Search Results for - Narrowed by: Computer security. - Computational Intelligence. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computational$002bIntelligence.$002509Computational$002bIntelligence.$0026ps$003d300$0026isd$003dtrue? 2024-05-20T05:46:36Z Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:222331 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221247 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:221782 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Alja&rsquo;am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:223717 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:221156 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:226430 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:222322 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:225822 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:221265 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:224235 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1675-2">https://doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Electronic Resources<br/> Predictive Computing and Information Security ent://SD_ILS/0/SD_ILS:226053 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Gupta, P.K. author.<br/><a href="https://doi.org/10.1007/978-981-10-5107-4">https://doi.org/10.1007/978-981-10-5107-4</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:223673 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Saini, H. S. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3818-1">https://doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:222561 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Boroojeni, Kianoosh G. author.<br/><a href="https://doi.org/10.1007/978-3-319-45050-6">https://doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:224819 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:226912 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:226556 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Kim, Kuinam. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4154-9">https://doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:222862 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:222309 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1678-3">https://doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:221641 2024-05-20T05:46:36Z 2024-05-20T05:46:36Z Yazar&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2035-3">https://doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Electronic Resources<br/>