Search Results for - Narrowed by: Springer E-Book Collection - SpringerLink (Online service) - Systems and Data Security. - Computers.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dAUTHOR$002509Yazar$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Computers.$002509Computers.$0026ps$003d300?2024-06-15T12:17:19ZApplications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283062024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>Quality of Information and Communications Technology 12th International Conference, QUATIC 2019, Ciudad Real, Spain, September 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285032024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Piattini, Mario. editor. (orcid)0000-0002-7212-8279<br/><a href="https://doi.org/10.1007/978-3-030-29238-6">https://doi.org/10.1007/978-3-030-29238-6</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Computer Vision – ACCV 2018 14th Asian Conference on Computer Vision, Perth, Australia, December 2–6, 2018, Revised Selected Papers, Part VIent://SD_ILS/0/SD_ILS:4283942024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Jawahar, C.V. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20876-9">https://doi.org/10.1007/978-3-030-20876-9</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279082024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 – December 1, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277122024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papersent://SD_ILS/0/SD_ILS:4276472024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810<br/><a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4283462024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279812024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Li, Jin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Electronic Resources<br/>Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282562024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format: Electronic Resources<br/>Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282622024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983<br/><a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4281882024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2019 Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276902024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Joshi, James. editor. (orcid)0000-0003-4519-9802<br/><a href="https://doi.org/10.1007/978-3-030-23404-1">https://doi.org/10.1007/978-3-030-23404-1</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285132024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285152024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format: Electronic Resources<br/>Advances in Data Science, Cyber Security and IT Applications First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4280652024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Alfaries, Auhood. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36368-0">https://doi.org/10.1007/978-3-030-36368-0</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Deep Learning 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4291092024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30484-3">https://doi.org/10.1007/978-3-030-30484-3</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4291102024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format: Electronic Resources<br/>Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287342024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Damaševičius, Robertas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Applied Computer Sciences in Engineering 6th Workshop on Engineering Applications, WEA 2019, Santa Marta, Colombia, October 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277032024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Figueroa-García, Juan Carlos. editor. (orcid)0000-0001-5544-5937<br/><a href="https://doi.org/10.1007/978-3-030-31019-6">https://doi.org/10.1007/978-3-030-31019-6</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4282062024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281292024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279712024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4285052024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570<br/><a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279802024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Deng, Robert H. editor. (orcid)0000-0003-3491-8146<br/><a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4283772024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Chen, Songqing. editor. (orcid)0000-0003-4650-7125<br/><a href="https://doi.org/10.1007/978-3-030-37228-6">https://doi.org/10.1007/978-3-030-37228-6</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287082024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Perdisci, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290082024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941<br/><a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288202024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Cybenko, George. editor. (orcid)0000-0001-7734-2912<br/><a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2019 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288252024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23696-0">https://doi.org/10.1007/978-3-030-23696-0</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Open Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278332024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Bordeleau, Francis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIIent://SD_ILS/0/SD_ILS:4285832024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4292302024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Kosta, Eleni. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16744-8">https://doi.org/10.1007/978-3-030-16744-8</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284112024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Nielson, Flemming. editor. (orcid)0000-0001-7362-6176<br/><a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289832024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Pereira, José. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284232024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthdayent://SD_ILS/0/SD_ILS:4292552024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Alvim, Mário S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Electronic Resources<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288972024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4291972024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Chen, Songqing. editor. (orcid)0000-0003-4650-7125<br/><a href="https://doi.org/10.1007/978-3-030-37231-6">https://doi.org/10.1007/978-3-030-37231-6</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4278942024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format: Electronic Resources<br/>Euro-Par 2018: Parallel Processing Workshops Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276212024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Mencagli, Gabriele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10549-5">https://doi.org/10.1007/978-3-030-10549-5</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281022024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4285072024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format: Electronic Resources<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277612024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277982024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Nandi, Sukumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4282842024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30508-6">https://doi.org/10.1007/978-3-030-30508-6</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282892024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890<br/><a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290992024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X<br/><a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Theoretical Neural Computation 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4285642024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30487-4">https://doi.org/10.1007/978-3-030-30487-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Green, Pervasive, and Cloud Computing 14th International Conference, GPC 2019, Uberlândia, Brazil, May 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288542024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040<br/><a href="https://doi.org/10.1007/978-3-030-19223-5">https://doi.org/10.1007/978-3-030-19223-5</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4291402024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Explainable AI: Interpreting, Explaining and Visualizing Deep Learningent://SD_ILS/0/SD_ILS:4285942024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Samek, Wojciech. editor. (orcid)0000-0002-6283-3265<br/><a href="https://doi.org/10.1007/978-3-030-28954-6">https://doi.org/10.1007/978-3-030-28954-6</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4291932024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 11th International Workshop, SERENE 2019, Naples, Italy, September 17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282262024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Calinescu, Radu. editor. (orcid)0000-0002-2678-9260<br/><a href="https://doi.org/10.1007/978-3-030-30856-8">https://doi.org/10.1007/978-3-030-30856-8</a><br/>Format: Electronic Resources<br/>Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286482024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289962024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284642024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239<br/><a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:185322024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:181542024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179872024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39381-0">http://dx.doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181502024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:171902024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:175902024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Information Technology: New Generations 13th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:177482024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Latifi, Shahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32467-8">http://dx.doi.org/10.1007/978-3-319-32467-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Self- and Co-regulation in Cybercrime, Cybersecurity and National Securityent://SD_ILS/0/SD_ILS:225502024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format: Electronic Resources<br/>Cybersecurity in Israelent://SD_ILS/0/SD_ILS:228782024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tabansky, Lior. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18986-4">http://dx.doi.org/10.1007/978-3-319-18986-4</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:226992024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228292024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235222024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247432024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247442024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Building Secure Defenses Against Code-Reuse Attacksent://SD_ILS/0/SD_ILS:234642024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format: Electronic Resources<br/>Pattern and Security Requirements Engineering-Based Establishment of Security Standardsent://SD_ILS/0/SD_ILS:225852024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Reforming European Data Protection Lawent://SD_ILS/0/SD_ILS:254802024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:197662024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:205592024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Future Business Software Current Trends in Business Software Developmentent://SD_ILS/0/SD_ILS:204262024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Brunetti, Gino. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04144-5">http://dx.doi.org/10.1007/978-3-319-04144-5</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service Attack and Defenseent://SD_ILS/0/SD_ILS:197902024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:205062024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Pervasive Wireless Environments: Detecting and Localizing User Spoofingent://SD_ILS/0/SD_ILS:209832024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Cybersecurity in Switzerlandent://SD_ILS/0/SD_ILS:215532024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Dunn Cavelty, Myriam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10620-5">http://dx.doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Large-Scale Data Analyticsent://SD_ILS/0/SD_ILS:197622024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9242-9">http://dx.doi.org/10.1007/978-1-4614-9242-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208752024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Cyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:198962024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:214462024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:222192024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Electronic Identityent://SD_ILS/0/SD_ILS:195382024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Andrade, Norberto Nuno Gomes de. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6449-4">http://dx.doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:195462024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210272024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210432024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07620-1">http://dx.doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:214992024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:215002024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244242024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:246922024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246212024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Real-time Security Extensions for EPCglobal Networks Case Study for the Pharmaceutical Industryent://SD_ILS/0/SD_ILS:236802024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Schapranow, Matthieu-P. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36343-6">http://dx.doi.org/10.1007/978-3-642-36343-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:239752024-06-15T12:17:19Z2024-06-15T12:17:19ZYazar Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>