Search Results for Sushil. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSushil.$0026ps$003d300? 2024-06-01T22:19:39Z From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:221990 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/> The Flexible Enterprise ent://SD_ILS/0/SD_ILS:25014 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1560-8">http://dx.doi.org/10.1007/978-81-322-1560-8</a><br/>Format:&#160;Electronic Resources<br/> Systemic Flexibility and Business Agility ent://SD_ILS/0/SD_ILS:25093 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Sushil, . editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2151-7">http://dx.doi.org/10.1007/978-81-322-2151-7</a><br/>Format:&#160;Electronic Resources<br/> Managing Flexibility People, Process, Technology and Business ent://SD_ILS/0/SD_ILS:18746 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Sushil, . editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2380-1">http://dx.doi.org/10.1007/978-81-322-2380-1</a><br/>Format:&#160;Electronic Resources<br/> Flowing Stream Strategy Leveraging Strategic Change with Continuity. ent://SD_ILS/0/SD_ILS:2754 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Sushil. author.<br/><a href="http://dx.doi.org/10.1007/978-81-322-0726-9">http://dx.doi.org/10.1007/978-81-322-0726-9</a><br/>Format:&#160;Electronic Resources<br/> Flexible Work Organizations The Challenges of Capacity Building in Asia ent://SD_ILS/0/SD_ILS:18797 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2834-9">http://dx.doi.org/10.1007/978-81-322-2834-9</a><br/>Format:&#160;Electronic Resources<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:19766 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:17777 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:22177 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14039-1">http://dx.doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Electronic Resources<br/> Aesthetics: Quantification and Deconstruction A Case Study in Motorcycles ent://SD_ILS/0/SD_ILS:225825 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Chandra, Sushil. author.<br/><a href="https://doi.org/10.1007/978-981-10-6235-3">https://doi.org/10.1007/978-981-10-6235-3</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23554 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Topics in Parallel and Distributed Computing Enhancing the Undergraduate Curriculum: Performance, Concurrency, and Programming on Modern Platforms ent://SD_ILS/0/SD_ILS:221694 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Prasad, Sushil K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93109-8">https://doi.org/10.1007/978-3-319-93109-8</a><br/>Format:&#160;Electronic Resources<br/> Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security ent://SD_ILS/0/SD_ILS:428233 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X<br/><a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23327 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/> Network Security Metrics ent://SD_ILS/0/SD_ILS:225710 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Wang, Lingyu. author.<br/><a href="https://doi.org/10.1007/978-3-319-66505-4">https://doi.org/10.1007/978-3-319-66505-4</a><br/>Format:&#160;Electronic Resources<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:20506 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:223830 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:17433 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29968-6">http://dx.doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Understanding Development An Indian Perspective on Legal and Economic Policy ent://SD_ILS/0/SD_ILS:18751 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Banerjee, Swapnendu. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2455-6">http://dx.doi.org/10.1007/978-81-322-2455-6</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24122 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Engineering Technologies World Congress on Engineering 2018 ent://SD_ILS/0/SD_ILS:428517 2024-06-01T22:19:39Z 2024-06-01T22:19:39Z Yazar&#160;Ao, Sio-Iong. editor.<br/><a href="https://doi.org/10.1007/978-981-32-9531-5">https://doi.org/10.1007/978-981-32-9531-5</a><br/>Format:&#160;Electronic Resources<br/>