Sushil Jajodia
56 works on record
Works

Trusted recovery and defensive information warfare
2002

Multilevel secure transaction processing
2000

Cyber situational awareness

Moving target defense

Preleukemia

Information Systems Security 7th International Conference Iciss 2011 Kolkata India December 1519 2011 Proceedings

Advances in multimedia information systems

Information systems security

Data and applications security XIX

Trusted Recovery And Defensive Information Warfare

Advances in multimedia information systems

Preserving privacy in On-Line Analytical Processing (OLAP)

Information security

Time granularities in databases, data mining, and temporal reasoning

Applications of data mining in computer security

Advanced transaction models and architectures

Temporal databases

Multimedia database systems

Handbook of Database Security: Applications and Trends

Integrity and Internal Control in Information Systems

Advanced Transaction Models and Architectures

Handbook of database security

Moving Target Defense II

Adaptive Autonomous Secure Cyber Systems

Cyber Deception

Preserving Privacy in On-Line Analytical Processing

Graphical Models for Security

Information Security Theory and Practice

ICT Systems Security and Privacy Protection

Computer Security -- ESORICS 2013

Secure Cloud Computing

Cyber Warfare

Cyber Situational Awareness

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense

Network Security Metrics

Theory and Models for Cyber Situation Awareness

Security and Protection in Information Processing Systems
Multimedia Database Systems
Moving Target Defense
Integrity and Internal Control in Information Systems : IFIP TC11 Working Group 11. 5 Second Working Conference on Integrity and Internal Control in Information Systems
Security and Privacy in Communication Networks
Data and Applications Security and Privacy XXIV
Database Security XII

Encyclopedia of Cryptography, Security and Privacy
Journal on Data Semantics II
Computer Security - ESORICS 2008
Advances in Multimedia Information Systems
Integrity and Internal Control in Information Systems VI
Proceedings of the IFIP TC 11 23rd International Information Security Conference
Trusted Recovery and Defensive Information Warfare
Proceedings of the First ACM Workshop on Moving Target Defense
Information Hiding

Intrusion detection in distributed systems

Database Security XII

Proceedings of the 1993 Sigmod International Conference Management of Data (Sigmod Record)
Database Security, IV: Status and Prospects