Search Results - Jajodia, Sushil
Sushil Jajodia
Sushil Jajodia is an American computer scientist known for his work on cyber security and privacy, databases, and distributed systems. Provided by Wikipedia- Showing 1 - 20 results of 65
- Go to Next Page
-
1
Integrity and Internal Control in Information Systems : Volume 1: Increasing the confidence in information systems / by Jajodia, Sushil
Published 1997Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
2
Advanced Transaction Models and Architectures / by Jajodia, Sushil
Published 1997Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
3
Integrity and Internal Control in Information Systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13¿́¿14 Novemb... by Jajodia, Sushil
Published 2004Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
4
Integrity and Internal Control in Information Systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November... by Jajodia, Sushil
Published 2004Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
5
Network hardening : an automated approach to improving network security / by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014Call Number: Loading…Full Text (via Skillsoft)
Located: Loading…
eBook -
6
Network hardening : an automated approach to improving network security / by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
7
Moving target defense creating asymmetric uncertainty for cyber threats /
Published 2011Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
8
Trusted recovery and defensive information warfare / by Liu, Peng
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Book Loading… -
9
Cyber situational awareness issues and research /
Published 2010Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
10
Moving target defense II application of game theory and adversarial modeling /
Published 2013Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
11
Trusted Recovery and Defensive Information Warfare / by Liu, Peng
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
12
Applications of Data Mining in Computer Security / by Barbará, Daniel
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
13
Database security XII : status and prospects : IFIP TC11 WG11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece /
Published 1999Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
14
Integrity and internal control in information systems : IFIP TC11 Working Group 11.5 Working Conference on Integrity and Internal Control in Information Systems, Bridging Business...
Published 1998Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
15
Data and applications security and privacy XXIV 24th annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010 ; proceedings /
Published 2010Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
16
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures / by Johnson, Neil F.
Published 2001Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
17
Applications of data mining in computer security /
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Book Loading… -
18
Integrity and internal control in information systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 Novembe...
Published 2004Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
19
Security and privacy in communication networks 6th Iternational [sic] ICST conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings /
Published 2010Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic Conference Proceeding eBook -
20
Information systems security : 11th international conference, ICISS 2015, Kolkata, India, December 16-20, 2015, proceedings /
Published 2015Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook
Search Tools:
RSS Feed
–
Save Search
Related Subjects
Computer security
Security measures
Computer networks
Database security
Database management
Access control
Computers
Data protection
Computer science
Data encryption (Computer science)
Data mining
Data structures (Computer science)
Multimedia systems
Temporal databases
Information Systems
Information resources management
Auditing
Cloud computing
Computer crimes
Information storage and retrieval systems
Internet
Manasgement information systems
OLAP technology
Online data processing
Software engineering
Transaction systems (Computer systems)
Automation
Computer fraud
Computer network architectures
Control theory