27 results
Skip to content
Toggle navigation
VuFind
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
0
items
(Full)
Your Account
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Keyword
-- Title
-- Author
-- Subject
-- Call Number
-- ISBN/ISSN
-- OCLC Number
Title A-Z
Author A-Z
Subject A-Z
Call Number A-Z
Prospector
Find
Advanced
Author
Jajodia, Sushil.
Showing
1
-
20
of
27
for search:
'Jajodia, Sushil.'
, query time: 0.16s
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
1
Cyber situational awareness : issues and research
Published: Springer, 2010
Description: 1 online resource (xii, 249 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
2
Moving target defense : creating asymmetric uncertainty for cyber threats
Published: Springer, 2011
Description: 1 online resource (xv, 183 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
3
Moving target defense II : application of game theory and adversarial modeling
Published: Springer, 2013
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
4
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings
Published: Springer, 2005
Description: 1 online resource (xi, 342 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
5
Handbook of database security : applications and trends
Published: Springer, 2008
Description: 1 online resource (xiv, 577 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
6
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings
Published: Springer, 2011
Description: 1 online resource (xv, 388 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
7
Secure data management in decentralized systems
Published: Springer, 2007
Description: 1 online resource (viii, 462 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
8
Preserving privacy in On-Line Analytical Processing (OLAP)
by
Wang, Lingyu.
Published: Springer, 2007
Description: 1 online resource (xi, 180 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
9
Theory and models for cyber situation awareness
Published: Springer, 2017
Description: 1 online resource (vii, 227 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
10
Network security metrics
by
Wang, Lingyu.
Published: Springer, 2017
Description: 1 online resource (215 pages)
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
11
Network hardening : an automated approach to improving network security
by
Wang, Lingyu,
Published: Springer, 2014
Description: 1 online resource.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
12
Information systems security : 11th international conference, ICISS 2015, Kolkata, India, December 16-20, 2015, proceedings
Published: Springer, 2015
Description: 1 online resource (xvi, 584 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
13
Encyclopedia of cryptography and security
2nd ed..
Published: Springer, 2011
Description: 1 online resource (xl, 1416 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
14
Information Security Theory and Practice : 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings
Published: Springer, 2015
Description: 1 online resource (xii, 281 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
15
Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings
Published: Springer, 2013
Description: 1 online resource (xviii, 794 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
16
Computer Security : ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008 : proceedings
Published: Springer, 2008
Description: 1 online resource (xiv, 602 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
17
Graphical models for security : second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised selected papers
Published: Springer, 2016
Description: 1 online resource (ix, 103 pages) : color illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
18
Cyber deception : building the scientific foundation
Published: Springer, 2016
Description: 1 online resource (x, 314 pages) : illustrations.
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
19
Security and privacy in communication networks : 6th Iternational ICST conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings
Published: Springer, 2010
Description: 1 online resource (xiii, 500 pages).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
20
Cyber warfare : building the scientific foundation
Published: Springer, 2015
Description: 1 online resource (xiii, 321 pages) : illustrations (some color).
Located:
Loading...
Call Number:
Loading...
eBook
Loading...
Save to List
Saved in:
Select Page | with selected:
1
2
Next »
[2]
In Prospector
Request items from other Prospector libraries to be delivered to your local library for pickup.
Search Tools:
Get RSS Feed
—
Email this Search
—
Save Search
Related Subjects
Computer security
Computer networks Security measures
Data protection
Computers Access control
Data encryption (Computer science)
Database security
Internet Security measures
Cloud computing
Cloud computing Security measures
Computer crimes
Computer fraud
Computer networks
Computer networks Access control
Computer security Graphic methods
Control theory
Cyber intelligence (Computer security)
Cyberspace operations (Military science)
Databases
Game theory
Information storage and retrieval systems
Machine learning
OLAP technology
Online data processing Security measures
Telecommunication
Ubiquitous computing
Uncertainty (Information theory)
Wireless communication systems Security measures
×
Loading...