Search Results for - Narrowed by: Springer E-Book Collection - Signal, Image and Speech Processing. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Signal$00252C$002bImage$002band$002bSpeech$002bProcessing.$002509Signal$00252C$002bImage$002band$002bSpeech$002bProcessing.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300? 2024-05-20T15:00:01Z Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:222331 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:223717 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:221302 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Electronic Resources<br/> Inside Radio: An Attack and Defense Guide ent://SD_ILS/0/SD_ILS:224846 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:221829 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications ent://SD_ILS/0/SD_ILS:222228 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format:&#160;Electronic Resources<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:224261 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Jiang, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:224819 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Security Challenges and Approaches in Internet of Things ent://SD_ILS/0/SD_ILS:226985 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Misra, Sridipta. author.<br/><a href="https://doi.org/10.1007/978-3-319-44230-3">https://doi.org/10.1007/978-3-319-44230-3</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:226912 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:226961 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Geng, Wen-dong. author.<br/><a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:221204 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Nematollahi, Mohammad Ali. author.<br/><a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 1 ent://SD_ILS/0/SD_ILS:18773 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 2 ent://SD_ILS/0/SD_ILS:18774 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:19131 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:19035 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/> Physical and Data-Link Security Techniques for Future Communication Systems ent://SD_ILS/0/SD_ILS:16865 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of Biometrics ent://SD_ILS/0/SD_ILS:19833 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format:&#160;Electronic Resources<br/> Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems ent://SD_ILS/0/SD_ILS:25979 2024-05-20T15:00:01Z 2024-05-20T15:00:01Z Yazar&#160;Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format:&#160;Electronic Resources<br/>