Search Results for Automation. - Narrowed by: Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dAutomation.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300?2024-07-02T11:13:55ZBig Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:2254542024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 – November 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2267942024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Maglaras, Leandros A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format: Electronic Resources<br/>Advances and Trends in Artificial Intelligence. From Theory to Practice 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285922024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22999-3">https://doi.org/10.1007/978-3-030-22999-3</a><br/>Format: Electronic Resources<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4280392024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:2232522024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Agüero, Ramón. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format: Electronic Resources<br/>Context-Aware Systems and Applications, and Nature of Computation and Communication 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22–23, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4292382024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Cong Vinh, Phan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06152-4">https://doi.org/10.1007/978-3-030-06152-4</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:2255152024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4281832024-07-02T11:13:55Z2024-07-02T11:13:55ZYazar Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format: Electronic Resources<br/>