Sushil Jajodia

Publication Statistics

Publication period start
Publication period end
Number of co-authors


Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications


Bertino, Elisa, Jajodia, Sushil, Samarati, Pierangela (1999): A flexible authorization mechanism for relational data management systems. In ACM Transactions on Information Systems, 17 (2) pp. 101-140.

Jajodia, Sushil, Ammann, Paul, McCollum, Catherine D. (1999): Surviving Information Warfare Attacks. In IEEE Computer, 32 (4) pp. 57-63.

Jajodia, Sushil, McCollum, Catherine D., Ammann, Paul (1999): Trusted Recovery. In Communications of the ACM, 42 (7) pp. 71-75.

Johnson, Neil F., Jajodia, Sushil (1998): Exploring Steganography: Seeing the Unseen. In IEEE Computer, 31 (2) pp. 26-34.

Smith, Kenneth, Swarup, Vipin, Jajodia, Sushil, Faatz, Donald B., Cornett, Todd, Hoyt, Jeff (2003): Securely sharing neuroimagery. In: Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management November 2-8, 2003, New Orleans, Louisiana, USA. pp. 375-377.

Noel, Steven, Jacobs, Michael, Kalapa, Pramod, Jajodia, Sushil (2005): Multiple Coordinated Views for Network Attack Graphs. In: Ma, Kwan-Liu, North, Stephen C., Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. pp. 12.

Noel, Steven, Jajodia, Sushil (2004): Managing attack graph complexity through visual hierarchical aggregation. In: Brodley, Carla E., Chan, Philip, Lippman, Richard, Yurcik, William (eds.) VizSEC/DMSEC 2004 - Workshop on Visualization and Data Mining for Computer Security 29 October, 2004, Washington DC, USA. pp. 109-118.

Bettini, Claudio, Jajodia, Sushil, Pareschi, Linda (2007): Anonymity and Diversity in LBS: A Preliminary Investigation. In: PerCom Workshops 2007 - Fifth Annual IEEE International Conference on Pervasive Computing and Communications 19-23 March, 2007, White Plains, New York, USA. pp. 577-580.