Sushil Jajodia


2022

doi dblp
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models
Jihyeon Hyeong | Jayoung Kim | Noseong Park | Sushil Jajodia
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, Atlanta, GA, USA, October 17-21, 2022

2020

doi dblp
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center
Ankit Shah | Rajesh Ganesan | Sushil Jajodia | Hasan Cam
2020 Volume 14 Issue 1

doi dblp
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System
Ankit Shah | Arunesh Sinha | Rajesh Ganesan | Sushil Jajodia | Hasan Cam
2020 Volume 11 Issue 3

2018

doi dblp
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions
Ankit Shah | Rajesh Ganesan | Sushil Jajodia | Hasan Cam
2018 Volume 9 Issue 5

2017

doi dblp
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk
Rajesh Ganesan | Sushil Jajodia | Hasan Cam
2017 Volume 8 Issue 4

2016

doi dblp
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning
Rajesh Ganesan | Sushil Jajodia | Ankit Shah | Hasan Cam
2016 Volume 8 Issue 1

2012

doi dblp
Integrating trust management and access control in data-intensive Web applications
Sabrina De Capitani di Vimercati | Sara Foresti | Sushil Jajodia | Stefano Paraboschi | Giuseppe Psaila | Pierangela Samarati
2012 Volume 6 Issue 2

2003

doi dblp
Securely sharing neuroimagery
Kenneth P. Smith | Vipin Swarup | Sushil Jajodia | Donald B. Faatz | Todd Cornett | Jeffrey Hoyt
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, New Orleans, Louisiana, USA, November 2-8, 2003

1999

doi dblp
A Flexible Authorization Mechanism for Relational Data Management Systems
Elisa Bertino | Sushil Jajodia | Pierangela Samarati
1999 Volume 17 Issue 2