2023 - Research.com Computer Science in United States Leader Award
2020 - W. Wallace McDowell Award, IEEE Computer Society For contributions to the scientific and engineering principles that enable effective adaptive cyber defense.
2016 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For outstanding contributions in network vulnerability analysis and cyber situation awareness, resulting in seminal papers, patents, and a commercial system
2013 - IEEE Fellow For contributions to information security, data protection, and privacy
In the field of Operating system Sushil Jajodia connects related research areas like Process (computing), Undo, Heuristics and Granularity. With his scientific publications, his incorporates both Process (computing) and Operating system. His study on Computer security is interrelated to topics such as Information sensitivity and Exploit. While working on this project, Sushil Jajodia studies both Exploit and Computer security. In his research, he undertakes multidisciplinary study on Artificial intelligence and Inference. Sushil Jajodia performs multidisciplinary studies into Inference and Artificial intelligence in his work. By researching both Database and Transaction processing, he produces research that crosses academic boundaries. In his articles, he combines various disciplines, including Transaction processing and Database. As part of his studies on Data mining, Sushil Jajodia often connects relevant subjects like Temporal database.
Sushil Jajodia integrates many fields in his works, including Database and Programming language. He conducts interdisciplinary study in the fields of Programming language and Database through his research. He merges many fields, such as Computer security and Operating system, in his writings. Sushil Jajodia incorporates Operating system and Computer security in his research. He applies his multidisciplinary studies on Theoretical computer science and Algorithm in his research. Sushil Jajodia integrates Algorithm and Theoretical computer science in his research. He performs multidisciplinary studies into Artificial intelligence and Data mining in his work. Data mining and Artificial intelligence are two areas of study in which Sushil Jajodia engages in interdisciplinary research. He applies his multidisciplinary studies on Distributed computing and Computer network in his research.
As part of his studies on Distributed computing, Sushil Jajodia often connects relevant areas like Multicast. His multidisciplinary approach integrates Multicast and Source-specific multicast in his work. His Inter-domain research extends to the thematically linked field of Source-specific multicast. His research links Xcast with Inter-domain. In most of his Xcast studies, his work intersects topics such as Pragmatic General Multicast. Sushil Jajodia merges Pragmatic General Multicast with IP multicast in his research. Sushil Jajodia conducted interdisciplinary study in his works that combined IP multicast and Protocol Independent Multicast. His Protocol Independent Multicast study frequently links to adjacent areas such as Distributed computing. He regularly links together related areas like Rekeying in his Computer network studies.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)
Temporal Databases: Theory, Design, and Implementation
Abdullah Uz Tansel;James Clifford;Shashi Gadia;Sushil Jajodia.
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
Neil F. Johnson;Zoran Duric;Sushil Jajodia.
Flexible support for multiple access control policies
Sushil Jajodia;Pierangela Samarati;Maria Luisa Sapino;V. S. Subrahmanian.
ACM Transactions on Database Systems (2001)
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
Zi Chu;S. Gianvecchio;Haining Wang;S. Jajodia.
IEEE Transactions on Dependable and Secure Computing (2012)
A logical language for expressing authorizations
S. Jajodia;P. Samarati;V.S. Subrahmanian.
ieee symposium on security and privacy (1997)
Who is tweeting on Twitter: human, bot, or cyborg?
Zi Chu;Steven Gianvecchio;Haining Wang;Sushil Jajodia.
annual computer security applications conference (2010)
Steganalysis of Images Created Using Current Steganography Software
Neil F. Johnson;Sushil Jajodia.
information hiding (1998)
Exploring steganography: Seeing the unseen
Neil F. Johnson;Sushil Jajodia.
IEEE Computer (1998)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: