Search Results for - Narrowed by: Computer security. - Computer software. - Information Systems Applications (incl. Internet).SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware.$002509Computer$002bsoftware.$0026qf$003dSUBJECT$002509Subject$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$002509Information$002bSystems$002bApplications$002b$002528incl.$002bInternet$002529.$0026ps$003d300?2024-06-23T01:04:12ZAlgorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855522024-06-23T01:04:12Z2024-06-23T01:04:12Zby Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858622024-06-23T01:04:12Z2024-06-23T01:04:12Zby Chellappan, Sriram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062024-06-23T01:04:12Z2024-06-23T01:04:12Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 9th International Conference, IDCS 2016, Wuhan, China, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856752024-06-23T01:04:12Z2024-06-23T01:04:12Zby Li, Wenfeng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45940-0">https://doi.org/10.1007/978-3-319-45940-0</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850892024-06-23T01:04:12Z2024-06-23T01:04:12Zby Zhu, Quanyan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282024-06-23T01:04:12Z2024-06-23T01:04:12Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 12th International Conference, ICDCIT 2016, Bhubaneswar, India, January 15-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852182024-06-23T01:04:12Z2024-06-23T01:04:12Zby Bjørner, Nikolaj. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28034-9">https://doi.org/10.1007/978-3-319-28034-9</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855572024-06-23T01:04:12Z2024-06-23T01:04:12Zby Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542024-06-23T01:04:12Z2024-06-23T01:04:12Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852242024-06-23T01:04:12Z2024-06-23T01:04:12Zby Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860962024-06-23T01:04:12Z2024-06-23T01:04:12Zby Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format: Electronic Resources<br/>Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860872024-06-23T01:04:12Z2024-06-23T01:04:12Zby Livraga, Giovanni. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format: Electronic Resources<br/>