Search Results for - Narrowed by: Computer security. - Computer software. - Information Systems Applications (incl. Internet). SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$0026ps$003d300? 2024-06-23T01:04:12Z Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085552 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085862 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Chellappan, Sriram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086006 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085675 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085089 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085428 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085218 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085557 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085224 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086096 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086087 2024-06-23T01:04:12Z 2024-06-23T01:04:12Z by&#160;Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/>