Name
Affiliation
Papers
DUMINDA WIJESEKERA
Cornell Univ., Ithaca, NY
172
Collaborators
Citations 
PageRank 
158
1464
141.54
Referers 
Referees 
References 
2688
1966
1373
Search Limit
1001000
Title
Citations
PageRank
Year
AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System00.342022
Can You Trust Zero Trust?10.482022
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory00.342022
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities00.342021
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments.00.342020
An Attack-Fault Tree Analysis Of A Movable Railroad Bridge00.342019
Sharing Genetic Data under US Privacy Laws.00.342018
Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness10.352018
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis.00.342018
Pseudonym Certificate Validations under Heavy Vehicular Traffic Loads00.342018
ADS-Bsec: A Holistic Framework to Secure ADS-B.00.342018
An Authentication Mechanism for Accessing Mobile Web Services.00.342017
Key Distribution Scheme For Aircraft Equipped With Secure Ads-B In10.692017
A layered graphical model for mission attack impact analysis.00.342017
Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback.00.342017
ADS-Bsec: A novel framework to secure ADS-B20.412017
Identifying Evidence for Cloud Forensic Analysis.10.392017
An ADS-B Intrusion Detection System00.342016
Secure ADS-B design & evaluation00.342015
POSTER: A Logic Based Network Forensics Model for Evidence Analysis00.342015
A Logic-Based Network Forensic Model for Evidence Analysis.60.592015
A Model Towards Using Evidence from Security Events for Network Attack Analysis.30.482014
An Automated Dialog System For Conducting Security Interviews For Access Control00.342014
An Ontology for Medical Treatment Consent.10.632014
Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions.00.342014
Timely Delivery Of Messages In Positive Train Control00.342013
Navigation Assistance Framework for Emergencies.00.342013
Creating Integrated Evidence Graphs for Network Forensics.30.502013
Mapping evidence graphs to attack graphs30.452012
Leveraging an Inventory of the Cognitive Radio Attack Surface20.862012
A Policy-Based Dialogue System for Physical Access Control.10.632012
Using Attack Graphs in Forensic Examinations90.682012
Forensic Web Services Framework30.422011
QoP and QoS Policy Cognizant Module Composition10.382010
Ontological Constructs to Create Money Laundering Schemes.20.522010
Achieving peer-to-peer telecommunication services through social hashing20.422010
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.00.342010
Tracking skype VoIP calls over the internet60.412010
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services20.382010
Us Federal Oversight Of Rail Transportation Of Toxic By Inhalation Materials00.342010
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules80.672010
A testbed for large mobile social computing experiments40.382010
A Society-Integrated Testbed Architecture For Peer-To-Peer Telecommunications10.382009
A Testbed For Mobile Social Computing20.402009
SQLProb: a proxy-based architecture towards preventing SQL injection attacks361.482009
Online detection of web choreography misuses10.372009
A role-based XACML administration and delegation profile and its enforcement architecture50.472009
Enforcing Security Policies in Requirements Engineering Using AFUML00.342008
Forensic Web Services80.612008
Model-Based Covert Timing Channels: Automated Modeling and Evasion602.152008
  • 1
  • 2