Search Results for - Narrowed by: Signal, Image and Speech Processing. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Signal$00252C$002bImage$002band$002bSpeech$002bProcessing.$002509Signal$00252C$002bImage$002band$002bSpeech$002bProcessing.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?2024-06-04T20:46:53ZWireless Communications under Hostile Jamming: Security and Efficiencyent://SD_ILS/0/SD_ILS:2213022024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:2223312024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applicationsent://SD_ILS/0/SD_ILS:2222282024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:2218292024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:2237172024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Inside Radio: An Attack and Defense Guideent://SD_ILS/0/SD_ILS:2248462024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format: Electronic Resources<br/>Group-target Trackingent://SD_ILS/0/SD_ILS:2269612024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Geng, Wen-dong. author.<br/><a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Digital Watermarking Techniques and Trendsent://SD_ILS/0/SD_ILS:2212042024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Nematollahi, Mohammad Ali. author.<br/><a href="https://doi.org/10.1007/978-981-10-2095-7">https://doi.org/10.1007/978-981-10-2095-7</a><br/>Format: Electronic Resources<br/>Biometric Security and Privacy Opportunities & Challenges in The Big Data Eraent://SD_ILS/0/SD_ILS:2242612024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Jiang, Richard. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format: Electronic Resources<br/>Security Challenges and Approaches in Internet of Thingsent://SD_ILS/0/SD_ILS:2269852024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Misra, Sridipta. author.<br/><a href="https://doi.org/10.1007/978-3-319-44230-3">https://doi.org/10.1007/978-3-319-44230-3</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:191312024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:190352024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:168652024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>Encyclopedia of Biometricsent://SD_ILS/0/SD_ILS:198332024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Li, Stan Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4899-7488-4">http://dx.doi.org/10.1007/978-1-4899-7488-4</a><br/>Format: Electronic Resources<br/>Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systemsent://SD_ILS/0/SD_ILS:259792024-06-04T20:46:53Z2024-06-04T20:46:53ZYazar Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format: Electronic Resources<br/>