Search Results for - Narrowed by: Jajodia, Sushil. editor. - Computer security.
SirsiDynix Enterprise
https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dAUTHOR$002509Yazar$002509Jajodia$00252C$002bSushil.$002beditor.$002509Jajodia$00252C$002bSushil.$002beditor.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?
2024-06-21T19:53:31Z
Theory and Models for Cyber Situation Awareness
ent://SD_ILS/0/SD_ILS:223830
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format: Electronic Resources<br/>
Cyber Deception Building the Scientific Foundation
ent://SD_ILS/0/SD_ILS:17777
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>
Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:17433
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>
Cyber Warfare Building the Scientific Foundation
ent://SD_ILS/0/SD_ILS:22177
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>
Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:23554
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>
Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings
ent://SD_ILS/0/SD_ILS:23327
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>
Secure Cloud Computing
ent://SD_ILS/0/SD_ILS:19766
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>
ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings
ent://SD_ILS/0/SD_ILS:24122
2024-06-21T19:53:31Z
2024-06-21T19:53:31Z
Yazar Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>