Languages
Jajodia, Sushil.
Overview
Works: | 2 works in 12 publications in 1 languages |
---|
Titles
Information systems security = 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan.
(Electronic resources)
Proceedings of The Ifip Tc 11 23rd International Information Security Conference = IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy/
by:
Jajodia, Sushil.; SpringerLink (Online service); Cimato, Stelvio.; Samarati, Pierangela.
(Language materials, printed)
Temporal databases = research and practice /
by:
Jajodia, Sushil.; SpringerLink (Online service); Etzion, Opher.; Sripada, Suryanarayana.
(Language materials, printed)
Adaptive autonomous secure cyber systems
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; SpringerLink (Online service); Liu, Peng.; Wang, Cliff.
(Electronic resources)
Handbook of Database Security = Applications and Trends /
by:
Gertz, Michael.; Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Network hardening = an automated approach to improving network security /
by:
Jajodia, Sushil.; SpringerLink (Online service); Wang, Lingyu.; Albanese, Massimiliano.
(Electronic resources)
Security for Telecommunications Networks
by:
Jajodia, Sushil.; SpringerLink (Online service); McDaniel, Patrick.; Porta, Thomas La.; Traynor, Patrick.
(Language materials, printed)
Data and applications security and privacy XXIV = 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Foresti, Sara.
(Language materials, printed)
Cyber deception = building the scientific foundation /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Information security theory and practice = 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Akram, Raja Naeem.
(Electronic resources)
Cyber situational awareness = issues and research /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Language materials, printed)
Cyber warfare = building the scientific foundation /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Graphical models for security = second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
Mauw, Sjouke.; Kordy, Barbara.; Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Network security metrics
by:
Jajodia, Sushil.; Singhal, Anoop.; SpringerLink (Online service); Wang, Lingyu.
(Electronic resources)
Information Systems Security : = First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
Jajodia, Sushil.; SpringerLink (Online service); Mazumdar, Chandan; International Conference on Information Systems Security (2005 :)
(Language materials, printed)
Advances in multimedia information systems = 4th international workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998 : proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Dogac, Asuman, (1951-); International Conference on Multimedia Information Systems (1998 :); Ozsu, M. Tamer, (1951-)
(Language materials, printed)
Computer security = ESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Lopez, Javier.
(Electronic resources)
Adversarial and uncertain reasoning for adaptive cyber defense = control- and game-theoretic approaches to cyber security /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Conceptual modeling-ER 2001 = 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : proceedings /
by:
Jajodia, Sushil.; Solvberg, Arne.; SpringerLink (Online service); Kunii, Hideko S.; International Conference on Conceptual Modeling (2001 :)
(Language materials, printed)
Information hiding : = steganography and watermarking : attacks and countermeasures /
by:
Duric, Zoran.; Jajodia, Sushil.; Johnson, Neil F.
(Language materials, printed)
Data and Applications Security XIX = 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
Jajodia, Sushil.; SpringerLink (Online service); Wijesekera, Duminda.; IFIP WG 11.3 Working Conference on Data and Applications Security (2005 :)
(Language materials, printed)
Security and privacy in communication networks = 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
Jajodia, Sushil.; Zhou, Jianying.; SpringerLink (Online service)
(Language materials, printed)
Integrity and internal control in information systems VI = IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 November 2003, Lausanne, Switzerland/
by:
Jajodia, Sushil.; Strous, Leon.; NetLibrary, Inc.; IFIP TC11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (2003 :)
(Language materials, printed)
Show more
Fewer
Subjects
Computer security.
Information resources management
Data Structures, Cryptology and Information Theory.
Software Engineering.
Communications Engineering, Networks.
Computer networks- Security measures.
Relational databases
Data protection
Information Systems and Communication Service.
Cyberspace operations (Military science)
Logics and Meanings of Programs.
Computer Crime.
Data protection.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Operating Systems.
Database Management.
Multimedia systems
Database design
Wireless communication systems- Security measures
Information Systems Applications (incl. Internet)
Computer crimes.
Artificial Intelligence (incl. Robotics)
Computing Milieux.
Special Purpose and Application-Based Systems.
Information Storage and Retrieval.
Telecommunication systems- Security measures.
Ubiquitous computing
Computer security- Graphic methods
Database security
Legal Aspects of Computing.
Database management.
Computer networks- Security measures
Electronic Commerce/e-business.
Computer fraud.
Computer security
Data Encryption.
Computers- Access control
Information Systems Applications (incl.Internet)
Performance and Reliability.
Cloud computing.
Artificial Intelligence.
Cyber intelligence (Computer security)
Computer Science.
Computer Communication Networks.
Computers and Society.
Systems and Data Security.
Computer Systems Organization and Communication Networks.
Machine learning.
Probability and Statistics in Computer Science.
Database security.
Temporal databases.
Cloud computing- Security measures.
Internet- Security measures.
Control theory.