Arama Sonuçları Systems and Data Security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dSystems$002band$002bData$002bSecurity.$0026ps$003d300?dt=list2025-08-07T15:33:47ZMachine learning and security : protecting systems with data and algorithmsent://SD_ILS/0/SD_ILS:23158812025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format: Electronic Resources<br/>Physical and Data-Link Security Techniques for Future Communication Systemsent://SD_ILS/0/SD_ILS:20873752025-08-07T15:33:47Z2025-08-07T15:33:47Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-23609-4">https://doi.org/10.1007/978-3-319-23609-4</a><br/>Format: Electronic Resources<br/>Security and resilience in intelligent data-centric systems and communication networksent://SD_ILS/0/SD_ILS:22131042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format: Electronic Resources<br/>Security, privacy, and governance : protecting data, and using data to protect systemsent://SD_ILS/0/SD_ILS:23077562025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format: Electronic Resources<br/>Intelligent Data Analysis for e-Learning : Enhancing Security and Trustworthiness in Online Learning Systems.ent://SD_ILS/0/SD_ILS:23114192025-08-07T15:33:47Z2025-08-07T15:33:47Zby Miguel, Jorge.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045459/?ar">https://learning.oreilly.com/library/view/~/9780128045459/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045459">https://learning.oreilly.com/library/view/~/9780128045459</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045459/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045459/?ar</a><br/>Format: Electronic Resources<br/>Intelligent data analysis for e-Learning : enhancing security and trustworthiness in online learning systemsent://SD_ILS/0/SD_ILS:22107132025-08-07T15:33:47Z2025-08-07T15:33:47Zby Miguel, Jorge, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4675471">Click to View</a><br/>Format: Electronic Resources<br/>Governance of picture archiving and communications systems data security and quality management of filmless radiologyent://SD_ILS/0/SD_ILS:22614652025-08-07T15:33:47Z2025-08-07T15:33:47Zby Tong, Carrison K. S., 1962-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-672-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-672-3</a><br/>Format: Electronic Resources<br/>Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854422025-08-07T15:33:47Z2025-08-07T15:33:47Zby Buccafurri, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format: Electronic Resources<br/>Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846592025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mori, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format: Electronic Resources<br/>Fundamentals of Network Forensics A Research Perspectiveent://SD_ILS/0/SD_ILS:20848672025-08-07T15:33:47Z2025-08-07T15:33:47Zby Joshi, R.C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format: Electronic Resources<br/>Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USAent://SD_ILS/0/SD_ILS:5060152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Futcher, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format: Electronic Resources<br/>Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30– August 2, 2007, New Brunswick, Canadaent://SD_ILS/0/SD_ILS:5060192025-08-07T15:33:47Z2025-08-07T15:33:47Zby Etalle, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73655-6">http://dx.doi.org/10.1007/978-0-387-73655-6</a><br/>Format: Electronic Resources<br/>New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14–16 May 2007, Sandton, South Africaent://SD_ILS/0/SD_ILS:5059982025-08-07T15:33:47Z2025-08-07T15:33:47Zby Venter, Hein. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852652025-08-07T15:33:47Z2025-08-07T15:33:47Zby Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format: Electronic Resources<br/>Location Privacy in Mobile Applicationsent://SD_ILS/0/SD_ILS:20842412025-08-07T15:33:47Z2025-08-07T15:33:47Zby Liu, Bo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1705-7">https://doi.org/10.1007/978-981-13-1705-7</a><br/>Format: Electronic Resources<br/>Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859372025-08-07T15:33:47Z2025-08-07T15:33:47Zby Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format: Electronic Resources<br/>Speech and Computer 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853532025-08-07T15:33:47Z2025-08-07T15:33:47Zby Karpov, Alexey. editor. (orcid)0000-0003-3424-652X<br/><a href="https://doi.org/10.1007/978-3-319-99579-3">https://doi.org/10.1007/978-3-319-99579-3</a><br/>Format: Electronic Resources<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20846602025-08-07T15:33:47Z2025-08-07T15:33:47Zby Yuan, Hanning. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0896-3">https://doi.org/10.1007/978-981-13-0896-3</a><br/>Format: Electronic Resources<br/>Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20846722025-08-07T15:33:47Z2025-08-07T15:33:47Zby Yuan, Hanning. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0893-2">https://doi.org/10.1007/978-981-13-0893-2</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Resilience and Protectionent://SD_ILS/0/SD_ILS:5059822025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hyslop, Maitland. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">http://dx.doi.org/10.1007/978-0-387-71862-0</a><br/>Format: Electronic Resources<br/>Digital Fingerprintingent://SD_ILS/0/SD_ILS:20847382025-08-07T15:33:47Z2025-08-07T15:33:47Zby Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format: Electronic Resources<br/>Security-Aware Device-to-Device Communications Underlaying Cellular Networksent://SD_ILS/0/SD_ILS:20847872025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format: Electronic Resources<br/>Versatile Cybersecurityent://SD_ILS/0/SD_ILS:20842922025-08-07T15:33:47Z2025-08-07T15:33:47Zby Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20853592025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00009-7">https://doi.org/10.1007/978-3-030-00009-7</a><br/>Format: Electronic Resources<br/>Ten Laws for Securityent://SD_ILS/0/SD_ILS:20845272025-08-07T15:33:47Z2025-08-07T15:33:47Zby Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format: Electronic Resources<br/>Mobile Ad-hoc and Sensor Networks 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844922025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhu, Liehuang. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8890-2">https://doi.org/10.1007/978-981-10-8890-2</a><br/>Format: Electronic Resources<br/>Security in Network Codingent://SD_ILS/0/SD_ILS:20850062025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format: Electronic Resources<br/>Elements of Cloud Storage Security Concepts, Designs and Optimized Practicesent://SD_ILS/0/SD_ILS:20842952025-08-07T15:33:47Z2025-08-07T15:33:47Zby Galibus, Tatiana. author.<br/><a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format: Electronic Resources<br/>Cybersecurity in Germanyent://SD_ILS/0/SD_ILS:20841362025-08-07T15:33:47Z2025-08-07T15:33:47Zby Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format: Electronic Resources<br/>Android Application Security A Semantics and Context-Aware Approachent://SD_ILS/0/SD_ILS:20843662025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology – ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858772025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format: Electronic Resources<br/>Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841122025-08-07T15:33:47Z2025-08-07T15:33:47Zby Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format: Electronic Resources<br/>Physical Layer Security in Wireless Cooperative Networksent://SD_ILS/0/SD_ILS:20862242025-08-07T15:33:47Z2025-08-07T15:33:47Zby Wang, Li. author.<br/><a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format: Electronic Resources<br/>Recent Advances in Systems Safety and Securityent://SD_ILS/0/SD_ILS:20877052025-08-07T15:33:47Z2025-08-07T15:33:47Zby Pricop, Emil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format: Electronic Resources<br/>Cyber Security Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:20869152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Autonomous Agents and Multiagent Systems AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20858272025-08-07T15:33:47Z2025-08-07T15:33:47Zby Osman, Nardine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46840-2">https://doi.org/10.1007/978-3-319-46840-2</a><br/>Format: Electronic Resources<br/>Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detectionent://SD_ILS/0/SD_ILS:20867092025-08-07T15:33:47Z2025-08-07T15:33:47Zby Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format: Electronic Resources<br/>Dependability Metrics Advanced Lecturesent://SD_ILS/0/SD_ILS:5026932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Eusgeld, Irene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68947-8">http://dx.doi.org/10.1007/978-3-540-68947-8</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854982025-08-07T15:33:47Z2025-08-07T15:33:47Zby Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 1ent://SD_ILS/0/SD_ILS:20874432025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2650-5">https://doi.org/10.1007/978-81-322-2650-5</a><br/>Format: Electronic Resources<br/>Introduction to Security Reductionent://SD_ILS/0/SD_ILS:20841282025-08-07T15:33:47Z2025-08-07T15:33:47Zby Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume 2ent://SD_ILS/0/SD_ILS:20883582025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2653-6">https://doi.org/10.1007/978-81-322-2653-6</a><br/>Format: Electronic Resources<br/>Emerging Technologies in Computing First International Conference, iCETiC 2018, London, UK, August 23–24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20841472025-08-07T15:33:47Z2025-08-07T15:33:47Zby Miraz, Mahdi H. editor. (orcid)0000-0002-6795-7048<br/><a href="https://doi.org/10.1007/978-3-319-95450-9">https://doi.org/10.1007/978-3-319-95450-9</a><br/>Format: Electronic Resources<br/>Designing Usable and Secure Software with IRIS and CAIRISent://SD_ILS/0/SD_ILS:20847732025-08-07T15:33:47Z2025-08-07T15:33:47Zby Faily, Shamal. author.<br/><a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format: Electronic Resources<br/>Understanding Social Engineering Based Scamsent://SD_ILS/0/SD_ILS:20847042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Jakobsson, Markus. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format: Electronic Resources<br/>Secure System Design and Trustable Computingent://SD_ILS/0/SD_ILS:20875142025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chang, Chip-Hong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format: Electronic Resources<br/>Subjective Logic A Formalism for Reasoning Under Uncertaintyent://SD_ILS/0/SD_ILS:20849502025-08-07T15:33:47Z2025-08-07T15:33:47Zby Jøsang, Audun. author.<br/><a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format: Electronic Resources<br/>Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprisesent://SD_ILS/0/SD_ILS:20845762025-08-07T15:33:47Z2025-08-07T15:33:47Zby Pierer, Markus. author.<br/><a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format: Electronic Resources<br/>Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20845202025-08-07T15:33:47Z2025-08-07T15:33:47Zby You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format: Electronic Resources<br/>Big Data Concepts, Theories, and Applicationsent://SD_ILS/0/SD_ILS:20847512025-08-07T15:33:47Z2025-08-07T15:33:47Zby Yu, Shui. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format: Electronic Resources<br/>Computer Vision – ECCV 2018 15th European Conference, Munich, Germany, September 8–14, 2018, Proceedings, Part Vent://SD_ILS/0/SD_ILS:20851612025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ferrari, Vittorio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01228-1">https://doi.org/10.1007/978-3-030-01228-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20845112025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857222025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Fiveent://SD_ILS/0/SD_ILS:20870302025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format: Electronic Resources<br/>Advanced Computing and Systems for Security Volume Sixent://SD_ILS/0/SD_ILS:20863692025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20844812025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format: Electronic Resources<br/>Information and Communication Technology Proceedings of ICICT 2016ent://SD_ILS/0/SD_ILS:20863552025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mishra, Durgesh Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846192025-08-07T15:33:47Z2025-08-07T15:33:47Zby Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format: Electronic Resources<br/>Moving Target Defense for Distributed Systemsent://SD_ILS/0/SD_ILS:20845152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format: Electronic Resources<br/>Privacy-Enhancing Aggregation Techniques for Smart Grid Communicationsent://SD_ILS/0/SD_ILS:20847852025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format: Electronic Resources<br/>Elements of Cloud Computing Security A Survey of Key Practicalitiesent://SD_ILS/0/SD_ILS:20843352025-08-07T15:33:47Z2025-08-07T15:33:47Zby Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format: Electronic Resources<br/>Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10–11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857782025-08-07T15:33:47Z2025-08-07T15:33:47Zby Güneysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20861442025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format: Electronic Resources<br/>Boolean Functions and Their Applications in Cryptographyent://SD_ILS/0/SD_ILS:20845702025-08-07T15:33:47Z2025-08-07T15:33:47Zby Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format: Electronic Resources<br/>Industrial Espionage and Technical Surveillance Counter Measurersent://SD_ILS/0/SD_ILS:20877332025-08-07T15:33:47Z2025-08-07T15:33:47Zby Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format: Electronic Resources<br/>VoIP and PBX Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20863812025-08-07T15:33:47Z2025-08-07T15:33:47Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format: Electronic Resources<br/>Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 1ent://SD_ILS/0/SD_ILS:20875962025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format: Electronic Resources<br/>IT Convergence and Security 2017 Volume 2ent://SD_ILS/0/SD_ILS:20879312025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859212025-08-07T15:33:47Z2025-08-07T15:33:47Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format: Electronic Resources<br/>Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847772025-08-07T15:33:47Z2025-08-07T15:33:47Zby Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format: Electronic Resources<br/>Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20851002025-08-07T15:33:47Z2025-08-07T15:33:47Zby Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015ent://SD_ILS/0/SD_ILS:20864712025-08-07T15:33:47Z2025-08-07T15:33:47Zby Senthilkumar, Muthukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0251-9">https://doi.org/10.1007/978-981-10-0251-9</a><br/>Format: Electronic Resources<br/>Mobile Phone Security and Forensics A Practical Approachent://SD_ILS/0/SD_ILS:20865152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format: Electronic Resources<br/>Watermarking Securityent://SD_ILS/0/SD_ILS:20870952025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bas, Patrick. author.<br/><a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format: Electronic Resources<br/>Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860172025-08-07T15:33:47Z2025-08-07T15:33:47Zby Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format: Electronic Resources<br/>Wireless Sensor Networks Security, Coverage, and Localizationent://SD_ILS/0/SD_ILS:20844362025-08-07T15:33:47Z2025-08-07T15:33:47Zby Selmic, Rastko R. author.<br/><a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format: Electronic Resources<br/>Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858022025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format: Electronic Resources<br/>Advanced Monitoring in P2P Botnets A Dual Perspectiveent://SD_ILS/0/SD_ILS:20844732025-08-07T15:33:47Z2025-08-07T15:33:47Zby Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format: Electronic Resources<br/>Integration, Interconnection, and Interoperability of IoT Systemsent://SD_ILS/0/SD_ILS:20874212025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format: Electronic Resources<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20844332025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:20848032025-08-07T15:33:47Z2025-08-07T15:33:47Zby Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Electronic Resources<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:20847542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Rowe, Neil C. author.<br/><a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017ent://SD_ILS/0/SD_ILS:20866782025-08-07T15:33:47Z2025-08-07T15:33:47Zby Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format: Electronic Resources<br/>Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20846852025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mueller, Peter. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format: Electronic Resources<br/>Modern Data Strategyent://SD_ILS/0/SD_ILS:20847522025-08-07T15:33:47Z2025-08-07T15:33:47Zby Fleckenstein, Mike. author.<br/><a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format: Electronic Resources<br/>Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015ent://SD_ILS/0/SD_ILS:20846472025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mejia, Jezreel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-26285-7">https://doi.org/10.1007/978-3-319-26285-7</a><br/>Format: Electronic Resources<br/>Security and Resiliency Analytics for Smart Grids Static and Dynamic Approachesent://SD_ILS/0/SD_ILS:20847562025-08-07T15:33:47Z2025-08-07T15:33:47Zby Al-Shaer, Ehab. author.<br/><a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format: Electronic Resources<br/>Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applicationsent://SD_ILS/0/SD_ILS:20865492025-08-07T15:33:47Z2025-08-07T15:33:47Zby Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2ent://SD_ILS/0/SD_ILS:20874412025-08-07T15:33:47Z2025-08-07T15:33:47Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0755-2">https://doi.org/10.1007/978-981-10-0755-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1ent://SD_ILS/0/SD_ILS:20883622025-08-07T15:33:47Z2025-08-07T15:33:47Zby Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0767-5">https://doi.org/10.1007/978-981-10-0767-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20847162025-08-07T15:33:47Z2025-08-07T15:33:47Zby Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format: Electronic Resources<br/>Practical Information Security A Competency-Based Education Courseent://SD_ILS/0/SD_ILS:20878142025-08-07T15:33:47Z2025-08-07T15:33:47Zby Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format: Electronic Resources<br/>Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841372025-08-07T15:33:47Z2025-08-07T15:33:47Zby Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format: Electronic Resources<br/>Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852422025-08-07T15:33:47Z2025-08-07T15:33:47Zby Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format: Electronic Resources<br/>Designing for a Digital and Globalized World 13th International Conference, DESRIST 2018, Chennai, India, June 3–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chatterjee, Samir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91800-6">https://doi.org/10.1007/978-3-319-91800-6</a><br/>Format: Electronic Resources<br/>Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850632025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bushnell, Linda. editor. (orcid)0000-0002-8751-2409<br/><a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format: Electronic Resources<br/>Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859532025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format: Electronic Resources<br/>E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20–22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849982025-08-07T15:33:47Z2025-08-07T15:33:47Zby Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30222-5">https://doi.org/10.1007/978-3-319-30222-5</a><br/>Format: Electronic Resources<br/>Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852122025-08-07T15:33:47Z2025-08-07T15:33:47Zby Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format: Electronic Resources<br/>Information Technology: New Generations 13th International Conference on Information Technologyent://SD_ILS/0/SD_ILS:20868842025-08-07T15:33:47Z2025-08-07T15:33:47Zby Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32467-8">https://doi.org/10.1007/978-3-319-32467-8</a><br/>Format: Electronic Resources<br/>Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applicationsent://SD_ILS/0/SD_ILS:20850092025-08-07T15:33:47Z2025-08-07T15:33:47Zby Liu, Wen Ming. author.<br/><a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format: Electronic Resources<br/>Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysisent://SD_ILS/0/SD_ILS:20841222025-08-07T15:33:47Z2025-08-07T15:33:47Zby Nakahara Jr., Jorge. author.<br/><a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format: Electronic Resources<br/>Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedingsent://SD_ILS/0/SD_ILS:20846392025-08-07T15:33:47Z2025-08-07T15:33:47Zby Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28910-6">https://doi.org/10.1007/978-3-319-28910-6</a><br/>Format: Electronic Resources<br/>Mobile and Wireless Technologies 2016ent://SD_ILS/0/SD_ILS:20878932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format: Electronic Resources<br/>Women in Security Changing the Face of Technology and Innovationent://SD_ILS/0/SD_ILS:20880522025-08-07T15:33:47Z2025-08-07T15:33:47Zby Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20851512025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Cyber-security of SCADA and Other Industrial Control Systemsent://SD_ILS/0/SD_ILS:20847572025-08-07T15:33:47Z2025-08-07T15:33:47Zby Colbert, Edward J. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format: Electronic Resources<br/>Simulation and Synthesis in Medical Imaging Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855092025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gooya, Ali. editor. (orcid)0000-0001-5135-4800<br/><a href="https://doi.org/10.1007/978-3-030-00536-8">https://doi.org/10.1007/978-3-030-00536-8</a><br/>Format: Electronic Resources<br/>Social Network Analysis in Predictive Policing Concepts, Models and Methodsent://SD_ILS/0/SD_ILS:20846272025-08-07T15:33:47Z2025-08-07T15:33:47Zby Tayebi, Mohammad A. author.<br/><a href="https://doi.org/10.1007/978-3-319-41492-8">https://doi.org/10.1007/978-3-319-41492-8</a><br/>Format: Electronic Resources<br/>Internet and Distributed Computing Systems 11th International Conference, IDCS 2018, Tokyo, Japan, October 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02738-4">https://doi.org/10.1007/978-3-030-02738-4</a><br/>Format: Electronic Resources<br/>Ad-hoc, Mobile, and Wireless Networks 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedingsent://SD_ILS/0/SD_ILS:20852792025-08-07T15:33:47Z2025-08-07T15:33:47Zby Montavont, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00247-3">https://doi.org/10.1007/978-3-030-00247-3</a><br/>Format: Electronic Resources<br/>Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851342025-08-07T15:33:47Z2025-08-07T15:33:47Zby Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format: Electronic Resources<br/>Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20850852025-08-07T15:33:47Z2025-08-07T15:33:47Zby Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format: Electronic Resources<br/>Computer and Network Security Essentialsent://SD_ILS/0/SD_ILS:20882952025-08-07T15:33:47Z2025-08-07T15:33:47Zby Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format: Electronic Resources<br/>Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japanent://SD_ILS/0/SD_ILS:5020032025-08-07T15:33:47Z2025-08-07T15:33:47Zby Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format: Electronic Resources<br/>Physical-Layer Security for Cooperative Relay Networksent://SD_ILS/0/SD_ILS:20847092025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IIIent://SD_ILS/0/SD_ILS:20853992025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format: Electronic Resources<br/>Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850702025-08-07T15:33:47Z2025-08-07T15:33:47Zby Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794<br/><a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format: Electronic Resources<br/>Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852432025-08-07T15:33:47Z2025-08-07T15:33:47Zby Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5–6, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854992025-08-07T15:33:47Z2025-08-07T15:33:47Zby Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26–27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858482025-08-07T15:33:47Z2025-08-07T15:33:47Zby Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format: Electronic Resources<br/>Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24–26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20848812025-08-07T15:33:47Z2025-08-07T15:33:47Zby Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857472025-08-07T15:33:47Z2025-08-07T15:33:47Zby Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format: Electronic Resources<br/>Future Data and Security Engineering 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03192-3">https://doi.org/10.1007/978-3-030-03192-3</a><br/>Format: Electronic Resources<br/>Cyber Deception Building the Scientific Foundationent://SD_ILS/0/SD_ILS:20840882025-08-07T15:33:47Z2025-08-07T15:33:47Zby Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:20847222025-08-07T15:33:47Z2025-08-07T15:33:47Zby Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Securityent://SD_ILS/0/SD_ILS:20863752025-08-07T15:33:47Z2025-08-07T15:33:47Zby Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format: Electronic Resources<br/>Computer Performance Engineering 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20854002025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bakhshi, Rena. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02227-3">https://doi.org/10.1007/978-3-030-02227-3</a><br/>Format: Electronic Resources<br/>Progress in Artificial Intelligence and Pattern Recognition 6th International Workshop, IWAIPR 2018, Havana, Cuba, September 24–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853602025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hernández Heredia, Yanio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01132-1">https://doi.org/10.1007/978-3-030-01132-1</a><br/>Format: Electronic Resources<br/>Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20840692025-08-07T15:33:47Z2025-08-07T15:33:47Zby Shi, Zhongzhi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848772025-08-07T15:33:47Z2025-08-07T15:33:47Zby Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format: Electronic Resources<br/>Cryptographic Hardware and Embedded Systems – CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852562025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format: Electronic Resources<br/>Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17–21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853512025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format: Electronic Resources<br/>Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21–22, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:20857282025-08-07T15:33:47Z2025-08-07T15:33:47Zby Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format: Electronic Resources<br/>Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN & PDCAT 2015ent://SD_ILS/0/SD_ILS:20849492025-08-07T15:33:47Z2025-08-07T15:33:47Zby Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format: Electronic Resources<br/>Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857322025-08-07T15:33:47Z2025-08-07T15:33:47Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format: Electronic Resources<br/>Internet of Vehicles. Technologies and Services Towards Smart City 5th International Conference, IOV 2018, Paris, France, November 20–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852442025-08-07T15:33:47Z2025-08-07T15:33:47Zby Skulimowski, Andrzej M.J. editor. (orcid)0000-0003-0646-2858<br/><a href="https://doi.org/10.1007/978-3-030-05081-8">https://doi.org/10.1007/978-3-030-05081-8</a><br/>Format: Electronic Resources<br/>Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20840672025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format: Electronic Resources<br/>Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859862025-08-07T15:33:47Z2025-08-07T15:33:47Zby Badonnel, Rémi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format: Electronic Resources<br/>Cyber Security: Power and Technologyent://SD_ILS/0/SD_ILS:20869802025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format: Electronic Resources<br/>Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857902025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format: Electronic Resources<br/>Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848802025-08-07T15:33:47Z2025-08-07T15:33:47Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format: Electronic Resources<br/>Wireless Communications under Hostile Jamming: Security and Efficiencyent://SD_ILS/0/SD_ILS:20840492025-08-07T15:33:47Z2025-08-07T15:33:47Zby Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20856432025-08-07T15:33:47Z2025-08-07T15:33:47Zby Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format: Electronic Resources<br/>Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861322025-08-07T15:33:47Z2025-08-07T15:33:47Zby Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20856802025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kordy, Barbara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46263-9">https://doi.org/10.1007/978-3-319-46263-9</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20861582025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format: Electronic Resources<br/>Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857262025-08-07T15:33:47Z2025-08-07T15:33:47Zby Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format: Electronic Resources<br/>Image and Signal Processing 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860422025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mansouri, Alamin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94211-7">https://doi.org/10.1007/978-3-319-94211-7</a><br/>Format: Electronic Resources<br/>Information Science and Applications (ICISA) 2016ent://SD_ILS/0/SD_ILS:20876082025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856052025-08-07T15:33:47Z2025-08-07T15:33:47Zby Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format: Electronic Resources<br/>From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthdayent://SD_ILS/0/SD_ILS:20853642025-08-07T15:33:47Z2025-08-07T15:33:47Zby Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848752025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format: Electronic Resources<br/>Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applicationsent://SD_ILS/0/SD_ILS:20841672025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kävrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20860932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20855572025-08-07T15:33:47Z2025-08-07T15:33:47Zby Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 – September 1, 2015 Revised Selected Papersent://SD_ILS/0/SD_ILS:20852222025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format: Electronic Resources<br/>Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20849302025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format: Electronic Resources<br/>Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5129332025-08-07T15:33:47Z2025-08-07T15:33:47Zby Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVIIent://SD_ILS/0/SD_ILS:20851772025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-57932-9">https://doi.org/10.1007/978-3-662-57932-9</a><br/>Format: Electronic Resources<br/>Economics of Identity Theft: Avoidance, Causes and Possible Curesent://SD_ILS/0/SD_ILS:5058172025-08-07T15:33:47Z2025-08-07T15:33:47Zby Camp, L. Jean. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20850532025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00776-8">https://doi.org/10.1007/978-3-030-00776-8</a><br/>Format: Electronic Resources<br/>Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6–7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855172025-08-07T15:33:47Z2025-08-07T15:33:47Zby Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20853312025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00767-6">https://doi.org/10.1007/978-3-030-00767-6</a><br/>Format: Electronic Resources<br/>Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20847202025-08-07T15:33:47Z2025-08-07T15:33:47Zby Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format: Electronic Resources<br/>Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852982025-08-07T15:33:47Z2025-08-07T15:33:47Zby Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papersent://SD_ILS/0/SD_ILS:5129002025-08-07T15:33:47Z2025-08-07T15:33:47Zby Montanari, Ugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75336-0">http://dx.doi.org/10.1007/978-3-540-75336-0</a><br/>Format: Electronic Resources<br/>Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858622025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chellappan, Sriram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format: Electronic Resources<br/>Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approachent://SD_ILS/0/SD_ILS:20842572025-08-07T15:33:47Z2025-08-07T15:33:47Zby Parkinson, Simon. editor. (orcid)0000-0002-1747-9914<br/><a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format: Electronic Resources<br/>Advanced persistent training : take your security awareness program to the next levelent://SD_ILS/0/SD_ILS:23134522025-08-07T15:33:47Z2025-08-07T15:33:47Zby Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format: Electronic Resources<br/>Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20848132025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format: Electronic Resources<br/>Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:5034102025-08-07T15:33:47Z2025-08-07T15:33:47Zby Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78663-4">http://dx.doi.org/10.1007/978-3-540-78663-4</a><br/>Format: Electronic Resources<br/>Algorithms and Applications ALAP 2018ent://SD_ILS/0/SD_ILS:20864882025-08-07T15:33:47Z2025-08-07T15:33:47Zby Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format: Electronic Resources<br/>Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860962025-08-07T15:33:47Z2025-08-07T15:33:47Zby Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format: Electronic Resources<br/>Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italyent://SD_ILS/0/SD_ILS:5015462025-08-07T15:33:47Z2025-08-07T15:33:47Zby Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format: Electronic Resources<br/>Advances in Information Processing and Protectionent://SD_ILS/0/SD_ILS:5060142025-08-07T15:33:47Z2025-08-07T15:33:47Zby PejaÅ›, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format: Electronic Resources<br/>Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855522025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format: Electronic Resources<br/>Computer Networks 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20846512025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-92459-5">https://doi.org/10.1007/978-3-319-92459-5</a><br/>Format: Electronic Resources<br/>Computer Networks 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20848152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedingsent://SD_ILS/0/SD_ILS:5026762025-08-07T15:33:47Z2025-08-07T15:33:47Zby Harju, Jarmo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68807-5">http://dx.doi.org/10.1007/978-3-540-68807-5</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USAent://SD_ILS/0/SD_ILS:20872452025-08-07T15:33:47Z2025-08-07T15:33:47Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Electronic Resources<br/>Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20849662025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhang, Yin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38904-2">https://doi.org/10.1007/978-3-319-38904-2</a><br/>Format: Electronic Resources<br/>Distributed Applications and Interoperable Systems 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bonomi, Silvia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93767-0">https://doi.org/10.1007/978-3-319-93767-0</a><br/>Format: Electronic Resources<br/>The Hardware Trojan War Attacks, Myths, and Defensesent://SD_ILS/0/SD_ILS:20868392025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format: Electronic Resources<br/>Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848682025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20844022025-08-07T15:33:47Z2025-08-07T15:33:47Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format: Electronic Resources<br/>Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20844032025-08-07T15:33:47Z2025-08-07T15:33:47Zby Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format: Electronic Resources<br/>Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20857922025-08-07T15:33:47Z2025-08-07T15:33:47Zby Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5127032025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hämmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format: Electronic Resources<br/>Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858872025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format: Electronic Resources<br/>Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859802025-08-07T15:33:47Z2025-08-07T15:33:47Zby Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format: Electronic Resources<br/>Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20859282025-08-07T15:33:47Z2025-08-07T15:33:47Zby Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format: Electronic Resources<br/>Selected Areas in Cryptography – SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12–14, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859722025-08-07T15:33:47Z2025-08-07T15:33:47Zby Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format: Electronic Resources<br/>Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25–26, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860392025-08-07T15:33:47Z2025-08-07T15:33:47Zby Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:20862852025-08-07T15:33:47Z2025-08-07T15:33:47Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854062025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format: Electronic Resources<br/>Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852342025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lecomte, Thierry. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, Västerås, Sweden, September 19-21, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855842025-08-07T15:33:47Z2025-08-07T15:33:47Zby Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format: Electronic Resources<br/>Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853272025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format: Electronic Resources<br/>Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861762025-08-07T15:33:47Z2025-08-07T15:33:47Zby Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:20856712025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zeng, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77380-3">https://doi.org/10.1007/978-3-319-77380-3</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:20856722025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zeng, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77383-4">https://doi.org/10.1007/978-3-319-77383-4</a><br/>Format: Electronic Resources<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5028032025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format: Electronic Resources<br/>Grid Computing Securityent://SD_ILS/0/SD_ILS:5116722025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format: Electronic Resources<br/>Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20860062025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853882025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format: Electronic Resources<br/>Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17–18, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848582025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852152025-08-07T15:33:47Z2025-08-07T15:33:47Zby Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format: Electronic Resources<br/>Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5125182025-08-07T15:33:47Z2025-08-07T15:33:47Zby Boavida, Fernando. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72697-5">http://dx.doi.org/10.1007/978-3-540-72697-5</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lecturesent://SD_ILS/0/SD_ILS:20858582025-08-07T15:33:47Z2025-08-07T15:33:47Zby Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format: Electronic Resources<br/>Beginning ethical hacking with Pythonent://SD_ILS/0/SD_ILS:23122622025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5035632025-08-07T15:33:47Z2025-08-07T15:33:47Zby Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format: Electronic Resources<br/>Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format: Electronic Resources<br/>Advances in Multimedia Information Processing – PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20853302025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00764-5">https://doi.org/10.1007/978-3-030-00764-5</a><br/>Format: Electronic Resources<br/>Smart Secure Systems – IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20849222025-08-07T15:33:47Z2025-08-07T15:33:47Zby Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format: Electronic Resources<br/>Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20850162025-08-07T15:33:47Z2025-08-07T15:33:47Zby Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format: Electronic Resources<br/>Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20854172025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20857372025-08-07T15:33:47Z2025-08-07T15:33:47Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855682025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50832-0">https://doi.org/10.1007/978-3-319-50832-0</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20852382025-08-07T15:33:47Z2025-08-07T15:33:47Zby Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Sustainable Interdependent Networks From Theory to Applicationent://SD_ILS/0/SD_ILS:20881672025-08-07T15:33:47Z2025-08-07T15:33:47Zby Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format: Electronic Resources<br/>Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAEent://SD_ILS/0/SD_ILS:20842332025-08-07T15:33:47Z2025-08-07T15:33:47Zby Alja’am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format: Electronic Resources<br/>Security, Privacy, and Trust in Modern Data Managementent://SD_ILS/0/SD_ILS:5121932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format: Electronic Resources<br/>Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19–20, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20843202025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format: Electronic Resources<br/>Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851312025-08-07T15:33:47Z2025-08-07T15:33:47Zby Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format: Electronic Resources<br/>Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852252025-08-07T15:33:47Z2025-08-07T15:33:47Zby Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format: Electronic Resources<br/>Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29–31, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851712025-08-07T15:33:47Z2025-08-07T15:33:47Zby Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format: Electronic Resources<br/>Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036642025-08-07T15:33:47Z2025-08-07T15:33:47Zby Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format: Electronic Resources<br/>Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850822025-08-07T15:33:47Z2025-08-07T15:33:47Zby Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format: Electronic Resources<br/>Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20852582025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50835-1">https://doi.org/10.1007/978-3-319-50835-1</a><br/>Format: Electronic Resources<br/>Future Access Enablers for Ubiquitous and Intelligent Infrastructures Third International Conference, FABULOUS 2017, Bucharest, Romania, October 12-14, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20848822025-08-07T15:33:47Z2025-08-07T15:33:47Zby Fratu, Octavian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92213-3">https://doi.org/10.1007/978-3-319-92213-3</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20841052025-08-07T15:33:47Z2025-08-07T15:33:47Zby Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format: Electronic Resources<br/>Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20850522025-08-07T15:33:47Z2025-08-07T15:33:47Zby Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format: Electronic Resources<br/>Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20857452025-08-07T15:33:47Z2025-08-07T15:33:47Zby Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format: Electronic Resources<br/>Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014ent://SD_ILS/0/SD_ILS:20858102025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format: Electronic Resources<br/>Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20846202025-08-07T15:33:47Z2025-08-07T15:33:47Zby Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format: Electronic Resources<br/>Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852242025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20856592025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format: Electronic Resources<br/>Mathematical Software – ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855742025-08-07T15:33:47Z2025-08-07T15:33:47Zby Davenport, James H. editor. (orcid)0000-0002-3982-7545<br/><a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format: Electronic Resources<br/>RoboCup 2017: Robot World Cup XXIent://SD_ILS/0/SD_ILS:20853122025-08-07T15:33:47Z2025-08-07T15:33:47Zby Akiyama, Hidehisa. editor. (orcid)0000-0002-9793-9123<br/><a href="https://doi.org/10.1007/978-3-030-00308-1">https://doi.org/10.1007/978-3-030-00308-1</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20854282025-08-07T15:33:47Z2025-08-07T15:33:47Zby Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Panetto, Hervé. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02610-3">https://doi.org/10.1007/978-3-030-02610-3</a><br/>Format: Electronic Resources<br/>Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20853702025-08-07T15:33:47Z2025-08-07T15:33:47Zby Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format: Electronic Resources<br/>Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850362025-08-07T15:33:47Z2025-08-07T15:33:47Zby Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format: Electronic Resources<br/>Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16–18, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861932025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format: Electronic Resources<br/>Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20851582025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format: Electronic Resources<br/>Secure Networked Inference with Unreliable Data Sourcesent://SD_ILS/0/SD_ILS:20842482025-08-07T15:33:47Z2025-08-07T15:33:47Zby Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format: Electronic Resources<br/>Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20852352025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38898-4">https://doi.org/10.1007/978-3-319-38898-4</a><br/>Format: Electronic Resources<br/>Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20858052025-08-07T15:33:47Z2025-08-07T15:33:47Zby Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Electronic Resources<br/>Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857292025-08-07T15:33:47Z2025-08-07T15:33:47Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format: Electronic Resources<br/>Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:5036842025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format: Electronic Resources<br/>Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5124602025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format: Electronic Resources<br/>Inside Radio: An Attack and Defense Guideent://SD_ILS/0/SD_ILS:20846952025-08-07T15:33:47Z2025-08-07T15:33:47Zby Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format: Electronic Resources<br/>ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842652025-08-07T15:33:47Z2025-08-07T15:33:47Zby Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20854392025-08-07T15:33:47Z2025-08-07T15:33:47Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format: Electronic Resources<br/>Computer Security – ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856762025-08-07T15:33:47Z2025-08-07T15:33:47Zby Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format: Electronic Resources<br/>Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedingsent://SD_ILS/0/SD_ILS:5129982025-08-07T15:33:47Z2025-08-07T15:33:47Zby Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format: Electronic Resources<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:20843402025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Electronic Resources<br/>Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20852992025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20858012025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format: Electronic Resources<br/>Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20856772025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format: Electronic Resources<br/>Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20861242025-08-07T15:33:47Z2025-08-07T15:33:47Zby Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94523-1">https://doi.org/10.1007/978-3-319-94523-1</a><br/>Format: Electronic Resources<br/>Image Analysis and Recognition 15th International Conference, ICIAR 2018, Póvoa de Varzim, Portugal, June 27–29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20858832025-08-07T15:33:47Z2025-08-07T15:33:47Zby Campilho, Aurélio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format: Electronic Resources<br/>Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20851902025-08-07T15:33:47Z2025-08-07T15:33:47Zby Lai, Jian-Huang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format: Electronic Resources<br/>Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8–10, 2018, Revised Selected Papers, Part IVent://SD_ILS/0/SD_ILS:20853132025-08-07T15:33:47Z2025-08-07T15:33:47Zby Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format: Electronic Resources<br/>On the Move to Meaningful Internet Systems: OTM 2016 Conferences Confederated International Conferences: CoopIS, C&TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20856662025-08-07T15:33:47Z2025-08-07T15:33:47Zby Debruyne, Christophe. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48472-3">https://doi.org/10.1007/978-3-319-48472-3</a><br/>Format: Electronic Resources<br/>Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5126912025-08-07T15:33:47Z2025-08-07T15:33:47Zby Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:20844012025-08-07T15:33:47Z2025-08-07T15:33:47Zby Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format: Electronic Resources<br/>Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20860542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format: Electronic Resources<br/>Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18–19, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20842682025-08-07T15:33:47Z2025-08-07T15:33:47Zby Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format: Electronic Resources<br/>Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papersent://SD_ILS/0/SD_ILS:20842042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44350-8">https://doi.org/10.1007/978-3-319-44350-8</a><br/>Format: Electronic Resources<br/>Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Projectent://SD_ILS/0/SD_ILS:20875042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855612025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20862092025-08-07T15:33:47Z2025-08-07T15:33:47Zby Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5130232025-08-07T15:33:47Z2025-08-07T15:33:47Zby Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format: Electronic Resources<br/>Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855882025-08-07T15:33:47Z2025-08-07T15:33:47Zby Bauer, Lujo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format: Electronic Resources<br/>Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedingsent://SD_ILS/0/SD_ILS:20856232025-08-07T15:33:47Z2025-08-07T15:33:47Zby Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20855852025-08-07T15:33:47Z2025-08-07T15:33:47Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20860992025-08-07T15:33:47Z2025-08-07T15:33:47Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857352025-08-07T15:33:47Z2025-08-07T15:33:47Zby Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:20857362025-08-07T15:33:47Z2025-08-07T15:33:47Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20859622025-08-07T15:33:47Z2025-08-07T15:33:47Zby Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format: Electronic Resources<br/>Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20854642025-08-07T15:33:47Z2025-08-07T15:33:47Zby D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format: Electronic Resources<br/>Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norwayent://SD_ILS/0/SD_ILS:5015182025-08-07T15:33:47Z2025-08-07T15:33:47Zby Karabulut, Yücel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format: Electronic Resources<br/>Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18–19, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20857602025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format: Electronic Resources<br/>Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:20859042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format: Electronic Resources<br/>Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11–13, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20855762025-08-07T15:33:47Z2025-08-07T15:33:47Zby Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format: Electronic Resources<br/>Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20850862025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:20860632025-08-07T15:33:47Z2025-08-07T15:33:47Zby Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Advances in Neural Networks – ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedingsent://SD_ILS/0/SD_ILS:20857032025-08-07T15:33:47Z2025-08-07T15:33:47Zby Cheng, Long. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40663-3">https://doi.org/10.1007/978-3-319-40663-3</a><br/>Format: Electronic Resources<br/>Public-Key Cryptography – PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20857042025-08-07T15:33:47Z2025-08-07T15:33:47Zby Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format: Electronic Resources<br/>The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthdayent://SD_ILS/0/SD_ILS:20861542025-08-07T15:33:47Z2025-08-07T15:33:47Zby Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format: Electronic Resources<br/>Blockchain – ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20860942025-08-07T15:33:47Z2025-08-07T15:33:47Zby Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format: Electronic Resources<br/>Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedingsent://SD_ILS/0/SD_ILS:20859132025-08-07T15:33:47Z2025-08-07T15:33:47Zby Dubois, Catherine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:20856852025-08-07T15:33:47Z2025-08-07T15:33:47Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format: Electronic Resources<br/>Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:20852302025-08-07T15:33:47Z2025-08-07T15:33:47Zby Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format: Electronic Resources<br/>