Search Results for - Narrowed by: Computer security. - Computer science.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026ps$003d300?2024-05-23T20:12:07ZComputer science security : concepts and toolsent://SD_ILS/0/SD_ILS:23340352024-05-23T20:12:07Z2024-05-23T20:12:07Zby Zaidoun, Ameur Salem, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781786307552/?ar">https://learning.oreilly.com/library/view/~/9781786307552/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar">https://go.oreilly.com/library-access/library/view/-/9781786307552/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781786307552">https://learning.oreilly.com/library/view/~/9781786307552</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851982024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856302024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chen, Xiaofeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Theories, Methods, and Human Issues 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854882024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91238-7">https://doi.org/10.1007/978-3-319-91238-7</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2018, Valencia, Spain, September 26–28, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853522024-05-23T20:12:07Z2024-05-23T20:12:07Zby Domingo-Ferrer, Josep. editor. (orcid)0000-0001-7213-4962<br/><a href="https://doi.org/10.1007/978-3-319-99771-1">https://doi.org/10.1007/978-3-319-99771-1</a><br/>Format: Electronic Resources<br/>Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18–19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857602024-05-23T20:12:07Z2024-05-23T20:12:07Zby Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:20853642024-05-23T20:12:07Z2024-05-23T20:12:07Zby Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861762024-05-23T20:12:07Z2024-05-23T20:12:07Zby Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232024-05-23T20:12:07Z2024-05-23T20:12:07Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Dynamic Logic. New Trends and Applications First International Workshop, DALI 2017, Brasilia, Brazil, September 23-24, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20861022024-05-23T20:12:07Z2024-05-23T20:12:07Zby Madeira, Alexandre. editor. (orcid)0000-0002-0646-2017<br/><a href="https://doi.org/10.1007/978-3-319-73579-5">https://doi.org/10.1007/978-3-319-73579-5</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20840672024-05-23T20:12:07Z2024-05-23T20:12:07Zby Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Smart and Innovative Trends in Next Generation Computing Technologies Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20846532024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bhattacharyya, Pushpak. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8660-1">https://doi.org/10.1007/978-981-10-8660-1</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846572024-05-23T20:12:07Z2024-05-23T20:12:07Zby Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Smart and Innovative Trends in Next Generation Computing Technologies Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20846582024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bhattacharyya, Pushpak. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8657-1">https://doi.org/10.1007/978-981-10-8657-1</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851712024-05-23T20:12:07Z2024-05-23T20:12:07Zby Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012024-05-23T20:12:07Z2024-05-23T20:12:07Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20844022024-05-23T20:12:07Z2024-05-23T20:12:07Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20844032024-05-23T20:12:07Z2024-05-23T20:12:07Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852432024-05-23T20:12:07Z2024-05-23T20:12:07Zby Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642024-05-23T20:12:07Z2024-05-23T20:12:07Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Human Interface and the Management of Information. Information in Applications and Services 20th International Conference, HIMI 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852892024-05-23T20:12:07Z2024-05-23T20:12:07Zby Yamamoto, Sakae. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92046-7">https://doi.org/10.1007/978-3-319-92046-7</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852982024-05-23T20:12:07Z2024-05-23T20:12:07Zby Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854992024-05-23T20:12:07Z2024-05-23T20:12:07Zby Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Image and Video Technology PSIVT 2017 International Workshops, Wuhan, China, November 20-24, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858512024-05-23T20:12:07Z2024-05-23T20:12:07Zby Satoh, Shin'ichi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92753-4">https://doi.org/10.1007/978-3-319-92753-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858542024-05-23T20:12:07Z2024-05-23T20:12:07Zby Preneel, Bart. editor. (orcid)0000-0003-2005-9651<br/><a href="https://doi.org/10.1007/978-3-319-93387-0">https://doi.org/10.1007/978-3-319-93387-0</a><br/>Format: Electronic Resources<br/>Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855172024-05-23T20:12:07Z2024-05-23T20:12:07Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>RoboCup 2017: Robot World Cup XXIent://SD_ILS/0/SD_ILS:20853122024-05-23T20:12:07Z2024-05-23T20:12:07Zby Akiyama, Hidehisa. editor. (orcid)0000-0002-9793-9123<br/><a href="https://doi.org/10.1007/978-3-030-00308-1">https://doi.org/10.1007/978-3-030-00308-1</a><br/>Format: Electronic Resources<br/>Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860392024-05-23T20:12:07Z2024-05-23T20:12:07Zby Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860402024-05-23T20:12:07Z2024-05-23T20:12:07Zby Susilo, Willy. editor. (orcid)0000-0002-1562-5105<br/><a href="https://doi.org/10.1007/978-3-319-93638-3">https://doi.org/10.1007/978-3-319-93638-3</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858832024-05-23T20:12:07Z2024-05-23T20:12:07Zby Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:20862852024-05-23T20:12:07Z2024-05-23T20:12:07Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860942024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20859132024-05-23T20:12:07Z2024-05-23T20:12:07Zby Dubois, Catherine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format: Electronic Resources<br/>Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detectionent://SD_ILS/0/SD_ILS:20867092024-05-23T20:12:07Z2024-05-23T20:12:07Zby Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:20842482024-05-23T20:12:07Z2024-05-23T20:12:07Zby Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Mobile Networks and Management 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845422024-05-23T20:12:07Z2024-05-23T20:12:07Zby Hu, Jiankun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-90775-8">https://doi.org/10.1007/978-3-319-90775-8</a><br/>Format: Electronic Resources<br/>Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849302024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format: Electronic Resources<br/>Handbook of Mobile Data Privacyent://SD_ILS/0/SD_ILS:20843032024-05-23T20:12:07Z2024-05-23T20:12:07Zby Gkoulalas-Divanis, Aris. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855232024-05-23T20:12:07Z2024-05-23T20:12:07Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03810-6">https://doi.org/10.1007/978-3-030-03810-6</a><br/>Format: Electronic Resources<br/>Computational Data and Social Networks 7th International Conference, CSoNet 2018, Shanghai, China, December 18–20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854242024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chen, Xuemin. editor. (orcid)0000-0003-3820-9195<br/><a href="https://doi.org/10.1007/978-3-030-04648-4">https://doi.org/10.1007/978-3-030-04648-4</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Interaction in Context 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20853852024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91244-8">https://doi.org/10.1007/978-3-319-91244-8</a><br/>Format: Electronic Resources<br/>Computer Security ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860192024-05-23T20:12:07Z2024-05-23T20:12:07Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-319-72817-9">https://doi.org/10.1007/978-3-319-72817-9</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861322024-05-23T20:12:07Z2024-05-23T20:12:07Zby Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format: Electronic Resources<br/>Mathematical Software – ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855742024-05-23T20:12:07Z2024-05-23T20:12:07Zby Davenport, James H. editor. (orcid)0000-0002-3982-7545<br/><a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855762024-05-23T20:12:07Z2024-05-23T20:12:07Zby Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20861842024-05-23T20:12:07Z2024-05-23T20:12:07Zby Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92037-5">https://doi.org/10.1007/978-3-319-92037-5</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861932024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Designing Usable and Secure Software with IRIS and CAIRISent://SD_ILS/0/SD_ILS:20847732024-05-23T20:12:07Z2024-05-23T20:12:07Zby Faily, Shamal. author.<br/><a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format: Electronic Resources<br/>Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20851862024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lopez, Javier. editor.<br/><a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format: Electronic Resources<br/>Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850702024-05-23T20:12:07Z2024-05-23T20:12:07Zby Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794<br/><a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202024-05-23T20:12:07Z2024-05-23T20:12:07Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856432024-05-23T20:12:07Z2024-05-23T20:12:07Zby Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855082024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chen, Liqun. editor. (orcid)0000-0003-2680-4907<br/><a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format: Electronic Resources<br/>Internet Science 5th International Conference, INSCI 2018, St. Petersburg, Russia, October 24–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855202024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bodrunova, Svetlana S. editor. (orcid)0000-0003-0740-561X<br/><a href="https://doi.org/10.1007/978-3-030-01437-7">https://doi.org/10.1007/978-3-030-01437-7</a><br/>Format: Electronic Resources<br/>IoT as a Service Third International Conference, IoTaaS 2017, Taichung, Taiwan, September 20–22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841612024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lin, Yi-Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00410-1">https://doi.org/10.1007/978-3-030-00410-1</a><br/>Format: Electronic Resources<br/>Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24–26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848812024-05-23T20:12:07Z2024-05-23T20:12:07Zby Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format: Electronic Resources<br/>Cybersecurity in Germanyent://SD_ILS/0/SD_ILS:20841362024-05-23T20:12:07Z2024-05-23T20:12:07Zby Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format: Electronic Resources<br/>Honeypot Frameworks and Their Applications: A New Frameworkent://SD_ILS/0/SD_ILS:20841442024-05-23T20:12:07Z2024-05-23T20:12:07Zby NG, Chee Keong. author.<br/><a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAEent://SD_ILS/0/SD_ILS:20842332024-05-23T20:12:07Z2024-05-23T20:12:07Zby Alja’am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652024-05-23T20:12:07Z2024-05-23T20:12:07Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Computer Networks 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20846512024-05-23T20:12:07Z2024-05-23T20:12:07Zby Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-92459-5">https://doi.org/10.1007/978-3-319-92459-5</a><br/>Format: Electronic Resources<br/>Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851582024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format: Electronic Resources<br/>Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications 22nd Iberoamerican Congress, CIARP 2017, Valparaíso, Chile, November 7–10, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20852522024-05-23T20:12:07Z2024-05-23T20:12:07Zby Mendoza, Marcelo. editor. (orcid)0000-0002-7969-6041<br/><a href="https://doi.org/10.1007/978-3-319-75193-1">https://doi.org/10.1007/978-3-319-75193-1</a><br/>Format: Electronic Resources<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852532024-05-23T20:12:07Z2024-05-23T20:12:07Zby Dinur, Itai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852122024-05-23T20:12:07Z2024-05-23T20:12:07Zby Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Secure IT Systems 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852132024-05-23T20:12:07Z2024-05-23T20:12:07Zby Gruschka, Nils. editor. (orcid)0000-0001-7360-8314<br/><a href="https://doi.org/10.1007/978-3-030-03638-6">https://doi.org/10.1007/978-3-030-03638-6</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20855382024-05-23T20:12:07Z2024-05-23T20:12:07Zby Beimel, Amos. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03807-6">https://doi.org/10.1007/978-3-030-03807-6</a><br/>Format: Electronic Resources<br/>Human Aspects of IT for the Aged Population. Acceptance, Communication and Participation 4th International Conference, ITAP 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851222024-05-23T20:12:07Z2024-05-23T20:12:07Zby Zhou, Jia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92034-4">https://doi.org/10.1007/978-3-319-92034-4</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482024-05-23T20:12:07Z2024-05-23T20:12:07Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20857922024-05-23T20:12:07Z2024-05-23T20:12:07Zby Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542024-05-23T20:12:07Z2024-05-23T20:12:07Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855882024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bauer, Lujo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858932024-05-23T20:12:07Z2024-05-23T20:12:07Zby Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861242024-05-23T20:12:07Z2024-05-23T20:12:07Zby Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94523-1">https://doi.org/10.1007/978-3-319-94523-1</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XIV 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842382024-05-23T20:12:07Z2024-05-23T20:12:07Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99277-8">https://doi.org/10.1007/978-3-319-99277-8</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851342024-05-23T20:12:07Z2024-05-23T20:12:07Zby Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850522024-05-23T20:12:07Z2024-05-23T20:12:07Zby Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Modeling Decisions for Artificial Intelligence 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850592024-05-23T20:12:07Z2024-05-23T20:12:07Zby Torra, Vicenç. editor. (orcid)0000-0002-0368-8037<br/><a href="https://doi.org/10.1007/978-3-030-00202-2">https://doi.org/10.1007/978-3-030-00202-2</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20847972024-05-23T20:12:07Z2024-05-23T20:12:07Zby Matoušek, Petr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132024-05-23T20:12:07Z2024-05-23T20:12:07Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Human-Computer Interaction. Interaction Technologies 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20854582024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kurosu, Masaaki. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91250-9">https://doi.org/10.1007/978-3-319-91250-9</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302024-05-23T20:12:07Z2024-05-23T20:12:07Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292024-05-23T20:12:07Z2024-05-23T20:12:07Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846202024-05-23T20:12:07Z2024-05-23T20:12:07Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics 11th Pacific Asia Workshop. PAISI 2016, Auckland, New Zealand, April 19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852192024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chau, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31863-9">https://doi.org/10.1007/978-3-319-31863-9</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20852222024-05-23T20:12:07Z2024-05-23T20:12:07Zby Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857442024-05-23T20:12:07Z2024-05-23T20:12:07Zby Piessens, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49635-0">https://doi.org/10.1007/978-3-662-49635-0</a><br/>Format: Electronic Resources<br/>Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurityent://SD_ILS/0/SD_ILS:20860982024-05-23T20:12:07Z2024-05-23T20:12:07Zby Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53090-0">https://doi.org/10.1007/978-3-662-53090-0</a><br/>Format: Electronic Resources<br/>Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861262024-05-23T20:12:07Z2024-05-23T20:12:07Zby Camenisch, Jan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20854172024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:20843352024-05-23T20:12:07Z2024-05-23T20:12:07Zby Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Subjective Logic A Formalism for Reasoning Under Uncertaintyent://SD_ILS/0/SD_ILS:20849502024-05-23T20:12:07Z2024-05-23T20:12:07Zby Jøsang, Audun. author.<br/><a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:20845702024-05-23T20:12:07Z2024-05-23T20:12:07Zby Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848152024-05-23T20:12:07Z2024-05-23T20:12:07Zby Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850042024-05-23T20:12:07Z2024-05-23T20:12:07Zby Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282024-05-23T20:12:07Z2024-05-23T20:12:07Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20858002024-05-23T20:12:07Z2024-05-23T20:12:07Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53890-6">https://doi.org/10.1007/978-3-662-53890-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852024-05-23T20:12:07Z2024-05-23T20:12:07Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks – ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857032024-05-23T20:12:07Z2024-05-23T20:12:07Zby Cheng, Long. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40663-3">https://doi.org/10.1007/978-3-319-40663-3</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856052024-05-23T20:12:07Z2024-05-23T20:12:07Zby Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860962024-05-23T20:12:07Z2024-05-23T20:12:07Zby Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format: Electronic Resources<br/>Technology and Practice of Passwords 9th International Conference, PASSWORDS 2015, Cambridge, UK, December 7–9, 2015, Proceedingsent://SD_ILS/0/SD_ILS:20855262024-05-23T20:12:07Z2024-05-23T20:12:07Zby Stajano, Frank. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29938-9">https://doi.org/10.1007/978-3-319-29938-9</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858052024-05-23T20:12:07Z2024-05-23T20:12:07Zby Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014ent://SD_ILS/0/SD_ILS:20858102024-05-23T20:12:07Z2024-05-23T20:12:07Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858122024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chen, Jiageng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20856592024-05-23T20:12:07Z2024-05-23T20:12:07Zby Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Current Trends in Web Engineering ICWE 2016 International Workshops, DUI, TELERISE, SoWeMine, and Liquid Web, Lugano, Switzerland, June 6-9, 2016. Revised Selected Papersent://SD_ILS/0/SD_ILS:20861472024-05-23T20:12:07Z2024-05-23T20:12:07Zby Casteleyn, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46963-8">https://doi.org/10.1007/978-3-319-46963-8</a><br/>Format: Electronic Resources<br/>Financial Cryptography and Data Security FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861862024-05-23T20:12:07Z2024-05-23T20:12:07Zby Clark, Jeremy. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53357-4">https://doi.org/10.1007/978-3-662-53357-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762024-05-23T20:12:07Z2024-05-23T20:12:07Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856772024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857092024-05-23T20:12:07Z2024-05-23T20:12:07Zby Pointcheval, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31517-1">https://doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Information Literacy: Key to an Inclusive Society 4th European Conference, ECIL 2016, Prague, Czech Republic, October 10-13, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842072024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kurbanoğlu, Serap. editor.<br/><a href="https://doi.org/10.1007/978-3-319-52162-6">https://doi.org/10.1007/978-3-319-52162-6</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772024-05-23T20:12:07Z2024-05-23T20:12:07Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852342024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lecomte, Thierry. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382024-05-23T20:12:07Z2024-05-23T20:12:07Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392024-05-23T20:12:07Z2024-05-23T20:12:07Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582024-05-23T20:12:07Z2024-05-23T20:12:07Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21–22, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20860622024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bécue, Adrien. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632024-05-23T20:12:07Z2024-05-23T20:12:07Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772024-05-23T20:12:07Z2024-05-23T20:12:07Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection X 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848392024-05-23T20:12:07Z2024-05-23T20:12:07Zby Rice, Mason. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48737-3">https://doi.org/10.1007/978-3-319-48737-3</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752024-05-23T20:12:07Z2024-05-23T20:12:07Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Provable Security 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854302024-05-23T20:12:07Z2024-05-23T20:12:07Zby Chen, Liqun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47422-9">https://doi.org/10.1007/978-3-319-47422-9</a><br/>Format: Electronic Resources<br/>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850852024-05-23T20:12:07Z2024-05-23T20:12:07Zby Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852152024-05-23T20:12:07Z2024-05-23T20:12:07Zby Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252024-05-23T20:12:07Z2024-05-23T20:12:07Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855572024-05-23T20:12:07Z2024-05-23T20:12:07Zby Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858012024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Privacy in Statistical Databases UNESCO Chair in Data Privacy, International Conference, PSD 2016, Dubrovnik, Croatia, September 14–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861512024-05-23T20:12:07Z2024-05-23T20:12:07Zby Domingo-Ferrer, Josep. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45381-1">https://doi.org/10.1007/978-3-319-45381-1</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861532024-05-23T20:12:07Z2024-05-23T20:12:07Zby Tryfonas, Theo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860592024-05-23T20:12:07Z2024-05-23T20:12:07Zby Cheon, Jung Hee. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53887-6">https://doi.org/10.1007/978-3-662-53887-6</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USAent://SD_ILS/0/SD_ILS:20872452024-05-23T20:12:07Z2024-05-23T20:12:07Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052024-05-23T20:12:07Z2024-05-23T20:12:07Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Technology and Intimacy: Choice or Coercion 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20845052024-05-23T20:12:07Z2024-05-23T20:12:07Zby Kreps, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44805-3">https://doi.org/10.1007/978-3-319-44805-3</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162024-05-23T20:12:07Z2024-05-23T20:12:07Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 10th International Conference, CRITIS 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850972024-05-23T20:12:07Z2024-05-23T20:12:07Zby Rome, Erich. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33331-1">https://doi.org/10.1007/978-3-319-33331-1</a><br/>Format: Electronic Resources<br/>Thinking security : stopping next year's hackersent://SD_ILS/0/SD_ILS:23089322024-05-23T20:12:07Z2024-05-23T20:12:07Zby Bellovin, Steven M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar">https://go.oreilly.com/library-access/library/view/-/9780134278223/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223">https://learning.oreilly.com/library/view/~/9780134278223</a>
<a href="https://learning.oreilly.com/library/view/~/9780134278223/?ar">https://learning.oreilly.com/library/view/~/9780134278223/?ar</a><br/>Format: Electronic Resources<br/>Control engineering and information systems : proceedings of the 2014 International Conference on Control Engineering and Information System (ICCEIS2014), Yueyang, Hunan, China, 20-22 June 2014ent://SD_ILS/0/SD_ILS:23056072024-05-23T20:12:07Z2024-05-23T20:12:07Zby International Conference on Control Engineering and Information Systems (2014 : Yueyang, Hunan Sheng, China), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781138026858/?ar">https://learning.oreilly.com/library/view/~/9781138026858/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781138026858">https://learning.oreilly.com/library/view/~/9781138026858</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar">https://go.oreilly.com/library-access/library/view/-/9781138026858/?ar</a><br/>Format: Electronic Resources<br/>The privacy engineer's manifesto : getting from policy to code to QA to valueent://SD_ILS/0/SD_ILS:23022962024-05-23T20:12:07Z2024-05-23T20:12:07Zby Dennedy, Michelle Finneran.<br/><a href="https://learning.oreilly.com/library/view/~/9781430263555">https://learning.oreilly.com/library/view/~/9781430263555</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar">https://go.oreilly.com/library-access/library/view/-/9781430263555/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430263555/?ar">https://learning.oreilly.com/library/view/~/9781430263555/?ar</a><br/>Format: Electronic Resources<br/>The basics of information security : understanding the fundamentals of InfoSec in theory and practiceent://SD_ILS/0/SD_ILS:23032942024-05-23T20:12:07Z2024-05-23T20:12:07Zby Andress, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007440/?ar">https://learning.oreilly.com/library/view/~/9780128007440/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007440/?ar</a><br/>Format: Electronic Resources<br/>Practical anonymity hiding in plain sight onlineent://SD_ILS/0/SD_ILS:22061652024-05-23T20:12:07Z2024-05-23T20:12:07Zby Loshin, Peter.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1115167">Click to View</a><br/>Format: Electronic Resources<br/>Pro ASP.NET web API security : securing ASP.NET web APIent://SD_ILS/0/SD_ILS:22986142024-05-23T20:12:07Z2024-05-23T20:12:07Zby Lakshmiraghavan, Badrinarayanan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar">https://go.oreilly.com/library-access/library/view/-/9781430257820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430257820/?ar">https://learning.oreilly.com/library/view/~/9781430257820/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430257820">https://learning.oreilly.com/library/view/~/9781430257820</a><br/>Format: Electronic Resources<br/>Managing risk and information security : protect to enableent://SD_ILS/0/SD_ILS:22973262024-05-23T20:12:07Z2024-05-23T20:12:07Zby Harkins, Malcolm.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar">https://go.oreilly.com/library-access/library/view/-/9781430251132/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781430251132">https://learning.oreilly.com/library/view/~/9781430251132</a>
<a href="https://learning.oreilly.com/library/view/~/9781430251132/?ar">https://learning.oreilly.com/library/view/~/9781430251132/?ar</a><br/>Format: Electronic Resources<br/>Adaptive Security Management Architectureent://SD_ILS/0/SD_ILS:23260642024-05-23T20:12:07Z2024-05-23T20:12:07Zby Tiller, James S.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013375">https://learning.oreilly.com/library/view/~/9781420013375</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013375/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013375/?ar">https://learning.oreilly.com/library/view/~/9781420013375/?ar</a><br/>Format: Electronic Resources<br/>SSCP Systems Security Certified Practitioner Study Guide and DVD Training System.ent://SD_ILS/0/SD_ILS:11921142024-05-23T20:12:07Z2024-05-23T20:12:07Zby Syngress.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=294375">Click to View</a><br/>Format: Electronic Resources<br/>