語系
跳至 : 概要 | 書目資訊 | 主題

Jajodia, Sushil.

概要
作品: 1 作品在 15 項出版品 1 種語言
書目資訊
Graphical Models for Security = Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / by: SpringerLink (Online service); Jajodia, Sushil.; Mauw, Sjouke.; Kordy, Barbara. (書目-語言資料,印刷品) , [http://id.loc.gov/vocabulary/relators/edt]
Moving target defense II = application of game theory and adversarial modeling / by: Jajodia, Sushil.; SpringerLink (Online service) (書目-語言資料,印刷品)
Encyclopedia of Cryptography, Security and Privacy by: Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela. (書目-語言資料,印刷品) , [http://id.loc.gov/vocabulary/relators/edt]
Data and Applications Security XIX = 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings / by: Wijesekera, Duminda.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Jajodia, Sushil. (書目-語言資料,印刷品)
Network security metrics by: Wang, Lingyu.; SpringerLink (Online service); Jajodia, Sushil.; Singhal, Anoop. (書目-語言資料,印刷品)
Computer security - ESORICS 2013 = 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings / by: Jajodia, Sushil.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Crampton, Jason.; Mayes, Keith. (書目-語言資料,印刷品)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Lopez, Javier.; Jajodia, Sushil.; SpringerLink (Online service) (書目-語言資料,印刷品)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings by: SpringerLink (Online service); Mazumdar, Chandan; Jajodia, Sushil.; Workshop on the Preservation of Stability under Discretization ((2001 :) (書目-語言資料,印刷品)
Moving target defense = creating asymmetric uncertainty for cyber threats / by: Jajodia, Sushil.; SpringerLink (Online service) (書目-語言資料,印刷品)
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan. (書目-語言資料,印刷品)
更多
主題
Electronic Commerce/e-business. Artificial intelligence. Computer Communication Networks. Software engineering. Electrical engineering. Computer fraud. Complexity. Computer Systems Organization and Communication Networks. Information Systems Applications (incl.Internet) Information Systems Applications (incl. Internet) Logics and Meanings of Programs. Algorithms. Artificial Intelligence (incl. Robotics) Application software. e-Commerce/e-business. Artificial Intelligence. Data Structures, Cryptology and Information Theory. Data encryption (Computer science). Coding theory. Computational complexity. Information Storage and Retrieval. Computers. Ubiquitous computing Computer networks. Database Management. Performance and Reliability. Applied mathematics. Mathematical and Computational Engineering. Telecommunication systems Software Engineering. Data Structures and Information Theory. Algorithm Analysis and Problem Complexity. Computer logic. Data Encryption. Operating Systems. Computers Coding and Information Theory. Information theory. Database security Communications Engineering, Networks. Applications of Mathematics. Computer networks Information Systems Applications (incl. Internet). Data structures (Computer science). Computer Science. Game theory. Management of Computing and Information Systems. Computer communication systems. Probability and Statistics in Computer Science. Computer security Legal Aspects of Computing. Information Systems and Communication Service. Internet Mathematical statistics. Computer crimes. Special Purpose and Application-Based Systems. Computers and Society. Cryptology. Uncertainty (Information theory) Cloud computing Computer Crime. Engineering mathematics. Computing Milieux. Computer science. Management information systems. Database security. Data encryption (Computer science) Computer security. Cloud computing. Computer organization. Systems and Data Security. Data protection
 
 
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入