Search Results for - Narrowed by: Springer E-Book Collection - Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ps$003d300?2024-05-06T08:18:10ZAutonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThingsent://SD_ILS/0/SD_ILS:4277192024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Al-Shaer, Ehab. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format: Electronic Resources<br/>Malicious Attack Propagation and Source Identificationent://SD_ILS/0/SD_ILS:4276182024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Jiang, Jiaojiao. author.<br/><a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Electronic Resources<br/>Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4276202024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Pathan, Al-Sakib Khan. editor. (orcid)0000-0001-6572-3451<br/><a href="https://doi.org/10.1007/978-3-030-05928-6">https://doi.org/10.1007/978-3-030-05928-6</a><br/>Format: Electronic Resources<br/>Artificial Intelligence for Communications and Networks First EAI International Conference, AICON 2019, Harbin, China, May 25–26, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278132024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Han, Shuai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22971-9">https://doi.org/10.1007/978-3-030-22971-9</a><br/>Format: Electronic Resources<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4280392024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280462024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Albrecht, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280532024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Duong, Trung Quang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30149-1">https://doi.org/10.1007/978-3-030-30149-1</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283352024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33723-0">https://doi.org/10.1007/978-3-030-33723-0</a><br/>Format: Electronic Resources<br/>Handbook of Multimedia Information Security: Techniques and Applicationsent://SD_ILS/0/SD_ILS:4279042024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Singh, Amit Kumar. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278032024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35653-8">https://doi.org/10.1007/978-3-030-35653-8</a><br/>Format: Electronic Resources<br/>Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14–17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281242024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar U., Leong Hou. editor.<br/><a href="https://doi.org/10.1007/978-3-030-26142-9">https://doi.org/10.1007/978-3-030-26142-9</a><br/>Format: Electronic Resources<br/>Cybercryptography: Applicable Cryptography for Cyberspace Securityent://SD_ILS/0/SD_ILS:4284282024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Yan, Song Y. author.<br/><a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4283482024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Gritzalis, Dimitris. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7–9, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4279772024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-33720-9">https://doi.org/10.1007/978-3-030-33720-9</a><br/>Format: Electronic Resources<br/>Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4283492024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Jiann-Liang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06158-6">https://doi.org/10.1007/978-3-030-06158-6</a><br/>Format: Electronic Resources<br/>Mobile Computing, Applications, and Services 10th EAI International Conference, MobiCASE 2019, Hangzhou, China, June 14–15, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276942024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Yin, Yuyu. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28468-8">https://doi.org/10.1007/978-3-030-28468-8</a><br/>Format: Electronic Resources<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4281642024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Madsen, Tom. author.<br/><a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4285282024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zheng, Jun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05888-3">https://doi.org/10.1007/978-3-030-05888-3</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4283592024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Gao, Honghao. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12971-2">https://doi.org/10.1007/978-3-030-12971-2</a><br/>Format: Electronic Resources<br/>Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286082024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-13-3732-1">https://doi.org/10.1007/978-981-13-3732-1</a><br/>Format: Electronic Resources<br/>Cloud Computing – CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276492024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Da Silva, Dilma. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23502-4">https://doi.org/10.1007/978-3-030-23502-4</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 13th International Conference, CRiSIS 2018, Arcachon, France, October 16–18, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280292024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zemmari, Akka. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12143-3">https://doi.org/10.1007/978-3-030-12143-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284072024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Garg, Deepak. editor. (orcid)0000-0002-0888-3093<br/><a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283202024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Berlingerio, Michele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10928-8">https://doi.org/10.1007/978-3-030-10928-8</a><br/>Format: Electronic Resources<br/>Blockchain Technology in Internet of Thingsent://SD_ILS/0/SD_ILS:4284212024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zhu, Liehuang. author.<br/><a href="https://doi.org/10.1007/978-3-030-21766-2">https://doi.org/10.1007/978-3-030-21766-2</a><br/>Format: Electronic Resources<br/>Cloud Security Auditingent://SD_ILS/0/SD_ILS:4279642024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Majumdar, Suryadipta. author.<br/><a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4281532024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27615-7">https://doi.org/10.1007/978-3-030-27615-7</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280982024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Venter, Hein. editor. (orcid)0000-0002-3607-8630<br/><a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285402024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wrycza, Stanisław. editor. (orcid)0000-0001-7699-6631<br/><a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format: Electronic Resources<br/>Advances in Visual Informatics 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279972024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Badioze Zaman, Halimah. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34032-2">https://doi.org/10.1007/978-3-030-34032-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281832024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285562024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127<br/><a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format: Electronic Resources<br/>Industrial Control Systems Security and Resiliency Practice and Theoryent://SD_ILS/0/SD_ILS:4284832024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Rieger, Craig. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26–29, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4284942024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-030-27618-8">https://doi.org/10.1007/978-3-030-27618-8</a><br/>Format: Electronic Resources<br/>Intelligent Data Processing 11th International Conference, IDP 2016, Barcelona, Spain, October 10–14, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:4285872024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Strijov, Vadim V. editor. (orcid)0000-0002-2194-8859<br/><a href="https://doi.org/10.1007/978-3-030-35400-8">https://doi.org/10.1007/978-3-030-35400-8</a><br/>Format: Electronic Resources<br/>Architecture for Blockchain Applicationsent://SD_ILS/0/SD_ILS:4285882024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Xu, Xiwei. author.<br/><a href="https://doi.org/10.1007/978-3-030-03035-3">https://doi.org/10.1007/978-3-030-03035-3</a><br/>Format: Electronic Resources<br/>Advances and Trends in Artificial Intelligence. From Theory to Practice 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285922024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22999-3">https://doi.org/10.1007/978-3-030-22999-3</a><br/>Format: Electronic Resources<br/>Big Data – BigData 2019 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289732024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Keke. editor. (orcid)0000-0002-9996-156X<br/><a href="https://doi.org/10.1007/978-3-030-23551-2">https://doi.org/10.1007/978-3-030-23551-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277972024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131<br/><a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format: Electronic Resources<br/>Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279632024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Drevin, Lynette. editor. (orcid)0000-0001-9370-8216<br/><a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format: Electronic Resources<br/>Advances of Science and Technology 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4291712024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zimale, Fasikaw Atanaw. editor.<br/><a href="https://doi.org/10.1007/978-3-030-15357-1">https://doi.org/10.1007/978-3-030-15357-1</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291542024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Communications, and Business Analytics Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4292432024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-8581-0">https://doi.org/10.1007/978-981-13-8581-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286632024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24900-7">https://doi.org/10.1007/978-3-030-24900-7</a><br/>Format: Electronic Resources<br/>Quality, Reliability, Security and Robustness in Heterogeneous Systems 14th EAI International Conference, Qshine 2018, Ho Chi Minh City, Vietnam, December 3–4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4290482024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Duong, Trung Q. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14413-5">https://doi.org/10.1007/978-3-030-14413-5</a><br/>Format: Electronic Resources<br/>Broadband Communications, Networks, and Systems 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4289582024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Sucasas, Victor. editor. (orcid)0000-0002-7981-401X<br/><a href="https://doi.org/10.1007/978-3-030-05195-2">https://doi.org/10.1007/978-3-030-05195-2</a><br/>Format: Electronic Resources<br/>Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznań, Poland, September 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286902024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Leslie, Christopher. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format: Electronic Resources<br/>Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadowsent://SD_ILS/0/SD_ILS:4288602024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Guttman, Joshua D. editor.<br/><a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Cybersecurity in the Electricity Sector Managing Critical Infrastructureent://SD_ILS/0/SD_ILS:4284772024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Leszczyna, Rafał. author.<br/><a href="https://doi.org/10.1007/978-3-030-19538-0">https://doi.org/10.1007/978-3-030-19538-0</a><br/>Format: Electronic Resources<br/>Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22–25, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283712024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Li, Guoliang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18590-9">https://doi.org/10.1007/978-3-030-18590-9</a><br/>Format: Electronic Resources<br/>Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4286172024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format: Electronic Resources<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292002024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Berlingerio, Michele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10925-7">https://doi.org/10.1007/978-3-030-10925-7</a><br/>Format: Electronic Resources<br/>Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292092024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674<br/><a href="https://doi.org/10.1007/978-3-030-05490-8">https://doi.org/10.1007/978-3-030-05490-8</a><br/>Format: Electronic Resources<br/>Security and Privacy for Next-Generation Wireless Networksent://SD_ILS/0/SD_ILS:4282982024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zhong, Sheng. author.<br/><a href="https://doi.org/10.1007/978-3-030-01150-5">https://doi.org/10.1007/978-3-030-01150-5</a><br/>Format: Electronic Resources<br/>Handbook of Big Data and IoT Securityent://SD_ILS/0/SD_ILS:4287792024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554<br/><a href="https://doi.org/10.1007/978-3-030-10543-3">https://doi.org/10.1007/978-3-030-10543-3</a><br/>Format: Electronic Resources<br/>Context-Aware Systems and Applications, and Nature of Computation and Communication 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22–23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292382024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Cong Vinh, Phan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06152-4">https://doi.org/10.1007/978-3-030-06152-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292482024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Breitinger, Frank. editor. (orcid)0000-0001-5261-4600<br/><a href="https://doi.org/10.1007/978-3-030-05487-8">https://doi.org/10.1007/978-3-030-05487-8</a><br/>Format: Electronic Resources<br/>Proactive and Dynamic Network Defenseent://SD_ILS/0/SD_ILS:4291602024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13–15, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289692024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zincir-Heywood, Nur. editor.<br/><a href="https://doi.org/10.1007/978-3-030-18419-3">https://doi.org/10.1007/978-3-030-18419-3</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papersent://SD_ILS/0/SD_ILS:4278712024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Ding, Jintai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288562024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Shen, Bazhong. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing Third EAI International Conference, ADHIP 2019, Nanjing, China, September 21–22, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288572024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Gui, Guan. editor. (orcid)0000-0003-3888-2881<br/><a href="https://doi.org/10.1007/978-3-030-36402-1">https://doi.org/10.1007/978-3-030-36402-1</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218722024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220682024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24–26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2220692024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format: Electronic Resources<br/>Cyber-Physical Systems Securityent://SD_ILS/0/SD_ILS:2220602024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Koç, Çetin Kaya. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format: Electronic Resources<br/>Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225542024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:2231132024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Fog Computing and Its Applicationsent://SD_ILS/0/SD_ILS:2211822024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:2213982024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Smart Micro-Grid Systems Security and Privacyent://SD_ILS/0/SD_ILS:2218002024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Kayem, Anne V. D. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format: Electronic Resources<br/>Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2217422024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Deshpande, A.V. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format: Electronic Resources<br/>Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2219192024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:2220142024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:2210732024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:2214432024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2225842024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Krimmer, Robert. editor. (orcid)0000-0002-0873-539X<br/><a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220562024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983<br/><a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2235852024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format: Electronic Resources<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:2233482024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Electronic Resources<br/>Information Technology - New Generations 15th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:2210592024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227552024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218522024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Saracino, Andrea. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223872024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2220572024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Qiu, Meikang. editor. (orcid)0000-0002-1004-0140<br/><a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224952024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Ganapathy, Vinod. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format: Electronic Resources<br/>Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228942024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Ghosh, Debdas. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2232802024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:2225232024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Matyáš, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format: Electronic Resources<br/>Edge Computing: A Primerent://SD_ILS/0/SD_ILS:2224542024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Cao, Jie. author.<br/><a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2235772024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometricsent://SD_ILS/0/SD_ILS:2228152024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2249892024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Cyber Threat Intelligenceent://SD_ILS/0/SD_ILS:2233892024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234852024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedingsent://SD_ILS/0/SD_ILS:2249692024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Belqasmi, Fatna. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format: Electronic Resources<br/>5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2233802024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Smart Grident://SD_ILS/0/SD_ILS:2221232024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Abdallah, Asmaa. author.<br/><a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:2221392024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Adversary Detection For Cognitive Radio Networksent://SD_ILS/0/SD_ILS:2244892024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence Tools for Cyber Attributionent://SD_ILS/0/SD_ILS:2253542024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:2254542024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252152024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260152024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Dynamic Games for Network Securityent://SD_ILS/0/SD_ILS:2237632024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar He, Xiaofan. author.<br/><a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255642024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11–12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2263322024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256042024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2246452024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:2258702024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format: Electronic Resources<br/>Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:2258792024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Qianbin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2263062024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format: Electronic Resources<br/>Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Mediaent://SD_ILS/0/SD_ILS:2258072024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Mayer, Joceli. author.<br/><a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format: Electronic Resources<br/>Medical Image Watermarking Techniques and Applicationsent://SD_ILS/0/SD_ILS:2212002024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Singh, Amit Kumar. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57699-2">https://doi.org/10.1007/978-3-319-57699-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2213652024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72395-2">https://doi.org/10.1007/978-3-319-72395-2</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 9th International Conference, MCSS 2017, Kraków, Poland, November 16-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2218972024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Dziech, Andrzej. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69911-0">https://doi.org/10.1007/978-3-319-69911-0</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications Second EAI International Conference, Industrial IoT 2017, Wuhu, China, March 25–26, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221962024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Fulong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60753-5">https://doi.org/10.1007/978-3-319-60753-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231052024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Gollmann, Dieter. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61204-1">https://doi.org/10.1007/978-3-319-61204-1</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2232522024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Agüero, Ramón. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2212962024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Hong, Seokhie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-53177-9">https://doi.org/10.1007/978-3-319-53177-9</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2228852024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format: Electronic Resources<br/>Mathematics and Computing Third International Conference, ICMC 2017, Haldia, India, January 17-21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2212342024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Giri, Debasis. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4642-1">https://doi.org/10.1007/978-981-10-4642-1</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2223892024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Applied Cryptography Engineering 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231312024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Ali, Sk Subidh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71501-8">https://doi.org/10.1007/978-3-319-71501-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2017 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2231322024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Patra, Arpita. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71667-1">https://doi.org/10.1007/978-3-319-71667-1</a><br/>Format: Electronic Resources<br/>Future Intelligent Vehicular Technologies First International Conference, Future 5V 2016, Porto, Portugal, September 15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2238692024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Ferreira, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51207-5">https://doi.org/10.1007/978-3-319-51207-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2237382024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-65548-2">https://doi.org/10.1007/978-3-319-65548-2</a><br/>Format: Electronic Resources<br/>Parallel Architecture, Algorithm and Programming 8th International Symposium, PAAP 2017, Haikou, China, June 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2243232024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chen, Guoliang. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6442-5">https://doi.org/10.1007/978-981-10-6442-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245432024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format: Electronic Resources<br/>E-Democracy – Privacy-Preserving, Secure, Intelligent E-Government Services 7th International Conference, E-Democracy 2017, Athens, Greece, December 14-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245572024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-71117-1">https://doi.org/10.1007/978-3-319-71117-1</a><br/>Format: Electronic Resources<br/>Trust Management XI 11th IFIP WG 11.11 International Conference, IFIPTM 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2252772024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Steghöfer, Jan-Philipp. editor. (orcid)0000-0003-1694-0972<br/><a href="https://doi.org/10.1007/978-3-319-59171-1">https://doi.org/10.1007/978-3-319-59171-1</a><br/>Format: Electronic Resources<br/>Smart Cards, Tokens, Security and Applicationsent://SD_ILS/0/SD_ILS:2251832024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Mayes, Keith. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2227632024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Deng, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2221132024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-319-72389-1">https://doi.org/10.1007/978-3-319-72389-1</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2239632024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Maffei, Matteo. editor.<br/><a href="https://doi.org/10.1007/978-3-662-54455-6">https://doi.org/10.1007/978-3-662-54455-6</a><br/>Format: Electronic Resources<br/>Resilience and Risk Methods and Application in Environment, Cyber and Social Domainsent://SD_ILS/0/SD_ILS:2244402024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Linkov, Igor. editor.<br/><a href="https://doi.org/10.1007/978-94-024-1123-2">https://doi.org/10.1007/978-94-024-1123-2</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2256562024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Camp, Olivier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54433-5">https://doi.org/10.1007/978-3-319-54433-5</a><br/>Format: Electronic Resources<br/>Digital Communication. Towards a Smart and Secure Future Internet 28th International Tyrrhenian Workshop, TIWDC 2017, Palermo, Italy, September 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2234132024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Piva, Alessandro. editor. (orcid)0000-0002-3047-0519<br/><a href="https://doi.org/10.1007/978-3-319-67639-5">https://doi.org/10.1007/978-3-319-67639-5</a><br/>Format: Electronic Resources<br/>Smart Grid Inspired Future Technologies First International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2233352024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Hu, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47729-9">https://doi.org/10.1007/978-3-319-47729-9</a><br/>Format: Electronic Resources<br/>Anomaly Detection Principles and Algorithmsent://SD_ILS/0/SD_ILS:2254832024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Mehrotra, Kishan G. author.<br/><a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2260002024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67876-4">https://doi.org/10.1007/978-3-319-67876-4</a><br/>Format: Electronic Resources<br/>Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providersent://SD_ILS/0/SD_ILS:2263252024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar von Faber, Eberhard. author.<br/><a href="https://doi.org/10.1007/978-3-658-16482-9">https://doi.org/10.1007/978-3-658-16482-9</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266722024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52727-7">https://doi.org/10.1007/978-3-319-52727-7</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2228552024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format: Electronic Resources<br/>Fundamentals of Secure System Modellingent://SD_ILS/0/SD_ILS:2251422024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Matulevičius, Raimundas. author.<br/><a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format: Electronic Resources<br/>E-Technologies: Embracing the Internet of Things 7th International Conference, MCETECH 2017, Ottawa, ON, Canada, May 17-19, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2253112024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Aïmeur, Esma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59041-7">https://doi.org/10.1007/978-3-319-59041-7</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2254402024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format: Electronic Resources<br/>ICT Innovations 2017 Data-Driven Innovation. 9th International Conference, ICT Innovations 2017, Skopje, Macedonia, September 18-23, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2257152024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Trajanov, Dimitar. editor. (orcid)0000-0002-3105-6010<br/><a href="https://doi.org/10.1007/978-3-319-67597-8">https://doi.org/10.1007/978-3-319-67597-8</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:2259962024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format: Electronic Resources<br/>Applications for Future Internet International Summit, AFI 2016, Puebla, Mexico, May 25-28, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257622024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Sucar, Enrique. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49622-1">https://doi.org/10.1007/978-3-319-49622-1</a><br/>Format: Electronic Resources<br/>Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2257662024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49580-4">https://doi.org/10.1007/978-3-319-49580-4</a><br/>Format: Electronic Resources<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 21st Iberoamerican Congress, CIARP 2016, Lima, Peru, November 8–11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2252532024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Beltrán-Castañón, César. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52277-7">https://doi.org/10.1007/978-3-319-52277-7</a><br/>Format: Electronic Resources<br/>Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Threats and Counter Effortsent://SD_ILS/0/SD_ILS:2258352024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Martellini, Maurizio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62108-1">https://doi.org/10.1007/978-3-319-62108-1</a><br/>Format: Electronic Resources<br/>Enterprise Security Second International Workshop, ES 2015, Vancouver, BC, Canada, November 30 – December 3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266192024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Chang, Victor. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54380-2">https://doi.org/10.1007/978-3-319-54380-2</a><br/>Format: Electronic Resources<br/>Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2253392024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format: Electronic Resources<br/>Analytical and Computational Methods in Probability Theory First International Conference, ACMPT 2017, Moscow, Russia, October 23-27, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2260432024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Rykov, Vladimir V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-71504-9">https://doi.org/10.1007/978-3-319-71504-9</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 – November 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2267942024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Maglaras, Leandros A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format: Electronic Resources<br/>Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266772024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Shyamasundar, Rudrapatna K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format: Electronic Resources<br/>Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systemsent://SD_ILS/0/SD_ILS:2265662024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Kavati, Ilaiah. author.<br/><a href="https://doi.org/10.1007/978-3-319-57660-2">https://doi.org/10.1007/978-3-319-57660-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:2266552024-05-06T08:18:10Z2024-05-06T08:18:10ZYazar Cuppens, Frédéric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format: Electronic Resources<br/>