Arama Sonu&ccedil;ları Systems and Data Security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dSystems$002band$002bData$002bSecurity.$0026ps$003d300?dt=list 2025-08-07T15:33:47Z Machine learning and security : protecting systems with data and algorithms ent://SD_ILS/0/SD_ILS:2315881 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chio, Clarence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar">https://go.oreilly.com/library-access/library/view/-/9781491979891/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491979891/?ar">https://learning.oreilly.com/library/view/~/9781491979891/?ar</a><br/>Format:&#160;Electronic Resources<br/> Physical and Data-Link Security Techniques for Future Communication Systems ent://SD_ILS/0/SD_ILS:2087375 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-23609-4">https://doi.org/10.1007/978-3-319-23609-4</a><br/>Format:&#160;Electronic Resources<br/> Security and resilience in intelligent data-centric systems and communication networks ent://SD_ILS/0/SD_ILS:2213104 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ficco, Massimo, editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5090270">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Security, privacy, and governance : protecting data, and using data to protect systems ent://SD_ILS/0/SD_ILS:2307756 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lorica, Ben, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar">https://go.oreilly.com/library-access/library/view/-/9781491931042/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491931042/?ar">https://learning.oreilly.com/videos/~/9781491931042/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Data Analysis for e-Learning : Enhancing Security and Trustworthiness in Online Learning Systems. ent://SD_ILS/0/SD_ILS:2311419 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Miguel, Jorge.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045459/?ar">https://learning.oreilly.com/library/view/~/9780128045459/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128045459">https://learning.oreilly.com/library/view/~/9780128045459</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045459/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045459/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intelligent data analysis for e-Learning : enhancing security and trustworthiness in online learning systems ent://SD_ILS/0/SD_ILS:2210713 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Miguel, Jorge, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4675471">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Governance of picture archiving and communications systems data security and quality management of filmless radiology ent://SD_ILS/0/SD_ILS:2261465 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Tong, Carrison K. S., 1962-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-672-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-672-3</a><br/>Format:&#160;Electronic Resources<br/> Availability, Reliability, and Security in Information Systems IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085442 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Buccafurri, Francesco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45507-5">https://doi.org/10.1007/978-3-319-45507-5</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy Third International Conference, ICISSP 2017, Porto, Portugal, February 19-21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084659 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mori, Paolo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93354-2">https://doi.org/10.1007/978-3-319-93354-2</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Network Forensics A Research Perspective ent://SD_ILS/0/SD_ILS:2084867 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Joshi, R.C. author.<br/><a href="https://doi.org/10.1007/978-1-4471-7299-4">https://doi.org/10.1007/978-1-4471-7299-4</a><br/>Format:&#160;Electronic Resources<br/> Fifth World Conference on Information Security Education Proceedings of the IFIP TC11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, New York, USA ent://SD_ILS/0/SD_ILS:506015 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Futcher, Lynn. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73269-5">http://dx.doi.org/10.1007/978-0-387-73269-5</a><br/>Format:&#160;Electronic Resources<br/> Trust Management Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30&ndash; August 2, 2007, New Brunswick, Canada ent://SD_ILS/0/SD_ILS:506019 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Etalle, Sandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73655-6">http://dx.doi.org/10.1007/978-0-387-73655-6</a><br/>Format:&#160;Electronic Resources<br/> New Approaches for Security, Privacy and Trust in Complex Environments Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14&ndash;16 May 2007, Sandton, South Africa ent://SD_ILS/0/SD_ILS:505998 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Venter, Hein. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-72367-9">http://dx.doi.org/10.1007/978-0-387-72367-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13&ndash;15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085265 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Eisenbarth, Thomas. editor. (orcid)0000-0003-1116-6973<br/><a href="https://doi.org/10.1007/978-3-319-75208-2">https://doi.org/10.1007/978-3-319-75208-2</a><br/>Format:&#160;Electronic Resources<br/> Location Privacy in Mobile Applications ent://SD_ILS/0/SD_ILS:2084241 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Liu, Bo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1705-7">https://doi.org/10.1007/978-981-13-1705-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Information Security in the Balkans Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085937 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Pasalic, Enes. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29172-7">https://doi.org/10.1007/978-3-319-29172-7</a><br/>Format:&#160;Electronic Resources<br/> Speech and Computer 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085353 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Karpov, Alexey. editor. (orcid)0000-0003-3424-652X<br/><a href="https://doi.org/10.1007/978-3-319-99579-3">https://doi.org/10.1007/978-3-319-99579-3</a><br/>Format:&#160;Electronic Resources<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2084660 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Yuan, Hanning. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0896-3">https://doi.org/10.1007/978-981-13-0896-3</a><br/>Format:&#160;Electronic Resources<br/> Geo-Spatial Knowledge and Intelligence 5th International Conference, GSKI 2017, Chiang Mai, Thailand, December 8-10, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2084672 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Yuan, Hanning. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0893-2">https://doi.org/10.1007/978-981-13-0893-2</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Resilience and Protection ent://SD_ILS/0/SD_ILS:505982 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hyslop, Maitland. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">http://dx.doi.org/10.1007/978-0-387-71862-0</a><br/>Format:&#160;Electronic Resources<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:2084738 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Wang, Cliff. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:2084787 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhang, Aiqing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format:&#160;Electronic Resources<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:2084292 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Conti, Mauro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2085359 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00009-7">https://doi.org/10.1007/978-3-030-00009-7</a><br/>Format:&#160;Electronic Resources<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:2084527 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Diehl, Eric. author.<br/><a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-hoc and Sensor Networks 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084492 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhu, Liehuang. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8890-2">https://doi.org/10.1007/978-981-10-8890-2</a><br/>Format:&#160;Electronic Resources<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:2085006 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhang, Peng. author.<br/><a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Storage Security Concepts, Designs and Optimized Practices ent://SD_ILS/0/SD_ILS:2084295 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Galibus, Tatiana. author.<br/><a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity in Germany ent://SD_ILS/0/SD_ILS:2084136 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Schallbruch, Martin. author.<br/><a href="https://doi.org/10.1007/978-3-319-90014-8">https://doi.org/10.1007/978-3-319-90014-8</a><br/>Format:&#160;Electronic Resources<br/> Android Application Security A Semantics and Context-Aware Approach ent://SD_ILS/0/SD_ILS:2084366 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhang, Mu. author.<br/><a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2017 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085877 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Howon. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78556-1">https://doi.org/10.1007/978-3-319-78556-1</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Cyber Security First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084112 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Li, Fagen. editor. (orcid)0000-0001-6289-1265<br/><a href="https://doi.org/10.1007/978-981-13-3095-7">https://doi.org/10.1007/978-981-13-3095-7</a><br/>Format:&#160;Electronic Resources<br/> Physical Layer Security in Wireless Cooperative Networks ent://SD_ILS/0/SD_ILS:2086224 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Wang, Li. author.<br/><a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Systems Safety and Security ent://SD_ILS/0/SD_ILS:2087705 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Pricop, Emil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32525-5">https://doi.org/10.1007/978-3-319-32525-5</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:2086915 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/> Autonomous Agents and Multiagent Systems AAMAS 2016 Workshops, Visionary Papers, Singapore, Singapore, May 9-10, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085827 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Osman, Nardine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46840-2">https://doi.org/10.1007/978-3-319-46840-2</a><br/>Format:&#160;Electronic Resources<br/> Trusted Digital Circuits Hardware Trojan Vulnerabilities, Prevention and Detection ent://SD_ILS/0/SD_ILS:2086709 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Salmani, Hassan. author.<br/><a href="https://doi.org/10.1007/978-3-319-79081-7">https://doi.org/10.1007/978-3-319-79081-7</a><br/>Format:&#160;Electronic Resources<br/> Dependability Metrics Advanced Lectures ent://SD_ILS/0/SD_ILS:502693 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Eusgeld, Irene. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68947-8">http://dx.doi.org/10.1007/978-3-540-68947-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085498 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Inomata, Atsuo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97916-8">https://doi.org/10.1007/978-3-319-97916-8</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 1 ent://SD_ILS/0/SD_ILS:2087443 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2650-5">https://doi.org/10.1007/978-81-322-2650-5</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:2084128 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Guo, Fuchun. author.<br/><a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume 2 ent://SD_ILS/0/SD_ILS:2088358 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-81-322-2653-6">https://doi.org/10.1007/978-81-322-2653-6</a><br/>Format:&#160;Electronic Resources<br/> Emerging Technologies in Computing First International Conference, iCETiC 2018, London, UK, August 23&ndash;24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084147 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Miraz, Mahdi H. editor. (orcid)0000-0002-6795-7048<br/><a href="https://doi.org/10.1007/978-3-319-95450-9">https://doi.org/10.1007/978-3-319-95450-9</a><br/>Format:&#160;Electronic Resources<br/> Designing Usable and Secure Software with IRIS and CAIRIS ent://SD_ILS/0/SD_ILS:2084773 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Faily, Shamal. author.<br/><a href="https://doi.org/10.1007/978-3-319-75493-2">https://doi.org/10.1007/978-3-319-75493-2</a><br/>Format:&#160;Electronic Resources<br/> Understanding Social Engineering Based Scams ent://SD_ILS/0/SD_ILS:2084704 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Jakobsson, Markus. editor.<br/><a href="https://doi.org/10.1007/978-1-4939-6457-4">https://doi.org/10.1007/978-1-4939-6457-4</a><br/>Format:&#160;Electronic Resources<br/> Secure System Design and Trustable Computing ent://SD_ILS/0/SD_ILS:2087514 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chang, Chip-Hong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format:&#160;Electronic Resources<br/> Subjective Logic A Formalism for Reasoning Under Uncertainty ent://SD_ILS/0/SD_ILS:2084950 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;J&oslash;sang, Audun. author.<br/><a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format:&#160;Electronic Resources<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:2084576 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Pierer, Markus. author.<br/><a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format:&#160;Electronic Resources<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084520 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;You, Ilsun. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:2084751 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Yu, Shui. editor.<br/><a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Vision &ndash; ECCV 2018 15th European Conference, Munich, Germany, September 8&ndash;14, 2018, Proceedings, Part V ent://SD_ILS/0/SD_ILS:2085161 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ferrari, Vittorio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01228-1">https://doi.org/10.1007/978-3-030-01228-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084511 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 15th International Conference, ADHOC-NOW 2016, Lille, France, July 4-6, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085722 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mitton, Nathalie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40509-4">https://doi.org/10.1007/978-3-319-40509-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Five ent://SD_ILS/0/SD_ILS:2087030 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8180-4">https://doi.org/10.1007/978-981-10-8180-4</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Six ent://SD_ILS/0/SD_ILS:2086369 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chaki, Rituparna. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8183-5">https://doi.org/10.1007/978-981-10-8183-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084481 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lin, Xiaodong. editor.<br/><a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communication Technology Proceedings of ICICT 2016 ent://SD_ILS/0/SD_ILS:2086355 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mishra, Durgesh Kumar. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084619 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Batten, Lynn. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/> Moving Target Defense for Distributed Systems ent://SD_ILS/0/SD_ILS:2084515 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Shetty, Sachin. author.<br/><a href="https://doi.org/10.1007/978-3-319-31032-9">https://doi.org/10.1007/978-3-319-31032-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy-Enhancing Aggregation Techniques for Smart Grid Communications ent://SD_ILS/0/SD_ILS:2084785 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lu, Rongxing. author.<br/><a href="https://doi.org/10.1007/978-3-319-32899-7">https://doi.org/10.1007/978-3-319-32899-7</a><br/>Format:&#160;Electronic Resources<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:2084335 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Alani, Mohammed M. author.<br/><a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/> Lightweight Cryptography for Security and Privacy 4th International Workshop, LightSec 2015, Bochum, Germany, September 10&ndash;11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085778 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29078-2">https://doi.org/10.1007/978-3-319-29078-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086144 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bao, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49151-6">https://doi.org/10.1007/978-3-319-49151-6</a><br/>Format:&#160;Electronic Resources<br/> Boolean Functions and Their Applications in Cryptography ent://SD_ILS/0/SD_ILS:2084570 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Wu, Chuan-Kun. author.<br/><a href="https://doi.org/10.1007/978-3-662-48865-2">https://doi.org/10.1007/978-3-662-48865-2</a><br/>Format:&#160;Electronic Resources<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:2087733 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Androulidakis, Iosif. author.<br/><a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:2086381 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/> Trust Management X 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085004 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Habib, Sheikh Mahbub. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41354-9">https://doi.org/10.1007/978-3-319-41354-9</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:2087596 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:2087931 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 8th International Symposium, FPS 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085921 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30303-1">https://doi.org/10.1007/978-3-319-30303-1</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084777 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Haltinner, Kristin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/> Mobile, Secure, and Programmable Networking Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085100 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Boumerdassi, Selma. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50463-6">https://doi.org/10.1007/978-3-319-50463-6</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 ent://SD_ILS/0/SD_ILS:2086471 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Senthilkumar, Muthukrishnan. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0251-9">https://doi.org/10.1007/978-981-10-0251-9</a><br/>Format:&#160;Electronic Resources<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:2086515 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Androulidakis, Iosif I. author.<br/><a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/> Watermarking Security ent://SD_ILS/0/SD_ILS:2087095 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bas, Patrick. author.<br/><a href="https://doi.org/10.1007/978-981-10-0506-0">https://doi.org/10.1007/978-981-10-0506-0</a><br/>Format:&#160;Electronic Resources<br/> Information Theoretic Security 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086017 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Nascimento, Anderson C.A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49175-2">https://doi.org/10.1007/978-3-319-49175-2</a><br/>Format:&#160;Electronic Resources<br/> Wireless Sensor Networks Security, Coverage, and Localization ent://SD_ILS/0/SD_ILS:2084436 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Selmic, Rastko R. author.<br/><a href="https://doi.org/10.1007/978-3-319-46769-6">https://doi.org/10.1007/978-3-319-46769-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 10th International Conference, SCN 2016, Amalfi, Italy, August 31 &ndash; September 2, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085802 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zikas, Vassilis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44618-9">https://doi.org/10.1007/978-3-319-44618-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:2084473 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Karuppayah, Shankar. author.<br/><a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/> Integration, Interconnection, and Interoperability of IoT Systems ent://SD_ILS/0/SD_ILS:2087421 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gravina, Raffaele. editor.<br/><a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format:&#160;Electronic Resources<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084433 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chen, Qingfeng. editor.<br/><a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Electronic Resources<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:2084803 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Petrenko, Sergei. author.<br/><a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:2084754 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Rowe, Neil C. author.<br/><a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:2086678 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Yang, Xin-She. editor.<br/><a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/> Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084685 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mueller, Peter. editor.<br/><a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format:&#160;Electronic Resources<br/> Modern Data Strategy ent://SD_ILS/0/SD_ILS:2084752 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Fleckenstein, Mike. author.<br/><a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format:&#160;Electronic Resources<br/> Trends and Applications in Software Engineering Proceedings of the 4th International Conference on Software Process Improvement CIMPS'2015 ent://SD_ILS/0/SD_ILS:2084647 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mejia, Jezreel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-26285-7">https://doi.org/10.1007/978-3-319-26285-7</a><br/>Format:&#160;Electronic Resources<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:2084756 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Al-Shaer, Ehab. author.<br/><a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications ent://SD_ILS/0/SD_ILS:2086549 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Rao, Nageswara S.V. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 2 ent://SD_ILS/0/SD_ILS:2087441 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0755-2">https://doi.org/10.1007/978-981-10-0755-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Congress on Information and Communication Technology ICICT 2015, Volume 1 ent://SD_ILS/0/SD_ILS:2088362 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0767-5">https://doi.org/10.1007/978-981-10-0767-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084716 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Aspinall, David. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:2087814 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Alsmadi, Izzat. author.<br/><a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/> Interoperability, Safety and Security in IoT Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084137 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Fortino, Giancarlo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93797-7">https://doi.org/10.1007/978-3-319-93797-7</a><br/>Format:&#160;Electronic Resources<br/> Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28&ndash;30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085242 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Traore, Issa. editor. (orcid)0000-0003-2987-8047<br/><a href="https://doi.org/10.1007/978-3-030-03712-3">https://doi.org/10.1007/978-3-030-03712-3</a><br/>Format:&#160;Electronic Resources<br/> Designing for a Digital and Globalized World 13th International Conference, DESRIST 2018, Chennai, India, June 3&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085654 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chatterjee, Samir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91800-6">https://doi.org/10.1007/978-3-319-91800-6</a><br/>Format:&#160;Electronic Resources<br/> Decision and Game Theory for Security 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085063 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bushnell, Linda. editor. (orcid)0000-0002-8751-2409<br/><a href="https://doi.org/10.1007/978-3-030-01554-1">https://doi.org/10.1007/978-3-030-01554-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085953 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Ho-won. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31875-2">https://doi.org/10.1007/978-3-319-31875-2</a><br/>Format:&#160;Electronic Resources<br/> E-Business and Telecommunications 12th International Joint Conference, ICETE 2015, Colmar, France, July 20&ndash;22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084998 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Obaidat, Mohammad S. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30222-5">https://doi.org/10.1007/978-3-319-30222-5</a><br/>Format:&#160;Electronic Resources<br/> Science of Cyber Security First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085212 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Liu, Feng. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03026-1">https://doi.org/10.1007/978-3-030-03026-1</a><br/>Format:&#160;Electronic Resources<br/> Information Technology: New Generations 13th International Conference on Information Technology ent://SD_ILS/0/SD_ILS:2086884 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Latifi, Shahram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32467-8">https://doi.org/10.1007/978-3-319-32467-8</a><br/>Format:&#160;Electronic Resources<br/> Preserving Privacy Against Side-Channel Leaks From Data Publishing to Web Applications ent://SD_ILS/0/SD_ILS:2085009 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Liu, Wen Ming. author.<br/><a href="https://doi.org/10.1007/978-3-319-42644-0">https://doi.org/10.1007/978-3-319-42644-0</a><br/>Format:&#160;Electronic Resources<br/> Lai-Massey Cipher Designs History, Design Criteria and Cryptanalysis ent://SD_ILS/0/SD_ILS:2084122 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Nakahara Jr., Jorge. author.<br/><a href="https://doi.org/10.1007/978-3-319-68273-0">https://doi.org/10.1007/978-3-319-68273-0</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Computing: Networking, Applications, and Worksharing 11th International Conference, CollaborateCom 2015, Wuhan, November 10-11, 2015, China. Proceedings ent://SD_ILS/0/SD_ILS:2084639 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Guo, Song. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28910-6">https://doi.org/10.1007/978-3-319-28910-6</a><br/>Format:&#160;Electronic Resources<br/> Mobile and Wireless Technologies 2016 ent://SD_ILS/0/SD_ILS:2087893 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-1409-3">https://doi.org/10.1007/978-981-10-1409-3</a><br/>Format:&#160;Electronic Resources<br/> Women in Security Changing the Face of Technology and Innovation ent://SD_ILS/0/SD_ILS:2088052 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Christofferson, Debra A. editor.<br/><a href="https://doi.org/10.1007/978-3-319-57795-1">https://doi.org/10.1007/978-3-319-57795-1</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085151 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00006-6">https://doi.org/10.1007/978-3-030-00006-6</a><br/>Format:&#160;Electronic Resources<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:2084051 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:2084757 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Colbert, Edward J. M. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/> Simulation and Synthesis in Medical Imaging Third International Workshop, SASHIMI 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085509 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gooya, Ali. editor. (orcid)0000-0001-5135-4800<br/><a href="https://doi.org/10.1007/978-3-030-00536-8">https://doi.org/10.1007/978-3-030-00536-8</a><br/>Format:&#160;Electronic Resources<br/> Social Network Analysis in Predictive Policing Concepts, Models and Methods ent://SD_ILS/0/SD_ILS:2084627 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Tayebi, Mohammad A. author.<br/><a href="https://doi.org/10.1007/978-3-319-41492-8">https://doi.org/10.1007/978-3-319-41492-8</a><br/>Format:&#160;Electronic Resources<br/> Internet and Distributed Computing Systems 11th International Conference, IDCS 2018, Tokyo, Japan, October 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085493 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Xiang, Yang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02738-4">https://doi.org/10.1007/978-3-030-02738-4</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings ent://SD_ILS/0/SD_ILS:2085279 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Montavont, Nicolas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00247-3">https://doi.org/10.1007/978-3-030-00247-3</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 7th International Provenance and Annotation Workshop, IPAW 2018, London, UK, July 9-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085134 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Belhajjame, Khalid. editor. (orcid)0000-0001-6938-0820<br/><a href="https://doi.org/10.1007/978-3-319-98379-0">https://doi.org/10.1007/978-3-319-98379-0</a><br/>Format:&#160;Electronic Resources<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085085 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Brumley, Billy Bob. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085015 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Caballero, Juan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:2088295 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Daimi, Kevin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/> Towards Sustainable Society on Ubiquitous Networks The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24&ndash;16, 2008, Tokyo, Japan ent://SD_ILS/0/SD_ILS:502003 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Oya, Makoto. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-85691-9">http://dx.doi.org/10.1007/978-0-387-85691-9</a><br/>Format:&#160;Electronic Resources<br/> Physical-Layer Security for Cooperative Relay Networks ent://SD_ILS/0/SD_ILS:2084709 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zou, Yulong. author.<br/><a href="https://doi.org/10.1007/978-3-319-31174-6">https://doi.org/10.1007/978-3-319-31174-6</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part III ent://SD_ILS/0/SD_ILS:2085399 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00012-7">https://doi.org/10.1007/978-3-030-00012-7</a><br/>Format:&#160;Electronic Resources<br/> Multi-Agent Systems and Agreement Technologies 15th European Conference, EUMAS 2017, and 5th International Conference, AT 2017, Evry, France, December 14-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085070 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Belardinelli, Francesco. editor. (orcid)0000-0002-7768-1794<br/><a href="https://doi.org/10.1007/978-3-030-01713-2">https://doi.org/10.1007/978-3-030-01713-2</a><br/>Format:&#160;Electronic Resources<br/> Security Standardisation Research 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085243 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Cremers, Cas. editor. (orcid)0000-0003-0322-2293<br/><a href="https://doi.org/10.1007/978-3-030-04762-7">https://doi.org/10.1007/978-3-030-04762-7</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 15th International Conference, DIMVA 2018, Saclay, France, June 28&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085893 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Giuffrida, Cristiano. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93411-2">https://doi.org/10.1007/978-3-319-93411-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5&ndash;6, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085499 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Furnell, Steven. editor. (orcid)0000-0003-0984-7542<br/><a href="https://doi.org/10.1007/978-3-319-98385-1">https://doi.org/10.1007/978-3-319-98385-1</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 19th International Conference, PAM 2018, Berlin, Germany, March 26&ndash;27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085848 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Beverly, Robert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-76481-8">https://doi.org/10.1007/978-3-319-76481-8</a><br/>Format:&#160;Electronic Resources<br/> Data Management Technologies and Applications 6th International Conference, DATA 2017, Madrid, Spain, July 24&ndash;26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084881 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Filipe, Joaquim. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94809-6">https://doi.org/10.1007/978-3-319-94809-6</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 14th International Conference, CARDIS 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085747 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Homma, Naofumi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31271-2">https://doi.org/10.1007/978-3-319-31271-2</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28&ndash;30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085054 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Dang, Tran Khanh. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03192-3">https://doi.org/10.1007/978-3-030-03192-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:2084088 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Jajodia, Sushil. editor.<br/><a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:2084722 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:2086375 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Baldi, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/> Computer Performance Engineering 15th European Workshop, EPEW 2018, Paris, France, October 29-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085400 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bakhshi, Rena. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02227-3">https://doi.org/10.1007/978-3-030-02227-3</a><br/>Format:&#160;Electronic Resources<br/> Progress in Artificial Intelligence and Pattern Recognition 6th International Workshop, IWAIPR 2018, Havana, Cuba, September 24&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085360 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hern&aacute;ndez Heredia, Yanio. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01132-1">https://doi.org/10.1007/978-3-030-01132-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084069 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Shi, Zhongzhi. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084877 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Doss, Robin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48021-3">https://doi.org/10.1007/978-3-319-48021-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems &ndash; CHES 2016 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085256 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53140-2">https://doi.org/10.1007/978-3-662-53140-2</a><br/>Format:&#160;Electronic Resources<br/> Cellular Automata 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17&ndash;21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085351 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mauri, Giancarlo. editor. (orcid)0000-0003-3520-4022<br/><a href="https://doi.org/10.1007/978-3-319-99813-8">https://doi.org/10.1007/978-3-319-99813-8</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, and Security Assurance 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21&ndash;22, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085728 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29883-2">https://doi.org/10.1007/978-3-319-29883-2</a><br/>Format:&#160;Electronic Resources<br/> Advances in Parallel and Distributed Computing and Ubiquitous Services UCAWSN &amp; PDCAT 2015 ent://SD_ILS/0/SD_ILS:2084949 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Park, James J. (Jong Hyuk). editor.<br/><a href="https://doi.org/10.1007/978-981-10-0068-3">https://doi.org/10.1007/978-981-10-0068-3</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085732 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29360-8">https://doi.org/10.1007/978-3-319-29360-8</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles. Technologies and Services Towards Smart City 5th International Conference, IOV 2018, Paris, France, November 20&ndash;22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085244 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Skulimowski, Andrzej M.J. editor. (orcid)0000-0003-0646-2858<br/><a href="https://doi.org/10.1007/978-3-030-05081-8">https://doi.org/10.1007/978-3-030-05081-8</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation Third International Conference, ICC3 2017, Coimbatore, India, December 14-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084067 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ganapathi, Geetha. editor.<br/><a href="https://doi.org/10.1007/978-981-13-0716-4">https://doi.org/10.1007/978-981-13-0716-4</a><br/>Format:&#160;Electronic Resources<br/> Management and Security in the Age of Hyperconnectivity 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, Munich, Germany, June 20-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085986 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Badonnel, R&eacute;mi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39814-3">https://doi.org/10.1007/978-3-319-39814-3</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:2086980 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lehto, Martti. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/> Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085790 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sako, Kazue. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29485-8">https://doi.org/10.1007/978-3-319-29485-8</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084880 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/> Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:2084049 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Li, Tongtong. author.<br/><a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; AFRICACRYPT 2018 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7&ndash;9, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085643 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Joux, Antoine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89339-6">https://doi.org/10.1007/978-3-319-89339-6</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086132 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Liu, Peng. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74860-3">https://doi.org/10.1007/978-3-319-74860-3</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Third International Workshop, GraMSec 2016, Lisbon, Portugal, June 27, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085680 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kordy, Barbara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46263-9">https://doi.org/10.1007/978-3-319-46263-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2015 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086158 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kwon, Soonhak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30840-1">https://doi.org/10.1007/978-3-319-30840-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085726 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Foresti, Sara. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/> Image and Signal Processing 8th International Conference, ICISP 2018, Cherbourg, France, July 2-4, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086042 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mansouri, Alamin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94211-7">https://doi.org/10.1007/978-3-319-94211-7</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:2087608 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Kuinam J. editor.<br/><a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085605 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Galinina, Olga. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46301-8">https://doi.org/10.1007/978-3-319-46301-8</a><br/>Format:&#160;Electronic Resources<br/> From Database to Cyber Security Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday ent://SD_ILS/0/SD_ILS:2085364 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620<br/><a href="https://doi.org/10.1007/978-3-030-04834-1">https://doi.org/10.1007/978-3-030-04834-1</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084875 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hoepman, Jaap-Henk. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33630-5">https://doi.org/10.1007/978-3-319-33630-5</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications ent://SD_ILS/0/SD_ILS:2084167 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;K&auml;vrestad, Joakim. author.<br/><a href="https://doi.org/10.1007/978-3-319-96319-8">https://doi.org/10.1007/978-3-319-96319-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2086093 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hancke, Gerhard P. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93524-9">https://doi.org/10.1007/978-3-319-93524-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy 4th Annual Privacy Forum, APF 2016, Frankfurt/Main, Germany, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085557 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Schiffner, Stefan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44760-5">https://doi.org/10.1007/978-3-319-44760-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 10th International Symposium, TGC 2015 Madrid, Spain, August 31 &ndash; September 1, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085222 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ganty, Pierre. editor.<br/><a href="https://doi.org/10.1007/978-3-319-28766-9">https://doi.org/10.1007/978-3-319-28766-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid and Innovative Frontiers in Telecommunications Third International Conference, SmartGIFT 2018, Auckland, New Zealand, April 23-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084930 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chong, Peter Han Joo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94965-9">https://doi.org/10.1007/978-3-319-94965-9</a><br/>Format:&#160;Electronic Resources<br/> Managing Virtualization of Networks and Services 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San Jos&eacute;, CA, USA, October 29-31, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512933 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Clemm, Alexander. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75694-1">http://dx.doi.org/10.1007/978-3-540-75694-1</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVII ent://SD_ILS/0/SD_ILS:2085177 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-57932-9">https://doi.org/10.1007/978-3-662-57932-9</a><br/>Format:&#160;Electronic Resources<br/> Economics of Identity Theft: Avoidance, Causes and Possible Cures ent://SD_ILS/0/SD_ILS:505817 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Camp, L. Jean. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-68614-1">http://dx.doi.org/10.1007/978-0-387-68614-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Multimedia Information Processing &ndash; PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085053 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00776-8">https://doi.org/10.1007/978-3-030-00776-8</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 14th International Workshop, STM 2018, Barcelona, Spain, September 6&ndash;7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085517 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683<br/><a href="https://doi.org/10.1007/978-3-030-01141-3">https://doi.org/10.1007/978-3-030-01141-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Multimedia Information Processing &ndash; PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085331 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00767-6">https://doi.org/10.1007/978-3-030-00767-6</a><br/>Format:&#160;Electronic Resources<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084720 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850<br/><a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085298 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/><a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:512900 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Montanari, Ugo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-75336-0">http://dx.doi.org/10.1007/978-3-540-75336-0</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 13th International Conference, WASA 2018, Tianjin, China, June 20-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085862 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chellappan, Sriram. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94268-1">https://doi.org/10.1007/978-3-319-94268-1</a><br/>Format:&#160;Electronic Resources<br/> Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approach ent://SD_ILS/0/SD_ILS:2084257 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Parkinson, Simon. editor. (orcid)0000-0002-1747-9914<br/><a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format:&#160;Electronic Resources<br/> Advanced persistent training : take your security awareness program to the next level ent://SD_ILS/0/SD_ILS:2313452 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Schroeder, Jordan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar">https://go.oreilly.com/library-access/library/view/-/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357/?ar">https://learning.oreilly.com/library/view/~/9781484228357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484228357">https://learning.oreilly.com/library/view/~/9781484228357</a><br/>Format:&#160;Electronic Resources<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084813 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gal-Oz, Nurit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:503410 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Barthe, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78663-4">http://dx.doi.org/10.1007/978-3-540-78663-4</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Applications ALAP 2018 ent://SD_ILS/0/SD_ILS:2086488 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Das, Sajal K. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format:&#160;Electronic Resources<br/> Privacy Technologies and Policy Third Annual Privacy Forum, APF 2015, Luxembourg, Luxembourg, October 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086096 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Berendt, Bettina. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31456-3">https://doi.org/10.1007/978-3-319-31456-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:501546 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information Processing and Protection ent://SD_ILS/0/SD_ILS:506014 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Pejaś, Jerzy. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-73137-7">http://dx.doi.org/10.1007/978-0-387-73137-7</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085552 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hu, Ting. editor.<br/><a href="https://doi.org/10.1007/978-3-030-05234-8">https://doi.org/10.1007/978-3-030-05234-8</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084651 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gaj, Piotr. editor. (orcid)0000-0002-2291-7341<br/><a href="https://doi.org/10.1007/978-3-319-92459-5">https://doi.org/10.1007/978-3-319-92459-5</a><br/>Format:&#160;Electronic Resources<br/> Computer Networks 23rd International Conference, CN 2016, Brun&oacute;w, Poland, June 14-17, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2084815 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gaj, Piotr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39207-3">https://doi.org/10.1007/978-3-319-39207-3</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 6th International Conference, WWIC 2008 Tampere, Finland, May 28-30, 2008 Proceedings ent://SD_ILS/0/SD_ILS:502676 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Harju, Jarmo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-68807-5">http://dx.doi.org/10.1007/978-3-540-68807-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World&reg;, Florida, USA ent://SD_ILS/0/SD_ILS:2087245 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084966 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhang, Yin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38904-2">https://doi.org/10.1007/978-3-319-38904-2</a><br/>Format:&#160;Electronic Resources<br/> Distributed Applications and Interoperable Systems 18th IFIP WG 6.1 International Conference, DAIS 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085804 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bonomi, Silvia. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93767-0">https://doi.org/10.1007/978-3-319-93767-0</a><br/>Format:&#160;Electronic Resources<br/> The Hardware Trojan War Attacks, Myths, and Defenses ent://SD_ILS/0/SD_ILS:2086839 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bhunia, Swarup. editor.<br/><a href="https://doi.org/10.1007/978-3-319-68511-3">https://doi.org/10.1007/978-3-319-68511-3</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084868 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kumar, Navin. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2084402 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01701-9">https://doi.org/10.1007/978-3-030-01701-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2084403 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Beyah, Raheem. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01704-0">https://doi.org/10.1007/978-3-030-01704-0</a><br/>Format:&#160;Electronic Resources<br/> Formal Techniques for Distributed Objects, Components, and Systems 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085792 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Baier, Christel. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92612-4">https://doi.org/10.1007/978-3-319-92612-4</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512703 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;H&auml;mmerli, Bernhard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085887 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ogawa, Kazuto. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085980 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Katsikas, Sokratis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44341-6">https://doi.org/10.1007/978-3-319-44341-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085928 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Barthe, Gilles. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46598-2">https://doi.org/10.1007/978-3-319-46598-2</a><br/>Format:&#160;Electronic Resources<br/> Selected Areas in Cryptography &ndash; SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12&ndash;14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085972 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Dunkelman, Orr. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/> Theory and Practice of Model Transformation 11th International Conference, ICMT 2018, Held as Part of STAF 2018, Toulouse, France, June 25&ndash;26, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086039 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Rensink, Arend. editor. (orcid)0000-0002-1714-6319<br/><a href="https://doi.org/10.1007/978-3-319-93317-7">https://doi.org/10.1007/978-3-319-93317-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:2086285 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085406 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lambrinoudakis, Costas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31811-0">https://doi.org/10.1007/978-3-319-31811-0</a><br/>Format:&#160;Electronic Resources<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085234 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lecomte, Thierry. editor.<br/><a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 37th International Conference, SAFECOMP 2018, V&auml;ster&aring;s, Sweden, September 19-21, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085584 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/><a href="https://doi.org/10.1007/978-3-319-99130-6">https://doi.org/10.1007/978-3-319-99130-6</a><br/>Format:&#160;Electronic Resources<br/> Biometric Recognition 13th Chinese Conference, CCBR 2018, Urumqi, China, August 11-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085327 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhou, Jie. editor.<br/><a href="https://doi.org/10.1007/978-3-319-97909-0">https://doi.org/10.1007/978-3-319-97909-0</a><br/>Format:&#160;Electronic Resources<br/> Engineering Psychology and Cognitive Ergonomics 15th International Conference, EPCE 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086176 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Harris, Don. editor.<br/><a href="https://doi.org/10.1007/978-3-319-91122-9">https://doi.org/10.1007/978-3-319-91122-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Multimedia Information Processing &ndash; PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:2085671 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zeng, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77380-3">https://doi.org/10.1007/978-3-319-77380-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Multimedia Information Processing &ndash; PCM 2017 18th Pacific-Rim Conference on Multimedia, Harbin, China, September 28-29, 2017, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:2085672 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zeng, Bing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-77383-4">https://doi.org/10.1007/978-3-319-77383-4</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:502803 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zamboni, Diego. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:511672 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chakrabarti, Anirban. author.<br/><a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 18th International Symposium, SSS 2016, Lyon, France, November 7-10, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2086006 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bonakdarpour, Borzoo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49259-9">https://doi.org/10.1007/978-3-319-49259-9</a><br/>Format:&#160;Electronic Resources<br/> Progress in Cryptology &ndash; INDOCRYPT 2018 19th International Conference on Cryptology in India, New Delhi, India, December 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085388 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chakraborty, Debrup. editor. (orcid)0000-0001-5179-1971<br/><a href="https://doi.org/10.1007/978-3-030-05378-9">https://doi.org/10.1007/978-3-030-05378-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084858 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sun, Guanglu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085215 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Panayiotou, Christos G. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/> Wired/Wireless Internet Communications 5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512518 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Boavida, Fernando. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72697-5">http://dx.doi.org/10.1007/978-3-540-72697-5</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:2085858 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Aldini, Alessandro. editor.<br/><a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/> Beginning ethical hacking with Python ent://SD_ILS/0/SD_ILS:2312262 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sinha, Sanjib.<br/><a href="https://learning.oreilly.com/library/view/~/9781484225417">https://learning.oreilly.com/library/view/~/9781484225417</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar">https://go.oreilly.com/library-access/library/view/-/9781484225417/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484225417/?ar">https://learning.oreilly.com/library/view/~/9781484225417/?ar</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503563 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Onieva, Jose A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-79966-5">http://dx.doi.org/10.1007/978-3-540-79966-5</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management. Facing up to Next Steps 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084254 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lehmann, Anja. editor.<br/><a href="https://doi.org/10.1007/978-3-319-55783-0">https://doi.org/10.1007/978-3-319-55783-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Multimedia Information Processing &ndash; PCM 2018 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085330 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hong, Richang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00764-5">https://doi.org/10.1007/978-3-030-00764-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Secure Systems &ndash; IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084922 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Venkataramani, Guru Prasadh. editor.<br/><a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085016 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Peyrin, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-662-52993-5">https://doi.org/10.1007/978-3-662-52993-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085417 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bishop, Matt. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45871-7">https://doi.org/10.1007/978-3-319-45871-7</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085737 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49387-8">https://doi.org/10.1007/978-3-662-49387-8</a><br/>Format:&#160;Electronic Resources<br/> Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085568 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50832-0">https://doi.org/10.1007/978-3-319-50832-0</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085238 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Franz, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45572-3">https://doi.org/10.1007/978-3-319-45572-3</a><br/>Format:&#160;Electronic Resources<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:2088167 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Amini, M. Hadi. editor.<br/><a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Trends in Computer Applications Best Studies from the 2017 International Conference on Computer and Applications, Dubai, UAE ent://SD_ILS/0/SD_ILS:2084233 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Alja&rsquo;am, Jihad Mohamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89914-5">https://doi.org/10.1007/978-3-319-89914-5</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Trust in Modern Data Management ent://SD_ILS/0/SD_ILS:512193 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Petković, Milan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format:&#160;Electronic Resources<br/> Soft Computing Systems Second International Conference, ICSCS 2018, Kollam, India, April 19&ndash;20, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084320 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zelinka, Ivan. editor.<br/><a href="https://doi.org/10.1007/978-981-13-1936-5">https://doi.org/10.1007/978-981-13-1936-5</a><br/>Format:&#160;Electronic Resources<br/> Towards Autonomous Robotic Systems 19th Annual Conference, TAROS 2018, Bristol, UK July 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085131 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Giuliani, Manuel. editor. (orcid)0000-0003-3781-7623<br/><a href="https://doi.org/10.1007/978-3-319-96728-8">https://doi.org/10.1007/978-3-319-96728-8</a><br/>Format:&#160;Electronic Resources<br/> Digital-Forensics and Watermarking 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085225 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Shi, Yun-Qing. editor.<br/><a href="https://doi.org/10.1007/978-3-319-31960-5">https://doi.org/10.1007/978-3-319-31960-5</a><br/>Format:&#160;Electronic Resources<br/> Cyberspace Safety and Security 10th International Symposium, CSS 2018, Amalfi, Italy, October 29&ndash;31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085171 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Castiglione, Arcangelo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01689-0">https://doi.org/10.1007/978-3-030-01689-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503664 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Grimaud, Gilles. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85893-5">http://dx.doi.org/10.1007/978-3-540-85893-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing 5th IFIP WG 2.14 European Conference, ESOCC 2016, Vienna, Austria, September 5-7, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085082 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Aiello, Marco. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44482-6">https://doi.org/10.1007/978-3-319-44482-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Visual Computing 12th International Symposium, ISVC 2016, Las Vegas, NV, USA, December 12-14, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085258 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bebis, George. editor.<br/><a href="https://doi.org/10.1007/978-3-319-50835-1">https://doi.org/10.1007/978-3-319-50835-1</a><br/>Format:&#160;Electronic Resources<br/> Future Access Enablers for Ubiquitous and Intelligent Infrastructures Third International Conference, FABULOUS 2017, Bucharest, Romania, October 12-14, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084882 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Fratu, Octavian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92213-3">https://doi.org/10.1007/978-3-319-92213-3</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability - The Security Challenges of the Connected World 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2084105 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Jahankhani, Hamid. editor.<br/><a href="https://doi.org/10.1007/978-3-319-51064-4">https://doi.org/10.1007/978-3-319-51064-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085052 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Su, Chunhua. editor.<br/><a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Electronic Resources<br/> Passive and Active Measurement 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085745 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Karagiannis, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-319-30505-9">https://doi.org/10.1007/978-3-319-30505-9</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII Selected Papers from FDSE 2014 ent://SD_ILS/0/SD_ILS:2085810 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49175-1">https://doi.org/10.1007/978-3-662-49175-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084620 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Peterson, Gilbert. editor.<br/><a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/> Graphical Models for Security Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085224 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mauw, Sjouke. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29968-6">https://doi.org/10.1007/978-3-319-29968-6</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2085659 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ranise, Silvio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Software &ndash; ICMS 2018 6th International Conference, South Bend, IN, USA, July 24-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085574 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Davenport, James H. editor. (orcid)0000-0002-3982-7545<br/><a href="https://doi.org/10.1007/978-3-319-96418-8">https://doi.org/10.1007/978-3-319-96418-8</a><br/>Format:&#160;Electronic Resources<br/> RoboCup 2017: Robot World Cup XXI ent://SD_ILS/0/SD_ILS:2085312 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Akiyama, Hidehisa. editor. (orcid)0000-0002-9793-9123<br/><a href="https://doi.org/10.1007/978-3-030-00308-1">https://doi.org/10.1007/978-3-030-00308-1</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085428 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Monrose, Fabian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems. OTM 2018 Conferences Confederated International Conferences: CoopIS, C&amp;TC, and ODBASE 2018, Valletta, Malta, October 22-26, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085154 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Panetto, Herv&eacute;. editor.<br/><a href="https://doi.org/10.1007/978-3-030-02610-3">https://doi.org/10.1007/978-3-030-02610-3</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085370 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061<br/><a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085036 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Wang, Guojun. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49145-5">https://doi.org/10.1007/978-3-319-49145-5</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXXII 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16&ndash;18, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086193 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kerschbaum, Florian. editor.<br/><a href="https://doi.org/10.1007/978-3-319-95729-6">https://doi.org/10.1007/978-3-319-95729-6</a><br/>Format:&#160;Electronic Resources<br/> Automated Technology for Verification and Analysis 16th International Symposium, ATVA 2018, Los Angeles, CA, USA, October 7-10, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085158 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lahiri, Shuvendu K. editor.<br/><a href="https://doi.org/10.1007/978-3-030-01090-4">https://doi.org/10.1007/978-3-030-01090-4</a><br/>Format:&#160;Electronic Resources<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:2084248 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Vempaty, Aditya. author.<br/><a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085235 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lin, Dongdai. editor.<br/><a href="https://doi.org/10.1007/978-3-319-38898-4">https://doi.org/10.1007/978-3-319-38898-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085805 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Skavhaug, Amund. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085729 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-29814-6">https://doi.org/10.1007/978-3-319-29814-6</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503684 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lippmann, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512460 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sauveron, Damien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">http://dx.doi.org/10.1007/978-3-540-72354-7</a><br/>Format:&#160;Electronic Resources<br/> Inside Radio: An Attack and Defense Guide ent://SD_ILS/0/SD_ILS:2084695 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Yang, Qing. author.<br/><a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084265 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Janczewski, Lech Jan. editor. (orcid)0000-0003-3319-924X<br/><a href="https://doi.org/10.1007/978-3-319-99828-2">https://doi.org/10.1007/978-3-319-99828-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085439 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45744-4">https://doi.org/10.1007/978-3-319-45744-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2016 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085676 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Askoxylakis, Ioannis. editor.<br/><a href="https://doi.org/10.1007/978-3-319-45741-3">https://doi.org/10.1007/978-3-319-45741-3</a><br/>Format:&#160;Electronic Resources<br/> Mobile Ad-Hoc and Sensor Networks Third International Conference, MSN 2007 Beijing, China, December 12-14, 2007 Proceedings ent://SD_ILS/0/SD_ILS:512998 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Zhang, Hongke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77024-4">http://dx.doi.org/10.1007/978-3-540-77024-4</a><br/>Format:&#160;Electronic Resources<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:2084340 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kim, Kwangjo. author.<br/><a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085299 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bailey, Michael. editor.<br/><a href="https://doi.org/10.1007/978-3-030-00470-5">https://doi.org/10.1007/978-3-030-00470-5</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085801 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49096-9">https://doi.org/10.1007/978-3-662-49096-9</a><br/>Format:&#160;Electronic Resources<br/> Theory of Cryptography 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085677 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kushilevitz, Eyal. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49099-0">https://doi.org/10.1007/978-3-662-49099-0</a><br/>Format:&#160;Electronic Resources<br/> Smart Homes and Health Telematics, Designing a Better Future: Urban Assisted Living 16th International Conference, ICOST 2018, Singapore, Singapore, July 10-12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086124 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Mokhtari, Mounir. editor.<br/><a href="https://doi.org/10.1007/978-3-319-94523-1">https://doi.org/10.1007/978-3-319-94523-1</a><br/>Format:&#160;Electronic Resources<br/> Image Analysis and Recognition 15th International Conference, ICIAR 2018, P&oacute;voa de Varzim, Portugal, June 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085883 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Campilho, Aur&eacute;lio. editor.<br/><a href="https://doi.org/10.1007/978-3-319-93000-8">https://doi.org/10.1007/978-3-319-93000-8</a><br/>Format:&#160;Electronic Resources<br/> Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085190 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Lai, Jian-Huang. editor.<br/><a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security 4th International Conference, ICCCS 2018, Haikou, China, June 8&ndash;10, 2018, Revised Selected Papers, Part IV ent://SD_ILS/0/SD_ILS:2085313 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Sun, Xingming. editor. (orcid)0000-0001-7982-726X<br/><a href="https://doi.org/10.1007/978-3-030-00015-8">https://doi.org/10.1007/978-3-030-00015-8</a><br/>Format:&#160;Electronic Resources<br/> On the Move to Meaningful Internet Systems: OTM 2016 Conferences Confederated International Conferences: CoopIS, C&amp;TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085666 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Debruyne, Christophe. editor.<br/><a href="https://doi.org/10.1007/978-3-319-48472-3">https://doi.org/10.1007/978-3-319-48472-3</a><br/>Format:&#160;Electronic Resources<br/> Ubiquitous Intelligence and Computing 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007. Proceedings ent://SD_ILS/0/SD_ILS:512691 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Indulska, Jadwiga. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-73549-6">http://dx.doi.org/10.1007/978-3-540-73549-6</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084401 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Staggs, Jason. editor.<br/><a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2086054 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Imine, Abdessamad. editor.<br/><a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2084268 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/><a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Electronic Resources<br/> Industrial IoT Technologies and Applications International Conference, Industrial IoT 2016, GuangZhou, China, March 25-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2084204 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Wan, Jiafu. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44350-8">https://doi.org/10.1007/978-3-319-44350-8</a><br/>Format:&#160;Electronic Resources<br/> Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project ent://SD_ILS/0/SD_ILS:2087504 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Takagi, Tsuyoshi. editor.<br/><a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085561 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086209 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Hartmann, Sven. editor.<br/><a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/> Cryptography and Coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007. Proceedings ent://SD_ILS/0/SD_ILS:513023 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Galbraith, Steven D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-77272-9">http://dx.doi.org/10.1007/978-3-540-77272-9</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085588 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Bauer, Lujo. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89722-6">https://doi.org/10.1007/978-3-319-89722-6</a><br/>Format:&#160;Electronic Resources<br/> Information and Communications Security 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings ent://SD_ILS/0/SD_ILS:2085623 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Qing, Sihan. editor.<br/><a href="https://doi.org/10.1007/978-3-319-89500-0">https://doi.org/10.1007/978-3-319-89500-0</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085585 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49896-5">https://doi.org/10.1007/978-3-662-49896-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2086099 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53018-4">https://doi.org/10.1007/978-3-662-53018-4</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; EUROCRYPT 2016 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085735 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Fischlin, Marc. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49890-3">https://doi.org/10.1007/978-3-662-49890-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III ent://SD_ILS/0/SD_ILS:2085736 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53015-3">https://doi.org/10.1007/978-3-662-53015-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; CRYPTO 2016 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085962 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Robshaw, Matthew. editor.<br/><a href="https://doi.org/10.1007/978-3-662-53008-5">https://doi.org/10.1007/978-3-662-53008-5</a><br/>Format:&#160;Electronic Resources<br/> Critical Information Infrastructures Security 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085464 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;D'Agostino, Gregorio. editor. (orcid)0000-0003-3657-5335<br/><a href="https://doi.org/10.1007/978-3-319-99843-5">https://doi.org/10.1007/978-3-319-99843-5</a><br/>Format:&#160;Electronic Resources<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:501518 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Karabulut, Y&uuml;cel. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/> Symbiotic Interaction 6th International Workshop, Symbiotic 2017, Eindhoven, The Netherlands, December 18&ndash;19, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085760 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ham, Jaap. editor. (orcid)0000-0003-1703-5165<br/><a href="https://doi.org/10.1007/978-3-319-91593-7">https://doi.org/10.1007/978-3-319-91593-7</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:2085904 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Kang, Brent ByungHoon. editor. (orcid)0000-0001-8984-1006<br/><a href="https://doi.org/10.1007/978-3-319-93563-8">https://doi.org/10.1007/978-3-319-93563-8</a><br/>Format:&#160;Electronic Resources<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085576 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X<br/><a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085086 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ray, Indrajit. editor.<br/><a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/> Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings ent://SD_ILS/0/SD_ILS:2086063 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Manulis, Mark. editor.<br/><a href="https://doi.org/10.1007/978-3-319-39555-5">https://doi.org/10.1007/978-3-319-39555-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Neural Networks &ndash; ISNN 2016 13th International Symposium on Neural Networks, ISNN 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:2085703 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Cheng, Long. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40663-3">https://doi.org/10.1007/978-3-319-40663-3</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography &ndash; PKC 2016 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085704 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Cheng, Chen-Mou. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49384-7">https://doi.org/10.1007/978-3-662-49384-7</a><br/>Format:&#160;Electronic Resources<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:2086154 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Ryan, Peter Y. A. editor.<br/><a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/> Blockchain &ndash; ICBC 2018 First International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2086094 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Chen, Shiping. editor. (orcid)0000-0002-4603-0024<br/><a href="https://doi.org/10.1007/978-3-319-94478-4">https://doi.org/10.1007/978-3-319-94478-4</a><br/>Format:&#160;Electronic Resources<br/> Tests and Proofs 12th International Conference, TAP 2018, Held as Part of STAF 2018, Toulouse, France, June 27-29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:2085913 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Dubois, Catherine. editor.<br/><a href="https://doi.org/10.1007/978-3-319-92994-1">https://doi.org/10.1007/978-3-319-92994-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:2085685 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40253-6">https://doi.org/10.1007/978-3-319-40253-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:2085230 2025-08-07T15:33:47Z 2025-08-07T15:33:47Z by&#160;Liu, Joseph K. editor.<br/><a href="https://doi.org/10.1007/978-3-319-40367-0">https://doi.org/10.1007/978-3-319-40367-0</a><br/>Format:&#160;Electronic Resources<br/>