Search Results for Jajodia, Sushil. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dJajodia$00252C$002bSushil.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-11-24T22:30:03Z From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:399827 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Ray, Indrajit. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:487956 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Kant, Krishna. editor.&#160;Samarati, Pierangela. editor.&#160;Singhal, Anoop. editor.&#160;Swarup, Vipin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography, Security and Privacy ent://SD_ILS/0/SD_ILS:487070 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:518532 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Shakarian, Paulo. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;XX(518532.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14039-1">https://doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings ent://SD_ILS/0/SD_ILS:195982 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25560-1">http://dx.doi.org/10.1007/978-3-642-25560-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:171874 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Liu, Peng. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193205 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16161-2">http://dx.doi.org/10.1007/978-3-642-16161-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189031 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Lopez, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183364 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Mazumdar, Chandan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183010 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;Wijesekera, Duminda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication ent://SD_ILS/0/SD_ILS:164920 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security ent://SD_ILS/0/SD_ILS:483947 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Cybenko, George. editor.&#160;Liu, Peng. editor.&#160;Wang, Cliff. editor.&#160;Wellman, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:519325 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Akram, Raja Naeem. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(519325.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-24018-3">https://doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Encyclopedia of Cryptography and Security ent://SD_ILS/0/SD_ILS:172455 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;van Tilborg, Henk C. A. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-5906-5">http://dx.doi.org/10.1007/978-1-4419-5906-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192431 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Foresti, Sara. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13739-6">http://dx.doi.org/10.1007/978-3-642-13739-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:166409 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Gertz, Michael. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:165430 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Yu, Ting. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:486885 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Wang, Lingyu. author.&#160;Albanese, Massimiliano. author.&#160;Jajodia, Sushil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04612-9">https://doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489201 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Frederic. editor.&#160;Jajodia, Sushil. editor.&#160;Abou El Kalam, Anas. editor.&#160;Sans, Thierry. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55415-5">https://doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334909 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Crampton, Jason. editor.&#160;Jajodia, Sushil. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy in Location-Based Applications Research Issues and Emerging Trends ent://SD_ILS/0/SD_ILS:190647 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Bettini, Claudio. editor.&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Wang, X. Sean. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03511-1">http://dx.doi.org/10.1007/978-3-642-03511-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:166336 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Wang, Lingyu. author.&#160;Jajodia, Sushil. author.&#160;Wijesekera, Duminda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Journal on Data Semantics II ent://SD_ILS/0/SD_ILS:182364 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Spaccapietra, Stefano. editor.&#160;Bertino, Elisa. editor.&#160;Jajodia, Sushil. editor.&#160;King, Roger. editor.&#160;McLeod, Dennis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104761">http://dx.doi.org/10.1007/b104761</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Time granularities in databases, data mining, and temporal reasoning ent://SD_ILS/0/SD_ILS:77334 2024-11-24T22:30:03Z 2024-11-24T22:30:03Z Author&#160;Bettini, Claudio, 1963-&#160;Jajodia, Sushil, ort. yaz.&#160;Wang, Sean, 1960- ort. yaz.<br/>Preferred Shelf Number&#160;QA 76.9.D3 B487 2000<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/>