Search Results for - Narrowed by: Engineering. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Engineering.$002509Engineering.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-05-21T13:52:13ZComputational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2212472024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:2237172024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAEent://SD_ILS/0/SD_ILS:2217822024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Alja’am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:2211562024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 1ent://SD_ILS/0/SD_ILS:2223222024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:2223312024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Women in Security Changing the Face of Technology and Innovationent://SD_ILS/0/SD_ILS:2261302024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 2ent://SD_ILS/0/SD_ILS:2258222024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Electronic Resources<br/>Sustainable Interdependent Networks From Theory to Applicationent://SD_ILS/0/SD_ILS:2264302024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:2216412024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2035-3">https://doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Electronic Resources<br/>Multimedia Forensics and Security Foundations, Innovations, and Applicationsent://SD_ILS/0/SD_ILS:2212652024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:2242352024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1675-2">https://doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:2236732024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Saini, H. S. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3818-1">https://doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Electronic Resources<br/>Information Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:2265562024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Kim, Kuinam. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4154-9">https://doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Electronic Resources<br/>Predictive Computing and Information Securityent://SD_ILS/0/SD_ILS:2260532024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Gupta, P.K. author.<br/><a href="https://doi.org/10.1007/978-981-10-5107-4">https://doi.org/10.1007/978-981-10-5107-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:2223092024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1678-3">https://doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>Verifiable Privacy Protection for Vehicular Communication Systemsent://SD_ILS/0/SD_ILS:2243662024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Förster, David. author.<br/><a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:2228622024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:2225612024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Boroojeni, Kianoosh G. author.<br/><a href="https://doi.org/10.1007/978-3-319-45050-6">https://doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:190352024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:191312024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:172702024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Secure System Design and Trustable Computingent://SD_ILS/0/SD_ILS:165212024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chang, Chip-Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14971-4">http://dx.doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:168652024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:177522024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Pricop, Emil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32525-5">http://dx.doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015ent://SD_ILS/0/SD_ILS:189922024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Senthilkumar, Muthukrishnan. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0251-9">http://dx.doi.org/10.1007/978-981-10-0251-9</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:173992024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:174022024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2ent://SD_ILS/0/SD_ILS:190762024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0755-2">http://dx.doi.org/10.1007/978-981-10-0755-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:190782024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0767-5">http://dx.doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:190442024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0557-2">http://dx.doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Trusted Computing for Embedded Systemsent://SD_ILS/0/SD_ILS:213332024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format: Electronic Resources<br/>Security Issues in Mobile NFC Devicesent://SD_ILS/0/SD_ILS:223832024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Detecting Peripheral-based Attacks on the Host Memoryent://SD_ILS/0/SD_ILS:220972024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Electronic Resources<br/>Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theoryent://SD_ILS/0/SD_ILS:217602024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11674-7">http://dx.doi.org/10.1007/978-3-319-11674-7</a><br/>Format: Electronic Resources<br/>Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departmentsent://SD_ILS/0/SD_ILS:219982024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13009-5">http://dx.doi.org/10.1007/978-3-319-13009-5</a><br/>Format: Electronic Resources<br/>QC-LDPC Code-Based Cryptographyent://SD_ILS/0/SD_ILS:202332024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Frameworkent://SD_ILS/0/SD_ILS:211442024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Ben Ayed, Ghazi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08231-8">http://dx.doi.org/10.1007/978-3-319-08231-8</a><br/>Format: Electronic Resources<br/>A Mathematical Approach to Research Problems of Science and Technology Theoretical Basis and Developments in Mathematical Modelingent://SD_ILS/0/SD_ILS:249652024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Nishii, Ryuei. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55060-0">http://dx.doi.org/10.1007/978-4-431-55060-0</a><br/>Format: Electronic Resources<br/>Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systemsent://SD_ILS/0/SD_ILS:259792024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:250312024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Krishnan, G. Sai Sundara. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1680-3">http://dx.doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Electronic Resources<br/>Computational Intelligence in Digital Forensics: Forensic Investigation and Applicationsent://SD_ILS/0/SD_ILS:207312024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Muda, Azah Kamilah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05885-6">http://dx.doi.org/10.1007/978-3-319-05885-6</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:237352024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>Bio-inspiring Cyber Security and Cloud Services: Trends and Innovationsent://SD_ILS/0/SD_ILS:244062024-05-21T13:52:13Z2024-05-21T13:52:13ZYazar Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43616-5">http://dx.doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>