Search Results for Automation. - Narrowed by: Security. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dAutomation.$0026qf$003dSUBJECT$002509Konu$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300? 2024-07-02T11:13:55Z Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:225454 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Industrial Networks and Intelligent Systems Second International Conference, INISCOM 2016, Leicester, UK, October 31 &ndash; November 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:226794 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Maglaras, Leandros A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52569-3">https://doi.org/10.1007/978-3-319-52569-3</a><br/>Format:&#160;Electronic Resources<br/> Advances and Trends in Artificial Intelligence. From Theory to Practice 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428592 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Wotawa, Franz. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22999-3">https://doi.org/10.1007/978-3-030-22999-3</a><br/>Format:&#160;Electronic Resources<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:428039 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Flammini, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/> Mobile Networks and Management 8th International Conference, MONAMI 2016, Abu Dhabi, United Arab Emirates, October 23-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:223252 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Ag&uuml;ero, Ram&oacute;n. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52712-3">https://doi.org/10.1007/978-3-319-52712-3</a><br/>Format:&#160;Electronic Resources<br/> Context-Aware Systems and Applications, and Nature of Computation and Communication 7th EAI International Conference, ICCASA 2018, and 4th EAI International Conference, ICTCC 2018, Viet Tri City, Vietnam, November 22&ndash;23, 2018, Proceedings ent://SD_ILS/0/SD_ILS:429238 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Cong Vinh, Phan. editor.<br/><a href="https://doi.org/10.1007/978-3-030-06152-4">https://doi.org/10.1007/978-3-030-06152-4</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:225515 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Matou&scaron;ek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:428183 2024-07-02T11:13:55Z 2024-07-02T11:13:55Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182<br/><a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format:&#160;Electronic Resources<br/>