語系
Jajodia, Sushil.
概要
作品: | 1 作品在 15 項出版品 1 種語言 |
---|
書目資訊
Graphical Models for Security = Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers /
by:
SpringerLink (Online service); Jajodia, Sushil.; Mauw, Sjouke.; Kordy, Barbara.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Encyclopedia of Cryptography, Security and Privacy
by:
Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Moving target defense II = application of game theory and adversarial modeling /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Data and Applications Security XIX = 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
Wijesekera, Duminda.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Jajodia, Sushil.
(書目-語言資料,印刷品)
Network security metrics
by:
Wang, Lingyu.; SpringerLink (Online service); Jajodia, Sushil.; Singhal, Anoop.
(書目-語言資料,印刷品)
Computer security - ESORICS 2013 = 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Crampton, Jason.; Mayes, Keith.
(書目-語言資料,印刷品)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Lopez, Javier.; Jajodia, Sushil.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
SpringerLink (Online service); Mazumdar, Chandan; Jajodia, Sushil.; Workshop on the Preservation of Stability under Discretization ((2001 :)
(書目-語言資料,印刷品)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan.
(書目-語言資料,印刷品)
Information systems security = 7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Mazumdar, Chandan.
(書目-語言資料,印刷品)
Network hardening = an automated approach to improving network security /
by:
Albanese, Massimiliano.; Wang, Lingyu.; SpringerLink (Online service); Jajodia, Sushil.
(書目-語言資料,印刷品)
Cyber deception = building the scientific foundation /
by:
SpringerLink (Online service); Jajodia, Sushil.
(書目-語言資料,印刷品)
Graphical models for security = second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
Mauw, Sjouke.; Kordy, Barbara.; Workshop on the Preservation of Stability under Discretization ((2001 :); Jajodia, Sushil.; SpringerLink (Online service)
(書目-語言資料,印刷品)
Handbook of Database Security = Applications and Trends /
by:
Gertz, Michael.; SpringerLink (Online service); Jajodia, Sushil.
(書目-語言資料,印刷品)
Adaptive Autonomous Secure Cyber Systems
by:
Wang, Cliff.; Swarup, Vipin.; Jajodia, Sushil.; SpringerLink (Online service); Cybenko, George.; Wellman, Michael.; Subrahmanian, V.S.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense = Control- and Game-Theoretic Approaches to Cyber Security /
by:
Wang, Cliff.; Wellman, Michael.; Cybenko, George.; SpringerLink (Online service); Liu, Peng.; Jajodia, Sushil.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Information security theory and practice = 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
SpringerLink (Online service); Jajodia, Sushil.; Akram, Raja Naeem.; Workshop on the Preservation of Stability under Discretization ((2001 :)
(書目-語言資料,印刷品)
Cyber Warfare = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; Swarup, Vipin.; Jajodia, Sushil.; Shakarian, Paulo.; SpringerLink (Online service); Wang, Cliff.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber Deception = Building the Scientific Foundation /
by:
Wang, Cliff.; Subrahmanian, V.S.; SpringerLink (Online service); Jajodia, Sushil.; Swarup, Vipin.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Information Security Theory and Practice = 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Akram, Raja Naeem.
(書目-語言資料,印刷品)
, [http://id.loc.gov/vocabulary/relators/edt]
Encyclopedia of cryptography and security
by:
Jajodia, Sushil.; SpringerLink (Online service); Tilborg, Henk C. A. van, (1947-)
(書目-語言資料,印刷品)
Security for Telecommunications Networks
by:
Jajodia, Sushil.; SpringerLink (Online service); Porta, Thomas La.; McDaniel, Patrick.; Traynor, Patrick.
(書目-語言資料,印刷品)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Liu, Peng.; SpringerLink (Online service); Wang, Cliff.
(書目-語言資料,印刷品)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
Cimato, Stelvio.; SpringerLink (Online service); Jajodia, Sushil.; Samarati, Pierangela.
(書目-語言資料,印刷品)
更多
較少的
主題
Electronic Commerce/e-business.
Computer Communication Networks.
Software engineering.
Information Systems Applications (incl.Internet)
Information Systems Applications (incl. Internet)
Application software.
e-Commerce/e-business.
Data Structures, Cryptology and Information Theory.
Computational complexity.
Computers.
Data Structures and Information Theory.
Algorithm Analysis and Problem Complexity.
Operating Systems.
Information Systems Applications (incl. Internet).
Data structures (Computer science).
Management of Computing and Information Systems.
Computer communication systems.
Probability and Statistics in Computer Science.
Special Purpose and Application-Based Systems.
Uncertainty (Information theory)
Computer Crime.
Data encryption (Computer science)
Cloud computing.
Computer organization.
Data protection
Computer fraud.
Data encryption (Computer science).
Performance and Reliability.
Mathematical and Computational Engineering.
Software Engineering.
Information theory.
Communications Engineering, Networks.
Artificial intelligence.
Electrical engineering.
Complexity.
Logics and Meanings of Programs.
Algorithms.
Coding theory.
Ubiquitous computing
Database Management.
Computer logic.
Computers
Coding and Information Theory.
Database security
Applications of Mathematics.
Computer Science.
Computer crimes.
Cloud computing
Engineering mathematics.
Computing Milieux.
Computer science.
Management information systems.
Database security.
Computer security.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Artificial Intelligence (incl. Robotics)
Artificial Intelligence.
Information Storage and Retrieval.
Computer networks.
Applied mathematics.
Telecommunication systems
Data Encryption.
Computer networks
Game theory.
Computer security
Legal Aspects of Computing.
Information Systems and Communication Service.
Internet
Mathematical statistics.
Computers and Society.
Cryptology.