LEAP+ Efficient security mechanisms for large-scale distributed sensor networks S Zhu, S Setia, S Jajodia ACM Transactions on Sensor Networks (TOSN) 2 (4), 500-528, 2006 | 2754 | 2006 |
Exploring steganography: Seeing the unseen NF Johnson, S Jajodia Computer 31 (2), 26-34, 1998 | 2548 | 1998 |
Temporal databases: theory, design, and implementation AU Tansel, J Clifford, S Gadia, S Jajodia, A Segev, R Snodgrass Benjamin-Cummings Publishing Co., Inc., 1993 | 1161 | 1993 |
Information hiding: steganography and watermarking-attacks and countermeasures: steganography and watermarking: attacks and countermeasures NF Johnson, Z Duric, S Jajodia Springer Science & Business Media, 2001 | 961 | 2001 |
Detecting automation of twitter accounts: Are you a human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia IEEE Transactions on dependable and secure computing 9 (6), 811-824, 2012 | 932 | 2012 |
Flexible support for multiple access control policies S Jajodia, P Samarati, ML Sapino, VS Subrahmanian ACM Transactions on Database Systems (TODS) 26 (2), 214-260, 2001 | 911 | 2001 |
Encyclopedia of cryptography and security HCA Van Tilborg, S Jajodia Springer Science & Business Media, 2014 | 848 | 2014 |
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks S Zhu, S Setia, S Jajodia, P Ning IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 259-271, 2004 | 841 | 2004 |
Who is tweeting on Twitter: human, bot, or cyborg? Z Chu, S Gianvecchio, H Wang, S Jajodia Proceedings of the 26th annual computer security applications conference, 21-30, 2010 | 771 | 2010 |
A logical language for expressing authorizations S Jajodia, P Samarati, VS Subrahmanian Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 696 | 1997 |
Steganalysis of images created using current steganography software NF Johnson, S Jajodia International Workshop on Information Hiding, 273-289, 1998 | 665 | 1998 |
Topological analysis of network attack vulnerability S Jajodia, S Noel, B O’berry Managing Cyber Threats: Issues, Approaches, and Challenges, 247-266, 2005 | 658 | 2005 |
Moving target defense: creating asymmetric uncertainty for cyber threats S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang Springer Science & Business Media, 2011 | 637 | 2011 |
Over-encryption: Management of access control evolution on outsourced data SDC Di Vimercati, S Foresti, S Jajodia, S Paraboschi, P Samarati Proceedings of the 33rd international conference on Very large data bases …, 2007 | 599 | 2007 |
An adaptive data replication algorithm O Wolfson, S Jajodia, Y Huang ACM Transactions on Database Systems (TODS) 22 (2), 255-314, 1997 | 564 | 1997 |
An attack graph-based probabilistic security metric L Wang, T Islam, T Long, A Singhal, S Jajodia Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008 | 550 | 2008 |
Protecting privacy against location-based personal identification C Bettini, XS Wang, S Jajodia Workshop on Secure Data Management, 185-199, 2005 | 540 | 2005 |
Balancing confidentiality and efficiency in untrusted relational DBMSs E Damiani, SDC Vimercati, S Jajodia, S Paraboschi, P Samarati Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 525 | 2003 |
Detecting novel network intrusions using bayes estimators D Barbara, N Wu, S Jajodia Proceedings of the 2001 SIAM International Conference on Data Mining, 1-17, 2001 | 490 | 2001 |
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach S Zhu, S Xu, S Setia, S Jajodia 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 481 | 2003 |