Search
for Author
All Reviews
Jajodia, Sushil
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
23
reviews
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors
Shah A., Ganesan R., Jajodia S., Cam H. Service Oriented Computing and Applications 12(2): 123-135, 2018. Type: Article
Using alerts for cybersecurity is one of the most pressing challenges, both in networks and in general within the computing world. Although there has been a surge of monitoring techniques to catch attacks and secure systems, there are ...
...
Nov 1 2018
Cyber deception: building the scientific foundation
Jajodia S., Subrahmanian V., Swarup V., Wang C., Springer International Publishing, New York, NY, 2016. 314 pp. Type: Book (978-3-319326-97-9)
This collection of 12 contributions (314 pages), with no introduction and no index, aims, according to the editors, to establish “a scientific foundation for cyber deception.” It was supported by grants from the US ...
...
Jul 17 2017
Cyber warfare: building the scientific foundation
Jajodia S., Shakarian P., Subrahmanian V., Swarup V., Wang C., Springer Publishing Company, Incorporated, Cham, Switzerland, 2015. 321 pp. Type: Book (978-3-319140-38-4)
This collection of basic research is designed for advanced students and practitioners. With a broad orientation including botnets, honeypots, human factors, game theory, big data, and cognitive modeling, several international researche...
...
Jul 23 2015
Secure cloud computing
Jajodia S., Kant K., Samarati P., Singhal A., Swarup V., Wang C., Springer Publishing Company, Incorporated, New York, NY, 2014. 350 pp. Type: Book (978-1-461492-77-1)
The increased prevalence of cloud computing has led to fears of more and more damaging cloud security attacks. In the cloud environment, three levels of access have traditionally been defined: infrastructure as a service (IaaS), platfo...
...
Sep 25 2014
Consistency and enforcement of access rules in cooperative data sharing environment
Le M., Kant K., Jajodia S. Computers and Security 413-18, 2014. Type: Article
Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating...
...
Jul 15 2014
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy