Search Results for - Narrowed by: Springer E-Book Collection - TEDU library - Security. - Electronic ResourcesSirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dLIBRARY$002509K$0025C3$0025BCt$0025C3$0025BCphane$0025091$00253ATEDU$002509TEDU$002blibrary$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026qf$003dFORMAT$002509Format$002509ER$002509Electronic$002bResources$0026ps$003d300?2024-05-31T05:22:04ZMalicious Attack Propagation and Source Identificationent://SD_ILS/0/SD_ILS:4276182024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Jiang, Jiaojiao. author.<br/><a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>Artificial Intelligence for Communications and Networks First EAI International Conference, AICON 2019, Harbin, China, May 25–26, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278132024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Han, Shuai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22971-9">https://doi.org/10.1007/978-3-030-22971-9</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283202024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Berlingerio, Michele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10928-8">https://doi.org/10.1007/978-3-030-10928-8</a><br/>Format: Electronic Resources<br/>Mobile Computing, Applications, and Services 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276942024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Yin, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28468-8">https://doi.org/10.1007/978-3-030-28468-8</a><br/>Format: Electronic Resources<br/>Advances in Visual Informatics 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279972024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Badioze Zaman, Halimah. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34032-2">https://doi.org/10.1007/978-3-030-34032-2</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4283592024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Gao, Honghao. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12971-2">https://doi.org/10.1007/978-3-030-12971-2</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288562024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Cybersecurity in the Electricity Sector Managing Critical Infrastructureent://SD_ILS/0/SD_ILS:4284772024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Leszczyna, Rafał. author.<br/><a href="https://doi.org/10.1007/978-3-030-19538-0">https://doi.org/10.1007/978-3-030-19538-0</a><br/>Format: Electronic Resources<br/>Industrial Control Systems Security and Resiliency Practice and Theoryent://SD_ILS/0/SD_ILS:4284832024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Rieger, Craig. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4284942024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27618-8">https://doi.org/10.1007/978-3-030-27618-8</a><br/>Format: Electronic Resources<br/>Advances and Trends in Artificial Intelligence. From Theory to Practice 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285922024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22999-3">https://doi.org/10.1007/978-3-030-22999-3</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Systems 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4290482024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Duong, Trung Q. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14413-5">https://doi.org/10.1007/978-3-030-14413-5</a><br/>Format: Electronic Resources<br/>Big Data – BigData 2019 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289732024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Keke. editor. (orcid)0000-0002-9996-156X<br/><a href="https://doi.org/10.1007/978-3-030-23551-2">https://doi.org/10.1007/978-3-030-23551-2</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291542024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278032024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35653-8">https://doi.org/10.1007/978-3-030-35653-8</a><br/>Format: Electronic Resources<br/>Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4276202024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Pathan, Al-Sakib Khan. editor. (orcid)0000-0001-6572-3451<br/><a href="https://doi.org/10.1007/978-3-030-05928-6">https://doi.org/10.1007/978-3-030-05928-6</a><br/>Format: Electronic Resources<br/>Handbook of Multimedia Information Security: Techniques and Applicationsent://SD_ILS/0/SD_ILS:4279042024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Singh, Amit Kumar. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Cloud Computing – CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276492024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Da Silva, Dilma. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23502-4">https://doi.org/10.1007/978-3-030-23502-4</a><br/>Format: Electronic Resources<br/>Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThingsent://SD_ILS/0/SD_ILS:4277192024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Al-Shaer, Ehab. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format: Electronic Resources<br/>Cloud Security Auditingent://SD_ILS/0/SD_ILS:4279642024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Majumdar, Suryadipta. author.<br/><a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277972024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Blockchain Technology in Internet of Thingsent://SD_ILS/0/SD_ILS:4284212024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zhu, Liehuang. author.<br/><a href="https://doi.org/10.1007/978-3-030-21766-2">https://doi.org/10.1007/978-3-030-21766-2</a><br/>Format: Electronic Resources<br/>Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286082024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-13-3732-1">https://doi.org/10.1007/978-981-13-3732-1</a><br/>Format: Electronic Resources<br/>Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284072024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Garg, Deepak. editor. (orcid)0000-0002-0888-3093<br/><a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Electronic Resources<br/>Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279632024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/><a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Electronic Resources<br/>Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14–17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281242024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar U., Leong Hou. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26142-9">https://doi.org/10.1007/978-3-030-26142-9</a><br/>Format: Electronic Resources<br/>Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286172024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4285282024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zheng, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05888-3">https://doi.org/10.1007/978-3-030-05888-3</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286632024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24900-7">https://doi.org/10.1007/978-3-030-24900-7</a><br/>Format: Electronic Resources<br/>Security and Privacy for Next-Generation Wireless Networksent://SD_ILS/0/SD_ILS:4282982024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zhong, Sheng. author.<br/><a href="https://doi.org/10.1007/978-3-030-01150-5">https://doi.org/10.1007/978-3-030-01150-5</a><br/>Format: Electronic Resources<br/>Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4283492024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Jiann-Liang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06158-6">https://doi.org/10.1007/978-3-030-06158-6</a><br/>Format: Electronic Resources<br/>Broadband Communications, Networks, and Systems 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289582024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Sucasas, Victor. editor. (orcid)0000-0002-7981-401X<br/><a href="https://doi.org/10.1007/978-3-030-05195-2">https://doi.org/10.1007/978-3-030-05195-2</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289692024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zincir-Heywood, Nur. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18419-3">https://doi.org/10.1007/978-3-030-18419-3</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292482024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Breitinger, Frank. editor. (orcid)0000-0001-5261-4600<br/><a href="https://doi.org/10.1007/978-3-030-05487-8">https://doi.org/10.1007/978-3-030-05487-8</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4281532024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27615-7">https://doi.org/10.1007/978-3-030-27615-7</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280982024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Venter, Hein. editor. (orcid)0000-0002-3607-8630<br/><a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papersent://SD_ILS/0/SD_ILS:4278712024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283352024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33723-0">https://doi.org/10.1007/978-3-030-33723-0</a><br/>Format: Electronic Resources<br/>Cybercryptography: Applicable Cryptography for Cyberspace Securityent://SD_ILS/0/SD_ILS:4284282024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Yan, Song Y. author.<br/><a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4279772024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33720-9">https://doi.org/10.1007/978-3-030-33720-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285402024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wrycza, Stanisław. editor. (orcid)0000-0001-7699-6631<br/><a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format: Electronic Resources<br/>Context-Aware Systems and Applications, and Nature of Computation and Communication 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22–23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292382024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Cong Vinh, Phan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06152-4">https://doi.org/10.1007/978-3-030-06152-4</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280292024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zemmari, Akka. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12143-3">https://doi.org/10.1007/978-3-030-12143-3</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280532024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Duong, Trung Quang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30149-1">https://doi.org/10.1007/978-3-030-30149-1</a><br/>Format: Electronic Resources<br/>Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22–25, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283712024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Li, Guoliang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18590-9">https://doi.org/10.1007/978-3-030-18590-9</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285562024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127<br/><a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288572024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Gui, Guan. editor. (orcid)0000-0003-3888-2881<br/><a href="https://doi.org/10.1007/978-3-030-36402-1">https://doi.org/10.1007/978-3-030-36402-1</a><br/>Format: Electronic Resources<br/>Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadowsent://SD_ILS/0/SD_ILS:4288602024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Guttman, Joshua D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292002024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Berlingerio, Michele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10925-7">https://doi.org/10.1007/978-3-030-10925-7</a><br/>Format: Electronic Resources<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4281642024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Madsen, Tom. author.<br/><a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286902024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Leslie, Christopher. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4283482024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Intelligent Data Processing 11th International Conference, IDP 2016, Barcelona, Spain, October 10–14, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:4285872024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Strijov, Vadim V. editor. (orcid)0000-0002-2194-8859<br/><a href="https://doi.org/10.1007/978-3-030-35400-8">https://doi.org/10.1007/978-3-030-35400-8</a><br/>Format: Electronic Resources<br/>Architecture for Blockchain Applicationsent://SD_ILS/0/SD_ILS:4285882024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format: Electronic Resources<br/>Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292092024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674<br/><a href="https://doi.org/10.1007/978-3-030-05490-8">https://doi.org/10.1007/978-3-030-05490-8</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281832024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format: Electronic Resources<br/>Handbook of Big Data and IoT Securityent://SD_ILS/0/SD_ILS:4287792024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554<br/><a href="https://doi.org/10.1007/978-3-030-10543-3">https://doi.org/10.1007/978-3-030-10543-3</a><br/>Format: Electronic Resources<br/>Proactive and Dynamic Network Defenseent://SD_ILS/0/SD_ILS:4291602024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Electronic Resources<br/>Advances of Science and Technology 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4291712024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zimale, Fasikaw Atanaw. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15357-1">https://doi.org/10.1007/978-3-030-15357-1</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4292432024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-8581-0">https://doi.org/10.1007/978-981-13-8581-0</a><br/>Format: Electronic Resources<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4280392024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225542024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235852024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:2244892024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:2210592024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Smart Micro-Grid Systems Security and Privacyent://SD_ILS/0/SD_ILS:2218002024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220682024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2220692024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218722024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Fog Computing and Its Applicationsent://SD_ILS/0/SD_ILS:2211822024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Smart Grident://SD_ILS/0/SD_ILS:2221232024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:2221392024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:2220602024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220562024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220572024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228942024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:2233892024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227552024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235772024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:2237632024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:2249692024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2258792024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225232024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232802024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2233802024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:2253542024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255642024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:2210732024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217422024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:2214432024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218522024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223872024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:2254542024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2246452024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252152024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:2213982024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2219192024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:2220142024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224952024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometricsent://SD_ILS/0/SD_ILS:2228152024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format: Electronic Resources<br/>Edge Computing: A Primerent://SD_ILS/0/SD_ILS:2224542024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:2231132024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234852024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:2233482024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256042024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2263322024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2258702024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2263062024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:2258072024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260152024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Future Intelligent Vehicular Technologies First International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2238692024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Ferreira, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51207-5">https://doi.org/10.1007/978-3-319-51207-5</a><br/>Format: Electronic Resources<br/>Smart Grid Inspired Future Technologies First International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2233352024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Hu, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47729-9">https://doi.org/10.1007/978-3-319-47729-9</a><br/>Format: Electronic Resources<br/>E-Technologies: Embracing the Internet of Things 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2253112024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Aïmeur, Esma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59041-7">https://doi.org/10.1007/978-3-319-59041-7</a><br/>Format: Electronic Resources<br/>Anomaly Detection Principles and Algorithmsent://SD_ILS/0/SD_ILS:2254832024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Mehrotra, Kishan G. author.<br/><a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228552024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2228852024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format: Electronic Resources<br/>Resilience and Risk Methods and Application in Environment, Cyber and Social Domainsent://SD_ILS/0/SD_ILS:2244402024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Linkov, Igor. editor.<br/><a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227632024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2237382024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-65548-2">https://doi.org/10.1007/978-3-319-65548-2</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245432024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format: Electronic Resources<br/>E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245572024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-71117-1">https://doi.org/10.1007/978-3-319-71117-1</a><br/>Format: Electronic Resources<br/>Parallel Architecture, Algorithm and Programming 8th International Symposium, PAAP 2017, Haikou, China, June 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2243232024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Guoliang. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6442-5">https://doi.org/10.1007/978-981-10-6442-5</a><br/>Format: Electronic Resources<br/>Mathematics and Computing Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2212342024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Giri, Debasis. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4642-1">https://doi.org/10.1007/978-981-10-4642-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213652024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 9th International Conference, MCSS 2017, Kraków, Poland, November 16-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2218972024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Dziech, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69911-0">https://doi.org/10.1007/978-3-319-69911-0</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2212962024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format: Electronic Resources<br/>Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252772024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Steghöfer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231312024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231322024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format: Electronic Resources<br/>Digital Communication. Towards a Smart and Secure Future Internet 28th International Tyrrhenian Workshop, TIWDC 2017, Palermo, Italy, September 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234132024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Piva, Alessandro. editor. (orcid)0000-0002-3047-0519<br/><a href="https://doi.org/10.1007/978-3-319-67639-5">https://doi.org/10.1007/978-3-319-67639-5</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256562024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format: Electronic Resources<br/>Applications for Future Internet International Summit, AFI 2016, Puebla, Mexico, May 25-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257622024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Sucar, Enrique. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49622-1">https://doi.org/10.1007/978-3-319-49622-1</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266722024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52727-7">https://doi.org/10.1007/978-3-319-52727-7</a><br/>Format: Electronic Resources<br/>Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providersent://SD_ILS/0/SD_ILS:2263252024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar von Faber, Eberhard. author.<br/><a href="https://doi.org/10.1007/978-3-658-16482-9">https://doi.org/10.1007/978-3-658-16482-9</a><br/>Format: Electronic Resources<br/>Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systemsent://SD_ILS/0/SD_ILS:2265662024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Kavati, Ilaiah. author.<br/><a href="https://doi.org/10.1007/978-3-319-57660-2">https://doi.org/10.1007/978-3-319-57660-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266552024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223892024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format: Electronic Resources<br/>ICT Innovations 2017 Data-Driven Innovation. 9th International Conference, ICT Innovations 2017, Skopje, Macedonia, September 18-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2257152024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Trajanov, Dimitar. editor. (orcid)0000-0002-3105-6010<br/><a href="https://doi.org/10.1007/978-3-319-67597-8">https://doi.org/10.1007/978-3-319-67597-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266772024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Shyamasundar, Rudrapatna K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266192024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 – November 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2267942024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Maglaras, Leandros A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format: Electronic Resources<br/>Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Effortsent://SD_ILS/0/SD_ILS:2258352024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Martellini, Maurizio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62108-1">https://doi.org/10.1007/978-3-319-62108-1</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:2251832024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format: Electronic Resources<br/>Fundamentals of Secure System Modellingent://SD_ILS/0/SD_ILS:2251422024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Matulevičius, Raimundas. author.<br/><a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253392024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format: Electronic Resources<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 21st Iberoamerican Congress, CIARP 2016, Lima, Peru, November 8–11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2252532024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Beltrán-Castañón, César. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52277-7">https://doi.org/10.1007/978-3-319-52277-7</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221962024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Chen, Fulong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60753-5">https://doi.org/10.1007/978-3-319-60753-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221132024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format: Electronic Resources<br/>Medical Image Watermarking Techniques and Applicationsent://SD_ILS/0/SD_ILS:2212002024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Singh, Amit Kumar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57699-2">https://doi.org/10.1007/978-3-319-57699-2</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2232522024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Agüero, Ramón. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231052024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2254402024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2259962024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2260002024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257662024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49580-4">https://doi.org/10.1007/978-3-319-49580-4</a><br/>Format: Electronic Resources<br/>Analytical and Computational Methods in Probability Theory First International Conference, ACMPT 2017, Moscow, Russia, October 23-27, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260432024-05-31T05:22:04Z2024-05-31T05:22:04ZYazar Rykov, Vladimir V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71504-9">https://doi.org/10.1007/978-3-319-71504-9</a><br/>Format: Electronic Resources<br/>