关注
Vipin Swarup
Vipin Swarup
在 mitre.org 的电子邮件经过验证
标题
引用次数
引用次数
年份
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
6432011
Security for mobile agents: Authentication and state appraisal
WM Farmer, JD Guttman, V Swarup
Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996
4271996
Security for mobile agents: Issues and requirements
WM Farmer, JD Guttman, V Swarup
Proceedings of the 19th national information systems security conference 2 …, 1996
3881996
A weakest-adversary security metric for network configuration security analysis
J Pamula, S Jajodia, P Ammann, V Swarup
Proceedings of the 2nd ACM workshop on Quality of protection, 31-38, 2006
2312006
Fingerprinting relational databases: Schemes and specialties
Y Li, V Swarup, S Jajodia
IEEE Transactions on Dependable and Secure Computing 2 (1), 34-45, 2005
2062005
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness: Issues and Research, 3-13, 2010
1982010
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer US, 2009
1982009
Authentication for mobile agents
S Berkovits, JD Guttman, V Swarup
Mobile agents and security, 114-136, 1998
1631998
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
S Jajodia, AK Ghosh, VS Subrahmanian, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2012
1402012
Assignments for applicative languages
V Swarup, US Reddy, E Ireland
Functional Programming Languages and Computer Architecture: 5th ACM …, 1991
971991
Cyber deception
S Jajodia, V Subrahmanian, V Swarup, C Wang
Springer 1, 2.1, 2016
912016
Constructing a virtual primary key for fingerprinting relational data
Y Li, V Swarup, S Jajodia
Proceedings of the 3rd ACM workshop on Digital rights management, 133-141, 2003
872003
Moving target defense ii
S Jajodia, AK Ghosh, V Subrahmanian, V Swarup, C Wang, XS Wang
Application of game Theory and Adversarial Modeling. Series: Advances in …, 2013
402013
The VLISP verified scheme system
JD Guttman, JD Ramsdell, V Swarup
Lisp and Symbolic Computation 8 (1), 33-110, 1995
401995
A robust watermarking scheme for relational data
Y Li, V Swarup, S Jajodia
Proceedings of the Workshop on Information Technology and Systems (WITS …, 2003
362003
Cyber warfare: building the scientific foundation
S Jajodia, P Shakarian, VS Subrahmanian, V Swarup, C Wang
Springer, 2015
352015
Trust appraisal and secure routing of mobile agents
V Swarup
DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997
331997
Everybody share: The challenge of data-sharing systems
K Smith, L Seligman, V Swarup
Computer 41 (9), 54-61, 2008
312008
A data sharing agreement framework
V Swarup, L Seligman, A Rosenthal
International Conference on Information Systems Security, 22-36, 2006
272006
Secure cloud computing
S Jajodia, K Kant, P Samarati, A Singhal, V Swarup, C Wang
Springer, 2014
262014
系统目前无法执行此操作,请稍后再试。
文章 1–20