Search Results for - Narrowed by: Telecommunication. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2024-06-01T10:34:32ZWireless Communications under Hostile Jamming: Security and Efficiencyent://SD_ILS/0/SD_ILS:20840492024-06-01T10:34:32Z2024-06-01T10:34:32Zby Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:20842482024-06-01T10:34:32Z2024-06-01T10:34:32Zby Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 2ent://SD_ILS/0/SD_ILS:20879312024-06-01T10:34:32Z2024-06-01T10:34:32Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Electronic Resources<br/>Integration, Interconnection, and Interoperability of IoT Systemsent://SD_ILS/0/SD_ILS:20874212024-06-01T10:34:32Z2024-06-01T10:34:32Zby Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format: Electronic Resources<br/>Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applicationsent://SD_ILS/0/SD_ILS:20865492024-06-01T10:34:32Z2024-06-01T10:34:32Zby Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Electronic Resources<br/>Algorithms and Applications ALAP 2018ent://SD_ILS/0/SD_ILS:20864882024-06-01T10:34:32Z2024-06-01T10:34:32Zby Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:20863752024-06-01T10:34:32Z2024-06-01T10:34:32Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017ent://SD_ILS/0/SD_ILS:20866782024-06-01T10:34:32Z2024-06-01T10:34:32Zby Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Physical Layer Security in Wireless Cooperative Networksent://SD_ILS/0/SD_ILS:20862242024-06-01T10:34:32Z2024-06-01T10:34:32Zby Wang, Li. author.<br/><a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Proceedings of ICICT 2016ent://SD_ILS/0/SD_ILS:20863552024-06-01T10:34:32Z2024-06-01T10:34:32Zby Mishra, Durgesh Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853702024-06-01T10:34:32Z2024-06-01T10:34:32Zby Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>Computer and Network Security Essentialsent://SD_ILS/0/SD_ILS:20882952024-06-01T10:34:32Z2024-06-01T10:34:32Zby Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Inside Radio: An Attack and Defense Guideent://SD_ILS/0/SD_ILS:20846952024-06-01T10:34:32Z2024-06-01T10:34:32Zby Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802024-06-01T10:34:32Z2024-06-01T10:34:32Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Practical Information Security A Competency-Based Education Courseent://SD_ILS/0/SD_ILS:20878142024-06-01T10:34:32Z2024-06-01T10:34:32Zby Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Electronic Resources<br/>Sustainable Interdependent Networks From Theory to Applicationent://SD_ILS/0/SD_ILS:20881672024-06-01T10:34:32Z2024-06-01T10:34:32Zby Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 1ent://SD_ILS/0/SD_ILS:20875962024-06-01T10:34:32Z2024-06-01T10:34:32Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:20883622024-06-01T10:34:32Z2024-06-01T10:34:32Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0767-5">https://doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:20876082024-06-01T10:34:32Z2024-06-01T10:34:32Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2ent://SD_ILS/0/SD_ILS:20874412024-06-01T10:34:32Z2024-06-01T10:34:32Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0755-2">https://doi.org/10.1007/978-981-10-0755-2</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:20877332024-06-01T10:34:32Z2024-06-01T10:34:32Zby Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:20850062024-06-01T10:34:32Z2024-06-01T10:34:32Zby Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:20873752024-06-01T10:34:32Z2024-06-01T10:34:32Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-23609-4">https://doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20863812024-06-01T10:34:32Z2024-06-01T10:34:32Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:20877052024-06-01T10:34:32Z2024-06-01T10:34:32Zby Pricop, Emil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:20878932024-06-01T10:34:32Z2024-06-01T10:34:32Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:20840882024-06-01T10:34:32Z2024-06-01T10:34:32Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Android Application Security A Semantics and Context-Aware Approachent://SD_ILS/0/SD_ILS:20843662024-06-01T10:34:32Z2024-06-01T10:34:32Zby Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:20847852024-06-01T10:34:32Z2024-06-01T10:34:32Zby Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:20847872024-06-01T10:34:32Z2024-06-01T10:34:32Zby Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20851002024-06-01T10:34:32Z2024-06-01T10:34:32Zby Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857222024-06-01T10:34:32Z2024-06-01T10:34:32Zby Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Wireless Sensor Networks Security, Coverage, and Localizationent://SD_ILS/0/SD_ILS:20844362024-06-01T10:34:32Z2024-06-01T10:34:32Zby Selmic, Rastko R. author.<br/><a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:20847092024-06-01T10:34:32Z2024-06-01T10:34:32Zby Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:20845152024-06-01T10:34:32Z2024-06-01T10:34:32Zby Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:20849492024-06-01T10:34:32Z2024-06-01T10:34:32Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20865152024-06-01T10:34:32Z2024-06-01T10:34:32Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>