Search Results for - Narrowed by: Systems and Data Security. - Operating systems (Computers).SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Operating$002bsystems$002b$002528Computers$002529.$002509Operating$002bsystems$002b$002528Computers$002529.$0026ps$003d300?2024-05-19T21:32:12ZPrivacy Technologies and Policy 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13–14, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291622024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Naldi, Maurizio. editor. (orcid)0000-0002-0903-398X<br/><a href="https://doi.org/10.1007/978-3-030-21752-5">https://doi.org/10.1007/978-3-030-21752-5</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287082024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Perdisci, Roberto. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 10th International Workshop, COSADE 2019, Darmstadt, Germany, April 3–5, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4287602024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Polian, Ilia. editor. (orcid)0000-0002-6563-2725<br/><a href="https://doi.org/10.1007/978-3-030-16350-1">https://doi.org/10.1007/978-3-030-16350-1</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XLIIent://SD_ILS/0/SD_ILS:4285832024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-60531-8">https://doi.org/10.1007/978-3-662-60531-8</a><br/>Format: Electronic Resources<br/>Euro-Par 2018: Parallel Processing Workshops Euro-Par 2018 International Workshops, Turin, Italy, August 27-28, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4276212024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Mencagli, Gabriele. editor.<br/><a href="https://doi.org/10.1007/978-3-030-10549-5">https://doi.org/10.1007/978-3-030-10549-5</a><br/>Format: Electronic Resources<br/>Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approachent://SD_ILS/0/SD_ILS:2226522024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Parkinson, Simon. editor. (orcid)0000-0002-1747-9914<br/><a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format: Electronic Resources<br/>Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2255542024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format: Electronic Resources<br/>Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2242332024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2248532024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIIent://SD_ILS/0/SD_ILS:2228202024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-57932-9">https://doi.org/10.1007/978-3-662-57932-9</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2242932024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Bonomi, Silvia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93767-0">https://doi.org/10.1007/978-3-319-93767-0</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2248032024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2216632024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:2233192024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:2218512024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2228852024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Xu, Ming. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245082024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Polychronakis, Michalis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format: Electronic Resources<br/>Engineering Secure Software and Systems 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2266162024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Bodden, Eric. editor.<br/><a href="https://doi.org/10.1007/978-3-319-62105-0">https://doi.org/10.1007/978-3-319-62105-0</a><br/>Format: Electronic Resources<br/>Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Toolsent://SD_ILS/0/SD_ILS:2268932024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Bhuyan, Monowar H. author.<br/><a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2245432024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Dacier, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format: Electronic Resources<br/>Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:236092024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Yung, Moti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27998-5">http://dx.doi.org/10.1007/978-3-319-27998-5</a><br/>Format: Electronic Resources<br/>Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:214912024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 12th International Conference, WWIC 2014, Paris, France, May 26-28, 2014. Proceedingsent://SD_ILS/0/SD_ILS:220292024-05-19T21:32:12Z2024-05-19T21:32:12ZYazar Mellouk, Abdelhamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13174-0">http://dx.doi.org/10.1007/978-3-319-13174-0</a><br/>Format: Electronic Resources<br/>