Search Results for - Narrowed by: Simulation and Modeling. - Computer security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Simulation$002band$002bModeling.$002509Simulation$002band$002bModeling.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-05-19T16:58:33Z Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24&ndash;26, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428102 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:226015 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:221443 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:221544 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/> Ad Hoc Networks 8th International Conference, ADHOCNETS 2016, Ottawa, Canada, September 26-27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:225339 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Zhou, Yifeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51204-4">https://doi.org/10.1007/978-3-319-51204-4</a><br/>Format:&#160;Electronic Resources<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 12th International Conference, QShine 2016, Seoul, Korea, July 7&ndash;8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:225451 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Lee, Jong-Hyouk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60717-7">https://doi.org/10.1007/978-3-319-60717-7</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering in Health Care 4th International Symposium, FHIES 2014, and 6th International Workshop, SEHC 2014, Washington, DC, USA, July 17-18, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:223789 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Huhn, Michaela. editor.<br/><a href="https://doi.org/10.1007/978-3-319-63194-3">https://doi.org/10.1007/978-3-319-63194-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:222855 2024-05-19T16:58:33Z 2024-05-19T16:58:33Z Yazar&#160;Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format:&#160;Electronic Resources<br/>