Search Results for - Narrowed by: Cryptology. - Operating Systems. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Cryptology.$002509Cryptology.$0026qf$003dSUBJECT$002509Konu$002509Operating$002bSystems.$002509Operating$002bSystems.$0026ps$003d300? 2024-05-29T05:33:13Z Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224508 2024-05-29T05:33:13Z 2024-05-29T05:33:13Z Yazar&#160;Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18&ndash;20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:224543 2024-05-29T05:33:13Z 2024-05-29T05:33:13Z Yazar&#160;Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format:&#160;Electronic Resources<br/> Engineering Secure Software and Systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226616 2024-05-29T05:33:13Z 2024-05-29T05:33:13Z Yazar&#160;Bodden, Eric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62105-0">https://doi.org/10.1007/978-3-319-62105-0</a><br/>Format:&#160;Electronic Resources<br/>