Moving target defense: creating asymmetric uncertainty for cyber threats S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang Springer Science & Business Media, 2011 | 643 | 2011 |
Security for mobile agents: Authentication and state appraisal WM Farmer, JD Guttman, V Swarup Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996 | 427 | 1996 |
Security for mobile agents: Issues and requirements WM Farmer, JD Guttman, V Swarup Proceedings of the 19th national information systems security conference 2 …, 1996 | 388 | 1996 |
A weakest-adversary security metric for network configuration security analysis J Pamula, S Jajodia, P Ammann, V Swarup Proceedings of the 2nd ACM workshop on Quality of protection, 31-38, 2006 | 231 | 2006 |
Fingerprinting relational databases: Schemes and specialties Y Li, V Swarup, S Jajodia IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005 | 206 | 2005 |
Cyber SA: Situational awareness for cyber defense P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ... Cyber Situational Awareness: Issues and Research, 3-13, 2010 | 198 | 2010 |
Cyber situational awareness S Jajodia, P Liu, V Swarup, C Wang Springer US, 2009 | 198 | 2009 |
Authentication for mobile agents S Berkovits, JD Guttman, V Swarup Mobile agents and security, 114-136, 1998 | 163 | 1998 |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling S Jajodia, AK Ghosh, VS Subrahmanian, V Swarup, C Wang, XS Wang Springer Science & Business Media, 2012 | 140 | 2012 |
Assignments for applicative languages V Swarup, US Reddy, E Ireland Functional Programming Languages and Computer Architecture: 5th ACM …, 1991 | 97 | 1991 |
Cyber deception S Jajodia, V Subrahmanian, V Swarup, C Wang Springer 1, 2.1, 2016 | 91 | 2016 |
Constructing a virtual primary key for fingerprinting relational data Y Li, V Swarup, S Jajodia Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003 | 87 | 2003 |
Moving target defense ii S Jajodia, AK Ghosh, V Subrahmanian, V Swarup, C Wang, XS Wang Application of game Theory and Adversarial Modeling. Series: Advances in …, 2013 | 40 | 2013 |
The VLISP verified scheme system JD Guttman, JD Ramsdell, V Swarup Lisp and Symbolic Computation 8 (1), 33-110, 1995 | 40 | 1995 |
A robust watermarking scheme for relational data Y Li, V Swarup, S Jajodia Proceedings of the Workshop on Information Technology and Systems (WITS …, 2003 | 36 | 2003 |
Cyber warfare: building the scientific foundation S Jajodia, P Shakarian, VS Subrahmanian, V Swarup, C Wang Springer, 2015 | 35 | 2015 |
Trust appraisal and secure routing of mobile agents V Swarup DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997 | 33 | 1997 |
Everybody share: The challenge of data-sharing systems K Smith, L Seligman, V Swarup Computer 41 (9), 54-61, 2008 | 31 | 2008 |
A data sharing agreement framework V Swarup, L Seligman, A Rosenthal International Conference on Information Systems Security, 22-36, 2006 | 27 | 2006 |
Secure cloud computing S Jajodia, K Kant, P Samarati, A Singhal, V Swarup, C Wang Springer, 2014 | 26 | 2014 |