Search Results for - Narrowed by: Springer E-Book Collection - Systems and Data Security. - Mathematical Applications in Computer Science. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Mathematical$002bApplications$002bin$002bComputer$002bScience.$002509Mathematical$002bApplications$002bin$002bComputer$002bScience.$0026ps$003d300$0026isd$003dtrue? 2024-05-24T23:26:34Z Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 ent://SD_ILS/0/SD_ILS:18992 2024-05-24T23:26:34Z 2024-05-24T23:26:34Z Yazar&#160;Senthilkumar, Muthukrishnan. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0251-9">http://dx.doi.org/10.1007/978-981-10-0251-9</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:25031 2024-05-24T23:26:34Z 2024-05-24T23:26:34Z Yazar&#160;Krishnan, G. Sai Sundara. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1680-3">http://dx.doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/>