Search Results for - Narrowed by: English - Systems and Data Security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-25T20:10:39ZCloud Infrastructures, Services, and IoT Systems for Smart Cities Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20–21, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847922024-09-25T20:10:39Z2024-09-25T20:10:39Zby Longo, Antonella. editor.<br/><a href="https://doi.org/10.1007/978-3-319-67636-4">https://doi.org/10.1007/978-3-319-67636-4</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:20841442024-09-25T20:10:39Z2024-09-25T20:10:39Zby NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Big Digital Forensic Data Volume 2: Quick Analysis for Evidence and Intelligenceent://SD_ILS/0/SD_ILS:20841452024-09-25T20:10:39Z2024-09-25T20:10:39Zby Quick, Darren. author.<br/><a href="https://doi.org/10.1007/978-981-13-0263-3">https://doi.org/10.1007/978-981-13-0263-3</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Computing First International Conference, iCETiC 2018, London, UK, August 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841472024-09-25T20:10:39Z2024-09-25T20:10:39Zby Miraz, Mahdi H. editor. (orcid)0000-0002-6795-7048<br/><a href="https://doi.org/10.1007/978-3-319-95450-9">https://doi.org/10.1007/978-3-319-95450-9</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20849222024-09-25T20:10:39Z2024-09-25T20:10:39Zby Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845202024-09-25T20:10:39Z2024-09-25T20:10:39Zby You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842382024-09-25T20:10:39Z2024-09-25T20:10:39Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851712024-09-25T20:10:39Z2024-09-25T20:10:39Zby Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIIent://SD_ILS/0/SD_ILS:20851772024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-57932-9">https://doi.org/10.1007/978-3-662-57932-9</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842682024-09-25T20:10:39Z2024-09-25T20:10:39Zby Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20853762024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kůrková, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format: Electronic Resources<br/>Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854742024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ganji, Mohadeseh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04503-6">https://doi.org/10.1007/978-3-030-04503-6</a><br/>Format: Electronic Resources<br/>Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854782024-09-25T20:10:39Z2024-09-25T20:10:39Zby Stoyanov, Danail. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851222024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232024-09-25T20:10:39Z2024-09-25T20:10:39Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20857922024-09-25T20:10:39Z2024-09-25T20:10:39Zby Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856432024-09-25T20:10:39Z2024-09-25T20:10:39Zby Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861762024-09-25T20:10:39Z2024-09-25T20:10:39Zby Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format: Electronic Resources<br/>Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20859132024-09-25T20:10:39Z2024-09-25T20:10:39Zby Dubois, Catherine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format: Electronic Resources<br/>Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851502024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ren, Jinchang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20851512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860192024-09-25T20:10:39Z2024-09-25T20:10:39Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Physical Layer Security in Wireless Cooperative Networksent://SD_ILS/0/SD_ILS:20862242024-09-25T20:10:39Z2024-09-25T20:10:39Zby Wang, Li. author.<br/><a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482024-09-25T20:10:39Z2024-09-25T20:10:39Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Satoh, Shin'ichi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format: Electronic Resources<br/>Image and Signal Processing 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860422024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mansouri, Alamin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94211-7">https://doi.org/10.1007/978-3-319-94211-7</a><br/>Format: Electronic Resources<br/>Cyber Security Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:20869152024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Modern Data Strategyent://SD_ILS/0/SD_ILS:20847522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Fleckenstein, Mike. author.<br/><a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format: Electronic Resources<br/>Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysisent://SD_ILS/0/SD_ILS:20841222024-09-25T20:10:39Z2024-09-25T20:10:39Zby Nakahara Jr., Jorge. author.<br/><a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-09-25T20:10:39Z2024-09-25T20:10:39Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849302024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format: Electronic Resources<br/>Location Privacy in Mobile Applicationsent://SD_ILS/0/SD_ILS:20842412024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Bo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1705-7">https://doi.org/10.1007/978-981-13-1705-7</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:20870302024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 13th International Symposium, ISVC 2018, Las Vegas, NV, USA, November 19 – 21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851832024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03801-4">https://doi.org/10.1007/978-3-030-03801-4</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851902024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lai, Jian-Huang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format: Electronic Resources<br/>Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848682024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20853692024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kůrková, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853702024-09-25T20:10:39Z2024-09-25T20:10:39Zby Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:20853992024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Theories, Methods, and Human Issues 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854882024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91238-7">https://doi.org/10.1007/978-3-319-91238-7</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 11th International Conference, IDCS 2018, Tokyo, Japan, October 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854932024-09-25T20:10:39Z2024-09-25T20:10:39Zby Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02738-4">https://doi.org/10.1007/978-3-030-02738-4</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20856722024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zeng, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77383-4">https://doi.org/10.1007/978-3-319-77383-4</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854982024-09-25T20:10:39Z2024-09-25T20:10:39Zby Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854992024-09-25T20:10:39Z2024-09-25T20:10:39Zby Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Wireless Communications under Hostile Jamming: Security and Efficiencyent://SD_ILS/0/SD_ILS:20840492024-09-25T20:10:39Z2024-09-25T20:10:39Zby Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855082024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Simulation and Synthesis in Medical Imaging Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855092024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gooya, Ali. editor. (orcid)0000-0001-5135-4800<br/><a href="https://doi.org/10.1007/978-3-030-00536-8">https://doi.org/10.1007/978-3-030-00536-8</a><br/>Format: Electronic Resources<br/>RoboCup 2017: Robot World Cup XXIent://SD_ILS/0/SD_ILS:20853122024-09-25T20:10:39Z2024-09-25T20:10:39Zby Akiyama, Hidehisa. editor. (orcid)0000-0002-9793-9123<br/><a href="https://doi.org/10.1007/978-3-030-00308-1">https://doi.org/10.1007/978-3-030-00308-1</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IVent://SD_ILS/0/SD_ILS:20853132024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852422024-09-25T20:10:39Z2024-09-25T20:10:39Zby Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852432024-09-25T20:10:39Z2024-09-25T20:10:39Zby Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-09-25T20:10:39Z2024-09-25T20:10:39Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Interaction Technologies 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20854582024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91250-9">https://doi.org/10.1007/978-3-319-91250-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852652024-09-25T20:10:39Z2024-09-25T20:10:39Zby Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format: Electronic Resources<br/>Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26–28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962<br/><a href="https://doi.org/10.1007/978-3-319-99771-1">https://doi.org/10.1007/978-3-319-99771-1</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Designing for a Digital and Globalized World 13th International Conference, DESRIST 2018, Chennai, India, June 3–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chatterjee, Samir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91800-6">https://doi.org/10.1007/978-3-319-91800-6</a><br/>Format: Electronic Resources<br/>Artificial Neural Networks and Machine Learning – ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20853672024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kůrková, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bonomi, Silvia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93767-0">https://doi.org/10.1007/978-3-319-93767-0</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20861842024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861932024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860942024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Computational Science – ICCS 2018 18th International Conference, Wuxi, China, June 11–13, 2018 Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20860382024-09-25T20:10:39Z2024-09-25T20:10:39Zby Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93713-7">https://doi.org/10.1007/978-3-319-93713-7</a><br/>Format: Electronic Resources<br/>Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860392024-09-25T20:10:39Z2024-09-25T20:10:39Zby Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-09-25T20:10:39Z2024-09-25T20:10:39Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:20847222024-09-25T20:10:39Z2024-09-25T20:10:39Zby Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20840692024-09-25T20:10:39Z2024-09-25T20:10:39Zby Shi, Zhongzhi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format: Electronic Resources<br/>Practical Information Security A Competency-Based Education Courseent://SD_ILS/0/SD_ILS:20878142024-09-25T20:10:39Z2024-09-25T20:10:39Zby Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 2ent://SD_ILS/0/SD_ILS:20879312024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Electronic Resources<br/>Sustainable Interdependent Networks From Theory to Applicationent://SD_ILS/0/SD_ILS:20881672024-09-25T20:10:39Z2024-09-25T20:10:39Zby Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format: Electronic Resources<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20846722024-09-25T20:10:39Z2024-09-25T20:10:39Zby Yuan, Hanning. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0893-2">https://doi.org/10.1007/978-981-13-0893-2</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-09-25T20:10:39Z2024-09-25T20:10:39Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-09-25T20:10:39Z2024-09-25T20:10:39Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20844022024-09-25T20:10:39Z2024-09-25T20:10:39Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20844032024-09-25T20:10:39Z2024-09-25T20:10:39Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applicationsent://SD_ILS/0/SD_ILS:20841672024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845422024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approachent://SD_ILS/0/SD_ILS:20842572024-09-25T20:10:39Z2024-09-25T20:10:39Zby Parkinson, Simon. editor. (orcid)0000-0002-1747-9914<br/><a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652024-09-25T20:10:39Z2024-09-25T20:10:39Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedingsent://SD_ILS/0/SD_ILS:20852792024-09-25T20:10:39Z2024-09-25T20:10:39Zby Montavont, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00247-3">https://doi.org/10.1007/978-3-030-00247-3</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20853852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853882024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Mathematical Software – ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855742024-09-25T20:10:39Z2024-09-25T20:10:39Zby Davenport, James H. editor. (orcid)0000-0002-3982-7545<br/><a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format: Electronic Resources<br/>Computer Performance Engineering 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854002024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bakhshi, Rena. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02227-3">https://doi.org/10.1007/978-3-030-02227-3</a><br/>Format: Electronic Resources<br/>Combinatorial Algorithms 29th International Workshop, IWOCA 2018, Singapore, July 16–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851202024-09-25T20:10:39Z2024-09-25T20:10:39Zby Iliopoulos, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94667-2">https://doi.org/10.1007/978-3-319-94667-2</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855842024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format: Electronic Resources<br/>Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852892024-09-25T20:10:39Z2024-09-25T20:10:39Zby Yamamoto, Sakae. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852122024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841122024-09-25T20:10:39Z2024-09-25T20:10:39Zby Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:20842482024-09-25T20:10:39Z2024-09-25T20:10:39Zby Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851182024-09-25T20:10:39Z2024-09-25T20:10:39Zby Phung, Dinh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93034-3">https://doi.org/10.1007/978-3-319-93034-3</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855762024-09-25T20:10:39Z2024-09-25T20:10:39Zby Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks – ISNN 2018 15th International Symposium on Neural Networks, ISNN 2018, Minsk, Belarus, June 25–28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854872024-09-25T20:10:39Z2024-09-25T20:10:39Zby Huang, Tingwen. editor. (orcid)0000-0001-9610-846X<br/><a href="https://doi.org/10.1007/978-3-319-92537-0">https://doi.org/10.1007/978-3-319-92537-0</a><br/>Format: Electronic Resources<br/>Intelligent Computing Methodologies 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20853072024-09-25T20:10:39Z2024-09-25T20:10:39Zby Huang, De-Shuang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95957-3">https://doi.org/10.1007/978-3-319-95957-3</a><br/>Format: Electronic Resources<br/>Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854242024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Xuemin. editor. (orcid)0000-0003-3820-9195<br/><a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format: Electronic Resources<br/>Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855172024-09-25T20:10:39Z2024-09-25T20:10:39Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856302024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 22nd Iberoamerican Congress, CIARP 2017, Valparaíso, Chile, November 7–10, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20852522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mendoza, Marcelo. editor. (orcid)0000-0002-7969-6041<br/><a href="https://doi.org/10.1007/978-3-319-75193-1">https://doi.org/10.1007/978-3-319-75193-1</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852532024-09-25T20:10:39Z2024-09-25T20:10:39Zby Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Speech and Computer 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853532024-09-25T20:10:39Z2024-09-25T20:10:39Zby Karpov, Alexey. editor. (orcid)0000-0003-3424-652X<br/><a href="https://doi.org/10.1007/978-3-319-99579-3">https://doi.org/10.1007/978-3-319-99579-3</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20853592024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00009-7">https://doi.org/10.1007/978-3-030-00009-7</a><br/>Format: Electronic Resources<br/>Progress in Artificial Intelligence and Pattern Recognition 6th International Workshop, IWAIPR 2018, Havana, Cuba, September 24–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853602024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hernández Heredia, Yanio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01132-1">https://doi.org/10.1007/978-3-030-01132-1</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858772024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20858792024-09-25T20:10:39Z2024-09-25T20:10:39Zby Phung, Dinh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93040-4">https://doi.org/10.1007/978-3-319-93040-4</a><br/>Format: Electronic Resources<br/>HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861712024-09-25T20:10:39Z2024-09-25T20:10:39Zby Nah, Fiona Fui-Hoon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858932024-09-25T20:10:39Z2024-09-25T20:10:39Zby Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Inside Radio: An Attack and Defense Guideent://SD_ILS/0/SD_ILS:20846952024-09-25T20:10:39Z2024-09-25T20:10:39Zby Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922024-09-25T20:10:39Z2024-09-25T20:10:39Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732024-09-25T20:10:39Z2024-09-25T20:10:39Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Designing Usable and Secure Software with IRIS and CAIRISent://SD_ILS/0/SD_ILS:20847732024-09-25T20:10:39Z2024-09-25T20:10:39Zby Faily, Shamal. author.<br/><a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:20841282024-09-25T20:10:39Z2024-09-25T20:10:39Zby Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Big Digital Forensic Data Volume 1: Data Reduction Framework and Selective Imagingent://SD_ILS/0/SD_ILS:20844822024-09-25T20:10:39Z2024-09-25T20:10:39Zby Quick, Darren. author.<br/><a href="https://doi.org/10.1007/978-981-10-7763-0">https://doi.org/10.1007/978-981-10-7763-0</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844922024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhu, Liehuang. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8890-2">https://doi.org/10.1007/978-981-10-8890-2</a><br/>Format: Electronic Resources<br/>Computer Networks 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20846512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-92459-5">https://doi.org/10.1007/978-3-319-92459-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846592024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mori, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Electronic Resources<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20846602024-09-25T20:10:39Z2024-09-25T20:10:39Zby Yuan, Hanning. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0896-3">https://doi.org/10.1007/978-981-13-0896-3</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032024-09-25T20:10:39Z2024-09-25T20:10:39Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAEent://SD_ILS/0/SD_ILS:20842332024-09-25T20:10:39Z2024-09-25T20:10:39Zby Alja’am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20844332024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850702024-09-25T20:10:39Z2024-09-25T20:10:39Zby Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794<br/><a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format: Electronic Resources<br/>Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851312024-09-25T20:10:39Z2024-09-25T20:10:39Zby Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format: Electronic Resources<br/>Intelligent Computing Theories and Application 14th International Conference, ICIC 2018, Wuhan, China, August 15-18, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851332024-09-25T20:10:39Z2024-09-25T20:10:39Zby Huang, De-Shuang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95933-7">https://doi.org/10.1007/978-3-319-95933-7</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851342024-09-25T20:10:39Z2024-09-25T20:10:39Zby Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format: Electronic Resources<br/>Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855012024-09-25T20:10:39Z2024-09-25T20:10:39Zby Au, Man Ho. editor. (orcid)0000-0003-2068-9530<br/><a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855882024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bauer, Lujo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855942024-09-25T20:10:39Z2024-09-25T20:10:39Zby Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format: Electronic Resources<br/>Combinatorial Algorithms 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856002024-09-25T20:10:39Z2024-09-25T20:10:39Zby Brankovic, Ljiljana. editor. (orcid)0000-0002-5056-4627<br/><a href="https://doi.org/10.1007/978-3-319-78825-8">https://doi.org/10.1007/978-3-319-78825-8</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20840672024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20850532024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00776-8">https://doi.org/10.1007/978-3-030-00776-8</a><br/>Format: Electronic Resources<br/>Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853272024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03192-3">https://doi.org/10.1007/978-3-030-03192-3</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20853302024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00764-5">https://doi.org/10.1007/978-3-030-00764-5</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20853312024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00767-6">https://doi.org/10.1007/978-3-030-00767-6</a><br/>Format: Electronic Resources<br/>Internet of Vehicles. Technologies and Services Towards Smart City 5th International Conference, IOV 2018, Paris, France, November 20–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852442024-09-25T20:10:39Z2024-09-25T20:10:39Zby Skulimowski, Andrzej M.J. editor. (orcid)0000-0003-0646-2858<br/><a href="https://doi.org/10.1007/978-3-030-05081-8">https://doi.org/10.1007/978-3-030-05081-8</a><br/>Format: Electronic Resources<br/>Dynamic Logic. New Trends and Applications First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20861022024-09-25T20:10:39Z2024-09-25T20:10:39Zby Madeira, Alexandre. editor. (orcid)0000-0002-0646-2017<br/><a href="https://doi.org/10.1007/978-3-319-73579-5">https://doi.org/10.1007/978-3-319-73579-5</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Panetto, Hervé. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02610-3">https://doi.org/10.1007/978-3-030-02610-3</a><br/>Format: Electronic Resources<br/>Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851582024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802024-09-25T20:10:39Z2024-09-25T20:10:39Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24–26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848812024-09-25T20:10:39Z2024-09-25T20:10:39Zby Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format: Electronic Resources<br/>Future Access Enablers for Ubiquitous and Intelligent Infrastructures Third International Conference, FABULOUS 2017, Bucharest, Romania, October 12-14, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848822024-09-25T20:10:39Z2024-09-25T20:10:39Zby Fratu, Octavian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92213-3">https://doi.org/10.1007/978-3-319-92213-3</a><br/>Format: Electronic Resources<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843202024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>Cybersecurity in Germanyent://SD_ILS/0/SD_ILS:20841362024-09-25T20:10:39Z2024-09-25T20:10:39Zby Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841372024-09-25T20:10:39Z2024-09-25T20:10:39Zby Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841612024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Recent Trends and Future Technology in Applied Intelligence 31st International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, Montreal, QC, Canada, June 25-28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852862024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mouhoub, Malek. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92058-0">https://doi.org/10.1007/978-3-319-92058-0</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20856712024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zeng, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77380-3">https://doi.org/10.1007/978-3-319-77380-3</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852982024-09-25T20:10:39Z2024-09-25T20:10:39Zby Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855202024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X<br/><a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-09-25T20:10:39Z2024-09-25T20:10:39Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850592024-09-25T20:10:39Z2024-09-25T20:10:39Zby Torra, Vicenç. editor. (orcid)0000-0002-0368-8037<br/><a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850632024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bushnell, Linda. editor. (orcid)0000-0002-8751-2409<br/><a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-09-25T20:10:39Z2024-09-25T20:10:39Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:20853642024-09-25T20:10:39Z2024-09-25T20:10:39Zby Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Edge Computing – EDGE 2018 Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858822024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Shijun. editor. (orcid)0000-0002-4108-1391<br/><a href="https://doi.org/10.1007/978-3-319-94340-4">https://doi.org/10.1007/978-3-319-94340-4</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858832024-09-25T20:10:39Z2024-09-25T20:10:39Zby Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Cloud Computing – CLOUD 2018 11th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858842024-09-25T20:10:39Z2024-09-25T20:10:39Zby Luo, Min. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94295-7">https://doi.org/10.1007/978-3-319-94295-7</a><br/>Format: Electronic Resources<br/>Advances in Knowledge Discovery and Data Mining 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860922024-09-25T20:10:39Z2024-09-25T20:10:39Zby Phung, Dinh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93037-4">https://doi.org/10.1007/978-3-319-93037-4</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20860932024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:20863692024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Computational Science – ICCS 2018 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858612024-09-25T20:10:39Z2024-09-25T20:10:39Zby Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93701-4">https://doi.org/10.1007/978-3-319-93701-4</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858622024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chellappan, Sriram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format: Electronic Resources<br/>Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017ent://SD_ILS/0/SD_ILS:20866782024-09-25T20:10:39Z2024-09-25T20:10:39Zby Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:20862852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applicationsent://SD_ILS/0/SD_ILS:20865492024-09-25T20:10:39Z2024-09-25T20:10:39Zby Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:20863752024-09-25T20:10:39Z2024-09-25T20:10:39Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Algorithms and Applications ALAP 2018ent://SD_ILS/0/SD_ILS:20864882024-09-25T20:10:39Z2024-09-25T20:10:39Zby Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format: Electronic Resources<br/>Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861242024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94523-1">https://doi.org/10.1007/978-3-319-94523-1</a><br/>Format: Electronic Resources<br/>Computer Vision – ECCV 2018 15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part Vent://SD_ILS/0/SD_ILS:20851612024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ferrari, Vittorio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01228-1">https://doi.org/10.1007/978-3-030-01228-1</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861322024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format: Electronic Resources<br/>Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18–19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857602024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format: Electronic Resources<br/>Women in Security Changing the Face of Technology and Innovationent://SD_ILS/0/SD_ILS:20880522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format: Electronic Resources<br/>Computational Science – ICCS 2018 18th International Conference, Wuxi, China, June 11–13, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858602024-09-25T20:10:39Z2024-09-25T20:10:39Zby Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93698-7">https://doi.org/10.1007/978-3-319-93698-7</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detectionent://SD_ILS/0/SD_ILS:20867092024-09-25T20:10:39Z2024-09-25T20:10:39Zby Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Proceedings of ICICT 2016ent://SD_ILS/0/SD_ILS:20863552024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mishra, Durgesh Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format: Electronic Resources<br/>Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Projectent://SD_ILS/0/SD_ILS:20875042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Computer and Network Security Essentialsent://SD_ILS/0/SD_ILS:20882952024-09-25T20:10:39Z2024-09-25T20:10:39Zby Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:20868392024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Integration, Interconnection, and Interoperability of IoT Systemsent://SD_ILS/0/SD_ILS:20874212024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 1ent://SD_ILS/0/SD_ILS:20875962024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format: Electronic Resources<br/>Advanced persistent training : take your security awareness program to the next levelent://SD_ILS/0/SD_ILS:23134522024-09-25T20:10:39Z2024-09-25T20:10:39Zby Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format: Electronic Resources<br/>Beginning ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23122622024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format: Electronic Resources<br/>Secure System Design and Trustable Computingent://SD_ILS/0/SD_ILS:20875142024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chang, Chip-Hong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772024-09-25T20:10:39Z2024-09-25T20:10:39Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:20845152024-09-25T20:10:39Z2024-09-25T20:10:39Zby Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Ten Laws for Securityent://SD_ILS/0/SD_ILS:20845272024-09-25T20:10:39Z2024-09-25T20:10:39Zby Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849982024-09-25T20:10:39Z2024-09-25T20:10:39Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30222-5">https://doi.org/10.1007/978-3-319-30222-5</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-09-25T20:10:39Z2024-09-25T20:10:39Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20851002024-09-25T20:10:39Z2024-09-25T20:10:39Zby Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:20850062024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162024-09-25T20:10:39Z2024-09-25T20:10:39Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854422024-09-25T20:10:39Z2024-09-25T20:10:39Zby Buccafurri, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>Innovative Security Solutions for Information Technology and Communications 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854432024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bica, Ion. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47238-6">https://doi.org/10.1007/978-3-319-47238-6</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857902024-09-25T20:10:39Z2024-09-25T20:10:39Zby Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20852582024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50835-1">https://doi.org/10.1007/978-3-319-50835-1</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859722024-09-25T20:10:39Z2024-09-25T20:10:39Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262024-09-25T20:10:39Z2024-09-25T20:10:39Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20856592024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858052024-09-25T20:10:39Z2024-09-25T20:10:39Zby Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, Póvoa de Varzim, Portugal, July 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858062024-09-25T20:10:39Z2024-09-25T20:10:39Zby Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41501-7">https://doi.org/10.1007/978-3-319-41501-7</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014ent://SD_ILS/0/SD_ILS:20858102024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVI Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:20857382024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49247-5">https://doi.org/10.1007/978-3-662-49247-5</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20862092024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Autonomous Agents and Multiagent Systems AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858272024-09-25T20:10:39Z2024-09-25T20:10:39Zby Osman, Nardine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46840-2">https://doi.org/10.1007/978-3-319-46840-2</a><br/>Format: Electronic Resources<br/>Digital Fingerprintingent://SD_ILS/0/SD_ILS:20847382024-09-25T20:10:39Z2024-09-25T20:10:39Zby Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:20847512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Yu, Shui. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:20847542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Rowe, Neil C. author.<br/><a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:20847562024-09-25T20:10:39Z2024-09-25T20:10:39Zby Al-Shaer, Ehab. author.<br/><a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:20847572024-09-25T20:10:39Z2024-09-25T20:10:39Zby Colbert, Edward J. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:20845702024-09-25T20:10:39Z2024-09-25T20:10:39Zby Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44350-8">https://doi.org/10.1007/978-3-319-44350-8</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:20847852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Android Application Security A Semantics and Context-Aware Approachent://SD_ILS/0/SD_ILS:20843662024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-09-25T20:10:39Z2024-09-25T20:10:39Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Fundamentals of Network Forensics A Research Perspectiveent://SD_ILS/0/SD_ILS:20848672024-09-25T20:10:39Z2024-09-25T20:10:39Zby Joshi, R.C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856752024-09-25T20:10:39Z2024-09-25T20:10:39Zby Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852182024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bjørner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852192024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31863-9">https://doi.org/10.1007/978-3-319-31863-9</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20852222024-09-25T20:10:39Z2024-09-25T20:10:39Zby Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252024-09-25T20:10:39Z2024-09-25T20:10:39Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-09-25T20:10:39Z2024-09-25T20:10:39Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-09-25T20:10:39Z2024-09-25T20:10:39Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-09-25T20:10:39Z2024-09-25T20:10:39Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-09-25T20:10:39Z2024-09-25T20:10:39Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-09-25T20:10:39Z2024-09-25T20:10:39Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860702024-09-25T20:10:39Z2024-09-25T20:10:39Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49890-4">https://doi.org/10.1007/978-3-319-49890-4</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282024-09-25T20:10:39Z2024-09-25T20:10:39Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-09-25T20:10:39Z2024-09-25T20:10:39Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855572024-09-25T20:10:39Z2024-09-25T20:10:39Zby Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855612024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855682024-09-25T20:10:39Z2024-09-25T20:10:39Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50832-0">https://doi.org/10.1007/978-3-319-50832-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352024-09-25T20:10:39Z2024-09-25T20:10:39Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362024-09-25T20:10:39Z2024-09-25T20:10:39Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372024-09-25T20:10:39Z2024-09-25T20:10:39Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860952024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53641-4">https://doi.org/10.1007/978-3-662-53641-4</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-09-25T20:10:39Z2024-09-25T20:10:39Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472024-09-25T20:10:39Z2024-09-25T20:10:39Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859372024-09-25T20:10:39Z2024-09-25T20:10:39Zby Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861512024-09-25T20:10:39Z2024-09-25T20:10:39Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-09-25T20:10:39Z2024-09-25T20:10:39Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:20876082024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:20883622024-09-25T20:10:39Z2024-09-25T20:10:39Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0767-5">https://doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>Understanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:20847042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Jakobsson, Markus. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:20847092024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-09-25T20:10:39Z2024-09-25T20:10:39Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mueller, Peter. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:20840882024-09-25T20:10:39Z2024-09-25T20:10:39Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-09-25T20:10:39Z2024-09-25T20:10:39Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848152024-09-25T20:10:39Z2024-09-25T20:10:39Zby Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:20849492024-09-25T20:10:39Z2024-09-25T20:10:39Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Subjective Logic A Formalism for Reasoning Under Uncertaintyent://SD_ILS/0/SD_ILS:20849502024-09-25T20:10:39Z2024-09-25T20:10:39Zby Jøsang, Audun. author.<br/><a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152024-09-25T20:10:39Z2024-09-25T20:10:39Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822024-09-25T20:10:39Z2024-09-25T20:10:39Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849662024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhang, Yin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38904-2">https://doi.org/10.1007/978-3-319-38904-2</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:20850092024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Wen Ming. author.<br/><a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062024-09-25T20:10:39Z2024-09-25T20:10:39Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362024-09-25T20:10:39Z2024-09-25T20:10:39Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856052024-09-25T20:10:39Z2024-09-25T20:10:39Zby Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-09-25T20:10:39Z2024-09-25T20:10:39Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042024-09-25T20:10:39Z2024-09-25T20:10:39Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>Constructive Side-Channel Analysis and Secure Design 7th International Workshop, COSADE 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857132024-09-25T20:10:39Z2024-09-25T20:10:39Zby Standaert, François-Xavier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43283-0">https://doi.org/10.1007/978-3-319-43283-0</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857222024-09-25T20:10:39Z2024-09-25T20:10:39Zby Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2016 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856662024-09-25T20:10:39Z2024-09-25T20:10:39Zby Debruyne, Christophe. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48472-3">https://doi.org/10.1007/978-3-319-48472-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-09-25T20:10:39Z2024-09-25T20:10:39Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858012024-09-25T20:10:39Z2024-09-25T20:10:39Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802024-09-25T20:10:39Z2024-09-25T20:10:39Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20860792024-09-25T20:10:39Z2024-09-25T20:10:39Zby Hirt, Martin. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53644-5">https://doi.org/10.1007/978-3-662-53644-5</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322024-09-25T20:10:39Z2024-09-25T20:10:39Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-09-25T20:10:39Z2024-09-25T20:10:39Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Open Source Intelligence Investigation From Strategy to Implementationent://SD_ILS/0/SD_ILS:20842942024-09-25T20:10:39Z2024-09-25T20:10:39Zby Akhgar, Babak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Electronic Resources<br/>Elements of Cloud Storage Security Concepts, Designs and Optimized Practicesent://SD_ILS/0/SD_ILS:20842952024-09-25T20:10:39Z2024-09-25T20:10:39Zby Galibus, Tatiana. author.<br/><a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:20845762024-09-25T20:10:39Z2024-09-25T20:10:39Zby Pierer, Markus. author.<br/><a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:20847872024-09-25T20:10:39Z2024-09-25T20:10:39Zby Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846192024-09-25T20:10:39Z2024-09-25T20:10:39Zby Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846202024-09-25T20:10:39Z2024-09-25T20:10:39Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>