Search Results for - Narrowed by: Big data. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Big$002bdata.$002509Big$002bdata.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-05-26T03:34:27Z Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:2084340 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Applications ALAP 2018 ent://SD_ILS/0/SD_ILS:2086488 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:2087030 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:2086678 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:2086369 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:2084803 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Strata Data Conference : London, UK 2018 ent://SD_ILS/0/SD_ILS:2319340 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Strata Conference (2018 : London, Great Britain) issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781492025993/?ar">https://learning.oreilly.com/videos/~/9781492025993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Big data : storage, sharing, and security ent://SD_ILS/0/SD_ILS:2313348 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Hu, Fei (Software engineer), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781498734875">https://learning.oreilly.com/library/view/~/9781498734875</a> <a href="https://learning.oreilly.com/library/view/~/9781498734875/?ar">https://learning.oreilly.com/library/view/~/9781498734875/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781498734875/?ar">https://go.oreilly.com/library-access/library/view/-/9781498734875/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cisco NetFlow ent://SD_ILS/0/SD_ILS:2310469 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134469843/?ar">https://learning.oreilly.com/videos/~/9780134469843/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780134469843/?ar">https://go.oreilly.com/library-access/library/view/-/9780134469843/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat forecasting : leveraging big data for predictive analysis ent://SD_ILS/0/SD_ILS:2310629 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format:&#160;Electronic Resources<br/> The security data lake : leveraging big data technologies to build a common data repository for security ent://SD_ILS/0/SD_ILS:2318350 2024-05-26T03:34:27Z 2024-05-26T03:34:27Z by&#160;Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format:&#160;Electronic Resources<br/>