Title: Advanced Transaction Models and Architectures, Author: Sushil Jajodia
Title: Network Hardening: An Automated Approach to Improving Network Security, Author: Lingyu Wang
Title: Time Granularities in Databases, Data Mining, and Temporal Reasoning, Author: Claudio Bettini
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Multilevel Secure Transaction Processing, Author: Vijay Atluri
Title: Multilevel Secure Transaction Processing, Author: Vijay Atluri
Title: Time Granularities in Databases, Data Mining, and Temporal Reasoning, Author: Claudio Bettini
Title: Preserving Privacy in On-Line Analytical Processing (OLAP), Author: Lingyu Wang
Title: Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Author: Sushil Jajodia
Title: Cyber Warfare: Building the Scientific Foundation, Author: Sushil Jajodia
Title: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Author: Sushil Jajodia
Title: Cyber Warfare: Building the Scientific Foundation, Author: Sushil Jajodia
Title: Adaptive Autonomous Secure Cyber Systems, Author: Sushil Jajodia
Title: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures, Author: Neil F. Johnson
Title: Security and Privacy in Communication Networks: 6th International ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010, Proceedings, Author: Sushil Jajodia
Title: Multilevel Secure Transaction Processing, Author: Vijay Atluri
Title: Integrity and Internal Control in Information Systems: IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results Warrenton, Virginia, USA November 1, Author: Sushil Jajodia
Title: Network Security Metrics, Author: Lingyu Wang
Title: Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Author: Sushil Jajodia
Title: Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy, Author: Sushil Jajodia

Pagination Links