Search Results for - Narrowed by: Systems and Data Security. - Computers.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Computers.$002509Computers.$0026ps$003d300$0026isd$003dtrue?2024-05-19T23:29:38ZApplied Computer Sciences in Engineering 6th Workshop on Engineering Applications, WEA 2019, Santa Marta, Colombia, October 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4277032024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Figueroa-García, Juan Carlos. editor. (orcid)0000-0001-5544-5937<br/><a href="https://doi.org/10.1007/978-3-030-31019-6">https://doi.org/10.1007/978-3-030-31019-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4278042024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36033-7">https://doi.org/10.1007/978-3-030-36033-7</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4282062024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format: Electronic Resources<br/>Software Engineering for Resilient Systems 11th International Workshop, SERENE 2019, Naples, Italy, September 17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282262024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Calinescu, Radu. editor. (orcid)0000-0002-2678-9260<br/><a href="https://doi.org/10.1007/978-3-030-30856-8">https://doi.org/10.1007/978-3-030-30856-8</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280222024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944<br/><a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284112024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Nielson, Flemming. editor. (orcid)0000-0001-7362-6176<br/><a href="https://doi.org/10.1007/978-3-030-17138-4">https://doi.org/10.1007/978-3-030-17138-4</a><br/>Format: Electronic Resources<br/>PRICAI 2019: Trends in Artificial Intelligence 16th Pacific Rim International Conference on Artificial Intelligence, Cuvu, Yanuca Island, Fiji, August 26-30, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4285052024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Nayak, Abhaya C. editor. (orcid)0000-0003-0681-9570<br/><a href="https://doi.org/10.1007/978-3-030-29894-4">https://doi.org/10.1007/978-3-030-29894-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4285072024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29959-0">https://doi.org/10.1007/978-3-030-29959-0</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2019 Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4276902024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Joshi, James. editor. (orcid)0000-0003-4519-9802<br/><a href="https://doi.org/10.1007/978-3-030-23404-1">https://doi.org/10.1007/978-3-030-23404-1</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4284232024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Karray, Fakhri. editor. (orcid)0000-0002-4217-1372<br/><a href="https://doi.org/10.1007/978-3-030-27202-9">https://doi.org/10.1007/978-3-030-27202-9</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4278942024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9942-8">https://doi.org/10.1007/978-981-13-9942-8</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Image Processing 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4282842024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30508-6">https://doi.org/10.1007/978-3-030-30508-6</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287082024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Perdisci, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288202024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Cybenko, George. editor. (orcid)0000-0001-7734-2912<br/><a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4281882024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Singh, Mayank. editor.<br/><a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4284642024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239<br/><a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format: Electronic Resources<br/>Algebra, Codes and Cryptology First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4280372024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Gueye, Cheikh Thiecoumba. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36237-9">https://doi.org/10.1007/978-3-030-36237-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4283772024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Chen, Songqing. editor. (orcid)0000-0003-4650-7125<br/><a href="https://doi.org/10.1007/978-3-030-37228-6">https://doi.org/10.1007/978-3-030-37228-6</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279432024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Mori, Paolo. editor. (orcid)0000-0002-6618-0388<br/><a href="https://doi.org/10.1007/978-3-030-25109-3">https://doi.org/10.1007/978-3-030-25109-3</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 14th International Conference, WASA 2019, Honolulu, HI, USA, June 24–26, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281022024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Biagioni, Edoardo S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23597-0">https://doi.org/10.1007/978-3-030-23597-0</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281292024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Attrapadung, Nuttapong. editor. (orcid)0000-0003-4116-1751<br/><a href="https://doi.org/10.1007/978-3-030-26834-3">https://doi.org/10.1007/978-3-030-26834-3</a><br/>Format: Electronic Resources<br/>Machine Learning for Cyber Security Second International Conference, ML4CS 2019, Xi’an, China, September 19-21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282562024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30619-9">https://doi.org/10.1007/978-3-030-30619-9</a><br/>Format: Electronic Resources<br/>Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4282622024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983<br/><a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11–12, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282662024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format: Electronic Resources<br/>Information Security 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285132024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Lin, Zhiqiang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30215-3">https://doi.org/10.1007/978-3-030-30215-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4285152024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-030-29962-0">https://doi.org/10.1007/978-3-030-29962-0</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4283462024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37337-5">https://doi.org/10.1007/978-3-030-37337-5</a><br/>Format: Electronic Resources<br/>Advances in Data Science, Cyber Security and IT Applications First International Conference on Computing, ICC 2019, Riyadh, Saudi Arabia, December 10–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4280652024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Alfaries, Auhood. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36368-0">https://doi.org/10.1007/978-3-030-36368-0</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26–28, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4290232024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Deep Learning 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4291092024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30484-3">https://doi.org/10.1007/978-3-030-30484-3</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Text and Time Series 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part IVent://SD_ILS/0/SD_ILS:4291102024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30490-4">https://doi.org/10.1007/978-3-030-30490-4</a><br/>Format: Electronic Resources<br/>Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4291402024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Sun, Xingming. editor. (orcid)0000-0003-1390-399X<br/><a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format: Electronic Resources<br/>Creativity in Intelligent Technologies and Data Science Third Conference, CIT&DS 2019, Volgograd, Russia, September 16–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4292442024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Kravets, Alla G. editor. (orcid)0000-0003-1675-8652<br/><a href="https://doi.org/10.1007/978-3-030-29743-5">https://doi.org/10.1007/978-3-030-29743-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 15th EAI International Conference, SecureComm 2019, Orlando, FL, USA, October 23–25, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4291972024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Chen, Songqing. editor. (orcid)0000-0003-4650-7125<br/><a href="https://doi.org/10.1007/978-3-030-37231-6">https://doi.org/10.1007/978-3-030-37231-6</a><br/>Format: Electronic Resources<br/>Information and Software Technologies 25th International Conference, ICIST 2019, Vilnius, Lithuania, October 10–12, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287342024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Damaševičius, Robertas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-30275-7">https://doi.org/10.1007/978-3-030-30275-7</a><br/>Format: Electronic Resources<br/>Secure IT Systems 24th Nordic Conference, NordSec 2019, Aalborg, Denmark, November 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287472024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Askarov, Aslan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-35055-0">https://doi.org/10.1007/978-3-030-35055-0</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2019: Theoretical Neural Computation 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17–19, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4285642024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tetko, Igor V. editor. (orcid)0000-0002-6855-0012<br/><a href="https://doi.org/10.1007/978-3-030-30487-4">https://doi.org/10.1007/978-3-030-30487-4</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 11th International Conference, SecITC 2018, Bucharest, Romania, November 8–9, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290082024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Lanet, Jean-Louis. editor. (orcid)0000-0002-4751-3941<br/><a href="https://doi.org/10.1007/978-3-030-12942-2">https://doi.org/10.1007/978-3-030-12942-2</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 19th IFIP WG 6.1 International Conference, DAIS 2019, Held as Part of the 14th International Federated Conference on Distributed Computing Techniques, DisCoTec 2019, Kongens Lyngby, Denmark, June 17–21, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4289832024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Pereira, José. editor. (orcid)0000-0002-3341-9217<br/><a href="https://doi.org/10.1007/978-3-030-22496-7">https://doi.org/10.1007/978-3-030-22496-7</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papersent://SD_ILS/0/SD_ILS:4276472024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Albanese, Massimiliano. editor. (orcid)0000-0002-2675-5810<br/><a href="https://doi.org/10.1007/978-3-030-36537-0">https://doi.org/10.1007/978-3-030-36537-0</a><br/>Format: Electronic Resources<br/>Open Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278332024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Bordeleau, Francis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 11th International Symposium, CSS 2019, Guangzhou, China, December 1–3, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4283062024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Vaidya, Jaideep. editor.<br/><a href="https://doi.org/10.1007/978-3-030-37352-8">https://doi.org/10.1007/978-3-030-37352-8</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279082024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Computer Vision – ACCV 2018 14th Asian Conference on Computer Vision, Perth, Australia, December 2–6, 2018, Revised Selected Papers, Part VIent://SD_ILS/0/SD_ILS:4283942024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Jawahar, C.V. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20876-9">https://doi.org/10.1007/978-3-030-20876-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4290992024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Jang-Jaccard, Julian. editor. (orcid)0000-0002-1002-057X<br/><a href="https://doi.org/10.1007/978-3-030-21548-4">https://doi.org/10.1007/978-3-030-21548-4</a><br/>Format: Electronic Resources<br/>Security and Safety Interplay of Intelligent Software Systems ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277612024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Hamid, Brahim. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16874-2">https://doi.org/10.1007/978-3-030-16874-2</a><br/>Format: Electronic Resources<br/>Security and Privacy Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9–11, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277982024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Nandi, Sukumar. editor.<br/><a href="https://doi.org/10.1007/978-981-13-7561-3">https://doi.org/10.1007/978-981-13-7561-3</a><br/>Format: Electronic Resources<br/>Quality of Information and Communications Technology 12th International Conference, QUATIC 2019, Ciudad Real, Spain, September 11–13, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285032024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Piattini, Mario. editor. (orcid)0000-0002-7212-8279<br/><a href="https://doi.org/10.1007/978-3-030-29238-6">https://doi.org/10.1007/978-3-030-29238-6</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4283242024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Dolev, Shlomi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4282892024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Luiijf, Eric. editor. (orcid)0000-0002-1821-9890<br/><a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIIent://SD_ILS/0/SD_ILS:4285832024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part Ient://SD_ILS/0/SD_ILS:4288672024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Hofheinz, Dennis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-36030-6">https://doi.org/10.1007/978-3-030-36030-6</a><br/>Format: Electronic Resources<br/>Explainable AI: Interpreting, Explaining and Visualizing Deep Learningent://SD_ILS/0/SD_ILS:4285942024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Samek, Wojciech. editor. (orcid)0000-0002-6283-3265<br/><a href="https://doi.org/10.1007/978-3-030-28954-6">https://doi.org/10.1007/978-3-030-28954-6</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4292302024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Kosta, Eleni. editor.<br/><a href="https://doi.org/10.1007/978-3-030-16744-8">https://doi.org/10.1007/978-3-030-16744-8</a><br/>Format: Electronic Resources<br/>HCI for Cybersecurity, Privacy and Trust First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288972024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Moallem, Abbas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22351-9">https://doi.org/10.1007/978-3-030-22351-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2019 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288252024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Buchmann, Johannes. editor.<br/><a href="https://doi.org/10.1007/978-3-030-23696-0">https://doi.org/10.1007/978-3-030-23696-0</a><br/>Format: Electronic Resources<br/>Information Security Applications 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286482024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-030-17982-3">https://doi.org/10.1007/978-3-030-17982-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4287782024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Guo, Fuchun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format: Electronic Resources<br/>Green, Pervasive, and Cloud Computing 14th International Conference, GPC 2019, Uberlândia, Brazil, May 26–28, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4288542024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Miani, Rodrigo. editor. (orcid)0000-0002-8176-8040<br/><a href="https://doi.org/10.1007/978-3-030-19223-5">https://doi.org/10.1007/978-3-030-19223-5</a><br/>Format: Electronic Resources<br/>Euro-Par 2018: Parallel Processing Workshops Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276212024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Mencagli, Gabriele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10549-5">https://doi.org/10.1007/978-3-030-10549-5</a><br/>Format: Electronic Resources<br/>Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 – December 1, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277122024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4289962024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Goldberg, Ian. editor.<br/><a href="https://doi.org/10.1007/978-3-030-32101-7">https://doi.org/10.1007/978-3-030-32101-7</a><br/>Format: Electronic Resources<br/>The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy Essays Dedicated to Catuscia Palamidessi on the Occasion of Her 60th Birthdayent://SD_ILS/0/SD_ILS:4292552024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Alvim, Mário S. editor.<br/><a href="https://doi.org/10.1007/978-3-030-31175-9">https://doi.org/10.1007/978-3-030-31175-9</a><br/>Format: Electronic Resources<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4291932024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Luhach, Ashish Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 17th International Conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279802024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Deng, Robert H. editor. (orcid)0000-0003-3491-8146<br/><a href="https://doi.org/10.1007/978-3-030-21568-2">https://doi.org/10.1007/978-3-030-21568-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in New Computing Environments Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4279812024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Li, Jin. editor.<br/><a href="https://doi.org/10.1007/978-3-030-21373-2">https://doi.org/10.1007/978-3-030-21373-2</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4279712024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:186172024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49096-9">http://dx.doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:186182024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Kushilevitz, Eyal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-49099-0">http://dx.doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:175902024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Information Technology: New Generations 13th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:177482024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Latifi, Shahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32467-8">http://dx.doi.org/10.1007/978-3-319-32467-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:185322024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Pierer, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-15046-4">http://dx.doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:182172024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Liu, Wen Ming. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42644-0">http://dx.doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179872024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39381-0">http://dx.doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:181502024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Habib, Sheikh Mahbub. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41354-9">http://dx.doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:181542024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Ranise, Silvio. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41483-6">http://dx.doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:177082024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Colbert, Edward J. M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32125-7">http://dx.doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:171902024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Yu, Shui. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27763-9">http://dx.doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Third IFIP TC 5/8 International Conference, ICT-EurAsia 2015, and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015, Held as Part of WCC 2015, Daejeon, Korea, October 4-7, 2015, Proceedingsent://SD_ILS/0/SD_ILS:233602024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Khalil, Ismail. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24315-3">http://dx.doi.org/10.1007/978-3-319-24315-3</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Building Secure Defenses Against Code-Reuse Attacksent://SD_ILS/0/SD_ILS:234642024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Davi, Lucas. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25546-0">http://dx.doi.org/10.1007/978-3-319-25546-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Cybersecurity in Israelent://SD_ILS/0/SD_ILS:228782024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tabansky, Lior. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18986-4">http://dx.doi.org/10.1007/978-3-319-18986-4</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Quantum Computational Number Theoryent://SD_ILS/0/SD_ILS:234882024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Yan, Song Y. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25823-2">http://dx.doi.org/10.1007/978-3-319-25823-2</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Self- and Co-regulation in Cybercrime, Cybersecurity and National Securityent://SD_ILS/0/SD_ILS:225502024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tropina, Tatiana. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16447-2">http://dx.doi.org/10.1007/978-3-319-16447-2</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:247432024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46494-6">http://dx.doi.org/10.1007/978-3-662-46494-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:247442024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Dodis, Yevgeniy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46497-7">http://dx.doi.org/10.1007/978-3-662-46497-7</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:226992024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Pattern and Security Requirements Engineering-Based Establishment of Security Standardsent://SD_ILS/0/SD_ILS:225852024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format: Electronic Resources<br/>Trust Management IX 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedingsent://SD_ILS/0/SD_ILS:228292024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Damsgaard Jensen, Christian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18491-3">http://dx.doi.org/10.1007/978-3-319-18491-3</a><br/>Format: Electronic Resources<br/>Multimedia Communications, Services and Security 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedingsent://SD_ILS/0/SD_ILS:235222024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Dziech, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26404-2">http://dx.doi.org/10.1007/978-3-319-26404-2</a><br/>Format: Electronic Resources<br/>Reforming European Data Protection Lawent://SD_ILS/0/SD_ILS:254802024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Gutwirth, Serge. editor.<br/><a href="http://dx.doi.org/10.1007/978-94-017-9385-8">http://dx.doi.org/10.1007/978-94-017-9385-8</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XVI Selected Papers from ACOMP 2013ent://SD_ILS/0/SD_ILS:246922024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45947-8">http://dx.doi.org/10.1007/978-3-662-45947-8</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210432024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07620-1">http://dx.doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246212024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Distributed Denial of Service Attack and Defenseent://SD_ILS/0/SD_ILS:197902024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Yu, Shui. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9491-1">http://dx.doi.org/10.1007/978-1-4614-9491-1</a><br/>Format: Electronic Resources<br/>Privacy vs. Securityent://SD_ILS/0/SD_ILS:195462024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Stalla-Bourdillon, Sophie. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6530-9">http://dx.doi.org/10.1007/978-1-4471-6530-9</a><br/>Format: Electronic Resources<br/>Pairing-Based Cryptography – Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:205592024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Cao, Zhenfu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04873-4">http://dx.doi.org/10.1007/978-3-319-04873-4</a><br/>Format: Electronic Resources<br/>Code Breaking in the Pacificent://SD_ILS/0/SD_ILS:211522024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Donovan, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08278-3">http://dx.doi.org/10.1007/978-3-319-08278-3</a><br/>Format: Electronic Resources<br/>Cybersecurity Systems for Human Cognition Augmentationent://SD_ILS/0/SD_ILS:215002024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10374-7">http://dx.doi.org/10.1007/978-3-319-10374-7</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:222192024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Real-time Security Extensions for EPCglobal Networks Case Study for the Pharmaceutical Industryent://SD_ILS/0/SD_ILS:236802024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Schapranow, Matthieu-P. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36343-6">http://dx.doi.org/10.1007/978-3-642-36343-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedingsent://SD_ILS/0/SD_ILS:239752024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Lindell, Yehuda. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54242-8">http://dx.doi.org/10.1007/978-3-642-54242-8</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:214462024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Trust Management VIII 8th IFIP WG 11.11 International Conference, IFIPTM 2014, Singapore, July 7-10, 2014. Proceedingsent://SD_ILS/0/SD_ILS:244242024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Zhou, Jianying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43813-8">http://dx.doi.org/10.1007/978-3-662-43813-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Secure Cloud Computingent://SD_ILS/0/SD_ILS:197662024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9278-8">http://dx.doi.org/10.1007/978-1-4614-9278-8</a><br/>Format: Electronic Resources<br/>Large-Scale Data Analyticsent://SD_ILS/0/SD_ILS:197622024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Gkoulalas-Divanis, Aris. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-9242-9">http://dx.doi.org/10.1007/978-1-4614-9242-9</a><br/>Format: Electronic Resources<br/>Electronic Identityent://SD_ILS/0/SD_ILS:195382024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Andrade, Norberto Nuno Gomes de. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6449-4">http://dx.doi.org/10.1007/978-1-4471-6449-4</a><br/>Format: Electronic Resources<br/>Future Business Software Current Trends in Business Software Developmentent://SD_ILS/0/SD_ILS:204262024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Brunetti, Gino. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04144-5">http://dx.doi.org/10.1007/978-3-319-04144-5</a><br/>Format: Electronic Resources<br/>Network Hardening An Automated Approach to Improving Network Securityent://SD_ILS/0/SD_ILS:205062024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04612-9">http://dx.doi.org/10.1007/978-3-319-04612-9</a><br/>Format: Electronic Resources<br/>Cyberterrorism Understanding, Assessment, and Responseent://SD_ILS/0/SD_ILS:198962024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Chen, Thomas M. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-0962-9">http://dx.doi.org/10.1007/978-1-4939-0962-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208752024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210272024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Boureanu, Ioana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07536-5">http://dx.doi.org/10.1007/978-3-319-07536-5</a><br/>Format: Electronic Resources<br/>Pervasive Wireless Environments: Detecting and Localizing User Spoofingent://SD_ILS/0/SD_ILS:209832024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Yang, Jie. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07356-9">http://dx.doi.org/10.1007/978-3-319-07356-9</a><br/>Format: Electronic Resources<br/>Cybersecurity in Switzerlandent://SD_ILS/0/SD_ILS:215532024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Dunn Cavelty, Myriam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10620-5">http://dx.doi.org/10.1007/978-3-319-10620-5</a><br/>Format: Electronic Resources<br/>Automated Firewall Analytics Design, Configuration and Optimizationent://SD_ILS/0/SD_ILS:214992024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Al-Shaer, Ehab. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10371-6">http://dx.doi.org/10.1007/978-3-319-10371-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-05-19T23:29:38Z2024-05-19T23:29:38ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>