Search Results for Computer security. - Narrowed by: Jo, Kang-Hyun. editor. SirsiDynix Enterprise https://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputer$002bsecurity.$0026qf$003dAUTHOR$002509Yazar$002509Jo$00252C$002bKang-Hyun.$002beditor.$002509Jo$00252C$002bKang-Hyun.$002beditor.$0026ps$003d300? 2024-06-16T16:33:19Z Intelligent Computing Theories and Application 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:221439 2024-06-16T16:33:19Z 2024-06-16T16:33:19Z Yazar&#160;Huang, De-Shuang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95933-7">https://doi.org/10.1007/978-3-319-95933-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Methodologies 10th International Conference, ICIC 2014, Taiyuan, China, August 3-6, 2014. Proceedings ent://SD_ILS/0/SD_ILS:21323 2024-06-16T16:33:19Z 2024-06-16T16:33:19Z Yazar&#160;Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09339-0">http://dx.doi.org/10.1007/978-3-319-09339-0</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Theories and Application 12th International Conference, ICIC 2016, Lanzhou, China, August 2-5, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:18200 2024-06-16T16:33:19Z 2024-06-16T16:33:19Z Yazar&#160;Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-42294-7">http://dx.doi.org/10.1007/978-3-319-42294-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Computing Theories and Methodologies 11th International Conference, ICIC 2015, Fuzhou, China, August 20-23, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:23198 2024-06-16T16:33:19Z 2024-06-16T16:33:19Z Yazar&#160;Huang, De-Shuang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22186-1">http://dx.doi.org/10.1007/978-3-319-22186-1</a><br/>Format:&#160;Electronic Resources<br/>