Search Results for - Narrowed by: Computer security. - Computer networks -- Security measures.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-05-17T09:02:05ZSelected Areas in Cryptography – SAC 2018 25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4278992024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Cid, Carlos. editor. (orcid)0000-0001-5761-8694<br/><a href="https://doi.org/10.1007/978-3-030-10970-7">https://doi.org/10.1007/978-3-030-10970-7</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4284142024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Blazy, Olivier. editor. (orcid)0000-0001-6205-8249<br/><a href="https://doi.org/10.1007/978-3-030-20074-9">https://doi.org/10.1007/978-3-030-20074-9</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paperent://SD_ILS/0/SD_ILS:4284002024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-11039-0">https://doi.org/10.1007/978-3-030-11039-0</a><br/>Format: Electronic Resources<br/>Security and Privacy in Social Networks and Big Data 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282072024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/><a href="https://doi.org/10.1007/978-981-15-0758-8">https://doi.org/10.1007/978-981-15-0758-8</a><br/>Format: Electronic Resources<br/>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277982024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Nandi, Sukumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285132024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282832024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Zhou, Jianying. editor. (orcid)0000-0003-0594-0432<br/><a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4281702024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Thampi, Sabu M. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5826-5">https://doi.org/10.1007/978-981-13-5826-5</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Information and Operational Technology Security Systems First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4283282024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Fournaris, Apostolos P. editor. (orcid)0000-0002-4758-2349<br/><a href="https://doi.org/10.1007/978-3-030-12085-6">https://doi.org/10.1007/978-3-030-12085-6</a><br/>Format: Electronic Resources<br/>Cyberdanger Understanding and Guarding Against Cybercrimeent://SD_ILS/0/SD_ILS:4288092024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Willems, Eddy. author.<br/><a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Cryptography and network security : principles and practiceent://SD_ILS/0/SD_ILS:6435442024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Stallings, William.<br/>Format: Kitap<br/>Engineering information security : the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:157212024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Jacobs, Stuart, author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7362912">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7362912</a><br/>Format: Electronic Resources<br/>Artificial immune system : applications in computer securityent://SD_ILS/0/SD_ILS:157472024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Tan, Ying, 1964- author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7547468</a><br/>Format: Electronic Resources<br/>Trust extension as a mechanism for secure code execution on commodity computersent://SD_ILS/0/SD_ILS:1869492024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Parno, Bryan., author.<br/>Abstract with links to full text <a href="http://dx.doi.org/10.1145/2611399">http://dx.doi.org/10.1145/2611399</a><br/>Format: Electronic Resources<br/>Engineering information security : the application of systems engineering concepts to achieve information assuranceent://SD_ILS/0/SD_ILS:154982024-05-17T09:02:05Z2024-05-17T09:02:05ZYazar Jacobs, Stuart, author.<br/>Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6047604</a><br/>Format: Electronic Resources<br/>