Search

Your search keyword '"Jajodia, Sushil"' showing total 5,583 results

Search Constraints

Start Over You searched for: Author "Jajodia, Sushil" Remove constraint Author: "Jajodia, Sushil"
5,583 results on '"Jajodia, Sushil"'

Search Results

1. GenFighter: A Generative and Evolutive Textual Attack Removal

2. An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models

3. PatchRNN: A Deep Learning-Based System for Security Patch Identification

4. Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks

7. Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System

8. Data Synthesis based on Generative Adversarial Networks

11. Analyzing Robustness of Automatic Scientific Claim Verification Tools against Adversarial Rephrasing Attacks.

12. Distributed Query Evaluation over Encrypted Data

13. Proactive Defense Through Deception

14. Optimizing Alert Data Management Processes at a Cyber Security Operations Center

15. Adaptive Cyber Defenses for Botnet Detection and Mitigation

16. MTD Techniques for Memory Protection Against Zero-Day Attacks

18. Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)

19. On-the fly AES Decryption/Encryption for Cloud SQL Databases

20. <inline-formula><tex-math notation="LaTeX">${\sf FakeDB}$</tex-math><alternatives><mml:math><mml:mi mathvariant="sans-serif">FakeDB</mml:mi></mml:math><inline-graphic xlink:href="subrahmanian-ieq1-3379434.gif"/></alternatives></inline-formula>: Generating Fake Synthetic Databases

21. A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center.

22. CASFinder: Detecting Common Attack Surface

25. An Integrated Framework for Cyber Situation Awareness

26. Computer-Aided Human Centric Cyber Situation Awareness

33. Temporal Granularity

34. Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds

37. Scalable Graph Synthesis with Adj and 1 — Adj

38. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies

42. The Role of Quasi-identifiers in k-Anonymity Revisited

43. Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options

44. Threat Modeling for Cloud Data Center Infrastructures

46. Formation of Awareness

48. Minimum-Cost Network Hardening

49. Linear-Time Network Hardening

50. Related Work

Catalog

Books, media, physical & digital resources