Search Results for - Narrowed by: Data Structures, Cryptology and Information Theory. - Information systems.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Information$002bsystems.$002509Information$002bsystems.$0026ps$003d300$0026isd$003dtrue?2024-09-27T03:25:37ZAdvances in Ad Hoc Networking Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25–27, 2008ent://SD_ILS/0/SD_ILS:5015232024-09-27T03:25:37Z2024-09-27T03:25:37Zby Cuenca, Pedro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09490-8">http://dx.doi.org/10.1007/978-0-387-09490-8</a><br/>Format: Electronic Resources<br/>Insider Attack and Cyber Security Beyond the Hackerent://SD_ILS/0/SD_ILS:5019132024-09-27T03:25:37Z2024-09-27T03:25:37Zby Stolfo, Salvatore J. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Vulnerability Analysis and Defense for the Internetent://SD_ILS/0/SD_ILS:5017872024-09-27T03:25:37Z2024-09-27T03:25:37Zby Singh, Abhishek. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Botnet Detection Countering the Largest Security Threatent://SD_ILS/0/SD_ILS:5016272024-09-27T03:25:37Z2024-09-27T03:25:37Zby Lee, Wenke. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Intrusion Detection Systemsent://SD_ILS/0/SD_ILS:5019102024-09-27T03:25:37Z2024-09-27T03:25:37Zby Mancini, Luigi V. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Privacy-Respecting Intrusion Detectionent://SD_ILS/0/SD_ILS:5057892024-09-27T03:25:37Z2024-09-27T03:25:37Zby Flegel, Ulrich. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Online Business Security Systemsent://SD_ILS/0/SD_ILS:5058322024-09-27T03:25:37Z2024-09-27T03:25:37Zby Williams, Godfried B. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format: Electronic Resources<br/>Secure Data Management in Decentralized Systemsent://SD_ILS/0/SD_ILS:5046902024-09-27T03:25:37Z2024-09-27T03:25:37Zby Yu, Ting. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Trust in Modern Data Managementent://SD_ILS/0/SD_ILS:5121932024-09-27T03:25:37Z2024-09-27T03:25:37Zby Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Electronic Resources<br/>Exploratory Data Analysis Using Fisher Informationent://SD_ILS/0/SD_ILS:5086792024-09-27T03:25:37Z2024-09-27T03:25:37Zby Frieden, B. Roy. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-84628-777-0">http://dx.doi.org/10.1007/978-1-84628-777-0</a><br/>Format: Electronic Resources<br/>Synchronizing Internet Protocol Security (SIPSec)ent://SD_ILS/0/SD_ILS:5058142024-09-27T03:25:37Z2024-09-27T03:25:37Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format: Electronic Resources<br/>Network Security Policies and Proceduresent://SD_ILS/0/SD_ILS:5056592024-09-27T03:25:37Z2024-09-27T03:25:37Zby Frye, Douglas W. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format: Electronic Resources<br/>Electronic Postage Systems Technology, Security, Economicsent://SD_ILS/0/SD_ILS:5055712024-09-27T03:25:37Z2024-09-27T03:25:37Zby Bleumer, Gerrit. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format: Electronic Resources<br/>Practical Internet Securityent://SD_ILS/0/SD_ILS:5049522024-09-27T03:25:37Z2024-09-27T03:25:37Zby Vacca, John R. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format: Electronic Resources<br/>Preserving Privacy in On-Line Analytical Processing (OLAP)ent://SD_ILS/0/SD_ILS:5056112024-09-27T03:25:37Z2024-09-27T03:25:37Zby Wang, Lingyu. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format: Electronic Resources<br/>Access Control Systems Security, Identity Management and Trust Modelsent://SD_ILS/0/SD_ILS:5046922024-09-27T03:25:37Z2024-09-27T03:25:37Zby Benantar, Messaoud. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format: Electronic Resources<br/>Intelligence and Security Informatics for International Security Information Sharing and Data Miningent://SD_ILS/0/SD_ILS:5049852024-09-27T03:25:37Z2024-09-27T03:25:37Zby Chen, Hsinchun. author.<br/><a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format: Electronic Resources<br/>Data Science and Classificationent://SD_ILS/0/SD_ILS:5111182024-09-27T03:25:37Z2024-09-27T03:25:37Zby Batagelj, Vladimir. editor.<br/><a href="http://dx.doi.org/10.1007/3-540-34416-0">http://dx.doi.org/10.1007/3-540-34416-0</a><br/>Format: Electronic Resources<br/>Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedingsent://SD_ILS/0/SD_ILS:5097202024-09-27T03:25:37Z2024-09-27T03:25:37Zby Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format: Electronic Resources<br/>Net-Centric Approaches to Intelligence and National Securityent://SD_ILS/0/SD_ILS:5044992024-09-27T03:25:37Z2024-09-27T03:25:37Zby Ladner, Roy. editor.<br/><a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format: Electronic Resources<br/>Coding for Data and Computer Communicationsent://SD_ILS/0/SD_ILS:5042262024-09-27T03:25:37Z2024-09-27T03:25:37Zby Salomon, David. author.<br/><a href="http://dx.doi.org/10.1007/b102531">http://dx.doi.org/10.1007/b102531</a><br/>Format: Electronic Resources<br/>Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22–27, 2004, Toulouse, Franceent://SD_ILS/0/SD_ILS:5042642024-09-27T03:25:37Z2024-09-27T03:25:37Zby Dimitrakos, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format: Electronic Resources<br/>Privacy, Security and Trust within the Context of Pervasive Computingent://SD_ILS/0/SD_ILS:5041712024-09-27T03:25:37Z2024-09-27T03:25:37Zby Robinson, Philip. editor.<br/><a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format: Electronic Resources<br/>Security in E-Learningent://SD_ILS/0/SD_ILS:5044802024-09-27T03:25:37Z2024-09-27T03:25:37Zby Weippl, Edgar. author.<br/><a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format: Electronic Resources<br/>Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES)ent://SD_ILS/0/SD_ILS:5045242024-09-27T03:25:37Z2024-09-27T03:25:37Zby Shoniregun, Charles A. author.<br/><a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format: Electronic Resources<br/>Evolutionary Multiobjective Optimization Theoretical Advances and Applicationsent://SD_ILS/0/SD_ILS:5083922024-09-27T03:25:37Z2024-09-27T03:25:37Zby Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-137-7">http://dx.doi.org/10.1007/1-84628-137-7</a><br/>Format: Electronic Resources<br/>Intelligent Knowledge-Based Systems Business and Technology in the New Millenniument://SD_ILS/0/SD_ILS:5076822024-09-27T03:25:37Z2024-09-27T03:25:37Zby Leondes, Cornelius T. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4020-7829-3">http://dx.doi.org/10.1007/978-1-4020-7829-3</a><br/>Format: Electronic Resources<br/>Intrusion Detection and Correlation Challenges and Solutionsent://SD_ILS/0/SD_ILS:5041652024-09-27T03:25:37Z2024-09-27T03:25:37Zby Kruegel, Christopher. author.<br/><a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format: Electronic Resources<br/>Enterprise Information Systems Vent://SD_ILS/0/SD_ILS:5062622024-09-27T03:25:37Z2024-09-27T03:25:37Zby Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-2673-0">http://dx.doi.org/10.1007/1-4020-2673-0</a><br/>Format: Electronic Resources<br/>Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6–9 September 2004ent://SD_ILS/0/SD_ILS:5064502024-09-27T03:25:37Z2024-09-27T03:25:37Zby Kowalik, Janusz S. editor.<br/><a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format: Electronic Resources<br/>The Austin Protocol Compilerent://SD_ILS/0/SD_ILS:5041212024-09-27T03:25:37Z2024-09-27T03:25:37Zby McGuire, Tommy M. author.<br/><a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format: Electronic Resources<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:5044252024-09-27T03:25:37Z2024-09-27T03:25:37Zby Sasaki, Ryoichi. editor.<br/><a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Advanced Techniques in Knowledge Discovery and Data Miningent://SD_ILS/0/SD_ILS:5084272024-09-27T03:25:37Z2024-09-27T03:25:37Zby Pal, Nikhil R. editor.<br/><a href="http://dx.doi.org/10.1007/1-84628-183-0">http://dx.doi.org/10.1007/1-84628-183-0</a><br/>Format: Electronic Resources<br/>