money laundering Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8418: 3-20. DOI: 10.1007/978-3-319-07076-6_1  1
2014 Mumford A, Wijesekera D. Toward the discovery and extraction of money laundering evidence from arbitrary data formats using combinatory reductions Ceur Workshop Proceedings. 1304: 32-39.  1
2014 Ababneh M, Athamnah M, Wijesekera D, Costa P. An automated dialog system for conducting security interviews for access control Ifip Advances in Information and Communication Technology. 441: 111-125.  1
2014 Liu C, Singhal A, Wijesekera D. A model towards using evidence from security events for network attack analysis Proceedings of the 11th International Workshop On Security in Information Systems, Wosis 2014 - in Conjunction With Iceis 2014. 83-95.  1
2014 Yu B, Wijesekera D, Costa P. An ontology for medical treatment consent Ceur Workshop Proceedings. 1304: 72-79.  1
2014 Ababneh M, Wijesekera D, Michael JB. A policy-based dialogue system for physical access control Ceur Workshop Proceedings. 966: 57-63.  1
2014 Kacem T, Wijesekera D, Costa P, Barreto A. Security requirements analysis of ADS-B networks Ceur Workshop Proceedings. 1304: 40-47.  1
2013 Mehmet M, Wijesekera D. Using dynamic risk estimation & social network analysis to detect money laundering evolution 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 310-315. DOI: 10.1109/THS.2013.6699020  1
2013 Abadie A, Wijesekera D. Leveraging an inventory of the cognitive radio attack surface Proceedings of the 2012 Ase International Conference On Cyber Security, Cybersecurity 2012. 136-143. DOI: 10.1109/CyberSecurity.2012.24  1
2013 Yu B, Wijesekera D. Building Dialysis Workflows into EMRs Procedia Technology. 9: 985-995. DOI: 10.1016/J.Protcy.2013.12.110  0.32
2013 Ababneh M, Wijesekera D. Dynamically Generating Policy Compliant Dialogues for Physical Access Control Procedia Technology. 9: 361-370. DOI: 10.1016/J.Protcy.2013.12.040  1
2013 Liu C, Singhal A, Wijesekera D. Creating Integrated Evidence Graphs for Network Forensics Ifip Advances in Information and Communication Technology. 410: 227-241. DOI: 10.1007/978-3-642-41148-9_16  1
2013 Mehmet M, Wijesekera D. Data analytics to detect evolving money laundering Ceur Workshop Proceedings. 1097: 71-78.  1
2013 Ababneh M, Wijesekera D. An ontological inference driven interactive voice response system Ceur Workshop Proceedings. 1097: 125-132.  1
2013 Ngo P, Wijesekera D. Navigation assistance framework for emergencies Ceur Workshop Proceedings. 1097: 149-156.  1
2012 Hartong M, Wijesekera D. U.S. Regulatory requirements for positive train control systems Railway Safety, Reliability, and Security: Technologies and Systems Engineering. 1-21. DOI: 10.4018/978-1-4666-1643-1.ch001  1
2012 Bandara DS, Bondi AB, Goel R, Pilapitiya N, Wijesekera D. Developing a framework to address performance and security protocol concerns in identity management for interoperable Positive Train Control systems 2012 Joint Rail Conference, Jrc 2012. 389-396. DOI: 10.1115/JRC2012-74113  1
2012 Liu C, Singhal A, Wijesekera D. Mapping evidence graphs to attack graphs Wifs 2012 - Proceedings of the 2012 Ieee International Workshop On Information Forensics and Security. 121-126. DOI: 10.1109/WIFS.2012.6412636  1
2012 Mohamed K, Wijesekera D. A lightweight framework for web services implementations on mobile devices Proceedings - 2012 Ieee 1st International Conference On Mobile Services, Ms 2012. 64-71. DOI: 10.1109/MobServ.2012.19  1
2012 Abadie A, Wijesekera D. Cognitive radio technologies: Envisioning the realization of network-centric warfare 2012 Military Communications and Information Systems Conference, Milcis 2012 - Proceedings. DOI: 10.1109/MilCIS.2012.6380670  1
2012 Melaragno AP, Bandara D, Wijesekera D, Michael JB. Securing the ZigBee protocol in the smart grid Computer. 45: 92-94. DOI: 10.1109/Mc.2012.146  1
2012 Liu C, Singhal A, Wijesekera D. Using attack graphs in forensic examinations Proceedings - 2012 7th International Conference On Availability, Reliability and Security, Ares 2012. 596-603. DOI: 10.1109/ARES.2012.58  1
2012 Mohamed K, Wijesekera D. Performance analysis of web services on mobile devices Procedia Computer Science. 10: 744-751. DOI: 10.1016/J.Procs.2012.06.095  1
2012 Yang X, Dantu R, Wijesekera D. Security issues in VoIP telecommunication networks Handbook On Securing Cyber-Physical Critical Infrastructure. 763-789. DOI: 10.1016/B978-0-12-415815-3.00030-3  1
2012 Ngo P, Wijesekera D. Emergency messages in the commercial mobile alert system Ifip Advances in Information and Communication Technology. 390: 171-184. DOI: 10.1007/978-3-642-35764-0_13  1
2012 Hartong M, Goel R, Wijesekera D. Transportation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7130: 330-355. DOI: 10.1007/978-3-642-28920-0_14  1
2012 Alhussein M, Srinivasan A, Wijesekera D. Forensics filesystem with cluster-level identifiers for efficient data recovery 2012 International Conference For Internet Technology and Secured Transactions, Icitst 2012. 411-415.  1
2011 Faresi AAL, Wijesekera D. Preemptive mechanism to prevent health data privacy leakage Proceedings of the International Conference On Management of Emergent Digital Ecosystems, Medes'11. 17-24. DOI: 10.1145/2077489.2077493  1
2011 Xu M, Wijesekera D, Zhang X. Runtime administration of an RBAC profile for XACML Ieee Transactions On Services Computing. 4: 286-299. DOI: 10.1109/Tsc.2010.27  1
2011 Gunestas M, Mehmet M, Wijesekera D, Singhal A. Forensic web services framework It Professional. 13: 31-37. DOI: 10.1109/Mitp.2011.41  1
2011 Hartong M, Goel R, Wijesekera D. Positive train control (PTC) failure modes Journal of King Saud University - Science. 23: 311-321. DOI: 10.1016/J.Jksus.2010.12.003  1
2011 Yu B, Varga J, Wijesekera D, Stavrou A, Singhal A. Specifying time-out points in surgical EMRs - Work in progress Communications in Computer and Information Science. 221: 165-174. DOI: 10.1007/978-3-642-24352-3_18  1
2011 Ngo P, Wijesekera D. Enhancing the usability of the commercial mobile alert system Ifip Advances in Information and Communication Technology. 367: 137-149.  1
2010 Gunestas M, Wijesekera D, Singhal A. Forensics over web services: The FWS Web Services Security Development and Architecture: Theoretical and Practical Issues. 99-117. DOI: 10.4018/978-1-60566-950-2.ch005  1
2010 Alazzawe A, Wijesekera D, Dantu R. A testbed for large mobile social computing experiments International Journal of Sensor Networks. 8: 89-97. DOI: 10.1504/Ijsnet.2010.034618  1
2010 Al Faresi A, Wijesekera D, Moidu K. A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules Ihi'10 - Proceedings of the 1st Acm International Health Informatics Symposium. 637-646. DOI: 10.1145/1882992.1883093  1
2010 Singhal A, Wijesekera D. Ontologies for modeling enterprise level security metrics Acm International Conference Proceeding Series. DOI: 10.1145/1852666.1852731  1
2010 Hartong M, Goel R, Wijesekera D. Positive train control and the rail safety improvement act of 2008 Proceedings of the Asme Joint Rail Conference 2010, Jrc2010. 1: 407-414. DOI: 10.1115/JRC2010-36038  1
2010 Drusinsky D, Michael JB, Otani TW, Shing MT, Wijesekera D. Computer-assisted validation and verification of cybersecurity requirements 2010 Ieee International Conference On Technologies For Homeland Security, Hst 2010. 93-98. DOI: 10.1109/THS.2010.5655087  1
2010 Seymer P, Stavrou A, Wijesekera D, Jajodia S. QoP and QoS policy cognizant module composition Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 77-86. DOI: 10.1109/POLICY.2010.16  1
2010 Sengar H, Ren Z, Wang H, Wijesekera D, Jajodia S. Tracking skype VoIP calls over the internet Proceedings - Ieee Infocom. DOI: 10.1109/INFCOM.2010.5462266  1
2010 Chandrasekaran V, Dantu R, Gupta NK, Yang X, Wijesekera D. Efficiency of social connection-based routing in P2P VoIP networks 2010 2nd International Conference On Communication Systems and Networks, Comsnets 2010. DOI: 10.1109/COMSNETS.2010.5431975  1
2010 Hartong M, Goel R, Wijesekera D. U.S. federal oversight of rail transportation of toxic by inhalation materials Ifip Advances in Information and Communication Technology. 342: 141-155. DOI: 10.1007/978-3-642-16806-2_10  1
2010 Gunestas M, Mehmet M, Wijesekera D. Detecting Ponzi and pyramid business schemes in choreographed web services Ifip Advances in Information and Communication Technology. 337: 133-150. DOI: 10.1007/978-3-642-15506-2_10  1
2010 Hartong M, Goel R, Wijesekera D. Security and Dependability in Train Control Systems Vehicular Networking: Automotive Applications and Beyond. 129-148. DOI: 10.1002/9780470661314.ch6  1
2010 Mehmet M, Wijesekera D. Ontological constructs to create money laundering schemes Ceur Workshop Proceedings. 713.  1
2010 Ngo P, Wijesekera D. Using ontological information to enhance responder availability in emergency response Ceur Workshop Proceedings. 713.  1
2009 Gunestas M, Wijesekera D. Online detection of web choreography misuses 2009 5th International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2009. DOI: 10.4108/ICST.COLLABORATECOM2009.8346  1
2009 Xu M, Wijesekera D. A role-based XACML administration and delegation profile and its enforcement architecture Proceedings of the Acm Conference On Computer and Communications Security. 53-60. DOI: 10.1145/1655121.1655132  1
2009 Hartong M, Goel R, Wijesekera D. Meta-models for misuse cases Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558645  1
2009 Liu A, Yuan Y, Wijesekera D, Stavrou A. SQLProb: A proxy-based architecture towards preventing SQL injection attacks Proceedings of the Acm Symposium On Applied Computing. 2054-2061. DOI: 10.1145/1529282.1529737  1
2009 Alazzawe A, Wijesekera D, Dantu R. A testbed for mobile social computing 2009 5th International Conference On Testbeds and Research Infrastructures For the Development of Networks and Communities and Workshops, Tridentcom 2009. DOI: 10.1109/TRIDENTCOM.2009.4976250  1
2009 Yang X, Dantu R, Wijesekera D. A society-integrated testbed architecture for peer-to-peer telecommunications 2009 5th International Conference On Testbeds and Research Infrastructures For the Development of Networks and Communities and Workshops, Tridentcom 2009. DOI: 10.1109/TRIDENTCOM.2009.4976215  1
2009 Xu M, Wijesekera D, Zhang X, Cooray D. Towards session-aware RBAC administration and enforcement with XACML Proceedings - 2009 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2009. 9-16. DOI: 10.1109/POLICY.2009.27  1
2009 Sengar H, Wang X, Wang H, Wijesekera D, Jajodia S. Online detection of network traffic anomalies using behavioral distance Ieee International Workshop On Quality of Service, Iwqos. DOI: 10.1109/IWQoS.2009.5201415  1
2009 Yang X, Dantu R, Wijesekera D. Achieving peer-to-peer telecommunication services through social hashing 2009 6th Ieee Consumer Communications and Networking Conference, Ccnc 2009. DOI: 10.1109/CCNC.2009.4784812  1
2009 Hartong M, Goel R, Wijesekera D. Secure cross-domain train scheduling Ifip Advances in Information and Communication Technology. 311: 199-211. DOI: 10.1007/978-3-642-04798-5_14  1
2009 Gunestas M, Wijesekera D, Elkhodary A. An evidence generation model for web services 2009 Ieee International Conference On System of Systems Engineering, Sose 2009 1
2009 Arvay RJ, Wijesekera D, Michael JB. Using RuleML to specify cross-domain information flow control policies 2009 Ieee International Conference On System of Systems Engineering, Sose 2009 1
2008 Wang X, Zhang R, Yang X, Jiang X, Wijesekera D. Voice pharming attack and the trust of VoIP Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460908  1
2008 Barker S, Sergot MJ, Wijesekera D. Status-based access control Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410235  1
2008 Whittle J, Wijesekera D, Hartong M. Executable misuse cases for modeling security concerns Proceedings - International Conference On Software Engineering. 121-130. DOI: 10.1145/1368088.1368106  1
2008 Sengar H, Wang H, Wijesekera D, Jajodia S. Detecting voIP floods using the hellinger distance Ieee Transactions On Parallel and Distributed Systems. 19: 794-805. DOI: 10.1109/Tpds.2007.70786  1
2008 Massie T, Wijesekera D. TVIS: Tactical voice interaction services for dismounted Urban operations Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2008.4753071  1
2008 Alazzawe A, Nawaz A, Wijesekera D. Extracting Kerberos passwords through RC4-HMAC encryption type analysis Aiccsa 08 - 6th Ieee/Acs International Conference On Computer Systems and Applications. 679-685. DOI: 10.1109/AICCSA.2008.4493602  1
2008 Hartong M, Goel R, Wijesekera D. Security and the US rail infrastructure International Journal of Critical Infrastructure Protection. 1: 15-28. DOI: 10.1016/J.Ijcip.2008.08.006  1
2008 Gianvecchio S, Wang H, Wijesekera D, Jajodia S. Model-based covert timing channels: Automated modeling and evasion Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5230: 211-230. DOI: 10.1007/978-3-540-87403-4_12  1
2008 Dhankhar V, Kaushik S, Wijesekera D. Securing workflows with XACML, RDF and BPEL Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5094: 330-345. DOI: 10.1007/978-3-540-70567-3_25  1
2008 Hartong M, Goel R, Wijesekera D. Protection and recovery of railroad event recorder data Ifip International Federation For Information Processing. 285: 247-260. DOI: 10.1007/978-0-387-84927-0_20  1
2008 Gunestas M, Wijesekera D, Singhal A. Forensic web services Ifip International Federation For Information Processing. 285: 163-176. DOI: 10.1007/978-0-387-84927-0_14  1
2007 Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401  0.64
2007 Dhankhar V, Kaushik S, Wijesekera D, Nerode A. Evaluating distributed XACML policies Sws'07 - Proceedings of the 2007 Acm Workshop On Secure Web Services. 99-110. DOI: 10.1145/1314418.1314434  1
2007 Wijesekera D, Ammann P, Sun L, Fraser G. Relating counterexamples to test cases in CTL model checking specifications Proceedings of the 3rd International Workshop Advances in Model Based Testing, Amost 2007. 75-84. DOI: 10.1145/1291535.1291543  1
2007 Hartong M, Goel R, Farkas C, Wijesekera D. PTC-VANET interactions to prevent highway rail intersection crossing accidents Ieee Vehicular Technology Conference. 2550-2554. DOI: 10.1109/VETECS.2007.525  1
2007 Hartong M, Goel R, Wijesekera D. Key management requirements for PTC operations Ieee Vehicular Technology Magazine. 2: 4-11. DOI: 10.1109/Mvt.2007.912931  1
2007 Majdalawieh M, Wijesekera D. DNPSec simulation study Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications. 337-342. DOI: 10.1007/978-1-4020-6266-7-60  1
2007 Hartong M, Goel R, Wijesekera D. Securing positive train control systems Ifip International Federation For Information Processing. 253: 57-72. DOI: 10.1007/978-0-387-75462-8_5  1
2007 Sweeney B, Wijesekera D. Comparison of IPsec to TLS and SRTP for securing VoIP Proceedings of the 5th International Workshop On Security in Information Systems - Wosis 2007; in Conjunction With Iceis 2007. 82-92.  1
2007 Kaushik S, Wijesekera D. RDF collections Webist 2007 - 3rd International Conference On Web Information Systems and Technologies, Proceedings. 91-97.  1
2007 Kaushik S, Wijesekera D. RDF collections Webist 2007 - 3rd International Conference On Web Information Systems and Technologies, Proceedings. 91-97.  1
2007 Wang L, Jajodia S, Wijesekera D. Preserving Privacy in On-line Analytical Processing Data Cubes Advances in Information Security. 33: 355-380.  1
2007 Dhankhar V, Kaushik S, Wijesekera D. XACML policies for exclusive resource usage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 275-290.  1
2007 Wang L, Jajodia S, Wijesekera D. Preserving Privacy in On-Line Analytical Processing (OLAP) Advances in Information Security. 29: 1-177.  1
2007 Pamunuwa H, Wijesekera D, Farkas C. An intrusion detection system for detecting phishing attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4721: 181-192.  1
2007 Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445.  1
2006 Hartong M, Goel R, Wijesekera D. Communications security concerns in communications based train control Wit Transactions On the Built Environment. 88: 693-702. DOI: 10.2495/Cr060681  1
2006 Kaushik S, Wijesekera D, Ammann P. BPEL orchestration of secure WebMail Proceedings of the Acm Conference On Computer and Communications Security. 85-94. DOI: 10.1145/1180367.1180383  1
2006 Lutfiyya H, Burgess M, Wijesekera D. Proceedings: Seventh IEEE International Workshop on Policies for Distributed Systems and Networks Policy 2006: Preface Proceedings - Seventh Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2006. 2006. DOI: 10.1109/POLICY.2006.24  1
2006 Sengar H, Dantu R, Wijesekera D, Jajodia S. SS7 over IP: Signaling interworking vulnerabilities Ieee Network. 20: 32-41. DOI: 10.1109/Mnet.2006.273119  1
2006 Sengar H, Wang H, Wijesekera D, Jajodia S. Fast detection of denial-of-service attacks on IP telephony Ieee International Workshop On Quality of Service, Iwqos. 199-208. DOI: 10.1109/IWQOS.2006.250469  1
2006 Sengar H, Wijesekera D, Wang H, Jajodia S. VoIP intrusion detection through interacting protocol state machines Proceedings of the International Conference On Dependable Systems and Networks. 2006: 393-402. DOI: 10.1109/DSN.2006.73  1
2006 Peng L, Wijesekera D, Wingfield TC, Michael JB. An ontology-based distributed whiteboard to determine legal responses to online cyber attacks Internet Research. 16: 475-490. DOI: 10.1108/10662240610710969  1
2006 Hartong M, Goel R, Wijesekera D. Mapping misuse cases to functional fault trees in order to secure positive train control systems Applications of Advanced Technology in Transportation - Proceedings of the Ninth International Conference On Applications of Advanced Technology in Transportation. 394-399. DOI: 10.1061/40799(213)62  1
2006 Lutfiyya H, Burgess M, Wijesekera D. Report on policy 2006: Workshop on policies for distributed systems and metworks Journal of Network and Systems Management. 14: 599-602. DOI: 10.1007/S10922-006-9046-5  1
2006 Kaushik S, Winsborough W, Wijesekera D, Ammann P. Policy transformations for preventing leakage of sensitive information in email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 163-178. DOI: 10.1007/11805588_12  1
2006 Zannone N, Jajodia S, Wijesekera D. Creating objects in the flexible authorization framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 1-14. DOI: 10.1007/11805588_1  1
2006 Majdalawieh M, Parisi-Presicce F, Wijesekera D. DNPSec: Distributed network protocol version 3 (DNP3) security framework Advances in Computer, Information, and Systems Sciences, and Engineering - Proceedings of Ieta 2005, Tene 2005, Eiae 2005. 227-234. DOI: 10.1007/1-4020-5261-8-36  1
2006 Peng L, Wingfield T, Wijesekera D, Frye E, Jackson R, Michael J. Making decisions about legal responses to cyber attacks Ifip International Federation For Information Processing. 194: 283-294. DOI: 10.1007/0-387-31163-7_23  1
2006 Hartong M, Goel R, Wijesekera D. Use-misuse case driven analysis of positive train control Ifip International Federation For Information Processing. 222: 141-155.  1
2006 Alghathbar K, Farkas C, Wijesekera D. Securing UML information flow using flowUML Journal of Research and Practice in Information Technology. 38: 111-119.  1
2006 Kodali N, Farkas C, Wijesekera D. uSMIL: Towards secure unbreakable semantics in multimedia web services Computer Systems Science and Engineering. 21: 367-380.  1
2006 Sengar H, Dantu R, Wijesekera D. Securing VoIP and PSTN from integrated signaling network vulnerabilities 1st Ieee Workshop On Voip Management and Security, Voip Mase 2006. 1-7.  1
2006 Hartong M, Goel R, Wijesekera D. Key management requirments for positive train control communications security Asme/Ieee 2006 Joint Rail Conference, Jrc2006. 253-262.  1
2006 Hartong M, Goel R, Wijesekera D. Communications based positive train control systems architecture in the USA Ieee Vehicular Technology Conference. 6: 2987-2991.  1
2006 Alazzawe A, Nawaz A, Wijesekera D. Analyzing preauthentication timestamps to crack Kerberos V passwords Proceedings of the 4th International Workshop On Security in Information Systems, Wosis 2006, in Conjunction With Iceis 2006. 267-277.  1
2006 Kaushik S, Farkas C, Wijesekera D, Ammann P. An algebra for composing ontologies1 Frontiers in Artificial Intelligence and Applications. 150: 265-276.  1
2005 Kaushik S, Wijesekera D, Winsborough W, Ammann P. Email feedback: A policy-based approach to overcoming false positives Fmse'05: Proceedings of the 2005 Acm Workshop On Formal Methods in Security Engineering. 73-82. DOI: 10.1145/1103576.1103586  1
2005 Kaushik S, Wijesekera D, Ammann P. Policy-based dissemination of partial web-ontologies Proceedings of the Acm Conference On Computer and Communications Security. 43-52. DOI: 10.1145/1103022.1103030  1
2005 Wijesekera D, Michael JB, Nerode A. An agent-based framework for assessing missile defense doctrine and policy Proceedings - Sixth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2005. 2005: 115-118. DOI: 10.1109/POLICY.2005.4  1
2005 Sengar H, Wijesekera D, Jajodia S. MTPSec: Customizable secure MTP3 tunnels in the SS7 network Proceedings - 19th Ieee International Parallel and Distributed Processing Symposium, Ipdps 2005. 2005. DOI: 10.1109/IPDPS.2005.297  1
2005 Sudaharan S, Dhammalapathi S, Rai S, Wijesekera D. Knowledge sharing honeynets Proceedings From the 6th Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc 2005. 2005: 240-243. DOI: 10.1109/IAW.2005.1495958  1
2005 Kodali N, Wijesekera D, Michael JB. SPUTERS: An integrated traffic surveillance and emergency response architecture Journal of Intelligent Transportation Systems: Technology, Planning, and Operations. 9: 11-22. DOI: 10.1080/15472450590912538  1
2005 Wijesekera D, Nerode A. Tableaux for constructive concurrent dynamic logic Annals of Pure and Applied Logic. 135: 1-72. DOI: 10.1016/J.Apal.2004.12.001  1
2005 Kodali N, Farkas C, Wijesekera D. Enforcing semantics-aware security in multimedia surveillance Journal On Data Semantics. 2: 199-221. DOI: 10.1007/978-3-540-30567-5_8  0.44
2005 Jajodia S, Wijesekera D. Lecture Notes in Computer Sciences: Preface Lecture Notes in Computer Science. 3654.  1
2005 Jajodia S, Wijesekera D. Data and applications security xix:19th annual ifip wg 11.3working conference on data and applications security storrs, ct, usa, august 7-10, 2005 proceedings Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3654.  1
2005 Alghathbar K, Wijesekera D, Farkas C. Secure UML information flow using flow UML Proceedings of the 3rd International Workshop On Security in Information Systems, Wosis 2005, in Conjunction With Iceis 2005. 229-238.  1
2005 Kodali N, Farkas C, Wijesekera D. Enforcing semantics-aware security in multimedia surveillance Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3360: 199-221.  1
2005 Sengar H, Wijesekera D, Jajodia S. Authentication and integrity in telecommunication signaling network Proceedings - 12th Ieee International Conference and Workshops On the Engineering of Computer-Based Systems, Ecs 2005. 163-170.  1
2005 Zannone N, Jajodia S, Massacci F, Wijesekera D. Maintaining privacy on derived objects Wpes'05: Proceedings of the 2005 Acm Workshop On Privacy in the Electronic Society. 10-19.  1
2005 Sudaharan S, Dhammalapati S, Rai S, Wijesekera D. Honeynet clusters as an early warning system for production networks Proceedings of the 3rd International Workshop On Security in Information Systems, Wosis 2005, in Conjunction With Iceis 2005. 77-83.  1
2004 Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in data cubes Journal of Computer Security. 12: 655-692. DOI: 10.3233/Jcs-2004-12501  0.64
2004 Alghathbar K, Wijesekera D. Analyzing information flow control policies in requirements engineering Proceedings - Fifth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2004. 193-196. DOI: 10.1109/POLICY.2004.1309167  1
2004 Kaushik S, Ammann P, Wijesekera D, Winsborough W, Ritchey R. A policy driven approach to email services Proceedings - Fifth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2004. 169-178. DOI: 10.1109/POLICY.2004.1309163  1
2004 Kodali N, Farkas C, Wijesekera D. An authorization model for multimedia digital libraries International Journal On Digital Libraries. 4: 139-155. DOI: 10.1007/S00799-004-0080-1  1
2004 Bettini C, Jajodia S, Wang XS, Wijesekera D. Reasoning with advanced policy rules and its application to access control International Journal On Digital Libraries. 4: 156-170. DOI: 10.1007/S00799-004-0078-8  1
2004 Youn I, Wijesekera D. Secure bridges: A means to conduct secure teleconferences over public telephones Ifip Advances in Information and Communication Technology. 144: 205-218.  1
2004 Jajodia S, Wijesekera D. A flexible authorization framework for e-commerce Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3347: 336-345.  1
2004 Chen S, Wijesekera D, Jajodia S. FlexFlow: A flexible flow control policy specification framework Ifip Advances in Information and Communication Technology. 142: 358-371.  1
2004 Kodali NB, Farkas C, Wijesekera D. Enforcing integrity in multimedia surveillance Ifip Advances in Information and Communication Technology. 140: 67-81.  1
2004 Kodali N, Farkas C, Wijesekera D. Specifying multimedia access control using RDF Computer Systems Science and Engineering. 19: 129-139.  1
2004 Sarda K, Wijesekera D, Jajodia S. Implementing consistency checking in correlating attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3347: 379-384.  1
2004 Wang L, Jajodia S, Wijesekera D. Securing OLAP data cubes against privacy breaches Proceedings - Ieee Symposium On Security and Privacy. 2004: 161-175.  1
2004 Wang L, Wijesekera D, Jajodia S. A logic-based framework for attribute based access control Fmse'04: Proceedings of the 2004 Acm Workshop On Formal Methods in Security Engineering. 45-55.  1
2004 Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in data cubes Journal of Computer Security. 12: 655-692.  1
2004 Chen S, Wijesekera D, Jajodia S. Incorporating dynamic constraints in the flexible authorization framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3193: 1-16.  1
2004 Kodali N, Farkas C, Wijesekera D. SECRETS: A secure real-time multimedia surveillance system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3073: 278-296.  1
2004 Farkas C, Wingfield TC, Michael JB, Wijesekera D. THEMIS: Threat evaluation metamodel for information systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3073: 307-321.  1
2003 Wijesekera D, Jajodia S, Parisi-Presicce F, Hagström A. Removing permissions in the flexible authorization framework Acm Transactions On Database Systems. 28: 209-229. DOI: 10.1145/937598.937599  1
2003 Wijesekera D, Jajodia S. A propositional policy algebra for access control Acm Transactions On Information and System Security. 6: 286-325. DOI: 10.1145/762476.762481  1
2003 Bettini C, Jajodia S, Sean Wang X, Wijesekera D. Provisions and Obligations in Policy Rule Management Journal of Network and Systems Management. 11: 351-372. DOI: 10.1023/A:1025711105609  1
2003 Alghathbar K, Wijesekera D. Consistent and complete access control policies in use cases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2863: 373-387. DOI: 10.1007/978-3-540-45221-8_32  1
2003 Kodali N, Farkas C, Wijesekera D. Multimedia Access Control Using RDF Metadata Lecture Notes in Computer Science. 718-731. DOI: 10.1007/978-3-540-39962-9_73  0.44
2003 Kodali N, Wijesekera D. Regulating Access to SMIL Formatted Pay-per-view Movies Proceedings of the Acm Workshop On Xml Security. 53-60.  1
2003 Alghathbar K, Wijesekera D. AuthUML: A three-phased framework to analyze access control specifications in use cases Proceedings of the Acm Workshop On Formal Methods in Security Engineering. 77-86.  1
2003 Kodali N, Farkas C, Wijesekera D. Multimedia access control using RDF metadata Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2889: 718-731.  1
2003 Michael JB, Wingfield TC, Wijesekera D. Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 622-627.  1
2003 Wang L, Li Y, Wijesekera D, Jajodia S. Precisely answering multi-dimensional range queries without privacy breaches Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2808: 100-115.  1
2002 Bettini C, Jajodia S, Wang XS, Wijesekera D. Obligation monitoring in policy management Proceedings - 3rd International Workshop On Policies For Distributed Systems and Networks, Policy 2002. 2-12. DOI: 10.1109/POLICY.2002.1011288  1
2002 Wijesekera D, Jajodia S. Policy algebras for access control - The predicate case Proceedings of the Acm Conference On Computer and Communications Security. 171-180.  1
2002 Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in sum-only data cubes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2502: 55-71.  1
2002 Ammann P, Wijesekera D, Kaushik S. Scalable, graph-based network vulnerability analysis Proceedings of the Acm Conference On Computer and Communications Security. 217-224.  1
2001 Jajodia S, Wijesekera D. Security in Federated Database Systems Information Security Technical Report. 6: 69-79. DOI: 10.1016/S1363-4127(01)00208-4  1
2001 Wijesekera D, Ganesh M, Srivastava J, Nerode A. Normal forms and syntactic completeness proofs for functional independencies Theoretical Computer Science. 266: 365-405. DOI: 10.1016/S0304-3975(00)00195-X  1
2001 Wijesekera D, Jajodia S. Policy algebras for access control - The propositional case Proceedings of the Acm Conference On Computer and Communications Security. 38-47.  1
2001 Hagström A, Jajodia S, Parisi-Presicce F, Wijesekera D. Revocations - A classification Proceedings of the Computer Security Foundations Workshop. 44-58.  1
2000 Choi SY, Wijesekera D. The DADSim air defense simulation environment Proceedings of Ieee International Symposium On High Assurance Systems Engineering. 2000: 75-82. DOI: 10.1109/HASE.2000.895444  1
2000 Brodsky A, Farkas C, Wijesekera D, Sean Wang X. Constraints, inference channels and secure databases Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1894: 98-113.  1
1999 Wijesekera D, Srivastava J, Nerode A, Foresti M. Experimental evaluation of loss perception in continuous media Multimedia Systems. 7: 486-499. DOI: 10.1007/S005300050149  1
1999 Paul RA, Srivastava J, Wijesekera D. Test and evaluation of distributed information system networks Annals of Software Engineering. 8: 289-311.  1
1997 Wijesekera D, Ganesh M, Srivastava J, Nerode A. Tableaux for functional dependencies and independencies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1227: 358-372. DOI: 10.1007/BFb0027426  1
1996 Wijesekera D, Srivastava J. Quality of service (QoS) metrics for continuous media Multimedia Tools and Applications. 3: 127-166. DOI: 10.1007/Bf00429748  1
Show low-probability matches.