Languages
Jajodia, Sushil.
Overview
Works: | 1 works in 15 publications in 1 languages |
---|
Titles
Graphical Models for Security = Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers /
by:
SpringerLink (Online service); Jajodia, Sushil.; Mauw, Sjouke.; Kordy, Barbara.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Moving target defense II = application of game theory and adversarial modeling /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Encyclopedia of Cryptography, Security and Privacy
by:
Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Data and Applications Security XIX = 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
Wijesekera, Duminda.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Jajodia, Sushil.
(Language materials, printed)
Network security metrics
by:
Wang, Lingyu.; SpringerLink (Online service); Jajodia, Sushil.; Singhal, Anoop.
(Language materials, printed)
Computer security - ESORICS 2013 = 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Crampton, Jason.; Mayes, Keith.
(Language materials, printed)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Lopez, Javier.; Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
SpringerLink (Online service); Mazumdar, Chandan; Jajodia, Sushil.; Workshop on the Preservation of Stability under Discretization ((2001 :)
(Language materials, printed)
Moving target defense = creating asymmetric uncertainty for cyber threats /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan.
(Language materials, printed)
Information systems security = 7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Mazumdar, Chandan.
(Language materials, printed)
Network hardening = an automated approach to improving network security /
by:
Albanese, Massimiliano.; Wang, Lingyu.; SpringerLink (Online service); Jajodia, Sushil.
(Language materials, printed)
Cyber deception = building the scientific foundation /
by:
SpringerLink (Online service); Jajodia, Sushil.
(Language materials, printed)
Graphical models for security = second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
Mauw, Sjouke.; Kordy, Barbara.; Workshop on the Preservation of Stability under Discretization ((2001 :); Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Adaptive Autonomous Secure Cyber Systems
by:
Wang, Cliff.; Swarup, Vipin.; Jajodia, Sushil.; SpringerLink (Online service); Cybenko, George.; Wellman, Michael.; Subrahmanian, V.S.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Handbook of Database Security = Applications and Trends /
by:
Gertz, Michael.; SpringerLink (Online service); Jajodia, Sushil.
(Language materials, printed)
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense = Control- and Game-Theoretic Approaches to Cyber Security /
by:
Wang, Cliff.; Wellman, Michael.; Cybenko, George.; SpringerLink (Online service); Liu, Peng.; Jajodia, Sushil.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Information security theory and practice = 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
SpringerLink (Online service); Jajodia, Sushil.; Akram, Raja Naeem.; Workshop on the Preservation of Stability under Discretization ((2001 :)
(Language materials, printed)
Cyber Warfare = Building the Scientific Foundation /
by:
Subrahmanian, V.S.; Swarup, Vipin.; Jajodia, Sushil.; Shakarian, Paulo.; SpringerLink (Online service); Wang, Cliff.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Cyber Deception = Building the Scientific Foundation /
by:
Wang, Cliff.; Subrahmanian, V.S.; SpringerLink (Online service); Jajodia, Sushil.; Swarup, Vipin.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Secure cloud computing
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Information Security Theory and Practice = 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Akram, Raja Naeem.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Encyclopedia of cryptography and security
by:
Jajodia, Sushil.; SpringerLink (Online service); Tilborg, Henk C. A. van, (1947-)
(Language materials, printed)
Security for Telecommunications Networks
by:
Jajodia, Sushil.; SpringerLink (Online service); Porta, Thomas La.; McDaniel, Patrick.; Traynor, Patrick.
(Language materials, printed)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Liu, Peng.; SpringerLink (Online service); Wang, Cliff.
(Language materials, printed)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
Cimato, Stelvio.; SpringerLink (Online service); Jajodia, Sushil.; Samarati, Pierangela.
(Language materials, printed)
Show more
Fewer
Subjects
Electronic Commerce/e-business.
Artificial intelligence.
Computer Communication Networks.
Software engineering.
Electrical engineering.
Computer fraud.
Complexity.
Computer Systems Organization and Communication Networks.
Information Systems Applications (incl.Internet)
Information Systems Applications (incl. Internet)
Logics and Meanings of Programs.
Algorithms.
Artificial Intelligence (incl. Robotics)
Application software.
e-Commerce/e-business.
Artificial Intelligence.
Data Structures, Cryptology and Information Theory.
Data encryption (Computer science).
Coding theory.
Computational complexity.
Information Storage and Retrieval.
Computers.
Ubiquitous computing
Computer networks.
Database Management.
Performance and Reliability.
Applied mathematics.
Mathematical and Computational Engineering.
Telecommunication systems
Software Engineering.
Data Structures and Information Theory.
Algorithm Analysis and Problem Complexity.
Computer logic.
Data Encryption.
Operating Systems.
Computers
Coding and Information Theory.
Information theory.
Database security
Communications Engineering, Networks.
Applications of Mathematics.
Computer networks
Information Systems Applications (incl. Internet).
Data structures (Computer science).
Computer Science.
Game theory.
Management of Computing and Information Systems.
Computer communication systems.
Probability and Statistics in Computer Science.
Computer security
Legal Aspects of Computing.
Information Systems and Communication Service.
Internet
Mathematical statistics.
Computer crimes.
Special Purpose and Application-Based Systems.
Computers and Society.
Cryptology.
Uncertainty (Information theory)
Cloud computing
Computer Crime.
Engineering mathematics.
Computing Milieux.
Computer science.
Management information systems.
Database security.
Data encryption (Computer science)
Computer security.
Cloud computing.
Computer organization.
Systems and Data Security.
Data protection