Skip to main content
साइन इन गर्नुहोस्
Bookshare Nepal: गृह पृष्ठ
-A +A
  • भाषा
    • English
    • Nepali
सहायता

खोजी परिणाम

Search results: 12
  • Information Systems Security

    Information Systems Security

    by Sushil Jajodia • Chandan Mazumdar

    This bookconstitutes the refereed proceedings of the 11th International Conference onInformation Systems Security, ICISS 2015, held in Kolkata, India, in December2015. The 24revised full papers and 8 short papers presented together with 4 invited paperswere carefully reviewed and selected from 133 ... थप

    Language: ENG
    प्रतिलिपि अधिकार 2015
  • Encyclopedia of Cryptography and Security

    Encyclopedia of Cryptography and Security

    by Sushil Jajodia • Henk C.A. Tilborg

    Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in m... थप

    Language: ENG
    प्रतिलिपि अधिकार 2005
  • Graphical Models for Security

    Graphical Models for Security

    by Sushil Jajodia • Sjouke Mauw • Barbara Kordy

    This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015. The 5 revised full papers presented together with one short tool paper and one invited lecture were c... थप

    Language: ENG
    प्रतिलिपि अधिकार 2016
  • Network Hardening

    Network Hardening

    by Sushil Jajodia • Lingyu Wang • Massimiliano Albanese

    This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means ... थप

    Language: ENG
    प्रतिलिपि अधिकार 2014
  • Theory and Models for Cyber Situation Awareness

    Theory and Models for Cyber Situation Awareness

    by Sushil Jajodia • Cliff Wang • Peng Liu

    Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily addres... थप

    Language: ENG
    प्रतिलिपि अधिकार 2017
  • Network Security Metrics

    Network Security Metrics

    by Sushil Jajodia • Lingyu Wang • Anoop Singhal

    This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the lack of effective security metrics which this book discusses in detail. Since "you cannot improve w... थप

    Language: ENG
    प्रतिलिपि अधिकार 2017
  • Cyber Deception: Building the Scientific Foundation

    Cyber Deception: Building the Scientific Foundation

    by Sushil Jajodia • Cliff Wang • V. S. Subrahmanian • Vipin Swarup

    This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the comp... थप

    Language: ENG
    प्रतिलिपि अधिकार 2016
  • Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security (Lecture Notes in Computer Science #11830)

    Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control- and Game-Theoretic Approaches to Cyber Security (Lecture Notes in Computer Science #11830)

    by Sushil Jajodia • Cliff Wang • Peng Liu • George Cybenko • Michael Wellman

    Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked information systems less homogeneous and less predictable by engineering systems that have homogeneous ... थप

    Language: ENG
    प्रतिलिपि अधिकार 2019
  • Secure Cloud Computing

    Secure Cloud Computing

    by Sushil Jajodia • Cliff Wang • Vipin Swarup • Krishna Kant • Pierangela Samarati • Anoop Singhal

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, f... थप

    Language: ENG
    प्रतिलिपि अधिकार 2014
  • Cyber Warfare: Building the Scientific Foundation (Advances in Information Security #56)

    Cyber Warfare: Building the Scientific Foundation (Advances in Information Security #56)

    by Sushil Jajodia • Cliff Wang • V. S. Subrahmanian • Vipin Swarup • Paulo Shakarian

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, pr... थप

    Language: ENG
    प्रतिलिपि अधिकार 2015
  • Adaptive Autonomous Secure Cyber Systems

    Adaptive Autonomous Secure Cyber Systems

    by Sushil Jajodia • Cliff Wang • V. S. Subrahmanian • Vipin Swarup • George Cybenko • Michael Wellman

    This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations;The extent to which autonomous cyber systems can be d... थप

    Language: ENG
    प्रतिलिपि अधिकार 2020
  • Moving Target Defense II

    Moving Target Defense II

    by Sushil Jajodia • Cliff Wang • V. S. Subrahmanian • Anup K. Ghosh • X. Sean Wang • Vipin Swarup

    Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force advers... थप

    Language: ENG
    प्रतिलिपि अधिकार 2013
खोजी रिफाइन गर्नुहोस्
Show More Results

खोजी रिफाइन गर्नुहोस्

Enter a 10 or 13 digit numerical ISBN code
Categories
खाली गर्नुहोस्

Footer

  • बारेमा
  • Partners
  • कानूनी
  • पहुँचता
  • गोपनीयता
  • सम्पर्क
  • ब्लग
Bookshare® र Benetech® को पञ्जीकृत व्यापारचिन्हहरू हुन्। Beneficent Technology, Inc. यो वेबसाइटको © प्रतिलिपि अधिकार 2002-2023, Beneficent Technology, Inc.