Search Results for - Narrowed by: Thesis Collection - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253ATHESIS$002509Thesis$002bCollection$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-05-31T16:11:25ZDynamic itemset hiding under multiple support thresholdsent://SD_ILS/0/SD_ILS:20754082024-05-31T16:11:25Z2024-05-31T16:11:25Zby Öztürk, Ahmet Cumhur, author.<br/><a href="http://hdl.handle.net/11147/6998">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Analysing the encrypted search algorithms on encrypted dataent://SD_ILS/0/SD_ILS:20755512024-05-31T16:11:25Z2024-05-31T16:11:25Zby Tekin, Leyla, author.<br/><a href="http://hdl.handle.net/11147/6951">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Measurement of javascript applications' readiness to untrusted data using bayesian networksent://SD_ILS/0/SD_ILS:4683082024-05-31T16:11:25Z2024-05-31T16:11:25Zby Ufuktepe, Ekincan, author.<br/><a href="http://hdl.handle.net/11147/4249">Access to Electronic Versiyon.</a><br/>Format: Manuscript<br/>Anomaly detection using network traffic characterizationent://SD_ILS/0/SD_ILS:250272024-05-31T16:11:25Z2024-05-31T16:11:25Zby Yarımtepe, Oğuz.<br/><a href="http://hdl.handle.net/11147/3459">Access to Electronic Version.</a><br/>Format: Manuscript<br/>Comparison of recovery requirements with investigation requirements for intrusion management systemsent://SD_ILS/0/SD_ILS:252472024-05-31T16:11:25Z2024-05-31T16:11:25Zby Arpaçay Tapucu, Dilek.<br/><a href="http://hdl.handle.net/11147/3463">Access to Electronic Version.</a><br/>Format: Manuscript<br/>A Turkish password cracker for unix based operating systemsent://SD_ILS/0/SD_ILS:78142024-05-31T16:11:25Z2024-05-31T16:11:25Zby Tahaoğlu, Osman Okyar.<br/><a href="http://hdl.handle.net/11147/3870">Access to Electronic Version.</a><br/>Format: Manuscript<br/>