Search Results for - Narrowed by: Springer E-Book Collection - Information Systems and Communication Service. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Information$002bSystems$002band$002bCommunication$002bService.$002509Information$002bSystems$002band$002bCommunication$002bService.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300? 2024-05-19T08:34:50Z Euro-Par 2018: Parallel Processing Workshops Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427621 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Mencagli, Gabriele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10549-5">https://doi.org/10.1007/978-3-030-10549-5</a><br/>Format:&#160;Electronic Resources<br/> Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 &ndash; December 1, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427712 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9&ndash;11, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427798 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Nandi, Sukumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format:&#160;Electronic Resources<br/> PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428505 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570<br/><a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27&ndash;29, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428423 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12&ndash;13, 2019, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:427894 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Image Processing 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part III ent://SD_ILS/0/SD_ILS:428284 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30508-6">https://doi.org/10.1007/978-3-030-30508-6</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428708 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Perdisci, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12&ndash;13, 2019, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:428188 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format:&#160;Electronic Resources<br/> Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428037 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:427943 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format:&#160;Electronic Resources<br/> Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10&ndash;12, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428734 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Dama&scaron;evičius, Robertas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Theoretical Neural Computation 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428564 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30487-4">https://doi.org/10.1007/978-3-030-30487-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24&ndash;26, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428102 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428513 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:428346 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Data Science, Cyber Security and IT Applications First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428065 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Alfaries, Auhood. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36368-0">https://doi.org/10.1007/978-3-030-36368-0</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Deep Learning 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:429109 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30484-3">https://doi.org/10.1007/978-3-030-30484-3</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:429110 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format:&#160;Electronic Resources<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429140 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format:&#160;Electronic Resources<br/> Creativity in Intelligent Technologies and Data Science Third Conference, CIT&amp;DS 2019, Volgograd, Russia, September 16&ndash;19, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:429244 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XLII ent://SD_ILS/0/SD_ILS:428583 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1&ndash;3, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:428306 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ACCV 2018 14th Asian Conference on Computer Vision, Perth, Australia, December 2&ndash;6, 2018, Revised Selected Papers, Part VI ent://SD_ILS/0/SD_ILS:428394 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Jawahar, C.V. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20876-9">https://doi.org/10.1007/978-3-030-20876-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3&ndash;5, 2019, Proceedings ent://SD_ILS/0/SD_ILS:429099 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X<br/><a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427980 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Deng, Robert H. editor. (orcid)0000-0003-3491-8146<br/><a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13&ndash;14, 2019, Proceedings ent://SD_ILS/0/SD_ILS:427981 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Li, Jin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23&ndash;25, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:428648 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format:&#160;Electronic Resources<br/> Green, Pervasive, and Cloud Computing 14th International Conference, GPC 2019, Uberl&acirc;ndia, Brazil, May 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428854 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040<br/><a href="https://doi.org/10.1007/978-3-030-19223-5">https://doi.org/10.1007/978-3-030-19223-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221497 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Ren, Jinchang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format:&#160;Electronic Resources<br/> Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221548 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Lai, Jian-Huang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format:&#160;Electronic Resources<br/> Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:221302 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221232 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Shi, Zhongzhi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222137 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/> Edge Computing &ndash; EDGE 2018 Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:224795 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Liu, Shijun. editor. (orcid)0000-0002-4108-1391<br/><a href="https://doi.org/10.1007/978-3-319-94340-4">https://doi.org/10.1007/978-3-319-94340-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:221564 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:222335 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221859 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222717 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:222759 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222781 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Secure Systems &ndash; IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222677 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format:&#160;Electronic Resources<br/> Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approach ent://SD_ILS/0/SD_ILS:222652 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Parkinson, Simon. editor. (orcid)0000-0002-1747-9914<br/><a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:222274 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:222452 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/> HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:226768 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Nah, Fiona Fui-Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format:&#160;Electronic Resources<br/> Modern Data Strategy ent://SD_ILS/0/SD_ILS:225164 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Fleckenstein, Mike. author.<br/><a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221365 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221343 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Puliafito, Antonio. editor. (orcid)0000-0003-0385-2711<br/><a href="https://doi.org/10.1007/978-3-319-67910-5">https://doi.org/10.1007/978-3-319-67910-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 &ndash; 25, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:223150 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 &ndash; September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225140 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:222113 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format:&#160;Electronic Resources<br/> Personal Analytics and Privacy. An Individual and Collective Perspective First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:221177 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Guidotti, Riccardo. editor. (orcid)0000-0002-2827-7613<br/><a href="https://doi.org/10.1007/978-3-319-71970-2">https://doi.org/10.1007/978-3-319-71970-2</a><br/>Format:&#160;Electronic Resources<br/> Video Analytics. Face and Facial Expression Recognition and Audience Measurement Third International Workshop, VAAM 2016, and Second International Workshop, FFER 2016, Cancun, Mexico, December 4, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222468 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Nasrollahi, Kamal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56687-0">https://doi.org/10.1007/978-3-319-56687-0</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 &ndash; 25, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:222314 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format:&#160;Electronic Resources<br/> AI 2017: Advances in Artificial Intelligence 30th Australasian Joint Conference, Melbourne, VIC, Australia, August 19&ndash;20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:223127 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Peng, Wei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63004-5">https://doi.org/10.1007/978-3-319-63004-5</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225498 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:225744 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Traor&eacute;, Issa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18337 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:17590 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format:&#160;Electronic Resources<br/> Information Technology: New Generations 13th International Conference on Information Technology ent://SD_ILS/0/SD_ILS:17748 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Latifi, Shahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32467-8">http://dx.doi.org/10.1007/978-3-319-32467-8</a><br/>Format:&#160;Electronic Resources<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:18532 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:18217 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18150 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18379 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:17708 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:17190 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:22699 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format:&#160;Electronic Resources<br/> Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:22829 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Krak&oacute;w, Poland, November 24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23522 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:23284 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23238 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:23360 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format:&#160;Electronic Resources<br/> Building Secure Defenses Against Code-Reuse Attacks ent://SD_ILS/0/SD_ILS:23464 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format:&#160;Electronic Resources<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:19766 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Electronic Resources<br/> Large-Scale Data Analytics ent://SD_ILS/0/SD_ILS:19762 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9242-9">http://dx.doi.org/10.1007/978-1-4614-9242-9</a><br/>Format:&#160;Electronic Resources<br/> Future Business Software Current Trends in Business Software Development ent://SD_ILS/0/SD_ILS:20426 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Brunetti, Gino. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04144-5">http://dx.doi.org/10.1007/978-3-319-04144-5</a><br/>Format:&#160;Electronic Resources<br/> Network Hardening An Automated Approach to Improving Network Security ent://SD_ILS/0/SD_ILS:20506 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format:&#160;Electronic Resources<br/> Cyberterrorism Understanding, Assessment, and Response ent://SD_ILS/0/SD_ILS:19896 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format:&#160;Electronic Resources<br/> Distributed Denial of Service Attack and Defense ent://SD_ILS/0/SD_ILS:19790 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Systems for Human Cognition Augmentation ent://SD_ILS/0/SD_ILS:21500 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21199 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Pervasive Wireless Environments: Detecting and Localizing User Spoofing ent://SD_ILS/0/SD_ILS:20983 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format:&#160;Electronic Resources<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:21499 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/> Real-time Security Extensions for EPCglobal Networks Case Study for the Pharmaceutical Industry ent://SD_ILS/0/SD_ILS:23680 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Schapranow, Matthieu-P. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36343-6">http://dx.doi.org/10.1007/978-3-642-36343-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:24424 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013 ent://SD_ILS/0/SD_ILS:24692 2024-05-19T08:34:50Z 2024-05-19T08:34:50Z Yazar&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format:&#160;Electronic Resources<br/>