Search Results for - Narrowed by: Computer security. - Big data.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Big$002bdata.$002509Big$002bdata.$0026ps$003d300?2024-05-30T12:33:43ZNetwork Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402024-05-30T12:33:43Z2024-05-30T12:33:43Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017ent://SD_ILS/0/SD_ILS:20866782024-05-30T12:33:43Z2024-05-30T12:33:43Zby Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:20870302024-05-30T12:33:43Z2024-05-30T12:33:43Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:20863692024-05-30T12:33:43Z2024-05-30T12:33:43Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Algorithms and Applications ALAP 2018ent://SD_ILS/0/SD_ILS:20864882024-05-30T12:33:43Z2024-05-30T12:33:43Zby Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032024-05-30T12:33:43Z2024-05-30T12:33:43Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Strata Data Conference : London, UK 2018ent://SD_ILS/0/SD_ILS:23193402024-05-30T12:33:43Z2024-05-30T12:33:43Zby Strata Conference (2018 : London, Great Britain) issuing body.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar">https://go.oreilly.com/library-access/library/view/-/9781492025993/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781492025993/?ar">https://learning.oreilly.com/videos/~/9781492025993/?ar</a><br/>Format: Electronic Resources<br/>Threat forecasting : leveraging big data for predictive analysisent://SD_ILS/0/SD_ILS:23106292024-05-30T12:33:43Z2024-05-30T12:33:43Zby Pirc, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128004784/?ar">https://learning.oreilly.com/library/view/~/9780128004784/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar">https://go.oreilly.com/library-access/library/view/-/9780128004784/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128004784">https://learning.oreilly.com/library/view/~/9780128004784</a><br/>Format: Electronic Resources<br/>Big data : storage, sharing, and securityent://SD_ILS/0/SD_ILS:23133482024-05-30T12:33:43Z2024-05-30T12:33:43Zby Hu, Fei (Software engineer), editor.<br/><a href="https://learning.oreilly.com/library/view/~/9781498734875">https://learning.oreilly.com/library/view/~/9781498734875</a>
<a href="https://learning.oreilly.com/library/view/~/9781498734875/?ar">https://learning.oreilly.com/library/view/~/9781498734875/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498734875/?ar">https://go.oreilly.com/library-access/library/view/-/9781498734875/?ar</a><br/>Format: Electronic Resources<br/>Cisco NetFlowent://SD_ILS/0/SD_ILS:23104692024-05-30T12:33:43Z2024-05-30T12:33:43Zby Santos, Omar, on-screen presenter.<br/><a href="https://learning.oreilly.com/videos/~/9780134469843/?ar">https://learning.oreilly.com/videos/~/9780134469843/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780134469843/?ar">https://go.oreilly.com/library-access/library/view/-/9780134469843/?ar</a><br/>Format: Electronic Resources<br/>The security data lake : leveraging big data technologies to build a common data repository for securityent://SD_ILS/0/SD_ILS:23183502024-05-30T12:33:43Z2024-05-30T12:33:43Zby Marty, Raffael, 1976- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491927748/?ar">https://learning.oreilly.com/library/view/~/9781491927748/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar">https://go.oreilly.com/library-access/library/view/-/9781491927748/?ar</a><br/>Format: Electronic Resources<br/>