Search Results for - Narrowed by: Telecommunication. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300? 2024-06-01T10:34:32Z Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:2084049 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:2084248 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:2087931 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/> Integration, Interconnection, and Interoperability of IoT Systems ent://SD_ILS/0/SD_ILS:2087421 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications ent://SD_ILS/0/SD_ILS:2086549 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Applications ALAP 2018 ent://SD_ILS/0/SD_ILS:2086488 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:2086375 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:2086678 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Security in Wireless Cooperative Networks ent://SD_ILS/0/SD_ILS:2086224 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Wang, Li. author.<br/><a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Proceedings of ICICT 2016 ent://SD_ILS/0/SD_ILS:2086355 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Mishra, Durgesh Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085370 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format:&#160;Electronic Resources<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:2088295 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/> Inside Radio: An Attack and Defense Guide ent://SD_ILS/0/SD_ILS:2084695 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:2086980 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:2087814 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:2088167 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:2087596 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 ent://SD_ILS/0/SD_ILS:2088362 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0767-5">https://doi.org/10.1007/978-981-10-0767-5</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:2087608 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 ent://SD_ILS/0/SD_ILS:2087441 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0755-2">https://doi.org/10.1007/978-981-10-0755-2</a><br/>Format:&#160;Electronic Resources<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:2087733 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:2085006 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/> Physical and Data-Link Security Techniques for Future Communication Systems ent://SD_ILS/0/SD_ILS:2087375 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-23609-4">https://doi.org/10.1007/978-3-319-23609-4</a><br/>Format:&#160;Electronic Resources<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:2086381 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:2087705 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Pricop, Emil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:2087893 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:2084088 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Android Application Security A Semantics and Context-Aware Approach ent://SD_ILS/0/SD_ILS:2084366 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:2084785 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:2084787 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085100 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085722 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format:&#160;Electronic Resources<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:2084436 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Selmic, Rastko R. author.<br/><a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/> Physical-Layer Security for Cooperative Relay Networks ent://SD_ILS/0/SD_ILS:2084709 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:2084515 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN &amp; PDCAT 2015 ent://SD_ILS/0/SD_ILS:2084949 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:2086515 2024-06-01T10:34:32Z 2024-06-01T10:34:32Z by&#160;Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/>