Sushil Jajodia
Sushil Jajodia is an American computer scientist known for his work on cyber security and privacy, databases, and distributed systems. Provided by Wikipedia
Showing 1 - 20 results of 68 for search 'Jajodia, Sushil', query time: 0.06s
Refine Results
-
1
Integrity and Internal Control in Information Systems : Volume 1: Increasing the confidence in information systems / by Jajodia, Sushil
Published 1997Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
2
Advanced Transaction Models and Architectures / by Jajodia, Sushil
Published 1997Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
3
Integrity and Internal Control in Information Systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13¿́¿14 Novemb... by Jajodia, Sushil
Published 2004Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
4
Integrity and Internal Control in Information Systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November... by Jajodia, Sushil
Published 2004Call Number: Loading…Full Text (via EBSCO)
Located: Loading…
eBook -
5
Network hardening : an automated approach to improving network security / by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014Call Number: Loading…Full Text (via Skillsoft)
Located: Loading…
Electronic eBook -
6
Network hardening : an automated approach to improving network security / by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
7
Network Hardening An Automated Approach to Improving Network Security / by Wang, Lingyu, Albanese, Massimiliano, Jajodia, Sushil
Published 2014Call Number: Loading…Online Access (A-Z Journals and Newspapers)
Located: Loading…
Electronic eBook -
8
Trusted recovery and defensive information warfare / by Liu, Peng
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Book Loading… -
9
Integrity and internal control in information systems : IFIP TC11 Working Group 11.5 Working Conference on Integrity and Internal Control in Information Systems, Bridging Business...
Published 1998Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
10
Moving target defense II application of game theory and adversarial modeling /
Published 2013Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
11
Database security XII : status and prospects : IFIP TC11 WG11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece /
Published 1999Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Conference Proceeding eBook -
12
Applications of Data Mining in Computer Security / by Barbará, Daniel
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
13
Moving target defense creating asymmetric uncertainty for cyber threats /
Published 2011Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
14
Trusted Recovery and Defensive Information Warfare / by Liu, Peng
Published 2002Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
eBook -
15
Cyber situational awareness issues and research /
Published 2010Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Springer)
Located: Loading…
Electronic eBook -
16
Applications of data mining in computer security /
Published 2002Other Authors:Call Number: Loading…
Located: Loading…Book Loading… -
17
Information hiding : steganography and watermarking : attacks and countermeasures / by Johnson, Neil F.
Published 2001Other Authors:Call Number: Loading…
Located: Loading…Book Loading… -
18
Data and applications security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 : proceedings /
Published 2005Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…Full Text (via Internet Archive)
Located: Loading…
Conference Proceeding eBook -
19
Integrity and internal control in information systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 Novembe...
Published 2004Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading… -
20
Data and applications security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 ; proceedings /
Published 2005Other Authors: “…Jajodia, Sushil…”
Call Number: Loading…
Located: Loading…Conference Proceeding Book Loading…
Search Tools:
RSS Feed
Related Subjects
Computer security
Security measures
Computer networks
Database security
Data protection
Database management
Access control
Computers
Computer science
Data encryption (Computer science)
Data mining
Data structures (Computer science)
Multimedia systems
Temporal databases
Computer Communication Networks
Computer networks 
Data and Information Security
Information Systems
Information resources management
Application software
Auditing
Cloud computing
Computer and Information Systems Applications
Computer crimes
Information storage and retrieval systems
Internet
Manasgement information systems
OLAP technology
Online data processing
Software engineering