Skip to content
Library Home
Start Over
Research Databases
E-Journals
Course Reserves
Library Home
Login to library account
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
Հայերէն
Українська
Language
Library Catalog
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced Search
|
Browse
|
Search Tips
Moving Target Defense
Cite this
Text this
Email this
Print
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Permanent link
Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats / edited by Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, X. Sean Wang.
Saved in:
Bibliographic Details
Corporate Author:
SpringerLink (Online service)
Other Authors:
Jajodia, Sushil
(Editor)
,
Ghosh, Anup K.
(Editor)
,
Swarup, Vipin
(Editor)
,
Wang, Cliff
(Editor)
,
Wang, X. Sean
(Editor)
Format:
eBook
Language:
English
Published:
New York, NY :
Springer New York : Imprint: Springer,
2011.
Edition:
1st ed. 2011.
Series:
Advances in Information Security,
54
Springer eBook Collection.
Subjects:
Computer security.
Data encryption (Computer science).
Application software.
Computer communication systems.
Computers.
Electronic resources (E-books)
Online Access:
Click to view e-book
Holy Cross Note:
Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Holdings
Description
Table of Contents
Similar Items
Staff View
Similar Items
Cyber Defense and Situational Awareness
Published: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Published: (2013)
Insider Threats in Cyber Security
Published: (2010)
Vulnerability Analysis and Defense for the Internet
Published: (2008)
Cyber Warfare Building the Scientific Foundation
Published: (2015)
Cyber Security Deterrence and IT Protection for Critical Infrastructures
Published: (2013)
Cyber Deception Building the Scientific Foundation
Published: (2016)
From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday
Published: (2018)
Insider Attack and Cyber Security Beyond the Hacker
Published: (2008)
Botnet Detection Countering the Largest Security Threat
Published: (2008)
Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers
Published: (2018)
Theory and Models for Cyber Situation Awareness
Published: (2017)
Trusted Computing and Information Security 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
Published: (2019)
Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches
by: Al-Shaer, Ehab, et al.
Published: (2016)
Introduction to Cyberdeception
by: Rowe, Neil C., et al.
Published: (2016)
Security and the Networked Society
by: Gregory, Mark A., et al.
Published: (2013)
Autonomic and Trusted Computing 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings
Published: (2007)
Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense
by: Heckman, Kristin E., et al.
Published: (2015)
Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedings
Published: (2018)
Network Intrusion Detection and Prevention Concepts and Techniques
by: Ghorbani, Ali A., et al.
Published: (2010)
ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings
Published: (2016)
Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers
Published: (2013)
Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Revised Selected Papers
Published: (2013)
Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers
Published: (2013)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I
Published: (2019)
Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II
Published: (2019)
Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings
Published: (2017)
Cyber Situational Awareness Issues and Research
Published: (2010)
Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers
Published: (2019)
Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers
Published: (2019)
Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedings
Published: (2019)
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers
Published: (2017)
Data and Applications Security and Privacy XXXI 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings
Published: (2017)
Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedings
Published: (2018)
Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Published: (2019)
Spyware and Adware
by: Aycock, John
Published: (2011)
Secure Multi-Party Non-Repudiation Protocols and Applications
by: Onieva, José A., et al.
Published: (2009)
Privacy-Respecting Intrusion Detection
by: Flegel, Ulrich
Published: (2007)
Global Initiatives to Secure Cyberspace An Emerging Landscape
Published: (2009)
Intrusion Detection Systems
Published: (2008)
Prev
Next
Similar Items
Cyber Defense and Situational Awareness
Published: (2014)
Moving Target Defense II Application of Game Theory and Adversarial Modeling
Published: (2013)
Insider Threats in Cyber Security
Published: (2010)
Vulnerability Analysis and Defense for the Internet
Published: (2008)
Cyber Warfare Building the Scientific Foundation
Published: (2015)