Search Results for - Narrowed by: Systems and Data Security. - Electrical engineering. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Electrical$002bengineering.$002509Electrical$002bengineering.$0026ps$003d300$0026isd$003dtrue? 2024-05-20T05:23:47Z Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 ent://SD_ILS/0/SD_ILS:19078 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0767-5">http://dx.doi.org/10.1007/978-981-10-0767-5</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:17747 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Zhang, Aiqing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32458-6">http://dx.doi.org/10.1007/978-3-319-32458-6</a><br/>Format:&#160;Electronic Resources<br/> Physical-Layer Security for Cooperative Relay Networks ent://SD_ILS/0/SD_ILS:17608 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Zou, Yulong. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31174-6">http://dx.doi.org/10.1007/978-3-319-31174-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN &amp; PDCAT 2015 ent://SD_ILS/0/SD_ILS:18965 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:19131 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1409-3">http://dx.doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:17399 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:17802 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Lu, Rongxing. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32899-7">http://dx.doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 ent://SD_ILS/0/SD_ILS:19076 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0755-2">http://dx.doi.org/10.1007/978-981-10-0755-2</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:17402 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:17596 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Zhang, Peng. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31083-1">http://dx.doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:17270 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/> Physical and Data-Link Security Techniques for Future Communication Systems ent://SD_ILS/0/SD_ILS:16865 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Baldi, Marco. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23609-4">http://dx.doi.org/10.1007/978-3-319-23609-4</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:17590 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Shetty, Sachin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31032-9">http://dx.doi.org/10.1007/978-3-319-31032-9</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:17752 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Pricop, Emil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32525-5">http://dx.doi.org/10.1007/978-3-319-32525-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:17777 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32699-3">http://dx.doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:18099 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Mitton, Nathalie. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40509-4">http://dx.doi.org/10.1007/978-3-319-40509-4</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:19044 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0557-2">http://dx.doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Electronic Resources<br/> Secure Wireless Sensor Networks Threats and Solutions ent://SD_ILS/0/SD_ILS:19962 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Conti, Mauro. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3460-7">http://dx.doi.org/10.1007/978-1-4939-3460-7</a><br/>Format:&#160;Electronic Resources<br/> Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:22383 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Electronic Resources<br/> Digital Defense A Cybersecurity Primer ent://SD_ILS/0/SD_ILS:23003 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Pelton, Joseph. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19953-5">http://dx.doi.org/10.1007/978-3-319-19953-5</a><br/>Format:&#160;Electronic Resources<br/> Handbook on Data Centers ent://SD_ILS/0/SD_ILS:19934 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Khan, Samee U. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-2092-1">http://dx.doi.org/10.1007/978-1-4939-2092-1</a><br/>Format:&#160;Electronic Resources<br/> Leakage Resilient Password Systems ent://SD_ILS/0/SD_ILS:22699 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Li, Yingjiu. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17503-4">http://dx.doi.org/10.1007/978-3-319-17503-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer Science and Ubiquitous Computing CSA &amp; CUTE ent://SD_ILS/0/SD_ILS:25835 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format:&#160;Electronic Resources<br/> Detecting Peripheral-based Attacks on the Host Memory ent://SD_ILS/0/SD_ILS:22097 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Stewin, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13515-1">http://dx.doi.org/10.1007/978-3-319-13515-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:22807 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy for Mobile Healthcare Networks ent://SD_ILS/0/SD_ILS:23391 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Zhang, Kuan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24717-5">http://dx.doi.org/10.1007/978-3-319-24717-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking First International Conference, MSPN 2015, Paris, France, June 15-17, 2015, Selected Papers ent://SD_ILS/0/SD_ILS:23476 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Boumerdassi, Selma. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25744-0">http://dx.doi.org/10.1007/978-3-319-25744-0</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:19673 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Xiao, Sheng. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7831-7">http://dx.doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:19661 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Pino, Robinson E. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7597-2">http://dx.doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/> Virtualization Techniques for Mobile Systems ent://SD_ILS/0/SD_ILS:20715 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Jaramillo, David. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05741-5">http://dx.doi.org/10.1007/978-3-319-05741-5</a><br/>Format:&#160;Electronic Resources<br/> QC-LDPC Code-Based Cryptography ent://SD_ILS/0/SD_ILS:20233 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Baldi, Marco. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02556-8">http://dx.doi.org/10.1007/978-3-319-02556-8</a><br/>Format:&#160;Electronic Resources<br/> Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems ent://SD_ILS/0/SD_ILS:25979 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Hong, Y.-W. Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-981-4560-14-6">http://dx.doi.org/10.1007/978-981-4560-14-6</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:19705 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Vasudevan, Amit. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-8190-4">http://dx.doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:21229 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:20814 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Wen, Mi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06355-3">http://dx.doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:19682 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Markantonakis, Konstantinos. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7915-4">http://dx.doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/> Primer on Client-Side Web Security ent://SD_ILS/0/SD_ILS:21866 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;De Ryck, Philippe. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12226-7">http://dx.doi.org/10.1007/978-3-319-12226-7</a><br/>Format:&#160;Electronic Resources<br/> Architecting User-Centric Privacy-as-a-Set-of-Services Digital Identity-Related Privacy Framework ent://SD_ILS/0/SD_ILS:21144 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Ben Ayed, Ghazi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08231-8">http://dx.doi.org/10.1007/978-3-319-08231-8</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:23735 2024-05-20T05:23:47Z 2024-05-20T05:23:47Z Yazar&#160;Nepal, Surya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38586-5">http://dx.doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>