Search Results for Electrical engineering. - Narrowed by: Security Science and Technology.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dElectrical$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Security$002bScience$002band$002bTechnology.$002509Security$002bScience$002band$002bTechnology.$0026ic$003dtrue$0026ps$003d300?2024-08-17T21:14:47ZMobile and Wireless Technology 2015ent://SD_ILS/0/SD_ILS:248312024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Kim, Kuinam J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47669-7">http://dx.doi.org/10.1007/978-3-662-47669-7</a><br/>Format: Electronic Resources<br/>Signal and Image Processing for Biometricsent://SD_ILS/0/SD_ILS:239532024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Scharcanski, Jacob. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54080-6">http://dx.doi.org/10.1007/978-3-642-54080-6</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:173992024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29721-7">http://dx.doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:190352024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Bas, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-0506-0">http://dx.doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Iris Image Recognition Wavelet Filter-banks Based Iris Feature Extraction Schemesent://SD_ILS/0/SD_ILS:208802024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Rahulkar, Amol D. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06767-4">http://dx.doi.org/10.1007/978-3-319-06767-4</a><br/>Format: Electronic Resources<br/>Cyber Security: Analytics, Technology and Automationent://SD_ILS/0/SD_ILS:228072024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Lehto, Martti. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18302-2">http://dx.doi.org/10.1007/978-3-319-18302-2</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:172702024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Androulidakis, Iosif. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28666-2">http://dx.doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:174022024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Androulidakis, Iosif I. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-29742-2">http://dx.doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Locating, Classifying and Countering Agile Land Vehicles With Applications to Command Architecturesent://SD_ILS/0/SD_ILS:166072024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Sworder, David D. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19431-8">http://dx.doi.org/10.1007/978-3-319-19431-8</a><br/>Format: Electronic Resources<br/>Security Issues in Mobile NFC Devicesent://SD_ILS/0/SD_ILS:223832024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Roland, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15488-6">http://dx.doi.org/10.1007/978-3-319-15488-6</a><br/>Format: Electronic Resources<br/>Trusted Computing Platforms TPM2.0 in Contextent://SD_ILS/0/SD_ILS:212292024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Proudler, Graeme. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08744-3">http://dx.doi.org/10.1007/978-3-319-08744-3</a><br/>Format: Electronic Resources<br/>Why Cryptography Should Not Rely on Physical Attack Complexityent://SD_ILS/0/SD_ILS:259622024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Krämer, Juliane. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-787-1">http://dx.doi.org/10.1007/978-981-287-787-1</a><br/>Format: Electronic Resources<br/>Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vorticesent://SD_ILS/0/SD_ILS:174512024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Izmailov, Igor. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-30125-9">http://dx.doi.org/10.1007/978-3-319-30125-9</a><br/>Format: Electronic Resources<br/>Ring Resonator Systems to Perform Optical Communication Enhancement Using Solitonent://SD_ILS/0/SD_ILS:258772024-08-17T21:14:47Z2024-08-17T21:14:47ZYazar Amiri, Iraj Sadegh. author.<br/><a href="http://dx.doi.org/10.1007/978-981-287-197-8">http://dx.doi.org/10.1007/978-981-287-197-8</a><br/>Format: Electronic Resources<br/>