Search Results for SpringerLink (Online service) - Narrowed by: 2017 - Computational Intelligence. - Computer security.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dSpringerLink$002b$002528Online$002bservice$002529$0026qf$003dPUBDATE$002509Bas$0025C4$0025B1m$002bY$0025C4$0025B1l$0025C4$0025B1$0025092017$0025092017$0026qf$003dSUBJECT$002509Konu$002509Computational$002bIntelligence.$002509Computational$002bIntelligence.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-07-14T15:45:54ZInformation Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:2265562024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Kim, Kuinam. editor.<br/><a href="https://doi.org/10.1007/978-981-10-4154-9">https://doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:2242352024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1675-2">https://doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:2223092024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1678-3">https://doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:2236732024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Saini, H. S. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3818-1">https://doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Electronic Resources<br/>Predictive Computing and Information Securityent://SD_ILS/0/SD_ILS:2260532024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Gupta, P.K. author.<br/><a href="https://doi.org/10.1007/978-981-10-5107-4">https://doi.org/10.1007/978-981-10-5107-4</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:2225612024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Boroojeni, Kianoosh G. author.<br/><a href="https://doi.org/10.1007/978-3-319-45050-6">https://doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fourent://SD_ILS/0/SD_ILS:2269122024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3391-9">https://doi.org/10.1007/978-981-10-3391-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Threeent://SD_ILS/0/SD_ILS:2248192024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3409-1">https://doi.org/10.1007/978-981-10-3409-1</a><br/>Format: Electronic Resources<br/>Computer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:2228622024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-3226-4">https://doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:2216412024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Mandal, Jyotsna Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2035-3">https://doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Electronic Resources<br/>Multimedia Forensics and Security Foundations, Innovations, and Applicationsent://SD_ILS/0/SD_ILS:2212652024-07-14T15:45:54Z2024-07-14T15:45:54ZYazar Hassanien, Aboul Ella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44270-9">https://doi.org/10.1007/978-3-319-44270-9</a><br/>Format: Electronic Resources<br/>