Search Results for Sushil.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSushil.$0026ps$003d300?2024-06-01T22:19:39ZFrom Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:2219902024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>The Flexible Enterpriseent://SD_ILS/0/SD_ILS:250142024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar , Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1560-8">http://dx.doi.org/10.1007/978-81-322-1560-8</a><br/>Format: Electronic Resources<br/>Systemic Flexibility and Business Agilityent://SD_ILS/0/SD_ILS:250932024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Sushil, . editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2151-7">http://dx.doi.org/10.1007/978-81-322-2151-7</a><br/>Format: Electronic Resources<br/>Managing Flexibility People, Process, Technology and Businessent://SD_ILS/0/SD_ILS:187462024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Sushil, . editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2380-1">http://dx.doi.org/10.1007/978-81-322-2380-1</a><br/>Format: Electronic Resources<br/>Flowing Stream Strategy Leveraging Strategic Change with Continuity.ent://SD_ILS/0/SD_ILS:27542024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Sushil. author.<br/><a href="http://dx.doi.org/10.1007/978-81-322-0726-9">http://dx.doi.org/10.1007/978-81-322-0726-9</a><br/>Format: Electronic Resources<br/>Flexible Work Organizations The Challenges of Capacity Building in Asiaent://SD_ILS/0/SD_ILS:187972024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2834-9">http://dx.doi.org/10.1007/978-81-322-2834-9</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:197662024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Cyber Warfare Building the Scientific Foundationent://SD_ILS/0/SD_ILS:221772024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format: Electronic Resources<br/>Aesthetics: Quantification and Deconstruction A Case Study in Motorcyclesent://SD_ILS/0/SD_ILS:2258252024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Chandra, Sushil. author.<br/><a href="https://doi.org/10.1007/978-981-10-6235-3">https://doi.org/10.1007/978-981-10-6235-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Topics in Parallel and Distributed Computing Enhancing the Undergraduate Curriculum: Performance, Concurrency, and Programming on Modern Platformsent://SD_ILS/0/SD_ILS:2216942024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Prasad, Sushil K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93109-8">https://doi.org/10.1007/978-3-319-93109-8</a><br/>Format: Electronic Resources<br/>Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Securityent://SD_ILS/0/SD_ILS:4282332024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X<br/><a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:233272024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format: Electronic Resources<br/>Network Security Metricsent://SD_ILS/0/SD_ILS:2257102024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:205062024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Theory and Models for Cyber Situation Awarenessent://SD_ILS/0/SD_ILS:2238302024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174332024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Understanding Development An Indian Perspective on Legal and Economic Policyent://SD_ILS/0/SD_ILS:187512024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Banerjee, Swapnendu. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2455-6">http://dx.doi.org/10.1007/978-81-322-2455-6</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:241222024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Transactions on Engineering Technologies World Congress on Engineering 2018ent://SD_ILS/0/SD_ILS:4285172024-06-01T22:19:39Z2024-06-01T22:19:39ZYazar Ao, Sio-Iong. editor.<br/><a href="https://doi.org/10.1007/978-981-32-9531-5">https://doi.org/10.1007/978-981-32-9531-5</a><br/>Format: Electronic Resources<br/>