Sushil Jajodia

S.J. · Sushil Jajoda

TitelArt ISBN-13Erschei-
nungsjahr
andere Autoren
Adaptive Autonomous Secure Cyber SystemsGebunden 978-3-030-33431-42020George Cybenko · V.S. Subrahmanian · Vipin Swarup · Cliff Wang · Michael Wellman
Advanced Transaction Models and ArchitecturesHardcover
978-0-7923-9880-61997Larry Kerschberg
Advances in Multimedia Information Systems: 4th International Workshop, MIS'98, Istanbul, Turkey September 24-26, 1998, ProceedingsTaschenbuch 978-3-540-65107-92008Asuman Dogac · M. Tamar ?-zsu
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security  " 978-3-030-30718-92019George Cybenko · Peng Liu · Cliff Wang · Michael Wellman
Applications of Data Mining in Computer SecurityHardcover
978-1-4020-7054-92002Daniel Barbará
Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. ProceedingsTaschenbuch 978-3-540-88312-82008
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings  " 978-3-642-40202-92013Jason Crampton · Keith Mayes
Conceptual Modeling - ER 2001: 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings: ER 2001 - ...  " 978-3-540-42866-42001Hideko S. Kunii · Arne Solvberg
Cyber Deception: Building the Scientific FoundationGebunden 978-3-319-32697-92016V.S. Subrahmanian · Vipin Swarup · Cliff Wang
Cyber Situational Awareness: Issues and ResearchPaperback
978-1-4614-2475-82012Peng Liu · Vipin Swarup · Cliff Wang
Cyber Warfare: Building the Scientific FoundationTaschenbuch 978-3-319-36007-22016Paulo Shakarian · V.S. Subrahmanian · Vipin Swarup · Cliff Wang
Cyber Warfare: Building the Scientific FoundationGebunden 978-3-319-14038-42015Paulo Shakarian · V.S. Subrahmanian · Vipin Swarup · Cliff Wang
Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, ProceedingsTaschenbuch 978-3-642-13738-92010Sara Foresti
Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, ... Notes in Computer Science, Band 3654)  " 978-3-540-28138-22008Duminda Wijesekera
Database Security Xii: Status And ProspectsPaperback
978-1-4757-4914-42013
Database Security XII: Status and ProspectsHardcover
978-0-7923-8488-51999
Encyclopedia of Cryptography and Security  "
978-1-4419-5905-82011Henk C.A. van Tilborg
Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected PapersTaschenbuch 978-3-319-29967-92016Sjouke Mauw · Barbara Kordy
Handbook of Database SecurityBroschiert
978-0-387-51684-42008Michael Gertz
Handbook of Database Security: Applications and TrendsHardcover
978-0-387-48532-42007  "
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, ProceedingsTaschenbuch 978-3-662-51541-92016Nora Cuppens-Boulahia · Frederic Cuppens · Anas Abou El Kalam · Thierry Sans
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, ProceedingsGebunden 978-3-642-55414-82014Nora Cuppens-Boulahia · Frederic Cuppens · Anas Abou El Kalam · Thierry Sans
Information Hiding: Steganography and Watermarking - Attacks and CountermeasuresHardcover
978-0-7923-7204-22000Neil F. Johnson · Zoran Duric
Information Security Theory and Practice: 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. ... Notes in Computer Science, Band 9311)Taschenbuch 978-3-319-24017-62015Raja Naeem Akram
Information Systems Security: 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings  " 978-3-642-25559-52011Chandan Mazumdar
Information Systems Security: 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings  " 978-3-319-26960-32015  "
Information Systems Security: First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings  " 978-3-540-30706-82008
Integrity and Internal Control in Information SystemsHardcover
978-0-412-84770-71998William List · Graeme W. McGregor
Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in information systems: Increasing the Confidence in ... in Information and Communication Technology)  "
978-0-412-82600-91997Graeme W. McGregor · William List
Intrusion Detection in Distributed Systems: An Abstraction-Based Approach  "
978-1-4020-7624-42003Peng Ning · Xiaoyang Sean Wang
Journal on Data Semantics IITaschenbuch 978-3-540-24208-62008Dennis McLeod · Stefano Spaccapietra · Elisa Bertino · Roger B. King
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber ThreatsPaperback
978-1-4614-2991-32013Anup K. Ghosh · Vipin Swarup · Cliff Wang · X. Sean Wang
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber ThreatsHardcover
978-1-4614-0976-22011Anup K. Ghosh · Vipin Swarup · Cliff Wang · X. Sean Wang
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber ThreatsPaperback
978-1-4614-0978-62011Anup K. Ghosh · Vipin Swarup
Moving Target Defense II: Application of Game Theory and Adversarial ModelingHardcover
978-1-4614-5415-12012Anup K. Ghosh · V.S. Subrahmanian · Vipin Swarup · Cliff Wang · X. Sean Wang
Moving Target Defense II: Application of Game Theory and Adversarial ModelingPaperback
978-1-4614-5417-52012Anup K. Ghosh · V.S. Subrahmanian
Multilevel Secure Transaction ProcessingHardcover
978-0-7923-7702-31999Vijay Atluri · Binto George
Multimedia Database Systems: Issues and Research DirectionsTaschenbuch 978-3-642-64622-51996V.S. Subrahmanian
Multimedia Database Systems: Issues and Research DirectionsGebunden 978-3-540-58710-11995  "
Network Security Metrics  " 978-3-319-66504-72017Lingyu Wang · Anoop Singhal
Preserving Privacy in On-Line Analytical ProcessingBroschiert
978-0-387-51642-42008Lingyu Wang · Duminda Wijesekera
Preserving Privacy in On-Line Analytical ProcessingHardcover
978-0-387-46273-82006Lingyu Wang · Duminda Wijesekera
Privacy in Location-Based Applications: Research Issues and Emerging TrendsTaschenbuch 978-3-642-03510-42009Claudio Bettini · Pierangela Samarati · Sean X. Wang
Proceedings of the 1993 Sigmod International Conference Management of DataPaperback
978-0-89791-592-21993
Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, ... in Information and Communication Technology)Hardcover
978-0-387-09698-82008Pierangela Samarati · Stelvio Cimato
Secure Cloud Computing  "
978-1-4614-9277-12014Krishna Kant · Pierangela Samarati · Anoop Singhal · Vipin Swarup · Cliff Wang
Secure Data Management in Decentralized Systems  "
978-0-387-27694-62006Ting Yu
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, ProceedingsPaperback 978-3-642-16162-92011Jianying Zhou
Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings ... and Telecommunications Engineering, Band 50)Taschenbuch 978-3-642-16160-52010  "
Temporal Databases: Research and Practice  " 978-3-540-64519-12008Opher Etzion · Suryanarayana Sripada
Theory and Models for Cyber Situation Awareness  " 978-3-319-61151-82017Peng Liu · Cliff Wang
Time Granularities in Databases, Data Mining, and Temporal Reasoning  " 978-3-642-08634-22010Claudio Bettini · Sean Wang
Time Granularities in Databases, Data Mining, and Temporal ReasoningGebunden 978-3-540-66997-52000Claudio Bettini · Sean Wang

Assn for Computing Machinery · Chapman and Hall · Springer

 

SUSHMA JAJU