Search Results for - Narrowed by: SpringerLink (Online service) - Jajodia, Sushil. editor. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dAUTHOR$002509Author$002509Jajodia$00252C$002bSushil.$002beditor.$002509Jajodia$00252C$002bSushil.$002beditor.$0026ps$003d300? 2024-06-13T21:29:26Z Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085224 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:2084088 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2008 13th European Symposium on Research in Computer Security, M&aacute;laga, Spain, October 6-8, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503749 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88313-5">http://dx.doi.org/10.1007/978-3-540-88313-5</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Database Security Applications and Trends ent://SD_ILS/0/SD_ILS:501583 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Gertz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-48533-1">http://dx.doi.org/10.1007/978-0-387-48533-1</a><br/>Format:&#160;Electronic Resources<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:504690 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510648 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11593980">http://dx.doi.org/10.1007/11593980</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:510309 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/11535706">http://dx.doi.org/10.1007/11535706</a><br/>Format:&#160;Electronic Resources<br/> Journal on Data Semantics II ent://SD_ILS/0/SD_ILS:509746 2024-06-13T21:29:26Z 2024-06-13T21:29:26Z by&#160;Spaccapietra, Stefano. editor.<br/><a href="http://dx.doi.org/10.1007/b104761">http://dx.doi.org/10.1007/b104761</a><br/>Format:&#160;Electronic Resources<br/>