Search Results for Computers. - Narrowed by: Computational intelligence. - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dComputers.$0026qf$003dSUBJECT$002509Konu$002509Computational$002bintelligence.$002509Computational$002bintelligence.$0026qf$003dSUBJECT$002509Konu$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300?2024-07-04T23:30:47ZRecent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:177522024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Pricop, Emil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-32525-5">http://dx.doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:187742024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2653-6">http://dx.doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:187732024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-2650-5">http://dx.doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Computational Intelligence in Digital Forensics: Forensic Investigation and Applicationsent://SD_ILS/0/SD_ILS:207312024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Muda, Azah Kamilah. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05885-6">http://dx.doi.org/10.1007/978-3-319-05885-6</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:190442024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0557-2">http://dx.doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Bio-inspiring Cyber Security and Cloud Services: Trends and Innovationsent://SD_ILS/0/SD_ILS:244062024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43616-5">http://dx.doi.org/10.1007/978-3-662-43616-5</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015ent://SD_ILS/0/SD_ILS:189922024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Senthilkumar, Muthukrishnan. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0251-9">http://dx.doi.org/10.1007/978-981-10-0251-9</a><br/>Format: Electronic Resources<br/>Advances in Computer Science and Ubiquitous Computing CSA & CUTEent://SD_ILS/0/SD_ILS:258352024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Park, Doo-Soon. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0281-6">http://dx.doi.org/10.1007/978-981-10-0281-6</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:189652024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Park, James J. (Jong Hyuk). editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0068-3">http://dx.doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015ent://SD_ILS/0/SD_ILS:170482024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Mejia, Jezreel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26285-7">http://dx.doi.org/10.1007/978-3-319-26285-7</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:250312024-07-04T23:30:47Z2024-07-04T23:30:47ZYazar Krishnan, G. Sai Sundara. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-1680-3">http://dx.doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Electronic Resources<br/>