Search Results for - Narrowed by: Electronic Book - Big data. - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dITYPE$002509Materyal$002bT$0025C3$0025BCr$0025C3$0025BC$0025091$00253AE-BOOKS$002509Electronic$002bBook$0026qf$003dSUBJECT$002509Konu$002509Big$002bdata.$002509Big$002bdata.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-20T23:19:00Z Information Systems 15th European, Mediterranean, and Middle Eastern Conference, EMCIS 2018, Limassol, Cyprus, October 4-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:428858 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Themistocleous, Marinos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11395-7">https://doi.org/10.1007/978-3-030-11395-7</a><br/>Format:&#160;Electronic Resources<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:429179 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704<br/><a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Electronic Resources<br/> Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 &ndash; December 1, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427712 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Applications ALAP 2018 ent://SD_ILS/0/SD_ILS:222004 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:222960 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:222331 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:223717 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:225454 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:222014 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:224261 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Jiang, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:225950 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Alsmadi, Izzat M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44257-0">https://doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Building Trust in Information Perspectives on the Frontiers of Provenance ent://SD_ILS/0/SD_ILS:18067 2024-06-20T23:19:00Z 2024-06-20T23:19:00Z Yazar&#160;Lemieux, Victoria L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40226-0">http://dx.doi.org/10.1007/978-3-319-40226-0</a><br/>Format:&#160;Electronic Resources<br/>