It looks like you're offline.
Open Library logo
additional options menu
Last edited anonymously
April 29, 2008 | History

Sushil Jajodia

We need a photo of Sushil Jajodia

56 works Add another?

  • Cover of: Intrusion detection in distributed systems: an abstraction-based approach

    My Reading Lists:

    Create a new list

  • Cover of: Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Lecture Notes in Computer Science)

    My Reading Lists:

    Create a new list

  • Cover of: Integrity and Internal Control in Information Systems: Volume 1: Increasing the confidence in information systems

    My Reading Lists:

    Create a new list

  • Cover of: Applications of Data Mining in Computer Security (Advances in Information Security)

    My Reading Lists:

    Create a new list

  • Cover of: Preleukemia

    My Reading Lists:

    Create a new list

  • Cover of: Time Granularities in Databases, Data Mining, and Temporal Reasoning

    My Reading Lists:

    Create a new list

  • Cover of: Database Security, IV: Status and Prospects : Results of the Ifip Wg 11.3 Workshop on Database Security Halifax, U.K., 18-21 September, 1990

    My Reading Lists:

    Create a new list

  • Cover of: Database Security XII: Status and Prospects (IFIP International Federation for Information Processing)

    My Reading Lists:

    Create a new list

  • Cover of: Proceedings of the 1993 Sigmod International Conference Management of Data (Sigmod Record)

    My Reading Lists:

    Create a new list

  • Cover of: Proceedings of the IFIP TC 11 23rd International Information Security Conference: IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy

    My Reading Lists:

    Create a new list

  • Cover of: Advances in Multimedia Information Systems: 4th International Workshop, MIS'98, Istanbul, Turkey September 24-26, 1998, Proceedings

    My Reading Lists:

    Create a new list

  • Cover of: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats

    My Reading Lists:

    Create a new list

  • Cover of: Computer Security - ESORICS 2008: 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

    My Reading Lists:

    Create a new list

  • Cover of: Journal on Data Semantics II

    My Reading Lists:

    Create a new list

  • Cover of: Trusted Recovery and Defensive Information Warfare

    My Reading Lists:

    Create a new list

  • Cover of: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures

    My Reading Lists:

    Create a new list

  • Cover of: Proceedings of the First ACM Workshop on Moving Target Defense

    My Reading Lists:

    Create a new list

  • Cover of: Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference ... and Communication Technology )

    My Reading Lists:

    Create a new list

  • Cover of: Multimedia Database Systems: Issues and Research Directions

    My Reading Lists:

    Create a new list

  • Cover of: Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11. 3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings

    My Reading Lists:

    Create a new list

History

Download catalog record: RDF / JSON
April 29, 2008 Created by an anonymous user initial import