Search Results for - Narrowed by: Computer security. - Biometrics.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Biometrics.$002509Biometrics.$0026ps$003d300?2024-05-17T11:55:12ZIntroduction to Intelligent Surveillance Surveillance Data Capture, Transmission, and Analyticsent://SD_ILS/0/SD_ILS:4282402024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Yan, Wei Qi. author.<br/><a href="https://doi.org/10.1007/978-3-030-10713-0">https://doi.org/10.1007/978-3-030-10713-0</a><br/>Format: Electronic Resources<br/>Biometric Recognition 14th Chinese Conference, CCBR 2019, Zhuzhou, China, October 12–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288642024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Sun, Zhenan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-31456-9">https://doi.org/10.1007/978-3-030-31456-9</a><br/>Format: Electronic Resources<br/>Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2224732024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:2249902024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:2257442024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Traoré, Issa. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXX Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:2227832024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar L. Gavrilova, Marina. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56006-8">https://doi.org/10.1007/978-3-662-56006-8</a><br/>Format: Electronic Resources<br/>Advances in User Authenticationent://SD_ILS/0/SD_ILS:2235742024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Dasgupta, Dipankar. author.<br/><a href="https://doi.org/10.1007/978-3-319-58808-7">https://doi.org/10.1007/978-3-319-58808-7</a><br/>Format: Electronic Resources<br/>Biometric Security and Privacy Opportunities & Challenges in The Big Data Eraent://SD_ILS/0/SD_ILS:2242612024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Jiang, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186822024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53090-0">http://dx.doi.org/10.1007/978-3-662-53090-0</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:186312024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Gavrilova, Marina L. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49247-5">http://dx.doi.org/10.1007/978-3-662-49247-5</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Póvoa de Varzim, Portugal, July 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181562024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Campilho, Aurélio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41501-7">http://dx.doi.org/10.1007/978-3-319-41501-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:174892024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30303-1">http://dx.doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19–21, 2015, Proceedingsent://SD_ILS/0/SD_ILS:235302024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Buchegger, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26502-5">http://dx.doi.org/10.1007/978-3-319-26502-5</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 13th International Workshop, IWDW 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papersent://SD_ILS/0/SD_ILS:229242024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Shi, Yun-Qing. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19321-2">http://dx.doi.org/10.1007/978-3-319-19321-2</a><br/>Format: Electronic Resources<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:198332024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Fundamentals of Sketch-Based Passwords A General Frameworkent://SD_ILS/0/SD_ILS:221122024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Riggan, Benjamin S. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13629-5">http://dx.doi.org/10.1007/978-3-319-13629-5</a><br/>Format: Electronic Resources<br/>Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedingsent://SD_ILS/0/SD_ILS:217422024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Bernsmed, Karin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11599-3">http://dx.doi.org/10.1007/978-3-319-11599-3</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedingsent://SD_ILS/0/SD_ILS:216202024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Teufel, Stephanie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10975-6">http://dx.doi.org/10.1007/978-3-319-10975-6</a><br/>Format: Electronic Resources<br/>Touchless Palmprint Recognition Systemsent://SD_ILS/0/SD_ILS:214972024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Genovese, Angelo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10365-5">http://dx.doi.org/10.1007/978-3-319-10365-5</a><br/>Format: Electronic Resources<br/>Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:245732024-05-17T11:55:12Z2024-05-17T11:55:12ZYazar Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format: Electronic Resources<br/>