Search Results for Artificial intelligence. - Narrowed by: Data protection. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dArtificial$002bintelligence.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026te$003dILS$0026ps$003d300? 2024-09-27T06:33:25Z Artificial Intelligence Tools for Cyber Attribution ent://SD_ILS/0/SD_ILS:2084793 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Nunes, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Artificial Intelligence for Privacy Protection and Security. ent://SD_ILS/0/SD_ILS:1270705 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Solanas, Agusti.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1679374">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hacking artificial intelligence : a leader's guide from deepfakes to breaking deep learning ent://SD_ILS/0/SD_ILS:2332912 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Gibian, Davey, 1988- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar">https://go.oreilly.com/library-access/library/view/-/9781663719379/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781663719379">https://learning.oreilly.com/library/view/~/9781663719379</a> <a href="https://learning.oreilly.com/library/view/~/9781663719379/?ar">https://learning.oreilly.com/library/view/~/9781663719379/?ar</a><br/>Format:&#160;Sound recording<br/> Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084298 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640<br/><a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format:&#160;Electronic Resources<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084858 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/> Security with Intelligent Computing and Big-data Services ent://SD_ILS/0/SD_ILS:2086850 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Peng, Sheng-Lung. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:2084503 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Dehghantanha, Ali. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Electronic Resources<br/> Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084888 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Chen, Yuanfang. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometrics ent://SD_ILS/0/SD_ILS:2085025 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Gavrilova, Marina L. editor.<br/><a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24&ndash;26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085393 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Basu, Anup. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085532 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Maty&aacute;&scaron;, Vashek. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085392 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084880 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/> Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084772 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Patel, Zuber. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084813 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> 5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084498 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Long, Keping. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format:&#160;Electronic Resources<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084890 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;M. F. Kebe, Cheikh. editor.<br/><a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:2084340 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512691 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086054 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 &ndash; December 1, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085553 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Zhang, Feng. editor. (orcid)0000-0003-1983-7321<br/><a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format:&#160;Electronic Resources<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:512052 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Bella, Giampaolo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084657 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Hansen, Marit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/> How to build privacy and security into deep learning models ent://SD_ILS/0/SD_ILS:2322791 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Carmiel, Yishay, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366/?ar">https://learning.oreilly.com/videos/~/0636920339366/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339366">https://learning.oreilly.com/videos/~/0636920339366</a><br/>Format:&#160;Electronic Resources<br/> Ambient Intelligence European Conference, AmI 2008, Nuremberg, Germany, November 19-22, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503819 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Aarts, Emile. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-89617-3">http://dx.doi.org/10.1007/978-3-540-89617-3</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Intelligence and Computing 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502729 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Sandnes, Frode Eika. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69293-5">http://dx.doi.org/10.1007/978-3-540-69293-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA ent://SD_ILS/0/SD_ILS:506015 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Futcher, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:501518 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30&ndash; August 2, 2007, New Brunswick, Canada ent://SD_ILS/0/SD_ILS:506019 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Etalle, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73655-6">http://dx.doi.org/10.1007/978-0-387-73655-6</a><br/>Format:&#160;Electronic Resources<br/> Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24&ndash;16, 2008, Tokyo, Japan ent://SD_ILS/0/SD_ILS:502003 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:506014 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Pejaƛ, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/> New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14&ndash;16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:505998 2024-09-27T06:33:25Z 2024-09-27T06:33:25Z by&#160;Venter, Hein. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format:&#160;Electronic Resources<br/>