


default search action
Duminda Wijesekera
Person information
- affiliation: George Mason University, Fairfax, Virginia, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c160]Bikram Adhikari, Zoran Duric, Duminda Wijesekera, Bo Yu:
Comparative Study of Attention among Drivers with Varying Driving Experience. IV 2024: 1353-1360 - [c159]Mahbubul Alam Palash, Duminda Wijesekera:
Benchmarking the Performance of 5G CV2X for Connected Vehicles based Adaptive Traffic Signal. IV 2024: 1853-1858 - 2023
- [c158]Mahbubul Alam Palash, Duminda Wijesekera:
Adaptive Traffic Signal Control using CV2X. VTC Fall 2023: 1-7 - 2022
- [j44]James Bret Michael, George W. Dinolt, Frederick B. Cohen, Duminda Wijesekera:
Can You Trust Zero Trust? Computer 55(8): 103-105 (2022) - [j43]Howard D. Grimes, Gabriela F. Ciocarlie
, Bo Yu, Duminda Wijesekera
, Gregory E. Shannon, Wayne Austad
, Charles Fracchia
, Dongyan Xu, Thomas R. Kurfess, Lisa Strama, Michael Mylrea, Bill Reid:
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing. IEEE Secur. Priv. 20(6): 53-65 (2022) - [c157]Matthew Jablonski, Duminda Wijesekera, Anoop Singhal:
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory. SAT-CPS@CODASPY 2022: 13-20 - [c156]Rami Alnafrani, Duminda Wijesekera:
AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System. ISDFS 2022: 1-6 - [c155]Rami Alnafrani, Duminda Wijesekera:
An Automated Framework for Generating Attack Graphs Using Known Security Threats. ISDFS 2022: 1-6 - [c154]Thabet Kacem, Alexandre B. Barreto, Paulo Costa, Duminda Wijesekera:
A Key Management Module for Secure ADS-B. ITSC 2022: 1784-1789 - 2021
- [j42]Matthew Lanoue, Chad A. Bollmann, James Bret Michael
, John D. Roth
, Duminda Wijesekera
:
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities. Computer 54(4): 76-84 (2021) - [j41]James Bret Michael
, Doron Drusinsky
, Duminda Wijesekera
:
Formal Verification of Cyberphysical Systems. Computer 54(9): 15-24 (2021) - [j40]James Bret Michael
, Doron Drusinsky
, Duminda Wijesekera
:
Formal Methods in Cyberphysical Systems. Computer 54(9): 25-29 (2021) - [c153]Thabet Kacem, Aydin Kaya, Ali Seydi Keçeli, Cagatay Catal, Duminda Wijesekera, Paulo Costa:
ADS-B Attack Classification using Machine Learning Techniques. IV Workshops 2021: 7-12 - [c152]Yongxin Wang, Duminda Wijesekera:
Pixel Invisibility: Detect Object Unseen in Color Domain. VEHITS 2021: 201-210 - 2020
- [c151]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments. IFIP Int. Conf. Digital Forensics 2020: 161-180 - [i1]Yongxin Wang, Duminda Wijesekera:
Pixel Invisibility: Detecting Objects Invisible in Color Images. CoRR abs/2006.08383 (2020)
2010 – 2019
- 2019
- [j39]Michael P. Heinl, Bo Yu, Duminda Wijesekera:
A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond. J. Digit. Forensics Secur. Law 14(1): 2:1-2:19 (2019) - [c150]Paul Seymer, Chaitanya Yavvari, Duminda Wijesekera, Cing-Dao Kan:
Coordinating AV Dispatch with Smart Remote Parking. CAVS 2019: 1-7 - [c149]Matthew Jablonski, Yongxin Wang, Chaitanya Yavvari, Zezhou Wang, Xiang Liu, Keith Holt, Duminda Wijesekera:
An Attack-Fault Tree Analysis of a Movable Railroad Bridge. Critical Infrastructure Protection 2019: 51-71 - [c148]Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera:
DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS. IFIP Int. Conf. Digital Forensics 2019: 253-272 - [c147]Paul Seymer
, Duminda Wijesekera
, Cing-Dao Kan:
Smart Parking Zones Using Meshed Bluetooth Sensor Networks. SMARTGREENS/VEHITS (Selected Papers) 2019: 245-269 - [c146]Paul Seymer, Duminda Wijesekera, Cing-Dao Kan:
Smart Parking Zones using Dual Mode Routed Bluetooth Fogged Meshes. VEHITS 2019: 211-222 - [c145]Paul Seymer, Duminda Wijesekera, Cing-Dao Kan:
Secure Outdoor Smart Parking Using Dual Mode Bluetooth Mesh Networks. VTC Spring 2019: 1-7 - [c144]Chaitanya Yavvari, Duminda Wijesekera, Zoran Duric:
Stable and Safe Automated Driving Using 3-D Road Geometric Features. VTC Spring 2019: 1-7 - 2018
- [j38]Thabet Kacem
, Duminda Wijesekera
, Paulo C. G. Costa
:
ADS-Bsec: A Holistic Framework to Secure ADS-B. IEEE Trans. Intell. Veh. 3(4): 511-521 (2018) - [j37]Satish Kolli
, Joshua Lilly, Duminda Wijesekera:
Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness. IEEE Veh. Technol. Mag. 13(3): 48-60 (2018) - [c143]Mohammad Ababneh, Malik Qasaimeh, Duminda Wijesekera, Paulo C. G. Costa
:
Performance of Generating Dialogs from Ontology and Context. AICCSA 2018: 1-6 - [c142]Michael Reep, Bo Yu, Duminda Wijesekera, Paulo C. G. Costa
:
Sharing Genetic Data under US Privacy Laws. HEALTHINF 2018: 349-360 - [c141]Eniye Tebekaemi, Duminda Wijesekera:
A Communications Model for Decentralized Autonomous Control of the Power Grid. ICC 2018: 1-6 - [c140]Eniye Tebekaemi, Duminda Wijesekera, Paulo C. G. Costa
:
An Integrated Control and Intrusion Detection System for Smart Grid Security. Critical Infrastructure Protection 2018: 243-264 - [c139]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis. IFIP Int. Conf. Digital Forensics 2018: 263-289 - [c138]Chaitanya Yavvari, Zoran Duric, Duminda Wijesekera:
Cooperative Collision Avoidance by Sharing Vehicular Subsystem Data. Intelligent Vehicles Symposium 2018: 1346-1353 - [c137]Santos Jha, Chaitanya Yavvari, Duminda Wijesekera:
Pseudonym Certificate Validations under Heavy Vehicular Traffic Loads. VNC 2018: 1-7 - 2017
- [j36]Thabet Kacem, Alexandre Barreto, Duminda Wijesekera, Paulo C. G. Costa
:
ADS-Bsec: A novel framework to secure ADS-B. ICT Express 3(4): 160-163 (2017) - [c136]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A layered graphical model for mission attack impact analysis. CNS 2017: 602-609 - [c135]Eniye Tebekaemi, Edward Colbert, Duminda Wijesekera:
Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback. Critical Infrastructure Protection 2017: 45-62 - [c134]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. IFIP Int. Conf. Digital Forensics 2017: 111-130 - [c133]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa
:
Key distribution scheme for aircraft equipped with secure ADS-B IN. ITSC 2017: 1-6 - [c132]Chaitanya Yavvari, Zoran Duric, Duminda Wijesekera:
Vehicular dynamics based plausibility checking. ITSC 2017: 1-8 - [c131]KamalEldin Mohamed, Duminda Wijesekera, Paulo Cesar G. da Costa
:
An Authentication Mechanism for Accessing Mobile Web Services. MobiWIS 2017: 147-162 - [p4]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. Research Advances in Cloud Computing 2017: 371-391 - 2016
- [c130]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Probabilistic Network Forensic Model for Evidence Analysis. IFIP Int. Conf. Digital Forensics 2016: 189-210 - [c129]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa
, Alexandre Barreto:
Secure ADS-B framework "ADS-Bsec". ITSC 2016: 2681-2686 - [c128]Michael Reep, Bo Yu, Duminda Wijesekera, Paulo C. G. Costa:
Sharing Data under Genetic Privacy Laws. STIDS 2016: 46-54 - [c127]Thabet Kacem, Duminda Wijesekera, Paulo Cesar G. da Costa
, Alexandre Barreto:
An ADS-B Intrusion Detection System. Trustcom/BigDataSE/ISPA 2016: 544-551 - 2015
- [c126]Anoop Singhal, Changwei Liu, Duminda Wijesekera:
POSTER: A Logic Based Network Forensics Model for Evidence Analysis. CCS 2015: 1677 - [c125]Marcio Monteiro, Alexandre Barreto, Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa:
Detecting malicious ADS-B transmitters using a low-bandwidth sensor network. FUSION 2015: 1696-1701 - [c124]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa
, Jeronymo M. A. Carvalho, Marcio Monteiro, Alexandre Barreto:
Secure ADS-B design & evaluation. ICVES 2015: 213-218 - [c123]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Logic-Based Network Forensic Model for Evidence Analysis. IFIP Int. Conf. Digital Forensics 2015: 129-145 - [c122]Bo Yu, Duminda Wijesekera, Paulo C. G. Costa, Sharath Hiremegalore:
Genetic Counseling Using Workflow-based EMRs. STIDS 2015: 66-73 - [c121]Alonza Mumford, Duminda Wijesekera, Paulo C. G. Costa:
Toward Representing and Recognizing Cyber-Physical Autonomous Agents in Competition Using Event Semantics. STIDS 2015: 82-89 - 2014
- [j35]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Security requirement derivation by noun-verb analysis of use-misuse case relationships: a case study using positive train control. Innov. Syst. Softw. Eng. 10(2): 103-122 (2014) - [j34]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction. J. Digit. Forensics Secur. Law 9(2): 181-196 (2014) - [j33]Michael A. Schumann, Doron Drusinsky, James Bret Michael, Duminda Wijesekera:
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes. IEEE Trans. Software Eng. 40(2): 154-166 (2014) - [c120]Mohammad Ababneh, Malek Athamnah, Duminda Wijesekera, Paulo C. G. Costa:
An Automated Dialog System for Conducting Security Interviews for Access Control. Critical Infrastructure Protection 2014: 111-125 - [c119]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Model Towards Using Evidence from Security Events for Network Attack Analysis. WOSIS 2014: 83-95 - [c118]Alonza Mumford, Duminda Wijesekera:
Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions. STIDS 2014: 32-39 - [c117]Thabet Kacem, Duminda Wijesekera, Paulo C. G. Costa, Alexandre Barreto:
Security Requirements Analysis of ADS-B Networks. STIDS 2014: 40-47 - [c116]Bo Yu, Duminda Wijesekera, Paulo C. G. Costa:
An Ontology for Medical Treatment Consent. STIDS 2014: 72-79 - 2013
- [j32]Andre Abadie, Duminda Wijesekera:
An approach for risk assessment and mitigation in cognitive radio technologies. Int. J. Inf. Priv. Secur. Integr. 1(4): 344-359 (2013) - [c115]Andre B. Bondi, Damindra Bandara, Michael Smith, Rajni Goel, Duminda Wijesekera:
Timely Delivery of Messages in Positive Train Control. Critical Infrastructure Protection 2013: 139-152 - [c114]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Creating Integrated Evidence Graphs for Network Forensics. IFIP Int. Conf. Digital Forensics 2013: 227-241 - [c113]Murad Mehmet, Murat Günestas, Duminda Wijesekera:
Dynamic Risk Model of Money Laundering. RISK@ICTSS 2013: 3-20 - [c112]Murad Mehmet, Duminda Wijesekera:
Data Analytics to Detect Evolving Money Laundering. STIDS 2013: 71-78 - [c111]Mohammad Ababneh, Duminda Wijesekera:
An Ontological Inference Driven Interactive Voice Recognition System. STIDS 2013: 125-132 - [c110]Paul Ngo, Duminda Wijesekera:
Navigation Assistance Framework for Emergencies. STIDS 2013: 149-156 - 2012
- [j31]Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael:
Securing the ZigBee Protocol in the Smart Grid. Computer 45(4): 92-94 (2012) - [c109]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Using Attack Graphs in Forensic Examinations. ARES 2012: 596-603 - [c108]Andre Abadie, Duminda Wijesekera:
Leveraging an Inventory of the Cognitive Radio Attack Surface. CyberSecurity 2012: 136-143 - [c107]Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera:
Forensics filesystem with cluster-level identifiers for efficient data recovery. ICITST 2012: 411-415 - [c106]Paul Ngo, Duminda Wijesekera:
Emergency Messages in the Commercial Mobile Alert System. Critical Infrastructure Protection 2012: 171-184 - [c105]Andre Abadie, Duminda Wijesekera:
Cognitive radio technologies: Envisioning the realization of network-centric warfare. MilCIS 2012: 1-7 - [c104]KamalEldin Mohamed, Duminda Wijesekera:
A Lightweight Framework for Web Services Implementations on Mobile Devices. IEEE MS 2012: 64-71 - [c103]Mohammad Ababneh, Duminda Wijesekera, James Bret Michael:
A Policy-Based Dialogue System for Physical Access Control. STIDS 2012: 57-63 - [c102]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Mapping evidence graphs to attack graphs. WIFS 2012: 121-126 - [c101]KamalEldin Mohamed, Duminda Wijesekera:
Performance Analysis of Web Services on Mobile Devices. ANT/MobiWIS 2012: 744-751 - [p3]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Transportation. Critical Infrastructure Protection 2012: 330-355 - 2011
- [j30]Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services Framework. IT Prof. 13(3): 31-37 (2011) - [j29]Min Xu, Duminda Wijesekera, Xinwen Zhang:
Runtime Administration of an RBAC Profile for XACML. IEEE Trans. Serv. Comput. 4(4): 286-299 (2011) - [c100]Bo Yu, J. Varga, Duminda Wijesekera, Angelos Stavrou
, Anoop Singhal:
Specifying Time-Out Points in Surgical EMRs-Work in Progress. CENTERIS (3) 2011: 165-174 - [c99]Paul Ngo, Duminda Wijesekera:
Enhancing the Usability of the Commercial Mobile Alert System. Critical Infrastructure Protection 2011: 137-149 - [c98]Ahmed Al-Faresi, Duminda Wijesekera:
Preemptive mechanism to prevent health data privacy leakage. MEDES 2011: 17-24 - 2010
- [j28]Ahmed Alazzawe, Anis Alazzawe, Duminda Wijesekera, Ram Dantu:
A testbed for large mobile social computing experiments. Int. J. Sens. Networks 8(2): 89-97 (2010) - [c97]Vikram Chandrasekaran, Ram Dantu, Neeraj K. Gupta, Xiaohui Yang, Duminda Wijesekera:
Efficiency of social connection-based routing in P2P VoIP networks. COMSNETS 2010: 1-6 - [c96]Anoop Singhal, Duminda Wijesekera:
Ontologies for modeling enterprise level security metrics. CSIIRW 2010: 58 - [c95]Mark Hartong, Rajni Goel, Duminda Wijesekera:
U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials. Critical Infrastructure Protection 2010: 141-155 - [c94]Murat Gunestas, Murad Mehmet, Duminda Wijesekera:
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services. IFIP Int. Conf. Digital Forensics 2010: 133-150 - [c93]Ahmed Al-Faresi, Duminda Wijesekera, Khalid Moidu
:
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules. IHI 2010: 637-646 - [c92]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia
:
Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100 - [c91]Xiaohui Yang, Angelos Stavrou
, Ram Dantu, Duminda Wijesekera:
Small World VoIP. MobiCASE 2010: 137-155 - [c90]Paul Seymer, Angelos Stavrou
, Duminda Wijesekera, Sushil Jajodia
:
QoP and QoS Policy Cognizant Module Composition. POLICY 2010: 77-86 - [c89]Murad Mehmet, Duminda Wijesekera:
Ontological Constructs to Create Money Laundering Schemes. STIDS 2010: 21-29 - [c88]Paul Ngo, Duminda Wijesekera:
Using Ontological Information to Enhance Responder Availability in Emergency Response. STIDS 2010: 42-49 - [c87]Ahmed A. L. Faresi, Bo Yu, Khalid Moidu, Angelos Stavrou, Duminda Wijesekera, Anoop Singhal:
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract. HealthSec 2010
2000 – 2009
- 2009
- [c86]Xiaohui Yang, Ram Dantu, Duminda Wijesekera:
Achieving Peer-to-Peer Telecommunication Services through Social Hashing. CCNC 2009: 1-2 - [c85]Murat Gunestas, Duminda Wijesekera:
Online detection of web choreography misuses. CollaborateCom 2009: 1-10 - [c84]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Meta-models for misuse cases. CSIIRW 2009: 33 - [c83]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Secure Cross-Domain Train Scheduling. Critical Infrastructure Protection 2009: 199-211 - [c82]Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia
:
Online detection of network traffic anomalies using behavioral distance. IWQoS 2009: 1-9 - [c81]Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray:
Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 - [c80]Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou
:
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 - [c79]Min Xu, Duminda Wijesekera:
A role-based XACML administration and delegation profile and its enforcement architecture. SWS 2009: 53-60 - [c78]Randall J. Arvay, Duminda Wijesekera, James Bret Michael:
Using RuleML to specify cross-domain information flow control policies. SoSE 2009: 1-6 - [c77]Murat Gunestas, Duminda Wijesekera, Ahmed Elkhodary:
An evidence generation model for web services. SoSE 2009: 1-6 - [c76]Anis Alazzawe, Ahmed Alazzawe, Duminda Wijesekera, Ram Dantu:
A testbed for mobile social computing. TRIDENTCOM 2009: 1-6 - [c75]Xiaohui Yang, Ram Dantu, Duminda Wijesekera:
A society-integrated testbed architecture for peer-to-peer telecommunications. TRIDENTCOM 2009: 1-6 - 2008
- [j27]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Security and the US rail infrastructure. Int. J. Crit. Infrastructure Prot. 1: 15-28 (2008) - [j26]Khaled Alghathbar, Duminda Wijesekera:
Enforcing Security Policies in Requirements Engineering Using AFUML. Int. J. Comput. Their Appl. 15(4): 237-251 (2008) - [j25]Steve Barker, Marek J. Sergot, Duminda Wijesekera:
Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): 1:1-1:47 (2008) - [j24]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distributed Syst. 19(6): 794-805 (2008) - [c74]Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera:
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685 - [c73]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera:
Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345 - [c72]Jon Whittle, Duminda Wijesekera, Mark Hartong:
Executable misuse cases for modeling security concerns. ICSE 2008: 121-130 - [c71]Murat Gunestas, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176 - [c70]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260 - [c69]Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 - [c68]Xinyuan Wang, Ruishan Zhang, Xiaohui Yang, Xuxian Jiang, Duminda Wijesekera:
Voice pharming attack and the trust of VoIP. SecureComm 2008: 24 - [e2]Kathryn Blackmond Laskey, Duminda Wijesekera:
Towards Effective Exploitation and Integration of Intelligence Resources, Proceedings of the Third International Ontology for the Intelligence Community Conference, OIC 2008, Fairfax, VA, USA, December 3-4, 2008. CEUR Workshop Proceedings 440, CEUR-WS.org 2008 [contents] - 2007
- [b1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180 - [j23]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries. J. Comput. Secur. 15(4): 417-445 (2007) - [j22]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Key management requirements for PTC operations. IEEE Veh. Technol. Mag. 2(2): 4-11 (2007) - [c67]Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser:
Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84 - [c66]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera:
XACML Policies for Exclusive Resource Usage. DBSec 2007: 275-290 - [c65]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Securing Positive Train Control Systems. Critical Infrastructure Protection 2007: 57-72 - [c64]Mark Hartong, Rajni Goel, Duminda Wijesekera:
A Framework for Investigating Railroad Accidents. IFIP Int. Conf. Digital Forensics 2007: 255-265 - [c63]Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas:
An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192 - [c62]Barry Sweeney, Duminda Wijesekera:
Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92 - [c61]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode:
Evaluating distributed xacml policies. SWS 2007: 99-110 - [c60]Mark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera:
PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554 - [c59]Saket Kaushik, Duminda Wijesekera:
RDF Collections. WEBIST (2) 2007: 91-97 - [c58]Saket Kaushik, Duminda Wijesekera:
RDF Collections. WEBIST (Selected Papers) 2007: 201-212 - [p2]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 - 2006
- [j21]Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera:
Securing UML Information Flow Using FlowUML. J. Res. Pract. Inf. Technol. 38(1) (2006) - [j20]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
uSMIL: Towards secure unbreakable semantics in multimedia web services. Comput. Syst. Sci. Eng. 21(5) (2006) - [j19]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Res. 16(5): 475-490 (2006) - [j18]Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera:
Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. J. Netw. Syst. Manag. 14(4): 599-602 (2006) - [j17]Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia:
SS7 over IP: signaling interworking vulnerabilities. IEEE Netw. 20(6): 32-41 (2006) - [c57]Nicola Zannone
, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 - [c56]Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 - [c55]Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia:
VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 - [c54]Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann:
An Algebra for Composing Ontologies. FOIS 2006: 265-276 - [c53]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Use-Misuse Case Driven Analysis of Positive Train Control. IFIP Int. Conf. Digital Forensics 2006: 141-155 - [c52]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 - [c51]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael:
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 - [c50]Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera:
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277 - [c49]Saket Kaushik, Duminda Wijesekera, Paul Ammann:
BPEL orchestration of secure webmail. SWS 2006: 85-94 - [c48]Mark Hartong, Rajni Goel, Duminda Wijesekera:
Communications Based Positive Train Control Systems Architecture in the USA. VTC Spring 2006: 2987-2991 - 2005
- [j16]Duminda Wijesekera, Anil Nerode:
Tableaux for constructive concurrent dynamic logic. Ann. Pure Appl. Log. 135(1-3): 1-72 (2005) - [j15]Naren Kodali, Duminda Wijesekera, James Bret Michael:
SPUTERS: An Integrated Traffic Surveillance and Emergency Response Architecture. J. Intell. Transp. Syst. 9(1): 11-22 (2005) - [j14]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semant. 2: 199-221 (2005) - [c47]Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann:
Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 - [c46]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia:
Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170 - [c45]Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael:
Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294 - [c44]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia:
MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005 - [c43]Duminda Wijesekera, James Bret Michael, Anil Nerode:
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118 - [c42]Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera:
Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83 - [c41]Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas:
Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 - [c40]Saket Kaushik, Duminda Wijesekera, Paul Ammann:
Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52 - [c39]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera:
Maintaining privacy on derived objects. WPES 2005: 10-19 - [e1]Sushil Jajodia, Duminda Wijesekera:
Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3654, Springer 2005, ISBN 3-540-28138-X [contents] - 2004
- [j13]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3) (2004) - [j12]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-based inference control in data cubes. J. Comput. Secur. 12(5): 655-692 (2004) - [j11]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
An authorization model for multimedia digital libraries. Int. J. Digit. Libr. 4(3): 139-155 (2004) - [j10]Claudio Bettini
, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Reasoning with advanced policy rules and its application to access control. Int. J. Digit. Libr. 4(3): 156-170 (2004) - [c38]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
A logic-based framework for attribute based access control. FMSE 2004: 45-55 - [c37]Inja Youn, Duminda Wijesekera:
Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. DBSec 2004: 205-218 - [c36]Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16 - [c35]Sushil Jajodia, Duminda Wijesekera:
A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345 - [c34]Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia:
Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384 - [c33]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296 - [c32]Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 - [c31]Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey:
A Policy Driven Approach to Email Services. POLICY 2004: 169- - [c30]Khaled Alghathbar, Duminda Wijesekera:
Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196 - [c29]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Securing OLAP Data Cubes Against Privacy Breaches. S&P 2004: 161- - [c28]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76 - 2003
- [j9]Claudio Bettini
, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Provisions and Obligations in Policy Rule Management. J. Netw. Syst. Manag. 11(3): 351-372 (2003) - [j8]Duminda Wijesekera, Sushil Jajodia:
A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003) - [j7]Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström:
Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003) - [c27]Khaled Alghathbar, Duminda Wijesekera:
authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86 - [c26]James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera:
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626 - [c25]Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371 - [c24]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 - [c23]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731 - [c22]Mohamed Sharif, Duminda Wijesekera:
Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36 - [c21]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Enforcing Integrity in Multimedia Surveillance. IICIS 2003: 67-81 - [c20]Khaled Alghathbar, Duminda Wijesekera:
Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387 - 2002
- [c19]Duminda Wijesekera, Sushil Jajodia:
Policy algebras for access control the predicate case. CCS 2002: 171-180 - [c18]Paul Ammann, Duminda Wijesekera, Saket Kaushik:
Scalable, graph-based network vulnerability analysis. CCS 2002: 217-224 - [c17]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Towards Secure XML Federations. DBSec 2002: 117-131 - [c16]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 - [c15]Claudio Bettini
, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Obligation Monitoring in Policy Management. POLICY 2002: 2-12 - [c14]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 - [c13]Naren Kodali, Duminda Wijesekera:
Regulating access to SMIL formatted pay-per-view movies. XML Security 2002: 53-60 - [p1]Steven Noel, Duminda Wijesekera, Charles E. Youman:
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. Applications of Data Mining in Computer Security 2002: 1-31 - 2001
- [j6]Sushil Jajodia, Duminda Wijesekera:
Security in Federated Database Systems. Inf. Secur. Tech. Rep. 6(2): 69-79 (2001) - [j5]Duminda Wijesekera, M. Ganesh, Jaideep Srivastava
, Anil Nerode:
Normal forms and syntactic completeness proofs for functional independencies. Theor. Comput. Sci. 266(1-2): 365-405 (2001) - [c12]Duminda Wijesekera, Sushil Jajodia:
Policy algebras for access control: the propositional case. CCS 2001: 38-47 - [c11]Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera:
Revocations-A Classification. CSFW 2001: 44-58 - [c10]Sushil Jajodia, Duminda Wijesekera:
Recent Advances in Access Control Models. DBSec 2001: 3-15 - [c9]Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia:
Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 - 2000
- [c8]Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang:
Constraints, Inference Channels and Secure Databases. CP 2000: 98-113 - [c7]Sang-Yeong Choi, Duminda Wijesekera:
The DADSim air defense simulation environment. HASE 2000: 75-82 - [c6]Duminda Wijesekera, Daniel Barbará:
Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. MDM/KDD 2000: 98-103
1990 – 1999
- 1999
- [j4]Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera:
Test and evaluation of distributed information system networks. Ann. Softw. Eng. 8: 289-311 (1999) - [j3]Duminda Wijesekera, Jaideep Srivastava
, Anil Nerode, Mark Foresti:
Experimental Evaluation of Loss Perception in Continuous Media. Multim. Syst. 7(6): 486-499 (1999) - 1998
- [c5]Duminda Wijesekera, Srivatsan Varadarajan, Shwetal S. Parikh, Jaideep Srivastava, Anil Nerode:
Performance evaluation of media losses in the Continuous Media Toolkit. MSE 1998: 60-67 - [c4]Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava:
Pattern Directed Mining of Sequence Data. KDD 1998: 51-57 - 1997
- [c3]Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti:
Experimental Evaluation of PFS Continuous Media File System. CIKM 1997: 246-253 - [c2]Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote:
A multimedia programming toolkit/environment. ICPADS 1997: 446-452 - [c1]Duminda Wijesekera, M. Ganesh, Jaideep Srivastava
, Anil Nerode:
Tableaux for Functional Dependencies and Independencies. TABLEAUX 1997: 358-372 - 1996
- [j2]Duminda Wijesekera, Jaideep Srivastava:
Quality of Service (QoS) Metrics for Continuous Media. Multim. Tools Appl. 3(2): 127-166 (1996) - 1990
- [j1]Duminda Wijesekera:
Constructive Modal Logics I. Ann. Pure Appl. Log. 50(3): 271-301 (1990)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint