Search Results for - Narrowed by: 2019 - Law and legislation.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092019$0025092019$0026qf$003dSUBJECT$002509Konu$002509Law$002band$002blegislation.$002509Law$002band$002blegislation.$0026ps$003d300?2024-05-16T12:40:28ZAdvances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281292024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4277782024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17259-6">https://doi.org/10.1007/978-3-030-17259-6</a><br/>Format: Electronic Resources<br/>Electronic Government and the Information Systems Perspective 8th International Conference, EGOVIS 2019, Linz, Austria, August 26–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281522024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Kő, Andrea. editor. (orcid)0000-0003-0023-1143<br/><a href="https://doi.org/10.1007/978-3-030-27523-5">https://doi.org/10.1007/978-3-030-27523-5</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279712024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4280982024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Venter, Hein. editor. (orcid)0000-0002-3607-8630<br/><a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288202024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Cybenko, George. editor. (orcid)0000-0001-7734-2912<br/><a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290082024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941<br/><a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Smart Working, Living and Organising IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2018, Portsmouth, UK, June 25, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4288882024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Elbanna, Amany. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04315-5">https://doi.org/10.1007/978-3-030-04315-5</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292482024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Breitinger, Frank. editor. (orcid)0000-0001-5261-4600<br/><a href="https://doi.org/10.1007/978-3-030-05487-8">https://doi.org/10.1007/978-3-030-05487-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4291402024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282892024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890<br/><a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4281882024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282622024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983<br/><a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format: Electronic Resources<br/>Sermaye piyasası uyuşmazlıklarının alternatif yöntemlerle çözümünde tahkiment://SD_ILS/0/SD_ILS:6528752024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Özdemir, Elif Demirel.<br/>Format: Kitap<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 23rd Iberoamerican Congress, CIARP 2018, Madrid, Spain, November 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4277502024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Vera-Rodriguez, Ruben. editor.<br/><a href="https://doi.org/10.1007/978-3-030-13469-3">https://doi.org/10.1007/978-3-030-13469-3</a><br/>Format: Electronic Resources<br/>Electronic Participation 11th IFIP WG 8.5 International Conference, ePart 2019, San Benedetto Del Tronto, Italy, September 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284242024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Panagiotopoulos, Panos. editor. (orcid)0000-0001-5408-4842<br/><a href="https://doi.org/10.1007/978-3-030-27397-2">https://doi.org/10.1007/978-3-030-27397-2</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279082024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4277592024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4282062024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format: Electronic Resources<br/>Electronic Government 18th IFIP WG 8.5 International Conference, EGOV 2019, San Benedetto Del Tronto, Italy, September 2–4, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281422024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Lindgren, Ida. editor. (orcid)0000-0002-4735-8697<br/><a href="https://doi.org/10.1007/978-3-030-27325-5">https://doi.org/10.1007/978-3-030-27325-5</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284642024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239<br/><a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Electronic Resources<br/>Digital Services and Platforms. Considerations for Sourcing 12th Global Sourcing Workshop 2018, La Thuile, Italy, February 21–24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286782024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Kotlarsky, Julia. editor. (orcid)0000-0002-1478-549X<br/><a href="https://doi.org/10.1007/978-3-030-15850-7">https://doi.org/10.1007/978-3-030-15850-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2019 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4290402024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-030-17253-4">https://doi.org/10.1007/978-3-030-17253-4</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-05-16T12:40:28Z2024-05-16T12:40:28ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>