Search Results for - Narrowed by: Systems and Data Security. - Electrical engineering.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Electrical$002bengineering.$002509Electrical$002bengineering.$0026ps$003d300$0026isd$003dtrue?2024-05-20T05:23:47ZProceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:190782024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0767-5">http://dx.doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:177472024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Zhang, Aiqing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32458-6">http://dx.doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:176082024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Zou, Yulong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31174-6">http://dx.doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:189652024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:191312024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:173992024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:178022024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2ent://SD_ILS/0/SD_ILS:190762024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0755-2">http://dx.doi.org/10.1007/978-981-10-0755-2</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:174022024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:175962024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Zhang, Peng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31083-1">http://dx.doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:172702024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:168652024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:175902024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:177522024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Pricop, Emil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32525-5">http://dx.doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:177772024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:180992024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40509-4">http://dx.doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:190442024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0557-2">http://dx.doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Secure Wireless Sensor Networks Threats and Solutionsent://SD_ILS/0/SD_ILS:199622024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format: Electronic Resources<br/>Security Issues in Mobile NFC Devicesent://SD_ILS/0/SD_ILS:223832024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Digital Defense A Cybersecurity Primerent://SD_ILS/0/SD_ILS:230032024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Pelton, Joseph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19953-5">http://dx.doi.org/10.1007/978-3-319-19953-5</a><br/>Format: Electronic Resources<br/>Handbook on Data Centersent://SD_ILS/0/SD_ILS:199342024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format: Electronic Resources<br/>Leakage Resilient Password Systemsent://SD_ILS/0/SD_ILS:226992024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format: Electronic Resources<br/>Advances in Computer Science and Ubiquitous Computing CSA & CUTEent://SD_ILS/0/SD_ILS:258352024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format: Electronic Resources<br/>Detecting Peripheral-based Attacks on the Host Memoryent://SD_ILS/0/SD_ILS:220972024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format: Electronic Resources<br/>Cyber Security: Analytics, Technology and Automationent://SD_ILS/0/SD_ILS:228072024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Security and Privacy for Mobile Healthcare Networksent://SD_ILS/0/SD_ILS:233912024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papersent://SD_ILS/0/SD_ILS:234762024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format: Electronic Resources<br/>Dynamic Secrets in Communication Securityent://SD_ILS/0/SD_ILS:196732024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format: Electronic Resources<br/>Network Science and Cybersecurityent://SD_ILS/0/SD_ILS:196612024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format: Electronic Resources<br/>Virtualization Techniques for Mobile Systemsent://SD_ILS/0/SD_ILS:207152024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Jaramillo, David. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05741-5">http://dx.doi.org/10.1007/978-3-319-05741-5</a><br/>Format: Electronic Resources<br/>QC-LDPC Code-Based Cryptographyent://SD_ILS/0/SD_ILS:202332024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format: Electronic Resources<br/>Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systemsent://SD_ILS/0/SD_ILS:259792024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format: Electronic Resources<br/>Trustworthy Execution on Mobile Devicesent://SD_ILS/0/SD_ILS:197052024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:212292024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Querying over Encrypted Data in Smart Gridsent://SD_ILS/0/SD_ILS:208142024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format: Electronic Resources<br/>Secure Smart Embedded Devices, Platforms and Applicationsent://SD_ILS/0/SD_ILS:196822024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Markantonakis, Konstantinos. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7915-4">http://dx.doi.org/10.1007/978-1-4614-7915-4</a><br/>Format: Electronic Resources<br/>Primer on Client-Side Web Securityent://SD_ILS/0/SD_ILS:218662024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar De Ryck, Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12226-7">http://dx.doi.org/10.1007/978-3-319-12226-7</a><br/>Format: Electronic Resources<br/>Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Frameworkent://SD_ILS/0/SD_ILS:211442024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Ben Ayed, Ghazi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08231-8">http://dx.doi.org/10.1007/978-3-319-08231-8</a><br/>Format: Electronic Resources<br/>Security, Privacy and Trust in Cloud Systemsent://SD_ILS/0/SD_ILS:237352024-05-20T05:23:47Z2024-05-20T05:23:47ZYazar Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format: Electronic Resources<br/>