Languages
Jump To : Overview | Titles | Subjects

Jajodia, Sushil.

Overview
Works: 108 works in 15 publications in 1 languages
Titles
Handbook of Database Security :Applications and Trends / by: Gertz, Michael.; Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Network security metrics by: Jajodia, Sushil.; Singhal, Anoop.; SpringerLink (Online service); Wang, Lingyu. (Electronic resources)
Temporal databasesresearch and practice / by: Etzion, Opher.; Jajodia, Sushil.; SpringerLink (Online service); Sripada, Suryanarayana. (Electronic resources)
Cyber warfarebuilding the scientific foundation / by: Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Secure cloud computing by: Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Data and applications security and privacy XXIV24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings / by: (1998 :); Foresti, Sara.; Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Information security theory and practice9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings / by: (1998 :); Akram, Raja Naeem.; Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Computer securityESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings / by: (1998 :); Jajodia, Sushil.; Lopez, Javier.; SpringerLink (Online service) (Electronic resources)
Adaptive autonomous secure cyber systems by: Jajodia, Sushil.; SpringerLink (Online service) (Electronic resources)
Advances in multimedia information systems4th international workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998 : proceedings / by: (1998 :); Dogac, Asuman, (1951-); Jajodia, Sushil.; Ozsu, M. Tamer, (1951-); SpringerLink (Online service) (Electronic resources)
Show more
Subjects
Computer security. Data Structures, Cryptology and Information Theory. Software Engineering. Communications Engineering, Networks. Telecommunication systems Relational databases Data protection Information Systems and Communication Service. Cyberspace operations (Military science) Logics and Meanings of Programs. Computer Crime. Data mining. Data protection. Database Management. Management of Computing and Information Systems. Operating Systems. Algorithm Analysis and Problem Complexity. Multimedia systems Database design Uncertainty (Information theory) Information Systems Applications (incl. Internet) Computer crimes. Artificial Intelligence (incl. Robotics) Computing Milieux. Information Storage and Retrieval. Special Purpose and Application-Based Systems. Wireless communication systems Data encryption (Computer science) Ubiquitous computing Database security Legal Aspects of Computing. Database management. Internet Coding and Information Theory. Electronic Commerce/e-business. Computer fraud. Data Encryption. Computer security Information Systems Applications (incl.Internet) Performance and Reliability. Cloud computing. Artificial Intelligence. Cyber intelligence (Computer security) Computer networks Computer Science. Computer Communication Networks. Systems and Data Security. Computers Computers and Society. Computer Systems Organization and Communication Networks. Cloud computing Machine learning. Probability and Statistics in Computer Science. Database security. Temporal databases. Control theory.
 
 
Change password
Login