K
v
ire
.com
←
Back
Night
Docs
Library
Review
…
Author
Sushil Jajodia
also known as Jajodia S., Jajodia, Sushil, Jajodia, Sushil 1947-
George Mason University · Rutgers, The State University of New Jersey · Defense Information Systems Agency · United States Naval Research Laboratory
About this author
Works
1,019
Cited by
35,642
h-index
96
i10
439
ORCID ↗
Top papers
Exploring steganography: Seeing the unseen
Neil F. Johnson, Sushil Jajodia
·
1998
·
Computer
↗ 1,473
LEAP
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
·
2003
↗ 1,117
Temporal Databases: Theory, Design, and Implementation
Abdullah Uz Tansel, James Clifford, Shashi K. Gadia, et al.
·
1993
↗ 665
LEAP+
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
·
2006
·
ACM Transactions on Sensor Networks
↗ 664
Flexible support for multiple access control policies
Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, et al.
·
2001
·
ACM Transactions on Database Systems
↗ 639
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
Zi Chu, Steven Gianvecchio, Haining Wang, et al.
·
2012
·
IEEE Transactions on Dependable and Secure Computing
↗ 633
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, et al.
·
2004
↗ 561
Data synthesis based on generative adversarial networks
Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, et al.
·
2018
·
Proceedings of the VLDB Endowment
↗ 515
OA
Who is tweeting on Twitter
Zi Chu, Steven Gianvecchio, Haining Wang, et al.
·
2010
↗ 504
LEAP
Sencun Zhu, Sanjeev Setia, Sushil Jajodia
·
2003
↗ 479
A logical language for expressing authorizations
Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian
·
2002
↗ 427
An Attack Graph-Based Probabilistic Security Metric
Lingyu Wang, Tania Islam, Tao Long, et al.
·
2008
·
Lecture notes in computer science
↗ 378
OA
Books
Moving Target Defense II
2012
·
Springer
Information systems security
2005
·
Springer
Advances in multimedia information systems
1998
·
Springer
Database Security XII
2013
·
Springer
Integrity and Internal Control in Information Systems
1997
·
Springer
Trusted recovery and defensive information warfare
2001
·
Kluwer Academic
Information security
1994
·
IEEE Computer Society Press
Proceedings of the 1993 Sigmod International Conference Management of Data (Sigmod Record)
1993
·
Association for Computing Machinery