Scalable, graph-based network vulnerability analysis P Ammann, D Wijesekera, S Kaushik Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 1189 | 2002 |
A logic-based framework for attribute based access control L Wang, D Wijesekera, S Jajodia Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004 | 379 | 2004 |
Detecting VoIP floods using the Hellinger distance H Sengar, H Wang, D Wijesekera, S Jajodia IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008 | 212 | 2008 |
Model-based covert timing channels: Automated modeling and evasion S Gianvecchio, H Wang, D Wijesekera, S Jajodia Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 209 | 2008 |
SQLProb: a proxy-based architecture towards preventing SQL injection attacks A Liu, Y Yuan, D Wijesekera, A Stavrou Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009 | 152 | 2009 |
VoIP intrusion detection through interacting protocol state machines H Sengar, D Wijesekera, H Wang, S Jajodia International Conference on Dependable Systems and Networks (DSN'06), 393-402, 2006 | 150 | 2006 |
DNPSec: Distributed network protocol version 3 (DNP3) security framework M Majdalawieh, F Parisi-Presicce, D Wijesekera Advances in Computer, Information, and Systems Sciences, and Engineering 1 …, 2006 | 150 | 2006 |
Provisions and obligations in policy management and security applications C Bettini, S Jajodia, XS Wang, D Wijesekera VLDB'02: Proceedings of the 28th International Conference on Very Large …, 2002 | 150 | 2002 |
A propositional policy algebra for access control D Wijesekera, S Jajodia ACM Transactions on Information and System Security (TISSEC) 6 (2), 286-325, 2003 | 148 | 2003 |
Constructive modal logics I D Wijesekera Annals of Pure and Applied Logic 50 (3), 271-301, 1990 | 137 | 1990 |
Modern intrusion detection, data mining, and degrees of attack guilt S Noel, D Wijesekera, C Youman Applications of data mining in computer security, 1-31, 2002 | 131 | 2002 |
Securing OLAP data cubes against privacy breaches L Wang, S Jajodia, D Wijesekera IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 161-175, 2004 | 125 | 2004 |
Experimental evaluation of loss perception in continuous media D Wijesekera, J Srivastava, A Nerode, M Foresti Multimedia systems 7, 486-499, 1999 | 111 | 1999 |
Quality of service (QoS) metrics for continuous media D Wijesekera, J Srivastava Multimedia Tools and Applications 3, 127-166, 1996 | 104 | 1996 |
Implementing security policies in software development tools KS Alghathbar, D Wijesekera US Patent 7,340,469, 2008 | 97 | 2008 |
Executable misuse cases for modeling security concerns J Whittle, D Wijesekera, M Hartong Proceedings of the 30th international conference on Software engineering …, 2008 | 86 | 2008 |
Revocations-a classification A Hagstrom, S Jajodia, F Parisi-Presicce, D Wijesekera Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 44-58, 2001 | 84 | 2001 |
Provisions and obligations in policy rule management C Bettini, S Jajodia, XS Wang, D Wijesekera Journal of Network and Systems Management 11, 351-372, 2003 | 83 | 2003 |
Fast detection of denial-of-service attacks on IP telephony H Sengar, H Wang, D Wijesekera, S Jajodia 200614th IEEE International Workshop on Quality of Service, 199-208, 2006 | 79 | 2006 |
Implementing Security Policies in Software Development Tools K Alghathbar, D Wijesekera US Patent App. 11/969,513, 2009 | 74 | 2009 |