Search Results for - Narrowed by: Springer E-Book Collection - Information Systems and Communication Service. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Information$002bSystems$002band$002bCommunication$002bService.$002509Information$002bSystems$002band$002bCommunication$002bService.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-05-19T08:34:50ZEuro-Par 2018: Parallel Processing Workshops Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276212024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Mencagli, Gabriele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10549-5">https://doi.org/10.1007/978-3-030-10549-5</a><br/>Format: Electronic Resources<br/>Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 – December 1, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277122024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format: Electronic Resources<br/>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277982024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Nandi, Sukumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4285052024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570<br/><a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284232024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4278942024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4282842024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30508-6">https://doi.org/10.1007/978-3-030-30508-6</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287082024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Perdisci, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4281882024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287342024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Damaševičius, Robertas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Theoretical Neural Computation 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4285642024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30487-4">https://doi.org/10.1007/978-3-030-30487-4</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281022024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Electronic Resources<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285132024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4283462024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format: Electronic Resources<br/>Advances in Data Science, Cyber Security and IT Applications First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4280652024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Alfaries, Auhood. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36368-0">https://doi.org/10.1007/978-3-030-36368-0</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Deep Learning 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4291092024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30484-3">https://doi.org/10.1007/978-3-030-30484-3</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4291102024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4291402024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIIent://SD_ILS/0/SD_ILS:4285832024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283062024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>Computer Vision – ACCV 2018 14th Asian Conference on Computer Vision, Perth, Australia, December 2–6, 2018, Revised Selected Papers, Part VIent://SD_ILS/0/SD_ILS:4283942024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Jawahar, C.V. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20876-9">https://doi.org/10.1007/978-3-030-20876-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290992024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X<br/><a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279802024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Deng, Robert H. editor. (orcid)0000-0003-3491-8146<br/><a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279812024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Li, Jin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Electronic Resources<br/>Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286482024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Electronic Resources<br/>Green, Pervasive, and Cloud Computing 14th International Conference, GPC 2019, Uberlândia, Brazil, May 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288542024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040<br/><a href="https://doi.org/10.1007/978-3-030-19223-5">https://doi.org/10.1007/978-3-030-19223-5</a><br/>Format: Electronic Resources<br/>Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2214972024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Ren, Jinchang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format: Electronic Resources<br/>Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215482024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Lai, Jian-Huang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format: Electronic Resources<br/>Wireless Communications under Hostile Jamming: Security and Efficiencyent://SD_ILS/0/SD_ILS:2213022024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2212322024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Shi, Zhongzhi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2221372024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Edge Computing – EDGE 2018 Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2247952024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Liu, Shijun. editor. (orcid)0000-0002-4108-1391<br/><a href="https://doi.org/10.1007/978-3-319-94340-4">https://doi.org/10.1007/978-3-319-94340-4</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2215642024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2223352024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Kůrková, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218592024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2227172024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:2227592024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Kůrková, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2227812024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Kůrková, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2226772024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approachent://SD_ILS/0/SD_ILS:2226522024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Parkinson, Simon. editor. (orcid)0000-0002-1747-9914<br/><a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2222742024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224522024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2267682024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Nah, Fiona Fui-Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format: Electronic Resources<br/>Modern Data Strategyent://SD_ILS/0/SD_ILS:2251642024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Fleckenstein, Mike. author.<br/><a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213652024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213432024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Puliafito, Antonio. editor. (orcid)0000-0003-0385-2711<br/><a href="https://doi.org/10.1007/978-3-319-67910-5">https://doi.org/10.1007/978-3-319-67910-5</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:2231502024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6427-2">https://doi.org/10.1007/978-981-10-6427-2</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 – September 1, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2251402024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Obana, Satoshi. editor. (orcid)0000-0003-4795-4779<br/><a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221132024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format: Electronic Resources<br/>Personal Analytics and Privacy. An Individual and Collective Perspective First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2211772024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Guidotti, Riccardo. editor. (orcid)0000-0002-2827-7613<br/><a href="https://doi.org/10.1007/978-3-319-71970-2">https://doi.org/10.1007/978-3-319-71970-2</a><br/>Format: Electronic Resources<br/>Video Analytics. Face and Facial Expression Recognition and Audience Measurement Third International Workshop, VAAM 2016, and Second International Workshop, FFER 2016, Cancun, Mexico, December 4, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2224682024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Nasrollahi, Kamal. editor.<br/><a href="https://doi.org/10.1007/978-3-319-56687-0">https://doi.org/10.1007/978-3-319-56687-0</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:2223142024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Mandal, J. K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6430-2">https://doi.org/10.1007/978-981-10-6430-2</a><br/>Format: Electronic Resources<br/>AI 2017: Advances in Artificial Intelligence 30th Australasian Joint Conference, Melbourne, VIC, Australia, August 19–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231272024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Peng, Wei. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63004-5">https://doi.org/10.1007/978-3-319-63004-5</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2254982024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Brenner, Michael. editor. (orcid)0000-0003-2690-7340<br/><a href="https://doi.org/10.1007/978-3-319-70278-0">https://doi.org/10.1007/978-3-319-70278-0</a><br/>Format: Electronic Resources<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:2257442024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Traoré, Issa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:175902024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Information Technology: New Generations 13th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:177482024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Latifi, Shahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32467-8">http://dx.doi.org/10.1007/978-3-319-32467-8</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:185322024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181502024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:171902024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:226992024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228292024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235222024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Building Secure Defenses Against Code-Reuse Attacksent://SD_ILS/0/SD_ILS:234642024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:197662024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Large-Scale Data Analyticsent://SD_ILS/0/SD_ILS:197622024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9242-9">http://dx.doi.org/10.1007/978-1-4614-9242-9</a><br/>Format: Electronic Resources<br/>Future Business Software Current Trends in Business Software Developmentent://SD_ILS/0/SD_ILS:204262024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Brunetti, Gino. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04144-5">http://dx.doi.org/10.1007/978-3-319-04144-5</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:205062024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Cyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:198962024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service Attack and Defenseent://SD_ILS/0/SD_ILS:197902024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:215002024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Pervasive Wireless Environments: Detecting and Localizing User Spoofingent://SD_ILS/0/SD_ILS:209832024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:214992024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Real-time Security Extensions for EPCglobal Networks Case Study for the Pharmaceutical Industryent://SD_ILS/0/SD_ILS:236802024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Schapranow, Matthieu-P. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36343-6">http://dx.doi.org/10.1007/978-3-642-36343-6</a><br/>Format: Electronic Resources<br/>Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244242024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:246922024-05-19T08:34:50Z2024-05-19T08:34:50ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>