Languages
Jajodia, Sushil.
Overview
Works: | 108 works in 15 publications in 1 languages |
---|
Titles
Handbook of Database Security :Applications and Trends /
by:
Gertz, Michael.; Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Network security metrics
by:
Jajodia, Sushil.; Singhal, Anoop.; SpringerLink (Online service); Wang, Lingyu.
(Electronic resources)
Temporal databasesresearch and practice /
by:
Etzion, Opher.; Jajodia, Sushil.; SpringerLink (Online service); Sripada, Suryanarayana.
(Electronic resources)
Cyber warfarebuilding the scientific foundation /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Data and applications security and privacy XXIV24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, proceedings /
by:
(1998 :); Foresti, Sara.; Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Information security theory and practice9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 : proceedings /
by:
(1998 :); Akram, Raja Naeem.; Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Computer securityESORICS 2008 : 13th European Symposium on Research in Computer Security, Malaga, Spain, October 6-8, 2008 : proceedings /
by:
(1998 :); Jajodia, Sushil.; Lopez, Javier.; SpringerLink (Online service)
(Electronic resources)
Adaptive autonomous secure cyber systems
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Advances in multimedia information systems4th international workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998 : proceedings /
by:
(1998 :); Dogac, Asuman, (1951-); Jajodia, Sushil.; Ozsu, M. Tamer, (1951-); SpringerLink (Online service)
(Electronic resources)
Cyber deceptionbuilding the scientific foundation /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Proceedings of The Ifip Tc 11 23rd International Information Security ConferenceIFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy /
by:
Cimato, Stelvio.; Jajodia, Sushil.; Samarati, Pierangela.; SpringerLink (Online service)
(Electronic resources)
Information hiding :steganography and watermarking : attacks and countermeasures /
by:
Duric, Zoran.; Jajodia, Sushil.; Johnson, Neil F.
(Language materials, printed)
Moving target defensecreating asymmetric uncertainty for cyber threats /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Encyclopedia of cryptography and security
by:
Jajodia, Sushil.; SpringerLink (Online service); Tilborg, Henk C. A. van, (1947-)
(Electronic resources)
Network hardeningan automated approach to improving network security /
by:
Albanese, Massimiliano.; Jajodia, Sushil.; SpringerLink (Online service); Wang, Lingyu.
(Electronic resources)
Security and privacy in communication networks6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
by:
(1998 :); Jajodia, Sushil.; SpringerLink (Online service); Zhou, Jianying.
(Electronic resources)
Conceptual modeling-ER 200120th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : proceedings /
by:
(1998 :); Jajodia, Sushil.; Kunii, Hideko S.; Solvberg, Arne.; SpringerLink (Online service)
(Electronic resources)
Information systems security11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015 : proceedings /
by:
(1998 :); Jajodia, Sushil.; Mazumdar, Chandan.; SpringerLink (Online service)
(Electronic resources)
Graphical models for securitysecond International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015 : revised selected papers /
by:
(1998 :); Jajodia, Sushil.; Kordy, Barbara.; Mauw, Sjouke.; SpringerLink (Online service)
(Electronic resources)
Security for Telecommunications Networks
by:
Jajodia, Sushil.; McDaniel, Patrick.; Porta, Thomas La.; SpringerLink (Online service); Traynor, Patrick.
(Electronic resources)
Data and Applications Security XIX19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings /
by:
(1998 :); Jajodia, Sushil.; SpringerLink (Online service); Wijesekera, Duminda.
(Electronic resources)
Applications of data mining in computer security /
by:
Barbara, Daniel.; Jajodia, Sushil.
(Language materials, printed)
Information systems security7th international conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : procedings /
by:
(1998 :); Jajodia, Sushil.; Mazumdar, Chandan.; SpringerLink (Online service)
(Electronic resources)
Cyber situational awarenessissues and research /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Theory and models for cyber situation awareness
by:
Jajodia, Sushil.; Liu, Peng.; SpringerLink (Online service); Wang, Cliff.
(Electronic resources)
Adversarial and uncertain reasoning for adaptive cyber defensecontrol- and game-theoretic approaches to cyber security /
by:
Jajodia, Sushil.; SpringerLink (Online service)
(Electronic resources)
Information Systems Security :First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings
by:
(1998 :); Jajodia, Sushil.; Mazumdar, Chandan; SpringerLink (Online service)
(Electronic resources)
Show more
Fewer
Subjects
Computer security.
Data Structures, Cryptology and Information Theory.
Software Engineering.
Communications Engineering, Networks.
Telecommunication systems
Relational databases
Data protection
Information Systems and Communication Service.
Cyberspace operations (Military science)
Logics and Meanings of Programs.
Computer Crime.
Data mining.
Data protection.
Database Management.
Management of Computing and Information Systems.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Multimedia systems
Database design
Uncertainty (Information theory)
Information Systems Applications (incl. Internet)
Computer crimes.
Artificial Intelligence (incl. Robotics)
Computing Milieux.
Information Storage and Retrieval.
Special Purpose and Application-Based Systems.
Wireless communication systems
Data encryption (Computer science)
Ubiquitous computing
Database security
Legal Aspects of Computing.
Database management.
Internet
Coding and Information Theory.
Electronic Commerce/e-business.
Computer fraud.
Data Encryption.
Computer security
Information Systems Applications (incl.Internet)
Performance and Reliability.
Cloud computing.
Artificial Intelligence.
Cyber intelligence (Computer security)
Computer networks
Computer Science.
Computer Communication Networks.
Systems and Data Security.
Computers
Computers and Society.
Computer Systems Organization and Communication Networks.
Cloud computing
Machine learning.
Probability and Statistics in Computer Science.
Database security.
Temporal databases.
Control theory.