2020 - W. Wallace McDowell Award, IEEE Computer Society For contributions to the scientific and engineering principles that enable effective adaptive cyber defense.
2016 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For outstanding contributions in network vulnerability analysis and cyber situation awareness, resulting in seminal papers, patents, and a commercial system
2013 - IEEE Fellow For contributions to information security, data protection, and privacy
His main research concerns Computer security, Data mining, Computer network, Theoretical computer science and Database. His work carried out in the field of Computer security brings together such families of science as Service provider and Steganography. His study focuses on the intersection of Computer network and fields such as Distributed computing with connections in the field of Node.
His study in Theoretical computer science is interdisciplinary in nature, drawing from both Adjacency matrix, Attack graph, Network security and Cluster analysis. His Database research includes themes of Multilevel security and Data science. His Encryption research is multidisciplinary, relying on both Server and Cryptography.
His primary areas of study are Computer security, Distributed computing, Database, Computer network and Data mining. His Computer security study typically links adjacent topics like Internet privacy. His research in Distributed computing is mostly focused on Distributed database.
His work in Computer network is not limited to one particular discipline; it also encompasses Scalability. His work in Serializability addresses subjects such as Concurrency control, which are connected to disciplines such as Transaction processing. His research integrates issues of Cloud computing and Cryptography in his study of Encryption.
Sushil Jajodia focuses on Computer security, Network security, Intrusion detection system, Distributed computing and Software. His Computer security research is mostly focused on the topic Exploit. Sushil Jajodia has included themes like Network Access Control, Security service, Data mining and Resilience in his Network security study.
Sushil Jajodia combines subjects such as Resource management, Service, Honeypot, Workload and Resource with his study of Intrusion detection system. His Distributed computing research is multidisciplinary, incorporating perspectives in Attack surface and Botnet. His research in Encryption intersects with topics in Query by Example and Database.
Sushil Jajodia mainly investigates Computer security, Network security, Intrusion detection system, Deception and Distributed computing. The various areas that Sushil Jajodia examines in his Computer security study include Cloud computing security, Dependency graph, Scheduling, Risk management and Reinforcement learning. The Network security study combines topics in areas such as Data mining, Base, Bayesian probability, CVSS and Software.
His biological study spans a wide range of topics, including Property, Generative grammar, Private information retrieval and Information leakage. His research integrates issues of Workload, Attack strategy, Queue and Honeypot in his study of Intrusion detection system. The concepts of his Distributed computing study are interwoven with issues in Graphical model, Attack graph and Botnet.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu;Sanjeev Setia;Sushil Jajodia.
ACM Transactions on Sensor Networks (2006)
Exploring steganography: Seeing the unseen
Neil F. Johnson;Sushil Jajodia.
IEEE Computer (1998)
Temporal Databases: Theory, Design, and Implementation
Abdullah Uz Tansel;James Clifford;Shashi Gadia;Sushil Jajodia.
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
Neil F. Johnson;Zoran Duric;Sushil Jajodia.
Flexible support for multiple access control policies
Sushil Jajodia;Pierangela Samarati;Maria Luisa Sapino;V. S. Subrahmanian.
ACM Transactions on Database Systems (2001)
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
Sencun Zhu;S. Setia;S. Jajodia;Peng Ning.
ieee symposium on security and privacy (2004)
A logical language for expressing authorizations
S. Jajodia;P. Samarati;V.S. Subrahmanian.
ieee symposium on security and privacy (1997)
Steganalysis of Images Created Using Current Steganography Software
Neil F. Johnson;Sushil Jajodia.
information hiding (1998)
The consensus glossary of temporal database concepts — February 1998 version
Christian S. Jensen;Curtis E. Dyreson;Michael Böhlen;James Clifford.
Lecture Notes in Computer Science (1998)
Who is tweeting on Twitter: human, bot, or cyborg?
Zi Chu;Steven Gianvecchio;Haining Wang;Sushil Jajodia.
annual computer security applications conference (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: