Sökt på: Böcker av Sushil Jajodia
totalt 107 träffar
Moving Target Defense II
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and …
Conceptual Modeling - ER 2001
This book constitutes the refereed proceedings of the 20th International Conference on Conceptual Modeling, ER 2001, held in Tokohama, Japan, in November 2001.The 45 revised full …
Cyber Deception
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial …
Encyclopedia of Cryptography, Security and Privacy
A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the …
Trusted Recovery and Defensive Information Warfare
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional …
Cyber Warfare
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the …
Cyber Warfare
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the …
Intrusion Detection in Distributed Systems
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. …
Time Granularities in Databases, Data Mining, and Temporal Reasoning
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range …
Graphical Models for Security
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, …
Information Systems Security
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 …
Information Systems Security
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 …