Duminda Wijesekera
Duminda Wijesekera
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Scalable, graph-based network vulnerability analysis
P Ammann, D Wijesekera, S Kaushik
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
A logic-based framework for attribute based access control
L Wang, D Wijesekera, S Jajodia
Proceedings of the 2004 ACM workshop on Formal methods in security …, 2004
Detecting VoIP floods using the Hellinger distance
H Sengar, H Wang, D Wijesekera, S Jajodia
IEEE transactions on parallel and distributed systems 19 (6), 794-805, 2008
Model-based covert timing channels: Automated modeling and evasion
S Gianvecchio, H Wang, D Wijesekera, S Jajodia
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
A Liu, Y Yuan, D Wijesekera, A Stavrou
Proceedings of the 2009 ACM symposium on Applied Computing, 2054-2061, 2009
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
VLDB'02: Proceedings of the 28th International Conference on Very Large …, 2002
VoIP intrusion detection through interacting protocol state machines
H Sengar, D Wijesekera, H Wang, S Jajodia
International Conference on Dependable Systems and Networks (DSN'06), 393-402, 2006
DNPSec: Distributed network protocol version 3 (DNP3) security framework
M Majdalawieh, F Parisi-Presicce, D Wijesekera
Advances in Computer, Information, and Systems Sciences, and Engineering 1 …, 2006
A propositional policy algebra for access control
D Wijesekera, S Jajodia
ACM Transactions on Information and System Security (TISSEC) 6 (2), 286-325, 2003
Constructive modal logics I
D Wijesekera
Annals of Pure and Applied Logic 50 (3), 271-301, 1990
Modern intrusion detection, data mining, and degrees of attack guilt
S Noel, D Wijesekera, C Youman
Applications of data mining in computer security, 1-31, 2002
Securing OLAP data cubes against privacy breaches
L Wang, S Jajodia, D Wijesekera
IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 161-175, 2004
Experimental evaluation of loss perception in continuous media
D Wijesekera, J Srivastava, A Nerode, M Foresti
Multimedia systems 7, 486-499, 1999
Quality of service (QoS) metrics for continuous media
D Wijesekera, J Srivastava
Multimedia Tools and Applications 3, 127-166, 1996
Implementing security policies in software development tools
KS Alghathbar, D Wijesekera
US Patent 7,340,469, 2008
Executable misuse cases for modeling security concerns
J Whittle, D Wijesekera, M Hartong
Proceedings of the 30th international conference on Software engineering …, 2008
Revocations-a classification
A Hagstrom, S Jajodia, F Parisi-Presicce, D Wijesekera
Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 44-58, 2001
Provisions and obligations in policy rule management
C Bettini, S Jajodia, XS Wang, D Wijesekera
Journal of Network and Systems Management 11, 351-372, 2003
Fast detection of denial-of-service attacks on IP telephony
H Sengar, H Wang, D Wijesekera, S Jajodia
200614th IEEE International Workshop on Quality of Service, 199-208, 2006
Implementing Security Policies in Software Development Tools
K Alghathbar, D Wijesekera
US Patent App. 11/969,513, 2009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20