Jajodia, Sushil.
Jajodia, Sushil, 1947-....
Sushil Jajodia American cybersecurity researcher
VIAF ID: 44471967 ( Personal )
Permalink: http://viaf.org/viaf/44471967
Preferred Forms
-
- 200 _ | ‡a Jajodia ‡b Sushil ‡f 1947-....
-
- 100 1 _ ‡a Jajodia, Sushil
-
-
- 100 1 0 ‡a Jajodia, Sushil
- 100 1 _ ‡a Jajodia, Sushil
- 100 1 _ ‡a Jajodia, Sushil
-
-
-
- 100 1 _ ‡a Jajodia, Sushil ‡d 1947-
-
- 100 1 _ ‡a Jajodia, Sushil, ‡d 1947-....
-
- 100 0 _ ‡a Sushil Jajodia ‡c American cybersecurity researcher
4xx's: Alternate Name Forms (8)
5xx's: Related Names (1)
Works
Title | Sources |
---|---|
Advanced transaction models and architectures | |
Advances in multimedia information systems : 4th international workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998 : proceedings | |
Adversarial and uncertain reasoning for adaptive cyber defense : control- and game-theoretic approaches to cyber security | |
Applications of data mining in computer security | |
Computer Security -- ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings | |
Conceptual modeling-ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : proceedings | |
Cyber deception | |
Cyber situational awareness : issues and research | |
Cyber Warfare : Building the Scientific Foundation | |
Data and applications security XIX : 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005 : proceedings | |
Database security, IV status and prospects ; results of the IFIP WG 11 3 Workshop on Database Security, Halifax, U. K., 18 - 21 September, 1990 | |
Database security XII : status and prospects : IFIP TC11 WG11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece | |
Encyclopedia of cryptography and security | |
ESORICS 2008 | |
Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers | |
ICT Systems Security and Privacy Protection : 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings | |
Information hiding steganography and watermarking, attacks and countermeasures | |
Information security : an integrated collection of essays | |
Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings | |
Integrity and internal control on information systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 November 2003, Lausanne, Switzerland | |
Intrusion detection in distributed systems an abstraction-based approach | |
Journal on Data Semantics II | |
MIS'98 | |
Moving target defense : creating asymmetric uncertainty for cyber threats | |
Moving target defense II : application of game theory and adversarial modeling | |
Multilevel secure transaction processing | |
Multimedia database systems issues and research directions | |
Network hardening : an automated approach to improving network security | |
Preserving privacy in On-Line Analytical Processing (OLAP) | |
Proceedings, International Symposium on Databases in Parallel and Distributed Systems : December 5-7, 1988, Austin, Texas, USA | |
Secure cloud computing | |
Secure data management in decentralized systems | |
Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings | |
SIGMOD '93 : proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, DC, May 26-28, 1993 | |
Temporal databases : research and practice | |
Time granularities in databases, data mining and temporal reasoning | |
Trusted recovery and defensive information warfare |