H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 111 Citations 45,475 576 World Ranking 82 National Ranking 51

Research.com Recognitions

Awards & Achievements

2020 - W. Wallace McDowell Award, IEEE Computer Society For contributions to the scientific and engineering principles that enable effective adaptive cyber defense.

2016 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For outstanding contributions in network vulnerability analysis and cyber situation awareness, resulting in seminal papers, patents, and a commercial system

2013 - IEEE Fellow For contributions to information security, data protection, and privacy


What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • Computer security

His main research concerns Computer security, Data mining, Computer network, Theoretical computer science and Database. His work carried out in the field of Computer security brings together such families of science as Service provider and Steganography. His study focuses on the intersection of Computer network and fields such as Distributed computing with connections in the field of Node.

His study in Theoretical computer science is interdisciplinary in nature, drawing from both Adjacency matrix, Attack graph, Network security and Cluster analysis. His Database research includes themes of Multilevel security and Data science. His Encryption research is multidisciplinary, relying on both Server and Cryptography.

His most cited work include:

  • LEAP: efficient security mechanisms for large-scale distributed sensor networks (1084 citations)
  • Flexible support for multiple access control policies (624 citations)
  • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks (583 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Distributed computing, Database, Computer network and Data mining. His Computer security study typically links adjacent topics like Internet privacy. His research in Distributed computing is mostly focused on Distributed database.

His work in Computer network is not limited to one particular discipline; it also encompasses Scalability. His work in Serializability addresses subjects such as Concurrency control, which are connected to disciplines such as Transaction processing. His research integrates issues of Cloud computing and Cryptography in his study of Encryption.

He most often published in these fields:

  • Computer security (40.08%)
  • Distributed computing (16.01%)
  • Database (14.23%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (40.08%)
  • Network security (5.88%)
  • Intrusion detection system (8.34%)

In recent papers he was focusing on the following fields of study:

Sushil Jajodia focuses on Computer security, Network security, Intrusion detection system, Distributed computing and Software. His Computer security research is mostly focused on the topic Exploit. Sushil Jajodia has included themes like Network Access Control, Security service, Data mining and Resilience in his Network security study.

Sushil Jajodia combines subjects such as Resource management, Service, Honeypot, Workload and Resource with his study of Intrusion detection system. His Distributed computing research is multidisciplinary, incorporating perspectives in Attack surface and Botnet. His research in Encryption intersects with topics in Query by Example and Database.

Between 2014 and 2021, his most popular works were:

  • Data synthesis based on generative adversarial networks (70 citations)
  • Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks (61 citations)
  • Profiling Online Social Behaviors for Compromised Account Detection (61 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Sushil Jajodia mainly investigates Computer security, Network security, Intrusion detection system, Deception and Distributed computing. The various areas that Sushil Jajodia examines in his Computer security study include Cloud computing security, Dependency graph, Scheduling, Risk management and Reinforcement learning. The Network security study combines topics in areas such as Data mining, Base, Bayesian probability, CVSS and Software.

His biological study spans a wide range of topics, including Property, Generative grammar, Private information retrieval and Information leakage. His research integrates issues of Workload, Attack strategy, Queue and Honeypot in his study of Intrusion detection system. The concepts of his Distributed computing study are interwoven with issues in Graphical model, Attack graph and Botnet.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

LEAP+: Efficient security mechanisms for large-scale distributed sensor networks

Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)

2527 Citations

Exploring steganography: Seeing the unseen

Neil F. Johnson;Sushil Jajodia.
IEEE Computer (1998)

2158 Citations

Temporal Databases: Theory, Design, and Implementation

Abdullah Uz Tansel;James Clifford;Shashi Gadia;Sushil Jajodia.

1081 Citations

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures

Neil F. Johnson;Zoran Duric;Sushil Jajodia.

871 Citations

Flexible support for multiple access control policies

Sushil Jajodia;Pierangela Samarati;Maria Luisa Sapino;V. S. Subrahmanian.
ACM Transactions on Database Systems (2001)

856 Citations

An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks

Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)

781 Citations

A logical language for expressing authorizations

S. Jajodia;P. Samarati;V.S. Subrahmanian.
ieee symposium on security and privacy (1997)

667 Citations

Steganalysis of Images Created Using Current Steganography Software

Neil F. Johnson;Sushil Jajodia.
information hiding (1998)

610 Citations

The consensus glossary of temporal database concepts — February 1998 version

Christian S. Jensen;Curtis E. Dyreson;Michael Böhlen;James Clifford.
Lecture Notes in Computer Science (1998)

595 Citations

Who is tweeting on Twitter: human, bot, or cyborg?

Zi Chu;Steven Gianvecchio;Haining Wang;Sushil Jajodia.
annual computer security applications conference (2010)

577 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Sushil Jajodia

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 134

Pierangela Samarati

Pierangela Samarati

University of Milan

Publications: 128

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 79

Sabrina De Capitani di Vimercati

Sabrina De Capitani di Vimercati

University of Milan

Publications: 74

Ernesto Damiani

Ernesto Damiani

Khalifa University of Science and Technology

Publications: 54

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 52

Frédéric Cuppens

Frédéric Cuppens

Polytechnique Montréal

Publications: 51

Elena Ferrari

Elena Ferrari

University of Insubria

Publications: 48

Richard T. Snodgrass

Richard T. Snodgrass

University of Arizona

Publications: 47

Christian S. Jensen

Christian S. Jensen

Aalborg University

Publications: 47

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 46

Claudio Bettini

Claudio Bettini

University of Milan

Publications: 44

Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

Publications: 42

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 42

Stefano Paraboschi

Stefano Paraboschi

University of Bergamo

Publications: 40

Something went wrong. Please try again later.