Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Jajodia, Sushil Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 5 of 23 reviews    
  Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors
Shah A., Ganesan R., Jajodia S., Cam H. Service Oriented Computing and Applications 12(2): 123-135, 2018.  Type: Article

Using alerts for cybersecurity is one of the most pressing challenges, both in networks and in general within the computing world. Although there has been a surge of monitoring techniques to catch attacks and secure systems, there are ...
...
Nov 1 2018  
  Cyber deception: building the scientific foundation
Jajodia S., Subrahmanian V., Swarup V., Wang C., Springer International Publishing, New York, NY, 2016. 314 pp.  Type: Book (978-3-319326-97-9)

This collection of 12 contributions (314 pages), with no introduction and no index, aims, according to the editors, to establish “a scientific foundation for cyber deception.” It was supported by grants from the US ...
...
Jul 17 2017  
  Cyber warfare: building the scientific foundation
Jajodia S., Shakarian P., Subrahmanian V., Swarup V., Wang C., Springer Publishing Company, Incorporated, Cham, Switzerland, 2015. 321 pp.  Type: Book (978-3-319140-38-4)

This collection of basic research is designed for advanced students and practitioners. With a broad orientation including botnets, honeypots, human factors, game theory, big data, and cognitive modeling, several international researche...
...
Jul 23 2015  
  Secure cloud computing
Jajodia S., Kant K., Samarati P., Singhal A., Swarup V., Wang C., Springer Publishing Company, Incorporated, New York, NY, 2014. 350 pp.  Type: Book (978-1-461492-77-1)

The increased prevalence of cloud computing has led to fears of more and more damaging cloud security attacks. In the cloud environment, three levels of access have traditionally been defined: infrastructure as a service (IaaS), platfo...
...
Sep 25 2014  
  Consistency and enforcement of access rules in cooperative data sharing environment
Le M., Kant K., Jajodia S. Computers and Security 413-18, 2014.  Type: Article

Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating...
...
Jul 15 2014  

 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy