Duminda Wijesekera
Orcid: 0000-0002-7122-3055Affiliations:
- George Mason University, Fairfax, Virginia, USA
According to our database1,
Duminda Wijesekera
authored at least 208 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.gmu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Benchmarking the Performance of 5G CV2X for Connected Vehicles based Adaptive Traffic Signal.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024
2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
2022
IEEE Secur. Priv., 2022
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
2021
Computer, 2021
Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems, 2021
Proceedings of the IEEE Intelligent Vehicles Symposium Workshops, 2021
2020
Proceedings of the Advances in Digital Forensics XVI, 2020
2019
J. Digit. Forensics Secur. Law, 2019
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019
Proceedings of the Smart Cities, Green Technologies and Intelligent Transport Systems, 2019
Proceedings of the Advances in Digital Forensics XV, 2019
Proceedings of the Critical Infrastructure Protection XIII, 2019
Proceedings of the IEEE 2nd Connected and Automated Vehicles Symposium, 2019
2018
Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness.
IEEE Veh. Technol. Mag., 2018
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Critical Infrastructure Protection XII, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
2017
Proceedings of the Mobile Web and Intelligent Information Systems, 2017
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback.
Proceedings of the Critical Infrastructure Protection XI, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the Research Advances in Cloud Computing, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016
Proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
2015
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015
Toward Representing and Recognizing Cyber-Physical Autonomous Agents in Competition Using Event Semantics.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2015
Proceedings of the 18th International Conference on Information Fusion, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Software Eng., 2014
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction.
J. Digit. Forensics Secur. Law, 2014
Security requirement derivation by noun-verb analysis of use-misuse case relationships: a case study using positive train control.
Innov. Syst. Softw. Eng., 2014
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014
Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014
Proceedings of the WOSIS 2014, 2014
Proceedings of the Critical Infrastructure Protection VIII, 2014
2013
Int. J. Inf. Priv. Secur. Integr., 2013
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the Critical Infrastructure Protection VII, 2013
2012
Proceedings of the 3rd International Conference on Ambient Systems, 2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, 2012
Proceedings of the 2012 IEEE First International Conference on Mobile Services, 2012
Cognitive radio technologies: Envisioning the realization of network-centric warfare.
Proceedings of the 2012 Military Communications and Information Systems Conference, 2012
Proceedings of the Critical Infrastructure Protection VI, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011
Proceedings of the Critical Infrastructure Protection V, 2011
Proceedings of the ENTERprise Information Systems - International Conference, 2011
2010
Int. J. Sens. Networks, 2010
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Using Ontological Information to Enhance Responder Availability in Emergency Response.
Proceedings of the Fifth International Conference on Semantic Technologies for Intelligence, 2010
Proceedings of the Fifth International Conference on Semantic Technologies for Intelligence, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules.
Proceedings of the ACM International Health Informatics Symposium, 2010
Proceedings of the Advances in Digital Forensics VI, 2010
Proceedings of the Critical Infrastructure Protection IV, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the Second International Conference on Communication Systems and Networks, 2010
2009
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009
A role-based XACML administration and delegation profile and its enforcement architecture.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
Proceedings of the Critical Infrastructure Protection III, 2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
Enforcing Security Policies in Requirements Engineering Using AFUML.
Int. J. Comput. Their Appl., 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
J. Comput. Secur., 2007
RDF Collections.
Proceedings of the WEBIST 2007, 2007
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Comparison of IPsec to TLS and SRTP for Securing VoIP.
Proceedings of the Security in Information Systems, 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the Advances in Digital Forensics III, 2007
Proceedings of the Critical Infrastructure Protection, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 3rd Workshop on Advances in Model Based Testing, 2007
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007
2006
J. Netw. Syst. Manag., 2006
An ontology-based distributed whiteboard to determine legal responses to online cyber attacks.
Internet Res., 2006
uSMIL: Towards secure unbreakable semantics in multimedia web services.
Comput. Syst. Sci. Eng., 2006
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords.
Proceedings of the Security in Information Systems, 2006
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006
Proceedings of the Formal Ontology in Information Systems, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the Data and Applications Security XX, 2006
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Proceedings of the Data and Applications Security XX, 2006
2005
J. Intell. Transp. Syst., 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005
Honeynet Clusters as an early Warning System for Production Networks.
Proceedings of the Security in Information Systems, 2005
Secure UML Information Flow using FlowUML.
Proceedings of the Security in Information Systems, 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the Advances in Digital Forensics, 2005
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005
2004
Int. J. Digit. Libr., 2004
Specifying multimedia access control using RDF.
Comput. Syst. Sci. Eng., 2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Intelligence and Security Informatics, 2004
Proceedings of the Intelligence and Security Informatics, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Computer Security, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
2003
ACM Trans. Database Syst., 2003
ACM Trans. Inf. Syst. Secur., 2003
Proceedings of the «UML» 2003, 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Providing Voice Privacy Over Public Switched Telephone Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the Computer Security, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
authUML: a three-phased framework to analyze access control specifications in use cases.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
2002
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002
Proceedings of 28th International Conference on Very Large Data Bases, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the Computer Security, 2002
Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
2001
Theor. Comput. Sci., 2001
Subject Switching Algorithms for Access Control in Federated Databases.
Proceedings of the Database and Application Security XV, 2001
Recent Advances in Access Control Models.
Proceedings of the Database and Application Security XV, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the CCS 2001, 2001
2000
Mining Cinematic Knowledge Work in Progress [An Extended Abstract].
Proceedings of the International Workshop on Multimedia Data Mining, 2000
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000
Proceedings of the Principles and Practice of Constraint Programming, 2000
1999
Ann. Softw. Eng., 1999
1998
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998
Proceedings of the 1998 International Workshop on Multimedia Software Engineering, 1998
1997
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1997
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997
Proceedings of the Sixth International Conference on Information and Knowledge Management (CIKM'97), 1997
1996
1990