Ray, Indrajit.
Overview
            | Works: | 1 works in 2 publications in 1 languages | |
|---|---|---|
Titles
          
                  
                    Information Systems Security = 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings /
                  
                  by: 
                  Sanghi, Dheeraj.; Kamakoti, V.; Conti, Mauro.; Gaur, Manoj Singh.; Ray, Indrajit.; SpringerLink (Online service)
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Advances in Digital Forensics IV
                  
                  by: 
                  SpringerLink (Online service); Ray, Indrajit.; IFIP International Conference on Digital Forensics ((2008 :); Shenoi, Sujeet.
                  (Language materials, printed)
                  
                  
                
                  
                    Risks and Security of Internet and Systems = 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers /
                  
                  by: 
                  Lopez, Javier.; Ray, Indrajit.; SpringerLink (Online service); Crispo, Bruno.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Cyber-Security Threats and Response Models in Nuclear Power Plants
                  
                  by: 
                  Diao, Xiaoxu.; Ray, Indrajit.; Zhu, Quanyan.; SpringerLink (Online service); Huang, Linan.; Smidts, Carol.; Vaddi, Pavan Kumar.; Pietrykowski, Michael C.; Zhao, Yunfei.; Talukdar, Rakibul.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/aut]
                  
                
                  
                    From Database to Cyber Security = Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday /
                  
                  by: 
                  SpringerLink (Online service); Samarati, Pierangela.; Ray, Indrajit.; Ray, Indrakshi.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    Information systems security = 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016 : proceedings /
                  
                  by: 
                  Workshop on the Preservation of Stability under Discretization ((2001 :); Ray, Indrajit.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                  
                    Industrial Control Systems Security and Resiliency = Practice and Theory /
                  
                  by: 
                  Rieger, Craig.; SpringerLink (Online service); Ray, Indrajit.; Haney, Michael A.; Zhu, Quanyan.
                  (Language materials, printed)
                  , [http://id.loc.gov/vocabulary/relators/edt]
                  
                
                  
                    From database to cyber security = essays dedicated to Sushil Jajodia on the occasion of his 70th birthday /
                  
                  by: 
                  Ray, Indrajit.; Ray, Indrakshi.; Samarati, Pierangela.; SpringerLink (Online service)
                  (Language materials, printed)
                  
                  
                
                
          Subjects
          
            
              
                Systems and Data Security.
              
            
              
                Data protection.
              
            
              
                Artificial intelligence.
              
            
              
                Computer Communication Networks.
              
            
              
                Software engineering.
              
            
              
                Electrical engineering.
              
            
              
                Information Systems Applications (incl. Internet).
              
            
              
                Computer Science.
              
            
              
                Computers and civilization.
              
            
              
                Information Systems Applications (incl. Internet)
              
            
              
                Algorithms.
              
            
              
                Cooperating objects (Computer systems).
              
            
              
                Management of Computing and Information Systems.
              
            
              
                Computer communication systems.
              
            
              
                Computer security
              
            
              
                Security.
              
            
              
                Application software.
              
            
              
                Forensic sciences
              
            
              
                Information Systems and Communication Service.
              
            
              
                Nuclear Energy.
              
            
              
                Artificial Intelligence.
              
            
              
                Computers and Society.
              
            
              
                Cryptology.
              
            
              
                Data encryption (Computer science).
              
            
              
                Computer Applications.
              
            
              
                Cyber-Physical Systems.
              
            
              
                Computer science.
              
            
              
                Management information systems.
              
            
              
                User Interfaces and Human Computer Interaction.
              
            
              
                Computer Science, general.
              
            
              
                Data and Information Security.
              
            
              
                Computer security.
              
            
              
                Nuclear engineering.
              
            
              
                Electronics in criminal investigation
              
            
              
                Databases.
              
            
              
                Software Engineering.
              
            
              
                Algorithm Analysis and Problem Complexity.
              
            
              
                Computer crimes
              
            
              
                Data Encryption.
              
            
              
                Computers
              
            
              
                Communications Engineering, Networks.