Search Results for - Narrowed by: Engineering. - Systems and Data Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Engineering.$002509Engineering.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300? 2024-05-21T13:52:13Z Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:221247 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:223717 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:221782 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Alja&rsquo;am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:221156 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:222322 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:222331 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Women in Security Changing the Face of Technology and Innovation ent://SD_ILS/0/SD_ILS:226130 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:225822 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:226430 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:221641 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2035-3">https://doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:221265 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:224235 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1675-2">https://doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:223673 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Saini, H. S. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3818-1">https://doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:226556 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Kim, Kuinam. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4154-9">https://doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Electronic Resources<br/> Predictive Computing and Information Security ent://SD_ILS/0/SD_ILS:226053 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Gupta, P.K. author.<br/><a href="https://doi.org/10.1007/978-981-10-5107-4">https://doi.org/10.1007/978-981-10-5107-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:226912 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:222309 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1678-3">https://doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/> Verifiable Privacy Protection for Vehicular Communication Systems ent://SD_ILS/0/SD_ILS:224366 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;F&ouml;rster, David. author.<br/><a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:222862 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:222561 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Boroojeni, Kianoosh G. author.<br/><a href="https://doi.org/10.1007/978-3-319-45050-6">https://doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:224819 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:19035 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:19131 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 2 ent://SD_ILS/0/SD_ILS:18774 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format:&#160;Electronic Resources<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:17270 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/> Secure System Design and Trustable Computing ent://SD_ILS/0/SD_ILS:16521 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chang, Chip-Hong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14971-4">http://dx.doi.org/10.1007/978-3-319-14971-4</a><br/>Format:&#160;Electronic Resources<br/> Physical and Data-Link Security Techniques for Future Communication Systems ent://SD_ILS/0/SD_ILS:16865 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:17752 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Pricop, Emil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32525-5">http://dx.doi.org/10.1007/978-3-319-32525-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 ent://SD_ILS/0/SD_ILS:18992 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Senthilkumar, Muthukrishnan. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0251-9">http://dx.doi.org/10.1007/978-981-10-0251-9</a><br/>Format:&#160;Electronic Resources<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:17399 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:17402 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 1 ent://SD_ILS/0/SD_ILS:18773 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 ent://SD_ILS/0/SD_ILS:19076 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0755-2">http://dx.doi.org/10.1007/978-981-10-0755-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 ent://SD_ILS/0/SD_ILS:19078 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0767-5">http://dx.doi.org/10.1007/978-981-10-0767-5</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:19044 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0557-2">http://dx.doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing for Embedded Systems ent://SD_ILS/0/SD_ILS:21333 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Candaele, Bernard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09420-5">http://dx.doi.org/10.1007/978-3-319-09420-5</a><br/>Format:&#160;Electronic Resources<br/> Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:22383 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Electronic Resources<br/> Detecting Peripheral-based Attacks on the Host Memory ent://SD_ILS/0/SD_ILS:22097 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format:&#160;Electronic Resources<br/> Game Theoretic Analysis of Congestion, Safety and Security Traffic and Transportation Theory ent://SD_ILS/0/SD_ILS:21760 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11674-7">http://dx.doi.org/10.1007/978-3-319-11674-7</a><br/>Format:&#160;Electronic Resources<br/> Game Theoretic Analysis of Congestion, Safety and Security Networks, Air Traffic and Emergency Departments ent://SD_ILS/0/SD_ILS:21998 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Hausken, Kjell. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13009-5">http://dx.doi.org/10.1007/978-3-319-13009-5</a><br/>Format:&#160;Electronic Resources<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:20233 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:21144 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Ben Ayed, Ghazi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08231-8">http://dx.doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/> A Mathematical Approach to Research Problems of Science and Technology Theoretical Basis and Developments in Mathematical Modeling ent://SD_ILS/0/SD_ILS:24965 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Nishii, Ryuei. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-55060-0">http://dx.doi.org/10.1007/978-4-431-55060-0</a><br/>Format:&#160;Electronic Resources<br/> Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems ent://SD_ILS/0/SD_ILS:25979 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013 ent://SD_ILS/0/SD_ILS:25031 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Krishnan, G. Sai Sundara. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1680-3">http://dx.doi.org/10.1007/978-81-322-1680-3</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence in Digital Forensics: Forensic Investigation and Applications ent://SD_ILS/0/SD_ILS:20731 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Muda, Azah Kamilah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05885-6">http://dx.doi.org/10.1007/978-3-319-05885-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:23735 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/> Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations ent://SD_ILS/0/SD_ILS:24406 2024-05-21T13:52:13Z 2024-05-21T13:52:13Z Yazar&#160;Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43616-5">http://dx.doi.org/10.1007/978-3-662-43616-5</a><br/>Format:&#160;Electronic Resources<br/>