Author of the publication

Optimizing Alert Data Management Processes at a Cyber Security Operations Center.

, , , and . Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, volume 11830 of Lecture Notes in Computer Science, Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Jajodia, Sushil
add a person with the name Jajodia, Sushil
 

Other publications of authors with the same name

Correctness Criteria for Multilevel Secure Transactions., , , and . IEEE Trans. Knowl. Data Eng., 8 (1): 32-45 (1996)The Partitioned Synchronization Rule for Planar Extendible Partial Orders., , and . IEEE Trans. Knowl. Data Eng., 7 (5): 797-808 (1995)A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting., and . IEEE Trans. Knowl. Data Eng., 1 (4): 459-469 (1989)Minimum-cost network hardening using attack graphs., , and . Computer Communications, 29 (18): 3812-3824 (2006)Measuring Security Risk of Networks Using Attack Graphs., , , and . IJNGC, (2010)Detecting VoIP Floods Using the Hellinger Distance., , , and . IEEE Trans. Parallel Distrib. Syst., 19 (6): 794-805 (2008)Introduction to the special issue on the use of entity-relationship concepts in databases and related software., , and . Journal of Systems and Software, 4 (2-3): 95-98 (1984)Database Security and Privacy., , , and . Computing Handbook, 3rd ed. (2), CRC Press, (2014)Database Security and Privacy.. The Computer Science and Engineering Handbook, CRC Press, (1997)Data Mining for Intrusion Detection., and . The Data Mining and Knowledge Discovery Handbook, Springer, (2005)