Search Results for - Narrowed by: Springer E-Book Collection - Data protection. - Electronic ResourcesSirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dFORMAT$002509Format$002509ER$002509Electronic$002bResources$0026ps$003d300$0026isd$003dtrue?2024-06-15T05:02:18ZAutonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThingsent://SD_ILS/0/SD_ILS:4277192024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Al-Shaer, Ehab. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4281642024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Madsen, Tom. author.<br/><a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Advances in Visual Informatics 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279972024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Badioze Zaman, Halimah. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34032-2">https://doi.org/10.1007/978-3-030-34032-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286082024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-13-3732-1">https://doi.org/10.1007/978-981-13-3732-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285562024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127<br/><a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format: Electronic Resources<br/>Artificial Intelligence for Communications and Networks First EAI International Conference, AICON 2019, Harbin, China, May 25–26, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278132024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Han, Shuai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22971-9">https://doi.org/10.1007/978-3-030-22971-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284072024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Garg, Deepak. editor. (orcid)0000-0002-0888-3093<br/><a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Electronic Resources<br/>Cloud Computing – CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276492024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Da Silva, Dilma. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23502-4">https://doi.org/10.1007/978-3-030-23502-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4283482024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4283492024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Jiann-Liang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06158-6">https://doi.org/10.1007/978-3-030-06158-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281832024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280982024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Venter, Hein. editor. (orcid)0000-0002-3607-8630<br/><a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286172024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format: Electronic Resources<br/>Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4276202024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Pathan, Al-Sakib Khan. editor. (orcid)0000-0001-6572-3451<br/><a href="https://doi.org/10.1007/978-3-030-05928-6">https://doi.org/10.1007/978-3-030-05928-6</a><br/>Format: Electronic Resources<br/>Malicious Attack Propagation and Source Identificationent://SD_ILS/0/SD_ILS:4276182024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Jiang, Jiaojiao. author.<br/><a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4283592024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Gao, Honghao. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12971-2">https://doi.org/10.1007/978-3-030-12971-2</a><br/>Format: Electronic Resources<br/>Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285402024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wrycza, Stanisław. editor. (orcid)0000-0001-7699-6631<br/><a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277972024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278032024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35653-8">https://doi.org/10.1007/978-3-030-35653-8</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288562024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288572024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Gui, Guan. editor. (orcid)0000-0003-3888-2881<br/><a href="https://doi.org/10.1007/978-3-030-36402-1">https://doi.org/10.1007/978-3-030-36402-1</a><br/>Format: Electronic Resources<br/>Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadowsent://SD_ILS/0/SD_ILS:4288602024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Guttman, Joshua D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format: Electronic Resources<br/>Intelligent Data Processing 11th International Conference, IDP 2016, Barcelona, Spain, October 10–14, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:4285872024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Strijov, Vadim V. editor. (orcid)0000-0002-2194-8859<br/><a href="https://doi.org/10.1007/978-3-030-35400-8">https://doi.org/10.1007/978-3-030-35400-8</a><br/>Format: Electronic Resources<br/>Architecture for Blockchain Applicationsent://SD_ILS/0/SD_ILS:4285882024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papersent://SD_ILS/0/SD_ILS:4278712024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289692024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zincir-Heywood, Nur. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18419-3">https://doi.org/10.1007/978-3-030-18419-3</a><br/>Format: Electronic Resources<br/>Handbook of Multimedia Information Security: Techniques and Applicationsent://SD_ILS/0/SD_ILS:4279042024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Singh, Amit Kumar. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Mobile Computing, Applications, and Services 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276942024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Yin, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28468-8">https://doi.org/10.1007/978-3-030-28468-8</a><br/>Format: Electronic Resources<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4280392024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280532024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Duong, Trung Quang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30149-1">https://doi.org/10.1007/978-3-030-30149-1</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283352024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33723-0">https://doi.org/10.1007/978-3-030-33723-0</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4279772024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33720-9">https://doi.org/10.1007/978-3-030-33720-9</a><br/>Format: Electronic Resources<br/>Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22–25, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283712024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Li, Guoliang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18590-9">https://doi.org/10.1007/978-3-030-18590-9</a><br/>Format: Electronic Resources<br/>Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292092024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674<br/><a href="https://doi.org/10.1007/978-3-030-05490-8">https://doi.org/10.1007/978-3-030-05490-8</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Systems 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4290482024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Duong, Trung Q. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14413-5">https://doi.org/10.1007/978-3-030-14413-5</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4292432024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-8581-0">https://doi.org/10.1007/978-981-13-8581-0</a><br/>Format: Electronic Resources<br/>Advances of Science and Technology 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4291712024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zimale, Fasikaw Atanaw. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15357-1">https://doi.org/10.1007/978-3-030-15357-1</a><br/>Format: Electronic Resources<br/>Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279632024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/><a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Electronic Resources<br/>Cloud Security Auditingent://SD_ILS/0/SD_ILS:4279642024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Majumdar, Suryadipta. author.<br/><a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4285282024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zheng, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05888-3">https://doi.org/10.1007/978-3-030-05888-3</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292002024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Berlingerio, Michele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10925-7">https://doi.org/10.1007/978-3-030-10925-7</a><br/>Format: Electronic Resources<br/>Blockchain Technology in Internet of Thingsent://SD_ILS/0/SD_ILS:4284212024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zhu, Liehuang. author.<br/><a href="https://doi.org/10.1007/978-3-030-21766-2">https://doi.org/10.1007/978-3-030-21766-2</a><br/>Format: Electronic Resources<br/>Cybercryptography: Applicable Cryptography for Cyberspace Securityent://SD_ILS/0/SD_ILS:4284282024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Yan, Song Y. author.<br/><a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14–17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281242024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar U., Leong Hou. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26142-9">https://doi.org/10.1007/978-3-030-26142-9</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280292024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zemmari, Akka. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12143-3">https://doi.org/10.1007/978-3-030-12143-3</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283202024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Berlingerio, Michele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10928-8">https://doi.org/10.1007/978-3-030-10928-8</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4281532024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27615-7">https://doi.org/10.1007/978-3-030-27615-7</a><br/>Format: Electronic Resources<br/>Security and Privacy for Next-Generation Wireless Networksent://SD_ILS/0/SD_ILS:4282982024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zhong, Sheng. author.<br/><a href="https://doi.org/10.1007/978-3-030-01150-5">https://doi.org/10.1007/978-3-030-01150-5</a><br/>Format: Electronic Resources<br/>Context-Aware Systems and Applications, and Nature of Computation and Communication 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22–23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292382024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Cong Vinh, Phan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06152-4">https://doi.org/10.1007/978-3-030-06152-4</a><br/>Format: Electronic Resources<br/>Advances and Trends in Artificial Intelligence. From Theory to Practice 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285922024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22999-3">https://doi.org/10.1007/978-3-030-22999-3</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292482024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Breitinger, Frank. editor. (orcid)0000-0001-5261-4600<br/><a href="https://doi.org/10.1007/978-3-030-05487-8">https://doi.org/10.1007/978-3-030-05487-8</a><br/>Format: Electronic Resources<br/>Big Data – BigData 2019 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289732024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Keke. editor. (orcid)0000-0002-9996-156X<br/><a href="https://doi.org/10.1007/978-3-030-23551-2">https://doi.org/10.1007/978-3-030-23551-2</a><br/>Format: Electronic Resources<br/>Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286902024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Leslie, Christopher. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format: Electronic Resources<br/>Cybersecurity in the Electricity Sector Managing Critical Infrastructureent://SD_ILS/0/SD_ILS:4284772024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Leszczyna, Rafał. author.<br/><a href="https://doi.org/10.1007/978-3-030-19538-0">https://doi.org/10.1007/978-3-030-19538-0</a><br/>Format: Electronic Resources<br/>Industrial Control Systems Security and Resiliency Practice and Theoryent://SD_ILS/0/SD_ILS:4284832024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Rieger, Craig. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Electronic Resources<br/>Handbook of Big Data and IoT Securityent://SD_ILS/0/SD_ILS:4287792024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554<br/><a href="https://doi.org/10.1007/978-3-030-10543-3">https://doi.org/10.1007/978-3-030-10543-3</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291542024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format: Electronic Resources<br/>Proactive and Dynamic Network Defenseent://SD_ILS/0/SD_ILS:4291602024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Electronic Resources<br/>Broadband Communications, Networks, and Systems 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289582024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Sucasas, Victor. editor. (orcid)0000-0002-7981-401X<br/><a href="https://doi.org/10.1007/978-3-030-05195-2">https://doi.org/10.1007/978-3-030-05195-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286632024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24900-7">https://doi.org/10.1007/978-3-030-24900-7</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4284942024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27618-8">https://doi.org/10.1007/978-3-030-27618-8</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252152024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255642024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260152024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2263062024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2263322024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:2254542024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:2258072024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256042024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2258702024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2258792024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:2253542024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2219192024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:2214432024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:2220602024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225542024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232802024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2233802024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218522024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223872024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Smart Grident://SD_ILS/0/SD_ILS:2221232024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220562024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220572024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Fog Computing and Its Applicationsent://SD_ILS/0/SD_ILS:2211822024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224952024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228942024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227552024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:2210592024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2220692024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:2221392024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225232024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Edge Computing: A Primerent://SD_ILS/0/SD_ILS:2224542024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometricsent://SD_ILS/0/SD_ILS:2228152024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:2233892024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235772024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235852024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220682024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234852024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:2237632024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:2244892024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2246452024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:2249692024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217422024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:2233482024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:2210732024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:2231132024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:2213982024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Smart Micro-Grid Systems Security and Privacyent://SD_ILS/0/SD_ILS:2218002024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218722024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:2220142024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:2251832024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2232522024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Agüero, Ramón. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245432024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format: Electronic Resources<br/>ICT Innovations 2017 Data-Driven Innovation. 9th International Conference, ICT Innovations 2017, Skopje, Macedonia, September 18-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2257152024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Trajanov, Dimitar. editor. (orcid)0000-0002-3105-6010<br/><a href="https://doi.org/10.1007/978-3-319-67597-8">https://doi.org/10.1007/978-3-319-67597-8</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2254402024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format: Electronic Resources<br/>Fundamentals of Secure System Modellingent://SD_ILS/0/SD_ILS:2251422024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Matulevičius, Raimundas. author.<br/><a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format: Electronic Resources<br/>Analytical and Computational Methods in Probability Theory First International Conference, ACMPT 2017, Moscow, Russia, October 23-27, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260432024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Rykov, Vladimir V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71504-9">https://doi.org/10.1007/978-3-319-71504-9</a><br/>Format: Electronic Resources<br/>Applications for Future Internet International Summit, AFI 2016, Puebla, Mexico, May 25-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257622024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Sucar, Enrique. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49622-1">https://doi.org/10.1007/978-3-319-49622-1</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257662024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49580-4">https://doi.org/10.1007/978-3-319-49580-4</a><br/>Format: Electronic Resources<br/>Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providersent://SD_ILS/0/SD_ILS:2263252024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar von Faber, Eberhard. author.<br/><a href="https://doi.org/10.1007/978-3-658-16482-9">https://doi.org/10.1007/978-3-658-16482-9</a><br/>Format: Electronic Resources<br/>Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266192024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245572024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-71117-1">https://doi.org/10.1007/978-3-319-71117-1</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253392024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2259962024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256562024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2260002024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format: Electronic Resources<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 21st Iberoamerican Congress, CIARP 2016, Lima, Peru, November 8–11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2252532024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Beltrán-Castañón, César. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52277-7">https://doi.org/10.1007/978-3-319-52277-7</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266722024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52727-7">https://doi.org/10.1007/978-3-319-52727-7</a><br/>Format: Electronic Resources<br/>Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266772024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Shyamasundar, Rudrapatna K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>Medical Image Watermarking Techniques and Applicationsent://SD_ILS/0/SD_ILS:2212002024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Singh, Amit Kumar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57699-2">https://doi.org/10.1007/978-3-319-57699-2</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2228852024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231312024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231322024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format: Electronic Resources<br/>Smart Grid Inspired Future Technologies First International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2233352024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Hu, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47729-9">https://doi.org/10.1007/978-3-319-47729-9</a><br/>Format: Electronic Resources<br/>Digital Communication. Towards a Smart and Secure Future Internet 28th International Tyrrhenian Workshop, TIWDC 2017, Palermo, Italy, September 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234132024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Piva, Alessandro. editor. (orcid)0000-0002-3047-0519<br/><a href="https://doi.org/10.1007/978-3-319-67639-5">https://doi.org/10.1007/978-3-319-67639-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221132024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223892024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Resilience and Risk Methods and Application in Environment, Cyber and Social Domainsent://SD_ILS/0/SD_ILS:2244402024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Linkov, Igor. editor.<br/><a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227632024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228552024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213652024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format: Electronic Resources<br/>Parallel Architecture, Algorithm and Programming 8th International Symposium, PAAP 2017, Haikou, China, June 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2243232024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Guoliang. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6442-5">https://doi.org/10.1007/978-981-10-6442-5</a><br/>Format: Electronic Resources<br/>Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252772024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Steghöfer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 9th International Conference, MCSS 2017, Kraków, Poland, November 16-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2218972024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Dziech, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69911-0">https://doi.org/10.1007/978-3-319-69911-0</a><br/>Format: Electronic Resources<br/>Future Intelligent Vehicular Technologies First International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2238692024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Ferreira, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51207-5">https://doi.org/10.1007/978-3-319-51207-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2237382024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-65548-2">https://doi.org/10.1007/978-3-319-65548-2</a><br/>Format: Electronic Resources<br/>E-Technologies: Embracing the Internet of Things 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2253112024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Aïmeur, Esma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59041-7">https://doi.org/10.1007/978-3-319-59041-7</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2212962024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231052024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221962024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Chen, Fulong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60753-5">https://doi.org/10.1007/978-3-319-60753-5</a><br/>Format: Electronic Resources<br/>Mathematics and Computing Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2212342024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Giri, Debasis. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4642-1">https://doi.org/10.1007/978-981-10-4642-1</a><br/>Format: Electronic Resources<br/>Anomaly Detection Principles and Algorithmsent://SD_ILS/0/SD_ILS:2254832024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Mehrotra, Kishan G. author.<br/><a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format: Electronic Resources<br/>Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Effortsent://SD_ILS/0/SD_ILS:2258352024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Martellini, Maurizio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62108-1">https://doi.org/10.1007/978-3-319-62108-1</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 – November 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2267942024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Maglaras, Leandros A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266552024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format: Electronic Resources<br/>Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systemsent://SD_ILS/0/SD_ILS:2265662024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Kavati, Ilaiah. author.<br/><a href="https://doi.org/10.1007/978-3-319-57660-2">https://doi.org/10.1007/978-3-319-57660-2</a><br/>Format: Electronic Resources<br/>Enterprise Identity Management Towards an Investment Decision Support Approachent://SD_ILS/0/SD_ILS:26232024-06-15T05:02:18Z2024-06-15T05:02:18ZYazar Royer, Denis. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format: Electronic Resources<br/>