Author: Sushil Jajodia
Publication Overview
Publication period start: 2007
Number of co-authors: 15
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Bertino,
Elisa,
Jajodia,
Sushil,
Samarati,
Pierangela
(1999):
A flexible authorization mechanism for relational data management systems.
In
ACM Transactions on Information Systems,
17
(2)
pp. 101-140.
https://dl.acm.org/doi/10.1145/306686.306687
Jajodia,
Sushil,
Ammann,
Paul,
McCollum,
Catherine D.
(1999):
Surviving Information Warfare Attacks.
In
IEEE Computer,
32
(4)
pp. 57-63.
Jajodia,
Sushil,
McCollum,
Catherine D.,
Ammann,
Paul
(1999):
Trusted Recovery.
In
Communications of the ACM,
42
(7)
pp. 71-75.
Johnson,
Neil F.,
Jajodia,
Sushil
(1998):
Exploring Steganography: Seeing the Unseen.
In
IEEE Computer,
31
(2)
pp. 26-34.
Smith,
Kenneth,
Swarup,
Vipin,
Jajodia,
Sushil,
Faatz,
Donald B.,
Cornett,
Todd,
Hoyt,
Jeff
(2003):
Securely sharing neuroimagery.
In:
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management
November 2-8,
2003,
New Orleans, Louisiana, USA.
pp. 375-377.
https://doi.acm.org/10.1145/956863.956934
Noel,
Steven,
Jacobs,
Michael,
Kalapa,
Pramod,
Jajodia,
Sushil
(2005):
Multiple Coordinated Views for Network Attack Graphs.
In:
Ma,
Kwan-Liu,
North,
Stephen C.,
Yurcik,
William
(eds.)
VizSEC 2005 - IEEE Workshop on Visualization for Computer Security
26 October,
2005,
Minneapolis, MN, USA.
pp. 12.
https://doi.ieeecomputersociety.org/10.1109/VIZSEC.2005.14
Noel,
Steven,
Jajodia,
Sushil
(2004):
Managing attack graph complexity through visual hierarchical aggregation.
In:
Brodley,
Carla E.,
Chan,
Philip,
Lippman,
Richard,
Yurcik,
William
(eds.)
VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security
29 October,
2004,
Washington DC, USA.
pp. 109-118.
https://doi.acm.org/10.1145/1029208.1029225
Bettini,
Claudio,
Jajodia,
Sushil,
Pareschi,
Linda
(2007):
Anonymity and Diversity in LBS: A Preliminary Investigation.
In:
PerCom Workshops 2007 - Fifth Annual IEEE International Conference on Pervasive Computing and Communications
19-23 March,
2007,
White Plains, New York, USA.
pp. 577-580.
https://dx.doi.org/10.1109/PERCOMW.2007.23