Search Results for - Narrowed by: Computer network architectures. - Systems and Data Security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026qf$003dSUBJECT$002509Subject$002509Systems$002band$002bData$002bSecurity.$002509Systems$002band$002bData$002bSecurity.$0026ps$003d300$0026isd$003dtrue? 2024-06-19T20:56:38Z Distributed Applications and Interoperable Systems 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085804 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Bonomi, Silvia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93767-0">https://doi.org/10.1007/978-3-319-93767-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084657 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2084402 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2084403 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085367 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085369 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format:&#160;Electronic Resources<br/> Constructive Side-Channel Analysis and Secure Design 9th International Workshop, COSADE 2018, Singapore, April 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085594 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Fan, Junfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89641-0">https://doi.org/10.1007/978-3-319-89641-0</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Logic. New Trends and Applications First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2086102 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Madeira, Alexandre. editor. (orcid)0000-0002-0646-2017<br/><a href="https://doi.org/10.1007/978-3-319-73579-5">https://doi.org/10.1007/978-3-319-73579-5</a><br/>Format:&#160;Electronic Resources<br/> Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085424 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Chen, Xuemin. editor. (orcid)0000-0003-3820-9195<br/><a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086019 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086132 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing &ndash; CLOUD 2018 11th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25&ndash;30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085884 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Luo, Min. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94295-7">https://doi.org/10.1007/978-3-319-94295-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085508 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Electronic Resources<br/> Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086176 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2086184 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085186 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Electronic Resources<br/> Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085190 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Lai, Jian-Huang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085198 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Electronic Resources<br/> Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15&ndash;20, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085122 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format:&#160;Electronic Resources<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11&ndash;13, 2018 Proceedings, Part III ent://SD_ILS/0/SD_ILS:2086038 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93713-7">https://doi.org/10.1007/978-3-319-93713-7</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085501 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Au, Man Ho. editor. (orcid)0000-0003-2068-9530<br/><a href="https://doi.org/10.1007/978-3-030-02744-5">https://doi.org/10.1007/978-3-030-02744-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085150 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Ren, Jinchang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Visual Computing 13th International Symposium, ISVC 2018, Las Vegas, NV, USA, November 19 &ndash; 21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085183 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03801-4">https://doi.org/10.1007/978-3-030-03801-4</a><br/>Format:&#160;Electronic Resources<br/> Designing for a Digital and Globalized World 13th International Conference, DESRIST 2018, Chennai, India, June 3&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085654 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Chatterjee, Samir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91800-6">https://doi.org/10.1007/978-3-319-91800-6</a><br/>Format:&#160;Electronic Resources<br/> Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085792 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format:&#160;Electronic Resources<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11&ndash;13, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085860 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93698-7">https://doi.org/10.1007/978-3-319-93698-7</a><br/>Format:&#160;Electronic Resources<br/> Computational Science &ndash; ICCS 2018 18th International Conference, Wuxi, China, June 11-13, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085861 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Shi, Yong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93701-4">https://doi.org/10.1007/978-3-319-93701-4</a><br/>Format:&#160;Electronic Resources<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085376 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Kůrkov&aacute;, Věra. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format:&#160;Electronic Resources<br/> Edge Computing &ndash; EDGE 2018 Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085882 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Liu, Shijun. editor. (orcid)0000-0002-4108-1391<br/><a href="https://doi.org/10.1007/978-3-319-94340-4">https://doi.org/10.1007/978-3-319-94340-4</a><br/>Format:&#160;Electronic Resources<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:2084144 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085805 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26&ndash;27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085465 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45931-8">https://doi.org/10.1007/978-3-319-45931-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085417 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 &ndash; September 1, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085222 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format:&#160;Electronic Resources<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21&ndash;22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086062 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;B&eacute;cue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/> Security for Telecommunications Networks ent://SD_ILS/0/SD_ILS:501699 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Traynor, Patrick. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format:&#160;Electronic Resources<br/> Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503751 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Lucks, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format:&#160;Electronic Resources<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:501787 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Electronic Resources<br/> Network-Based Information Systems 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503645 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Takizawa, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85693-1">http://dx.doi.org/10.1007/978-3-540-85693-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:501690 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Mayes, Keith E. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format:&#160;Electronic Resources<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:501910 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:501913 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Set&uacute;bal, Portugal, August 7-10, 2006. Selected Papers ent://SD_ILS/0/SD_ILS:502831 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format:&#160;Electronic Resources<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:501627 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/> Network-Based Information Systems First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512807 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Enokido, Tomoya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-74573-0">http://dx.doi.org/10.1007/978-3-540-74573-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:505789 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/> E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers ent://SD_ILS/0/SD_ILS:512950 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Filipe, Joaquim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512745 2024-06-19T20:56:38Z 2024-06-19T20:56:38Z by&#160;Gorodetsky, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Electronic Resources<br/>