Search Results for - Narrowed by: Springer E-Book Collection - Computer Communication Networks. - Management information systems.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Konu$002509Management$002binformation$002bsystems.$002509Management$002binformation$002bsystems.$0026ps$003d300$0026isd$003dtrue?2024-06-26T06:22:37ZAdvances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285462024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377<br/><a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Digital Twin Era 16th IFIP WG 5.1 International Conference, PLM 2019, Moscow, Russia, July 8–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289872024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Fortin, Clement. editor.<br/><a href="https://doi.org/10.1007/978-3-030-42250-9">https://doi.org/10.1007/978-3-030-42250-9</a><br/>Format: Electronic Resources<br/>The Internet of Things in the Industrial Sector Security and Device Connectivity, Smart Environments, and Industry 4.0ent://SD_ILS/0/SD_ILS:4276662024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Mahmood, Zaigham. editor.<br/><a href="https://doi.org/10.1007/978-3-030-24892-5">https://doi.org/10.1007/978-3-030-24892-5</a><br/>Format: Electronic Resources<br/>Agile Methods 10th Brazilian Workshop, WBMA 2019, Belo Horizonte, Brazil, September 11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4291852024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Meirelles, Paulo. editor. (orcid)0000-0002-8923-2814<br/><a href="https://doi.org/10.1007/978-3-030-36701-5">https://doi.org/10.1007/978-3-030-36701-5</a><br/>Format: Electronic Resources<br/>Requirements Engineering for Service and Cloud Computingent://SD_ILS/0/SD_ILS:2234712024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Ramachandran, Muthu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51310-2">https://doi.org/10.1007/978-3-319-51310-2</a><br/>Format: Electronic Resources<br/>Contract Theory for Wireless Networksent://SD_ILS/0/SD_ILS:2231552024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Zhang, Yanru. author.<br/><a href="https://doi.org/10.1007/978-3-319-53288-2">https://doi.org/10.1007/978-3-319-53288-2</a><br/>Format: Electronic Resources<br/>Data Science and Big Data Computing Frameworks and Methodologiesent://SD_ILS/0/SD_ILS:176802024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31861-5">http://dx.doi.org/10.1007/978-3-319-31861-5</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:175212024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Karagiannis, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30505-9">http://dx.doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 8th International Workshop, SERENE 2016, Gothenburg, Sweden, September 5-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183562024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Crnkovic, Ivica. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45892-2">http://dx.doi.org/10.1007/978-3-319-45892-2</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186532024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Piessens, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49635-0">http://dx.doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing – ICSOC 2015 Workshops WESOA, RMSOC, ISC, DISCO, WESE, BSCI, FOR-MOVES, Goa, India, November 16-19, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:186682024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Norta, Alex. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-50539-7">http://dx.doi.org/10.1007/978-3-662-50539-7</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Science 5th International Conference, CLOSER 2015, Lisbon, Portugal, May 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:173812024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29582-4">http://dx.doi.org/10.1007/978-3-319-29582-4</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174132024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Qing, Sihan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29814-6">http://dx.doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23-25, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174142024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Kofroň, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29817-7">http://dx.doi.org/10.1007/978-3-319-29817-7</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182702024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44341-6">http://dx.doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 12th European Conference, ECMFA 2016, Held as Part of STAF 2016, Vienna, Austria, July 6-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181852024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Wąsowski, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42061-5">http://dx.doi.org/10.1007/978-3-319-42061-5</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182882024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Zikas, Vassilis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44618-9">http://dx.doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178372024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Rome, Erich. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33331-1">http://dx.doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 14th International Conference, ICSOC 2016, Banff, AB, Canada, October 10-13, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183782024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Sheng, Quan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46295-0">http://dx.doi.org/10.1007/978-3-319-46295-0</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183422024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Monrose, Fabian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45719-2">http://dx.doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Architectural Design Conception and Specification of Interactive Systemsent://SD_ILS/0/SD_ILS:182372024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Vissers, Chris A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-43298-4">http://dx.doi.org/10.1007/978-3-319-43298-4</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176752024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Lambrinoudakis, Costas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31811-0">http://dx.doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 11th International Conference, WASA 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedingsent://SD_ILS/0/SD_ILS:182232024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Yang, Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42836-9">http://dx.doi.org/10.1007/978-3-319-42836-9</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling. Technology-Specific Aspects of Models 9th International Conference, SAM 2016, Saint-Melo, France, October 3-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:183992024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Grabowski, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46613-2">http://dx.doi.org/10.1007/978-3-319-46613-2</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180302024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Badonnel, Rémi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39814-3">http://dx.doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:182822024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Ogawa, Kazuto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44524-3">http://dx.doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:186842024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53140-2">http://dx.doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:179552024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39028-4">http://dx.doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:174282024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Stajano, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29938-9">http://dx.doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Web Services, Formal Methods, and Behavioral Types 11th International Workshop, WS-FM 2014, Eindhoven, The Netherlands, September 11-12, 2014, and 12th International Workshop, WS-FM/BEAT 2015, Madrid, Spain, September 4-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178642024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Hildebrandt, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33612-1">http://dx.doi.org/10.1007/978-3-319-33612-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:176832024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Kim, Ho-won. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31875-2">http://dx.doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:186712024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Chen, Shanzhi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52726-9">http://dx.doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:231432024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21476-4">http://dx.doi.org/10.1007/978-3-319-21476-4</a><br/>Format: Electronic Resources<br/>Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228302024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233372024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XX Special Issue on Advanced Techniques for Big Data Managementent://SD_ILS/0/SD_ILS:247712024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46703-9">http://dx.doi.org/10.1007/978-3-662-46703-9</a><br/>Format: Electronic Resources<br/>Privacy in a Digital, Networked World Technologies, Implications and Solutionsent://SD_ILS/0/SD_ILS:211802024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Zeadally, Sherali. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08470-1">http://dx.doi.org/10.1007/978-3-319-08470-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:223232024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format: Electronic Resources<br/>Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235542024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235592024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232482024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Fischer-Hübner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format: Electronic Resources<br/>Social Computing, Behavioral-Cultural Modeling, and Prediction 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015. Proceedingsent://SD_ILS/0/SD_ILS:225272024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Agarwal, Nitin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16268-3">http://dx.doi.org/10.1007/978-3-319-16268-3</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:226402024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedingsent://SD_ILS/0/SD_ILS:230762024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235692024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27161-3">http://dx.doi.org/10.1007/978-3-319-27161-3</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234682024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Khouzani, MHR. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25594-1">http://dx.doi.org/10.1007/978-3-319-25594-1</a><br/>Format: Electronic Resources<br/>Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234712024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format: Electronic Resources<br/>Energy Informatics 4th D-A-CH Conference, EI 2015, Karlsruhe, Germany, November 12-13, 2015, Proceedingsent://SD_ILS/0/SD_ILS:234922024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Gottwalt, Sebastian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25876-8">http://dx.doi.org/10.1007/978-3-319-25876-8</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 11th European Conference, ECMFA 2015, Held as Part of STAF 2015, L`Aquila, Italy, July 20-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:231122024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Taentzer, Gabriele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21151-0">http://dx.doi.org/10.1007/978-3-319-21151-0</a><br/>Format: Electronic Resources<br/>Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235052024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228222024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235202024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedingsent://SD_ILS/0/SD_ILS:247652024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Focardi, Riccardo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46666-7">http://dx.doi.org/10.1007/978-3-662-46666-7</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235462024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231582024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format: Electronic Resources<br/>Information and Communications Security 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:231822024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Hui, Lucas C. K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21966-0">http://dx.doi.org/10.1007/978-3-319-21966-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Sciences International Conference in Cloud Computing and Services Sciences, CLOSER 2014 Barcelona Spain, April 3–5, 2014 Revised Selected Papersent://SD_ILS/0/SD_ILS:234492024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25414-2">http://dx.doi.org/10.1007/978-3-319-25414-2</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XIX Special Issue on Big Data and Open Dataent://SD_ILS/0/SD_ILS:247502024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46562-2">http://dx.doi.org/10.1007/978-3-662-46562-2</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248682024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Güneysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format: Electronic Resources<br/>Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lecturesent://SD_ILS/0/SD_ILS:226532024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 10th International Conference, WASA 2015, Qufu, China, August 10-12, 2015, Proceedingsent://SD_ILS/0/SD_ILS:231672024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Xu, Kuai. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21837-3">http://dx.doi.org/10.1007/978-3-319-21837-3</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 15th International Conference, NEW2AN 2015, and 8th Conference, ruSMART 2015, St. Petersburg, Russia, August 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232652024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23126-6">http://dx.doi.org/10.1007/978-3-319-23126-6</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 7th International Workshop, SERENE 2015, Paris, France, September 7-8, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232662024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Fantechi, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23129-7">http://dx.doi.org/10.1007/978-3-319-23129-7</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232912024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23440-3">http://dx.doi.org/10.1007/978-3-319-23440-3</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 27th IFIP WG 6.1 International Conference, ICTSS 2015, Sharjah and Dubai, United Arab Emirates, November 23-25, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235012024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar El-Fakih, Khaled. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25945-1">http://dx.doi.org/10.1007/978-3-319-25945-1</a><br/>Format: Electronic Resources<br/>Guide to Security Assurance for Cloud Computingent://SD_ILS/0/SD_ILS:235022024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format: Electronic Resources<br/>Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedingsent://SD_ILS/0/SD_ILS:230092024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Latré, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format: Electronic Resources<br/>Ad-hoc Networks and Wireless ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, Benidorm, Spain, June 22--27, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:247222024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Garcia Pineda, Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46338-3">http://dx.doi.org/10.1007/978-3-662-46338-3</a><br/>Format: Electronic Resources<br/>Guide to Computer Network Securityent://SD_ILS/0/SD_ILS:195652024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6654-2">http://dx.doi.org/10.1007/978-1-4471-6654-2</a><br/>Format: Electronic Resources<br/>Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambridge, UK, June 10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:224382024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15786-3">http://dx.doi.org/10.1007/978-3-319-15786-3</a><br/>Format: Electronic Resources<br/>Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:226482024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Steiner, Moritz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17172-2">http://dx.doi.org/10.1007/978-3-319-17172-2</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:233442024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Mjølsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format: Electronic Resources<br/>Globalizing Domain-Specific Languages International Dagstuhl Seminar, Dagstuhl Castle, Germany, October 5-10, 2014, Revised Papersent://SD_ILS/0/SD_ILS:235122024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Combemale, Benoit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26172-0">http://dx.doi.org/10.1007/978-3-319-26172-0</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 13th International Conference, ICSOC 2015, Goa, India, November 16-19, 2015, Proceedingsent://SD_ILS/0/SD_ILS:248802024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Barros, Alistair. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48616-0">http://dx.doi.org/10.1007/978-3-662-48616-0</a><br/>Format: Electronic Resources<br/>Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:235242024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format: Electronic Resources<br/>Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:247842024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 14th International Conference, ADHOC-NOW 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229672024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Papavassiliou, Symeon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19662-6">http://dx.doi.org/10.1007/978-3-319-19662-6</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208072024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedingsent://SD_ILS/0/SD_ILS:209952024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07425-2">http://dx.doi.org/10.1007/978-3-319-07425-2</a><br/>Format: Electronic Resources<br/>Multiple Access Communications 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:214762024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10262-7">http://dx.doi.org/10.1007/978-3-319-10262-7</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014, St. Petersburg, Russia, August 27-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:214952024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10353-2">http://dx.doi.org/10.1007/978-3-319-10353-2</a><br/>Format: Electronic Resources<br/>Software Architecture 8th European Conference, ECSA 2014, Vienna, Austria, August 25-29, 2014. Proceedingsent://SD_ILS/0/SD_ILS:214232024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Avgeriou, Paris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09970-5">http://dx.doi.org/10.1007/978-3-319-09970-5</a><br/>Format: Electronic Resources<br/>Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedingsent://SD_ILS/0/SD_ILS:218842024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Schmidt, Kai-Uwe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12325-7">http://dx.doi.org/10.1007/978-3-319-12325-7</a><br/>Format: Electronic Resources<br/>Cloud Computing Challenges, Limitations and R&D Solutionsent://SD_ILS/0/SD_ILS:215312024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format: Electronic Resources<br/>Cloud Computing and Services Science Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:217322024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11561-0">http://dx.doi.org/10.1007/978-3-319-11561-0</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedingsent://SD_ILS/0/SD_ILS:219222024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Poovendran, Radha. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12601-2">http://dx.doi.org/10.1007/978-3-319-12601-2</a><br/>Format: Electronic Resources<br/>Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216402024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Han, Weihong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11119-3">http://dx.doi.org/10.1007/978-3-319-11119-3</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:241222024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format: Electronic Resources<br/>Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 – July 3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244312024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format: Electronic Resources<br/>Service-Oriented Computing 12th International Conference, ICSOC 2014, Paris, France, November 3-6, 2014. Proceedingsent://SD_ILS/0/SD_ILS:246252024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Franch, Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45391-9">http://dx.doi.org/10.1007/978-3-662-45391-9</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:214602024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Prouff, Emmanuel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10175-0">http://dx.doi.org/10.1007/978-3-319-10175-0</a><br/>Format: Electronic Resources<br/>Modelling Foundations and Applications 10th European Conference, ECMFA 2014, Held as Part of STAF 2014, York, UK, July 21-25, 2014. Proceedingsent://SD_ILS/0/SD_ILS:213032024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Cabot, Jordi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09195-2">http://dx.doi.org/10.1007/978-3-319-09195-2</a><br/>Format: Electronic Resources<br/>Trust Management in Cloud Servicesent://SD_ILS/0/SD_ILS:218692024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Noor, Talal H. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12250-2">http://dx.doi.org/10.1007/978-3-319-12250-2</a><br/>Format: Electronic Resources<br/>Economics of Grids, Clouds, Systems, and Services 11th International Conference, GECON 2014, Cardiff, UK, September 16-18, 2014. Revised Selected Papers.ent://SD_ILS/0/SD_ILS:222602024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Altmann, Jörn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14609-6">http://dx.doi.org/10.1007/978-3-319-14609-6</a><br/>Format: Electronic Resources<br/>Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:218912024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format: Electronic Resources<br/>Mathematical and Engineering Methods in Computer Science 9th International Doctoral Workshop, MEMICS 2014, Telč, Czech Republic, October 17--19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:222952024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Hliněný, Petr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14896-0">http://dx.doi.org/10.1007/978-3-319-14896-0</a><br/>Format: Electronic Resources<br/>Testing Software and Systems 26th IFIP WG 6.1 International Conference, ICTSS 2014, Madrid, Spain, September 23-25, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245682024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Merayo, Mercedes G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44857-1">http://dx.doi.org/10.1007/978-3-662-44857-1</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245732024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>Traffic Monitoring and Analysis 6th International Workshop, TMA 2014, London, UK, April 14, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240752024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Dainotti, Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54999-1">http://dx.doi.org/10.1007/978-3-642-54999-1</a><br/>Format: Electronic Resources<br/>Energy-Efficient Data Centers Second International Workshop, E²DC 2013, Berkeley, CA, USA, May 21, 2013. Revised Selected Papersent://SD_ILS/0/SD_ILS:241002024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55149-9">http://dx.doi.org/10.1007/978-3-642-55149-9</a><br/>Format: Electronic Resources<br/>Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papersent://SD_ILS/0/SD_ILS:246882024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format: Electronic Resources<br/>System Analysis and Modeling: Models and Reusability 8th International Conference, SAM 2014, Valencia, Spain, September 29-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:217752024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Amyot, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11743-0">http://dx.doi.org/10.1007/978-3-319-11743-0</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216952024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format: Electronic Resources<br/>Internet of Vehicles – Technologies and Services First International Conference, IOV, Beijing, China, September 1-3, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216472024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Hsu, Robert C.-H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11167-4">http://dx.doi.org/10.1007/978-3-319-11167-4</a><br/>Format: Electronic Resources<br/>Network and System Security 8th International Conference, NSS 2014, Xi’an, China, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217662024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Au, Man Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11698-3">http://dx.doi.org/10.1007/978-3-319-11698-3</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218762024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244462024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format: Electronic Resources<br/>Collaborative Systems for Smart Networked Environments 15th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2014, Amsterdam, The Netherlands, October 6-8, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245492024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44745-1">http://dx.doi.org/10.1007/978-3-662-44745-1</a><br/>Format: Electronic Resources<br/>Social Computing, Behavioral-Cultural Modeling and Prediction 7th International Conference, SBP 2014, Washington, DC, USA, April 1-4, 2014. Proceedingsent://SD_ILS/0/SD_ILS:206882024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Kennedy, William G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05579-4">http://dx.doi.org/10.1007/978-3-319-05579-4</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210712024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Cai, Zhipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07782-6">http://dx.doi.org/10.1007/978-3-319-07782-6</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedingsent://SD_ILS/0/SD_ILS:240442024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Abadi, Martín. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54792-8">http://dx.doi.org/10.1007/978-3-642-54792-8</a><br/>Format: Electronic Resources<br/>Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:239442024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Katsikas, Sokratis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53997-8">http://dx.doi.org/10.1007/978-3-642-53997-8</a><br/>Format: Electronic Resources<br/>Information Systems and Global Assemblages. (Re)Configuring Actors, Artefacts, Organizations IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2014, Auckland, New Zealand, December 11-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:246712024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Doolin, Bill. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45708-5">http://dx.doi.org/10.1007/978-3-662-45708-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218412024-06-26T06:22:37Z2024-06-26T06:22:37ZYazar Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format: Electronic Resources<br/>