Languages
Jump To : Overview | Titles | Subjects

Jajodia, Sushil.

Overview
Works: 1 works in 15 publications in 1 languages
Titles
Graphical Models for Security = Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / by: SpringerLink (Online service); Jajodia, Sushil.; Mauw, Sjouke.; Kordy, Barbara. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Encyclopedia of Cryptography, Security and Privacy by: Jajodia, Sushil.; Yung, Moti.; SpringerLink (Online service); Samarati, Pierangela. (Language materials, printed) , [http://id.loc.gov/vocabulary/relators/edt]
Moving target defense II = application of game theory and adversarial modeling / by: Jajodia, Sushil.; SpringerLink (Online service) (Language materials, printed)
Data and Applications Security XIX = 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings / by: Wijesekera, Duminda.; Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Jajodia, Sushil. (Language materials, printed)
Network security metrics by: Wang, Lingyu.; SpringerLink (Online service); Jajodia, Sushil.; Singhal, Anoop. (Language materials, printed)
Computer security - ESORICS 2013 = 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings / by: Jajodia, Sushil.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :); Crampton, Jason.; Mayes, Keith. (Language materials, printed)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Lopez, Javier.; Jajodia, Sushil.; SpringerLink (Online service) (Language materials, printed)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings by: SpringerLink (Online service); Mazumdar, Chandan; Jajodia, Sushil.; Workshop on the Preservation of Stability under Discretization ((2001 :) (Language materials, printed)
Moving target defense = creating asymmetric uncertainty for cyber threats / by: Jajodia, Sushil.; SpringerLink (Online service) (Language materials, printed)
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings / by: Workshop on the Preservation of Stability under Discretization ((2001 :); Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan. (Language materials, printed)
Show more
Subjects
Electronic Commerce/e-business. Computer Communication Networks. Software engineering. Information Systems Applications (incl.Internet) Information Systems Applications (incl. Internet) Application software. e-Commerce/e-business. Data Structures, Cryptology and Information Theory. Computational complexity. Computers. Data Structures and Information Theory. Algorithm Analysis and Problem Complexity. Operating Systems. Information Systems Applications (incl. Internet). Data structures (Computer science). Management of Computing and Information Systems. Computer communication systems. Probability and Statistics in Computer Science. Special Purpose and Application-Based Systems. Uncertainty (Information theory) Computer Crime. Data encryption (Computer science) Cloud computing. Computer organization. Data protection Computer fraud. Data encryption (Computer science). Performance and Reliability. Mathematical and Computational Engineering. Software Engineering. Information theory. Communications Engineering, Networks. Artificial intelligence. Electrical engineering. Complexity. Logics and Meanings of Programs. Algorithms. Coding theory. Ubiquitous computing Database Management. Computer logic. Computers Coding and Information Theory. Database security Applications of Mathematics. Computer Science. Computer crimes. Cloud computing Engineering mathematics. Computing Milieux. Computer science. Management information systems. Database security. Computer security. Systems and Data Security. Computer Systems Organization and Communication Networks. Artificial Intelligence (incl. Robotics) Artificial Intelligence. Information Storage and Retrieval. Computer networks. Applied mathematics. Telecommunication systems Data Encryption. Computer networks Game theory. Computer security Legal Aspects of Computing. Information Systems and Communication Service. Internet Mathematical statistics. Computers and Society. Cryptology.
 
 
Change password
Login