Titel | Art | | ISBN-13 | Erschei- nungsjahr | andere Autoren |
Adaptive Autonomous Secure Cyber Systems | Gebunden | | 978-3-030-33431-4 | 2020 | George Cybenko · V.S. Subrahmanian · Vipin Swarup · Cliff Wang · Michael Wellman |
Advanced Transaction Models and Architectures | Hardcover | | 978-0-7923-9880-6 | 1997 | Larry Kerschberg |
Advances in Multimedia Information Systems: 4th International Workshop, MIS'98, Istanbul, Turkey September 24-26, 1998, Proceedings | Taschenbuch | | 978-3-540-65107-9 | 2008 | Asuman Dogac · M. Tamar ?-zsu |
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security | " | | 978-3-030-30718-9 | 2019 | George Cybenko · Peng Liu · Cliff Wang · Michael Wellman |
Applications of Data Mining in Computer Security | Hardcover | | 978-1-4020-7054-9 | 2002 | Daniel Barbará |
Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings | Taschenbuch | | 978-3-540-88312-8 | 2008 |
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings | " | | 978-3-642-40202-9 | 2013 | Jason Crampton · Keith Mayes |
Conceptual Modeling - ER 2001: 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings: ER 2001 - ... | " | | 978-3-540-42866-4 | 2001 | Hideko S. Kunii · Arne Solvberg |
Cyber Deception: Building the Scientific Foundation | Gebunden | | 978-3-319-32697-9 | 2016 | V.S. Subrahmanian · Vipin Swarup · Cliff Wang |
Cyber Situational Awareness: Issues and Research | Paperback | | 978-1-4614-2475-8 | 2012 | Peng Liu · Vipin Swarup · Cliff Wang |
Cyber Warfare: Building the Scientific Foundation | Taschenbuch | | 978-3-319-36007-2 | 2016 | Paulo Shakarian · V.S. Subrahmanian · Vipin Swarup · Cliff Wang |
Cyber Warfare: Building the Scientific Foundation | Gebunden | | 978-3-319-14038-4 | 2015 | Paulo Shakarian · V.S. Subrahmanian · Vipin Swarup · Cliff Wang |
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings | Taschenbuch | | 978-3-642-13738-9 | 2010 | Sara Foresti |
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, ... Notes in Computer Science, Band 3654) | " | | 978-3-540-28138-2 | 2008 | Duminda Wijesekera |
Database Security Xii: Status And Prospects | Paperback | | 978-1-4757-4914-4 | 2013 |
Database Security XII: Status and Prospects | Hardcover | | 978-0-7923-8488-5 | 1999 |
Encyclopedia of Cryptography and Security | " | | 978-1-4419-5905-8 | 2011 | Henk C.A. van Tilborg |
Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers | Taschenbuch | | 978-3-319-29967-9 | 2016 | Sjouke Mauw · Barbara Kordy |
Handbook of Database Security | Broschiert | | 978-0-387-51684-4 | 2008 | Michael Gertz |
Handbook of Database Security: Applications and Trends | Hardcover | | 978-0-387-48532-4 | 2007 | " |
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings | Taschenbuch | | 978-3-662-51541-9 | 2016 | Nora Cuppens-Boulahia · Frederic Cuppens · Anas Abou El Kalam · Thierry Sans |
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings | Gebunden | | 978-3-642-55414-8 | 2014 | Nora Cuppens-Boulahia · Frederic Cuppens · Anas Abou El Kalam · Thierry Sans |
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures | Hardcover | | 978-0-7923-7204-2 | 2000 | Neil F. Johnson · Zoran Duric |
Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. ... Notes in Computer Science, Band 9311) | Taschenbuch | | 978-3-319-24017-6 | 2015 | Raja Naeem Akram |
Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings | " | | 978-3-642-25559-5 | 2011 | Chandan Mazumdar |
Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings | " | | 978-3-319-26960-3 | 2015 | " |
Information Systems Security: First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings | " | | 978-3-540-30706-8 | 2008 |
Integrity and Internal Control in Information Systems | Hardcover | | 978-0-412-84770-7 | 1998 | William List · Graeme W. McGregor |
Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in information systems: Increasing the Confidence in ... in Information and Communication Technology) | " | | 978-0-412-82600-9 | 1997 | Graeme W. McGregor · William List |
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach | " | | 978-1-4020-7624-4 | 2003 | Peng Ning · Xiaoyang Sean Wang |
Journal on Data Semantics II | Taschenbuch | | 978-3-540-24208-6 | 2008 | Dennis McLeod · Stefano Spaccapietra · Elisa Bertino · Roger B. King |
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats | Paperback | | 978-1-4614-2991-3 | 2013 | Anup K. Ghosh · Vipin Swarup · Cliff Wang · X. Sean Wang |
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats | Hardcover | | 978-1-4614-0976-2 | 2011 | Anup K. Ghosh · Vipin Swarup · Cliff Wang · X. Sean Wang |
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats | Paperback | | 978-1-4614-0978-6 | 2011 | Anup K. Ghosh · Vipin Swarup |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling | Hardcover | | 978-1-4614-5415-1 | 2012 | Anup K. Ghosh · V.S. Subrahmanian · Vipin Swarup · Cliff Wang · X. Sean Wang |
Moving Target Defense II: Application of Game Theory and Adversarial Modeling | Paperback | | 978-1-4614-5417-5 | 2012 | Anup K. Ghosh · V.S. Subrahmanian |
Multilevel Secure Transaction Processing | Hardcover | | 978-0-7923-7702-3 | 1999 | Vijay Atluri · Binto George |
Multimedia Database Systems: Issues and Research Directions | Taschenbuch | | 978-3-642-64622-5 | 1996 | V.S. Subrahmanian |
Multimedia Database Systems: Issues and Research Directions | Gebunden | | 978-3-540-58710-1 | 1995 | " |
Network Security Metrics | " | | 978-3-319-66504-7 | 2017 | Lingyu Wang · Anoop Singhal |
Preserving Privacy in On-Line Analytical Processing | Broschiert | | 978-0-387-51642-4 | 2008 | Lingyu Wang · Duminda Wijesekera |
Preserving Privacy in On-Line Analytical Processing | Hardcover | | 978-0-387-46273-8 | 2006 | Lingyu Wang · Duminda Wijesekera |
Privacy in Location-Based Applications: Research Issues and Emerging Trends | Taschenbuch | | 978-3-642-03510-4 | 2009 | Claudio Bettini · Pierangela Samarati · Sean X. Wang |
Proceedings of the 1993 Sigmod International Conference Management of Data | Paperback | | 978-0-89791-592-2 | 1993 |
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, ... in Information and Communication Technology) | Hardcover | | 978-0-387-09698-8 | 2008 | Pierangela Samarati · Stelvio Cimato |
Secure Cloud Computing | " | | 978-1-4614-9277-1 | 2014 | Krishna Kant · Pierangela Samarati · Anoop Singhal · Vipin Swarup · Cliff Wang |
Secure Data Management in Decentralized Systems | " | | 978-0-387-27694-6 | 2006 | Ting Yu |
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings | Paperback | | 978-3-642-16162-9 | 2011 | Jianying Zhou |
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... and Telecommunications Engineering, Band 50) | Taschenbuch | | 978-3-642-16160-5 | 2010 | " |
Temporal Databases: Research and Practice | " | | 978-3-540-64519-1 | 2008 | Opher Etzion · Suryanarayana Sripada |
Theory and Models for Cyber Situation Awareness | " | | 978-3-319-61151-8 | 2017 | Peng Liu · Cliff Wang |
Time Granularities in Databases, Data Mining, and Temporal Reasoning | " | | 978-3-642-08634-2 | 2010 | Claudio Bettini · Sean Wang |
Time Granularities in Databases, Data Mining, and Temporal Reasoning | Gebunden | | 978-3-540-66997-5 | 2000 | Claudio Bettini · Sean Wang |