Search Results for Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026te$003dILS$0026ps$003d300?dt=list 2024-05-24T10:30:35Z Data protection ent://SD_ILS/0/SD_ILS:134498 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bainbridge, David.<br/>Preferred Shelf Number&#160;KD1957.C65 B35 2000<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Reinventing data protection? ent://SD_ILS/0/SD_ILS:133806 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gutwirth, Serge.<br/>Preferred Shelf Number&#160;KJE6071.A8 R45 2009<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Reinventing Data Protection? ent://SD_ILS/0/SD_ILS:170552 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;Hert, Paul. editor.&#160;Terwangne, C&eacute;cile. editor.&#160;Nouwt, Sjaak. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-9498-9">http://dx.doi.org/10.1007/978-1-4020-9498-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Harbour Protection Through Data Fusion Technologies ent://SD_ILS/0/SD_ILS:170363 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Shahbazian, Elisa. editor.&#160;Rogova, Galina. editor.&#160;DeWeert, Michael J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-8883-4">http://dx.doi.org/10.1007/978-1-4020-8883-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Tolley's data protection handbook ent://SD_ILS/0/SD_ILS:248858 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Singleton, Susan.<br/>Preferred Shelf Number&#160;KJC1682 S56 2006<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> European Data Protection: Coming of Age ent://SD_ILS/0/SD_ILS:335904 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gutwirth, Serge. editor.&#160;Leenes, Ronald. editor.&#160;de Hert, Paul. editor.&#160;Poullet, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335904.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5170-5">http://dx.doi.org/10.1007/978-94-007-5170-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> European Data Protection: In Good Health? ent://SD_ILS/0/SD_ILS:206493 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gutwirth, Serge. editor.&#160;Leenes, Ronald. editor.&#160;De Hert, Paul. editor.&#160;Poullet, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2903-2">http://dx.doi.org/10.1007/978-94-007-2903-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection for virtual data centers ent://SD_ILS/0/SD_ILS:303835 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Buffington, Jason, 1970-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Wiley InterScience <a href="http://dx.doi.org/10.1002/9781118255766">An electronic book accessible through the World Wide Web; click for information</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=34782">http://www.books24x7.com/marc.asp?bookid=34782</a> Safari Books Online <a href="http://proquest.safaribooksonline.com/640">http://proquest.safaribooksonline.com/640</a> <a href="http://proquest.safaribooksonline.com/?fpi=9780470572146">http://proquest.safaribooksonline.com/?fpi=9780470572146</a> Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470572146.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470572146.jpg</a> <a href="http://site.ebrary.com/lib/alltitles/Doc?id=10411475">http://site.ebrary.com/lib/alltitles/Doc?id=10411475</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Protection in a Profiled World ent://SD_ILS/0/SD_ILS:205340 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;De Hert, Paul. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8865-9">http://dx.doi.org/10.1007/978-90-481-8865-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things Security and Data Protection ent://SD_ILS/0/SD_ILS:485847 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ziegler, S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:289700 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hill, David G. (David Gary), 1943-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439806937">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-privacy and online data protection : special report ent://SD_ILS/0/SD_ILS:317726 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Singleton, Susan.&#160;Carey, Peter, LL. M. E-privacy and online data protection.&#160;Ustaran, Eduardo.<br/>Preferred Shelf Number&#160;KD3756 C367 2007<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Data protection law in the EU : roles, responsibilities and liability ent://SD_ILS/0/SD_ILS:506286 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Van Alsenoy, Brendan, author.<br/>Preferred Shelf Number&#160;KJE6071 .V36 2019<br/>Electronic Access&#160;<a href="https://www.cambridge.org/core/product/identifier/9781780688459/type/BOOK">https://www.cambridge.org/core/product/identifier/9781780688459/type/BOOK</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection for photographers : a guide to storing and protecting your valuable digital assets ent://SD_ILS/0/SD_ILS:364242 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Corrigan, Patrick H.<br/>Preferred Shelf Number&#160;TK7895.M4 C67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Privacy and Data Protection Issues of Biometric Applications A Comparative Legal Analysis ent://SD_ILS/0/SD_ILS:336365 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kindt, Els J. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336365.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-7522-0">http://dx.doi.org/10.1007/978-94-007-7522-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beyond Data Protection Strategic Case Studies and Practical Guidance ent://SD_ILS/0/SD_ILS:333660 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ismail, Noriswadi. editor.&#160;Yong Cieh, Edwin Lee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333660.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33081-0">http://dx.doi.org/10.1007/978-3-642-33081-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Market Integration Through Data Protection An Analysis of the Insurance and Financial Industries in the EU ent://SD_ILS/0/SD_ILS:336155 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Viola de Azevedo Cunha, Mario. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336155.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6085-1">http://dx.doi.org/10.1007/978-94-007-6085-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Genetic Data and the Law A Critical Perspective on Privacy Protection ent://SD_ILS/0/SD_ILS:237397 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Taylor, Mark.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511910128">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Sharing and Data Protection in the Area of Freedom, Security and Justice Towards Harmonised Data Protection Principles for Information Exchange at EU-level ent://SD_ILS/0/SD_ILS:195011 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Boehm, Franziska. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22392-1">http://dx.doi.org/10.1007/978-3-642-22392-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computers, Privacy and Data Protection: an Element of Choice ent://SD_ILS/0/SD_ILS:205901 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gutwirth, Serge. editor.&#160;Poullet, Yves. editor.&#160;De Hert, Paul. editor.&#160;Leenes, Ronald. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-0641-5">http://dx.doi.org/10.1007/978-94-007-0641-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection : a practical guide to UK and EU law ent://SD_ILS/0/SD_ILS:134801 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Carey, Peter.<br/>Preferred Shelf Number&#160;KD1957.C65 C373 2009<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Effectiveness of personal data protection : automated processing of criminal justice management ent://SD_ILS/0/SD_ILS:135228 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Matjas, Tatjana.<br/>Preferred Shelf Number&#160;K3264.C65 M38 2009<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> European data protection law : corporate compliance and regulation ent://SD_ILS/0/SD_ILS:113810 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kuner, Christopher.&#160;Kuner, Christopher. European data privacy law and online business.<br/>Preferred Shelf Number&#160;KJE6071 .K86 2007<br/>Format:&#160;Books<br/>Availability&#160;Law Library~2<br/> Digital data integrity the evolution from passive protection to active management ent://SD_ILS/0/SD_ILS:296732 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Little, David B.&#160;Farmer, Skip.&#160;El-Hilali, Oussama.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=20460">http://www.books24x7.com/marc.asp?bookid=20460</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470035184">http://dx.doi.org/10.1002/9780470035184</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=83896&ref=toc">http://www.myilibrary.com?id=83896&ref=toc</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Negotiating privacy : the European Union, the United States, and personal data protection ent://SD_ILS/0/SD_ILS:134508 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Heisenberg, Dorothee<br/>Preferred Shelf Number&#160;K3264.C65 H45 2005<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Data protection and data access : reports from ten countries on data protection and data access in social research, with an annotated international bibliograhy ent://SD_ILS/0/SD_ILS:15275 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Guchteneire, Paul de, ed.&#160;Mochmann, Ekkehard, ed.<br/>Preferred Shelf Number&#160;K 3264.C65 D38 1990<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:287123 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tipton, Harold F.&#160;Nozaki, Micki Krause.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439893159">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:290320 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003406">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook ent://SD_ILS/0/SD_ILS:289151 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tipton, Harold F.&#160;Krause, Micki.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203325438">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bulut bili&#351;im sistemleri : (KVKK kapsam&#305;nda) ent://SD_ILS/0/SD_ILS:517350 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Maya, Duygu.<br/>Preferred Shelf Number&#160;K564.C6 M393 2024<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Vergi m&uuml;kellefinin verilerinin korunmas&#305; : ki&#351;isel verilerin korunmas&#305;n&#305; isteme hakk&#305;n&#305;n vergi hukukuna etkileri ent://SD_ILS/0/SD_ILS:517341 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ak&ccedil;ao&#287;lu, Ertu&#287;rul.<br/>Preferred Shelf Number&#160;KKX3550 A33 2023<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Ki&#351;isel verilerin korunmas&#305; hukukunda ticari elektronik iletiler ent://SD_ILS/0/SD_ILS:514666 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kaya, Ramazan Furkan.<br/>Preferred Shelf Number&#160;KKX3042 K393 2023<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Dijital g&uuml;venlik : dijital ortamlarda g&uuml;venle var olmak ent://SD_ILS/0/SD_ILS:517179 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;&Ouml;zer, Fatih.&#160;&#350;ahin, Yusuf Levent, edit&ouml;r<br/>Preferred Shelf Number&#160;QA76.9.E74 O94 2022<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Ki&#351;isel verilerin korunmas&#305; ve verileri yok etmeme su&ccedil;u (TCK m.138) ent://SD_ILS/0/SD_ILS:506003 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Selek, Ozan.<br/>Preferred Shelf Number&#160;KKX3042 K89 2021<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Dijital mahremiyet : &ouml;zel hayat&#305;n&#305;z ne kadar gizli? ent://SD_ILS/0/SD_ILS:462618 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;&Ouml;zdemir, Harun.<br/>Preferred Shelf Number&#160;K3264.C65 D555 2020<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Ki&#351;isel verilerin korunmas&#305; ent://SD_ILS/0/SD_ILS:481329 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;&Ouml;zkan, O&#287;ulcan.<br/>Preferred Shelf Number&#160;KKX843 O95 2020<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Ki&#351;isel verileri koruma el kitab&#305;: teknik uygulama ve uyumluluk ent://SD_ILS/0/SD_ILS:505762 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Alkan, Mustafa.&#160;Mente&#351;, Turhan&#160;&#304;nceefe, Mehmet Ali.<br/>Preferred Shelf Number&#160;KKX2485 A45 2020<br/>Format:&#160;Books<br/>Availability&#160;Law Library~2<br/> 6698 say&#305;l&#305; ki&#351;isel verilerin korunmas&#305; kanunun AB veri koruma hukuku &#305;&#351;&#305;&#287;&#305;nda de&#287;erlendirilmesi ent://SD_ILS/0/SD_ILS:506005 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;H&#305;zarc&#305;, Emine.<br/>Preferred Shelf Number&#160;KJE1626 H593 2020<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Malicious Attack Propagation and Source Identification ent://SD_ILS/0/SD_ILS:482633 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jiang, Jiaojiao. author.&#160;Wen, Sheng. author.&#160;Liu, Bo. author.&#160;Yu, Shui. author.&#160;Xiang, Yang. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ubiquitous Computing and Computing Security of IoT ent://SD_ILS/0/SD_ILS:482645 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jeyanthi, N. editor.&#160;Abraham, Ajith. editor.&#160;Mcheick, Hamid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01566-4">https://doi.org/10.1007/978-3-030-01566-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing &ndash; CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482766 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Da Silva, Dilma. editor.&#160;Wang, Qingyang. editor. (orcid)0000-0002-5729-2898&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23502-4">https://doi.org/10.1007/978-3-030-23502-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 10th International Conference, PQCrypto 2019, Chongqing, China, May 8&ndash;10, 2019 Revised Selected Papers ent://SD_ILS/0/SD_ILS:483295 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ding, Jintai. editor.&#160;Steinwandt, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-25510-7">https://doi.org/10.1007/978-3-030-25510-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Multimedia Information Security: Techniques and Applications ent://SD_ILS/0/SD_ILS:483348 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Singh, Amit Kumar. editor.&#160;Mohan, Anand. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trends and Applications in Knowledge Discovery and Data Mining PAKDD 2019 Workshops, BDM, DLKT, LDRC, PAISI, WeL, Macau, China, April 14&ndash;17, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483717 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;U., Leong Hou. editor.&#160;Lauw, Hady W. editor. (orcid)0000-0002-8245-8677&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-26142-9">https://doi.org/10.1007/978-3-030-26142-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Blockchain Technology in Internet of Things ent://SD_ILS/0/SD_ILS:484527 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zhu, Liehuang. author.&#160;Gai, Keke. author.&#160;Li, Meng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-21766-2">https://doi.org/10.1007/978-3-030-21766-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Control Systems Security and Resiliency Practice and Theory ent://SD_ILS/0/SD_ILS:484767 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Rieger, Craig. editor.&#160;Ray, Indrajit. editor.&#160;Zhu, Quanyan. editor.&#160;Haney, Michael A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485314 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Feng, Jun. editor. (orcid)0000-0001-9917-1819&#160;Bhuiyan, Md Zakirul Alam. editor. (orcid)0000-0002-9513-9990&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24900-7">https://doi.org/10.1007/978-3-030-24900-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Histories of Computing in Eastern Europe IFIP WG 9.7 International Workshop on the History of Computing, HC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Pozna&#324;, Poland, September 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485365 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Leslie, Christopher. editor.&#160;Schmitt, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29160-0">https://doi.org/10.1007/978-3-030-29160-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows ent://SD_ILS/0/SD_ILS:486057 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Guttman, Joshua D. editor.&#160;Landwehr, Carl E. editor.&#160;Meseguer, Jos&eacute;. editor.&#160;Pavlovic, Dusko. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-19052-1">https://doi.org/10.1007/978-3-030-19052-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid and Internet of Things Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486172 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Pathan, Al-Sakib Khan. editor. (orcid)0000-0001-6572-3451&#160;Fadlullah, Zubair Md. editor.&#160;Guerroumi, Mohamed. editor. (orcid)0000-0001-9998-0608&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05928-6">https://doi.org/10.1007/978-3-030-05928-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484276 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chen, Jiann-Liang. editor.&#160;Pang, Ai-Chun. editor.&#160;Deng, Der-Jiunn. editor.&#160;Lin, Chun-Cheng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-06158-6">https://doi.org/10.1007/978-3-030-06158-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486649 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proactive and Dynamic Network Defense ent://SD_ILS/0/SD_ILS:486655 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Cliff. editor.&#160;Lu, Zhuo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486855 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Breitinger, Frank. editor. (orcid)0000-0001-5261-4600&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05487-8">https://doi.org/10.1007/978-3-030-05487-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ki&#351;isel verilerin korunmas&#305; ent://SD_ILS/0/SD_ILS:422943 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;K&uuml;zeci, Elif.<br/>Preferred Shelf Number&#160;KKX2485 K89 2019<br/>Format:&#160;Books<br/>Availability&#160;Law Library~2<br/> Kar&#351;&#305;la&#351;t&#305;rmal&#305; hukukta ki&#351;isel verilerin korunmas&#305; ent://SD_ILS/0/SD_ILS:458537 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Turan, Metin.<br/>Preferred Shelf Number&#160;KKX3042 T87 2019<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Information Security Practice and Experience 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483099 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Heng, Swee-Huay. editor. (orcid)0000-0003-3627-2131&#160;Lopez, Javier. editor. (orcid)0000-0001-8066-9991&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34339-2">https://doi.org/10.1007/978-3-030-34339-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 6th International Conference, FDSE 2019, Nha Trang City, Vietnam, November 27&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483119 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Dang, Tran Khanh. editor.&#160;K&uuml;ng, Josef. editor.&#160;Takizawa, Makoto. editor.&#160;Bui, Son Ha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35653-8">https://doi.org/10.1007/978-3-030-35653-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 13th International Conference, CRiSIS 2018, Arcachon, France, October 16&ndash;18, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483592 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zemmari, Akka. editor.&#160;Mosbah, Mohamed. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12143-3">https://doi.org/10.1007/978-3-030-12143-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:483593 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Flammini, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Security Auditing ent://SD_ILS/0/SD_ILS:483467 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Majumdar, Suryadipta. author. (orcid)0000-0002-6501-4214&#160;Madi, Taous. author.&#160;Wang, Yushun. author.&#160;Tabiban, Azadeh. author.&#160;Oqaily, Momen. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23128-6">https://doi.org/10.1007/978-3-030-23128-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16&ndash;18, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483608 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Albrecht, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35199-1">https://doi.org/10.1007/978-3-030-35199-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Privacy Preservation for Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:483634 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Pan, Miao. author.&#160;Wang, Jingyi. author.&#160;Errapotu, Sai Mounika. author.&#160;Zhang, Xinyue. author.&#160;Ding, Jiahao. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13370-2">https://doi.org/10.1007/978-3-030-13370-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15&ndash;16, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483660 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Venter, Hein. editor. (orcid)0000-0002-3607-8630&#160;Loock, Marianne. editor. (orcid)0000-0001-8005-716X&#160;Coetzee, Marijke. editor. (orcid)0000-0002-9157-3079&#160;Eloff, Mariki. editor. (orcid)0000-0001-8997-7931&#160;Eloff, Jan. editor. (orcid)0000-0003-4683-2198<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11407-7">https://doi.org/10.1007/978-3-030-11407-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security ent://SD_ILS/0/SD_ILS:484201 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Pelton, Joseph N. author.&#160;Singh, Indu B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network security and its impact on business strategy ent://SD_ILS/0/SD_ILS:482213 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Oncioiu, Ionica, 1972- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8455-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Informatics 6th International Visual Informatics Conference, IVIC 2019, Bangi, Malaysia, November 19&ndash;21, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483526 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Badioze Zaman, Halimah. editor.&#160;Smeaton, Alan F. editor.&#160;Shih, Timothy K. editor.&#160;Velastin, Sergio. editor.&#160;Terutoshi, Tada. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34032-2">https://doi.org/10.1007/978-3-030-34032-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G Enabled Secure Wireless Networks ent://SD_ILS/0/SD_ILS:483926 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jayakody, Dushantha Nalin K. editor.&#160;Srinivasan, Kathiravan. editor.&#160;Sharma, Vishal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03508-2">https://doi.org/10.1007/978-3-030-03508-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26&ndash;29, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:483778 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hartmann, Sven. editor.&#160;K&uuml;ng, Josef. editor.&#160;Chakravarthy, Sharma. editor.&#160;Anderst-Kotsis, Gabriele. editor.&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27615-7">https://doi.org/10.1007/978-3-030-27615-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Learning-based VANET Communication and Security Techniques ent://SD_ILS/0/SD_ILS:483960 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Xiao, Liang. author.&#160;Zhuang, Weihua. author.&#160;Zhou, Sheng. author.&#160;Chen, Cailian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01731-6">https://doi.org/10.1007/978-3-030-01731-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for Next-Generation Wireless Networks ent://SD_ILS/0/SD_ILS:484125 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zhong, Sheng. author.&#160;Zhong, Hong. author.&#160;Huang, Xinyi. author.&#160;Yang, Panlong. author.&#160;Shi, Jin. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01150-5">https://doi.org/10.1007/978-3-030-01150-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in the Electricity Sector Managing Critical Infrastructure ent://SD_ILS/0/SD_ILS:484738 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Leszczyna, Rafa&#322;. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-19538-0">https://doi.org/10.1007/978-3-030-19538-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7&ndash;9, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:484820 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bebis, George. editor.&#160;Boyle, Richard. editor.&#160;Parvin, Bahram. editor.&#160;Koracin, Darko. editor.&#160;Ushizima, Daniela. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-33720-9">https://doi.org/10.1007/978-3-030-33720-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 30th International Conference, DEXA 2019, Linz, Austria, August 26&ndash;29, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484879 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hartmann, Sven. editor.&#160;K&uuml;ng, Josef. editor.&#160;Chakravarthy, Sharma. editor.&#160;Anderst-Kotsis, Gabriele. editor.&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-27618-8">https://doi.org/10.1007/978-3-030-27618-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484933 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zheng, Jun. editor.&#160;Xiang, Wei. editor.&#160;Lorenz, Pascal. editor.&#160;Mao, Shiwen. editor.&#160;Yan, Feng. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05888-3">https://doi.org/10.1007/978-3-030-05888-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 9th International Conference, SPACE 2019, Gandhinagar, India, December 3&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485010 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bhasin, Shivam. editor. (orcid)0000-0002-6903-5127&#160;Mendelson, Avi. editor.&#160;Nandi, Mridul. editor. (orcid)0000-0002-1029-6576&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-35869-3">https://doi.org/10.1007/978-3-030-35869-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances and Trends in Artificial Intelligence. From Theory to Practice 32nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2019, Graz, Austria, July 9&ndash;11, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485129 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wotawa, Franz. editor.&#160;Friedrich, Gerhard. editor.&#160;Pill, Ingo. editor.&#160;Koitz-Hristov, Roxane. editor.&#160;Ali, Moonis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22999-3">https://doi.org/10.1007/978-3-030-22999-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Blockchain Second International Conference, SmartBlock 2019, Birmingham, UK, October 11&ndash;13, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485178 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34083-4">https://doi.org/10.1007/978-3-030-34083-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485193 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;You, Ilsun. editor. (orcid)0000-0002-0604-3445&#160;Chen, Hsing-Chung. editor.&#160;Sharma, Vishal. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-3732-1">https://doi.org/10.1007/978-981-13-3732-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Big Data and IoT Security ent://SD_ILS/0/SD_ILS:485849 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554&#160;Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10543-3">https://doi.org/10.1007/978-3-030-10543-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486019 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Shen, Bazhong. editor.&#160;Wang, Baocang. editor. (orcid)0000-0002-2554-4464&#160;Han, Jinguang. editor. (orcid)0000-0002-4993-9452&#160;Yu, Yong. editor. (orcid)0000-0003-0667-077X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Visual Computing 14th International Symposium on Visual Computing, ISVC 2019, Lake Tahoe, NV, USA, October 7&ndash;9, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484218 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bebis, George. editor.&#160;Boyle, Richard. editor.&#160;Parvin, Bahram. editor.&#160;Koracin, Darko. editor.&#160;Ushizima, Daniela. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-33723-0">https://doi.org/10.1007/978-3-030-33723-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484288 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gao, Honghao. editor.&#160;Yin, Yuyu. editor.&#160;Yang, Xiaoxian. editor.&#160;Miao, Huaikou. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12971-2">https://doi.org/10.1007/978-3-030-12971-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data &ndash; BigData 2019 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486277 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chen, Keke. editor. (orcid)0000-0002-9996-156X&#160;Seshadri, Sangeetha. editor.&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23551-2">https://doi.org/10.1007/978-3-030-23551-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13&ndash;15, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486285 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zincir-Heywood, Nur. editor.&#160;Bonfante, Guillaume. editor.&#160;Debbabi, Mourad. editor. (orcid)0000-0003-3015-3043&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18419-3">https://doi.org/10.1007/978-3-030-18419-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances of Science and Technology 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486686 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zimale, Fasikaw Atanaw. editor.&#160;Enku Nigussie, Temesgen. editor.&#160;Fanta, Solomon Workneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15357-1">https://doi.org/10.1007/978-3-030-15357-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486725 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Berlingerio, Michele. editor.&#160;Bonchi, Francesco. editor.&#160;G&auml;rtner, Thomas. editor.&#160;Hurley, Neil. editor. (orcid)0000-0001-8428-2866&#160;Ifrim, Georgiana. editor. (orcid)0000-0002-8400-2972<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10925-7">https://doi.org/10.1007/978-3-030-10925-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486744 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674&#160;Marquez-Barja, Johann. editor. (orcid)0000-0001-5660-3597&#160;Shahid, Adnan. editor. (orcid)0000-0003-1943-6261&#160;Liu, Wei. editor.&#160;Giannoulis, Spilios. editor. (orcid)0000-0002-3190-8770<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05490-8">https://doi.org/10.1007/978-3-030-05490-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486939 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems: Research, Development, Applications, Education 12th SIGSAND/PLAIS EuroSymposium 2019, Gdansk, Poland, September 19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487038 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wrycza, Stanis&#322;aw. editor. (orcid)0000-0001-7699-6631&#160;Ma&#347;lankowski, Jacek. editor. (orcid)0000-0003-0357-2736&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29608-7">https://doi.org/10.1007/978-3-030-29608-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487049 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Duong, Trung Quang. editor.&#160;Vo, Nguyen-Son. editor.&#160;Nguyen, Loi K. editor.&#160;Vien, Quoc-Tuan. editor.&#160;Nguyen, Van-Dinh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30149-1">https://doi.org/10.1007/978-3-030-30149-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> B&uuml;y&uuml;k veri uygulamalar&#305;nda ki&#351;isel veri mahremiyeti : uzmanl&#305;k tezi ent://SD_ILS/0/SD_ILS:424638 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ak&#305;nc&#305;, Ay&#351;e Nur.<br/>Preferred Shelf Number&#160;JC571 A35 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Siber g&uuml;venlik ve savunma : standartlar ve uygulamalar ent://SD_ILS/0/SD_ILS:462283 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sa&#287;&#305;ro&#287;lu, &#350;eref.<br/>Preferred Shelf Number&#160;TK5105.59 S53 2019<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings ent://SD_ILS/0/SD_ILS:482942 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Al-Shaer, Ehab. editor.&#160;Wei, Jinpeng. editor. (orcid)0000-0002-6982-7386&#160;Hamlen, Kevin W. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Education. Education in Proactive Information Security 12th IFIP WG 11.8 World Conference, WISE 12, Lisbon, Portugal, June 25&ndash;27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483477 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Drevin, Lynette. editor. (orcid)0000-0001-9370-8216&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-23451-5">https://doi.org/10.1007/978-3-030-23451-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483858 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Feng, Jun. editor. (orcid)0000-0001-9917-1819&#160;Bhuiyan, Md Zakirul Alam. editor. (orcid)0000-0002-9513-9990&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24907-6">https://doi.org/10.1007/978-3-030-24907-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484192 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Berlingerio, Michele. editor.&#160;Bonchi, Francesco. editor.&#160;G&auml;rtner, Thomas. editor.&#160;Hurley, Neil. editor. (orcid)0000-0001-8428-2866&#160;Ifrim, Georgiana. editor. (orcid)0000-0002-8400-2972<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10928-8">https://doi.org/10.1007/978-3-030-10928-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22&ndash;25, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484429 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Li, Guoliang. editor.&#160;Yang, Jun. editor.&#160;Gama, Joao. editor. (orcid)0000-0003-3357-1195&#160;Natwichai, Juggapong. editor.&#160;Tong, Yongxin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-18590-9">https://doi.org/10.1007/978-3-030-18590-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ki&#351;isel verilerin korunmas&#305; ent://SD_ILS/0/SD_ILS:392266 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;K&uuml;zeci, Elif.<br/>Preferred Shelf Number&#160;KKX2485 K89 2018<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Mahremiyet : dijital toplumda &ouml;zel hayat ent://SD_ILS/0/SD_ILS:392286 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lokke, Eirik.&#160;Ba&#351;ak, Dilek<br/>Preferred Shelf Number&#160;K3264.C65 L65 2018<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399024 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Security Reduction ent://SD_ILS/0/SD_ILS:399211 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Guo, Fuchun. author.&#160;Susilo, Willy. author. (orcid)0000-0002-1562-5105&#160;Mu, Yi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93049-7">https://doi.org/10.1007/978-3-319-93049-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Honeypot Frameworks and Their Applications: A New Framework ent://SD_ILS/0/SD_ILS:399250 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;NG, Chee Keong. author.&#160;Pan, Lei. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:399573 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kayem, Anne V. D. M. editor.&#160;Wolthusen, Stephen D. editor.&#160;Meinel, Christoph. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies for Authorization and Authentication First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399665 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Saracino, Andrea. editor.&#160;Mori, Paolo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04372-8">https://doi.org/10.1007/978-3-030-04372-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399906 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983&#160;Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026&#160;Yarom, Yuval. editor. (orcid)0000-0003-0401-4197&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-Physical Systems Security ent://SD_ILS/0/SD_ILS:399914 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98935-8">https://doi.org/10.1007/978-3-319-98935-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Multimedia First International Conference, ICSM 2018, Toulon, France, August 24&ndash;26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399927 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Basu, Anup. editor.&#160;Berretti, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04375-9">https://doi.org/10.1007/978-3-030-04375-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Versatile Cybersecurity ent://SD_ILS/0/SD_ILS:399974 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Somani, Gaurav. editor.&#160;Poovendran, Radha. editor. (orcid)0000-0003-0269-8097&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97643-3">https://doi.org/10.1007/978-3-319-97643-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXVI 26th International Workshop, Cambridge, UK, March 19&ndash;21, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400277 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.&#160;Christianson, Bruce. editor.&#160;Anderson, Jonathan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-03251-7">https://doi.org/10.1007/978-3-030-03251-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 &ndash; December 1, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400307 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zhang, Feng. editor. (orcid)0000-0003-1983-7321&#160;Zhai, Jidong. editor.&#160;Snir, Marc. editor.&#160;Jin, Hai. editor.&#160;Kasahara, Hironori. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Computing, Security, Privacy in New Computing Environments 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25&ndash;26, and December 15&ndash;16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:400508 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wan, Jiafu. editor.&#160;Lin, Kai. editor.&#160;Zeng, Delu. editor.&#160;Li, Jin. editor.&#160;Xiang, Yang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69605-8">https://doi.org/10.1007/978-3-319-69605-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400597 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Chen, Jinjun. editor.&#160;Yang, Laurence T. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mathematics and Computing 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400624 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ghosh, Debdas. editor.&#160;Giri, Debasis. editor.&#160;Mohapatra, Ram N. editor.&#160;Savas, Ekrem. editor.&#160;Sakurai, Kouichi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0023-3">https://doi.org/10.1007/978-981-13-0023-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XXXII Special Issue on Cybersecurity and Biometrics ent://SD_ILS/0/SD_ILS:400568 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C.J. Kenneth. editor.&#160;Sourin, Alexei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-56672-5">https://doi.org/10.1007/978-3-662-56672-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security with Intelligent Computing and Big-data Services ent://SD_ILS/0/SD_ILS:400872 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Peng, Sheng-Lung. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Balas, Valentina Emilia. editor.&#160;Zhao, Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400949 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78813-5">https://doi.org/10.1007/978-3-319-78813-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversary Detection For Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:401405 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401491 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hansen, Marit. editor.&#160;Kosta, Eleni. editor.&#160;Nai-Fovino, Igor. editor.&#160;Fischer-H&uuml;bner, Simone. editor. (orcid)0000-0002-6938-4466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Networking 11th EAI international Conference, ChinaCom 2016 Chongqing, China, September 24-26, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:402150 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chen, Qianbin. editor.&#160;Meng, Weixiao. editor.&#160;Zhao, Liqiang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66628-0">https://doi.org/10.1007/978-3-319-66628-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Networking 11th EAI International Conference, ChinaCom 2016, Chongqing, China, September 24-26, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:402158 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chen, Qianbin. editor.&#160;Meng, Weixiao. editor.&#160;Zhao, Liqiang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66625-9">https://doi.org/10.1007/978-3-319-66625-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402736 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gelenbe, Erol. editor. (orcid)0000-0001-9688-2201&#160;Campegiani, Paolo. editor.&#160;Czach&oacute;rski, Tadeusz. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Komnios, Ioannis. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95189-8">https://doi.org/10.1007/978-3-319-95189-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unutulma hakk&#305; : internetteki arama sonu&ccedil;lar&#305;ndan ki&#351;isel verilerin kald&#305;r&#305;lmas&#305; ent://SD_ILS/0/SD_ILS:392252 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Yavuz, Can.<br/>Preferred Shelf Number&#160;KJE1626 Y38 2018<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Smart Trends in Information Technology and Computer Communications Second International Conference, SmartCom 2017, Pune, India, August 18-19, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:399500 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Deshpande, A.V. editor.&#160;Unal, Aynur. editor.&#160;Passi, Kalpdrum. editor.&#160;Singh, Dharm. editor.&#160;Nayak, Malaya. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1423-0">https://doi.org/10.1007/978-981-13-1423-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399694 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252&#160;Raffai, Maria. editor. (orcid)0000-0001-6934-6366&#160;Doucek, Petr. editor. (orcid)0000-0002-5647-661X&#160;Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Applications of Neural Networks 19th International Conference, EANN 2018, Bristol, UK, September 3-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399759 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Pimenidis, Elias. editor. (orcid)0000-0003-3593-8640&#160;Jayne, Chrisina. editor. (orcid)0000-0001-7292-2109&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98204-5">https://doi.org/10.1007/978-3-319-98204-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G for Future Wireless Networks First International Conference, 5GWN 2017, Beijing, China, April 21-23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400890 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Long, Keping. editor.&#160;Leung, Victor C.M. editor.&#160;Zhang, Haijun. editor.&#160;Feng, Zhiyong. editor.&#160;Li, Yonghui. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72823-0">https://doi.org/10.1007/978-3-319-72823-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:400906 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Dehghantanha, Ali. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Dargahi, Tooska. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22&ndash;25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400846 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lin, Xiaodong. editor.&#160;Ghorbani, Ali. editor.&#160;Ren, Kui. editor.&#160;Zhu, Sencun. editor.&#160;Zhang, Aiqing. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-78816-6">https://doi.org/10.1007/978-3-319-78816-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Internet Security First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:401000 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;You, Ilsun. editor.&#160;Leu, Fang-Yie. editor.&#160;Chen, Hsing-Chung. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7850-7">https://doi.org/10.1007/978-981-10-7850-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 9th International Conference, AdHocNets 2017, Niagara Falls, ON, Canada, September 28&ndash;29, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401013 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zhou, Yifeng. editor.&#160;Kunz, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74439-1">https://doi.org/10.1007/978-3-319-74439-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:401109 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Internet Technologies and Trends First International Conference, ICFITT 2017, Surat, India, August 31 - September 2, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401813 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Patel, Zuber. editor.&#160;Gupta, Shilpi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73712-6">https://doi.org/10.1007/978-3-319-73712-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Technologies for Developing Countries First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings ent://SD_ILS/0/SD_ILS:401719 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Belqasmi, Fatna. editor.&#160;Harroud, Hamid. editor.&#160;Agueh, Max. editor.&#160;Dssouli, Rachida. editor.&#160;Kamoun, Faouzi. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67837-5">https://doi.org/10.1007/978-3-319-67837-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Network Systems and Security 4th International Conference, FNSS 2018, Paris, France, July 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401734 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94421-0">https://doi.org/10.1007/978-3-319-94421-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation ent://SD_ILS/0/SD_ILS:401907 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Petrenko, Sergei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals and Applications of Hardcopy Communication Conveying Side Information by Printed Media ent://SD_ILS/0/SD_ILS:402116 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Mayer, Joceli. author.&#160;Borges, Paulo V.K. author.&#160;J. Simske, Steven. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74083-6">https://doi.org/10.1007/978-3-319-74083-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology - New Generations 15th International Conference on Information Technology ent://SD_ILS/0/SD_ILS:398948 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Latifi, Shahram. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-77028-4">https://doi.org/10.1007/978-3-319-77028-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Enhancing Fog Computing and Its Applications ent://SD_ILS/0/SD_ILS:399066 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lin, Xiaodong. author.&#160;Ni, Jianbing. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Edge Computing: A Primer ent://SD_ILS/0/SD_ILS:400196 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Cao, Jie. author.&#160;Zhang, Quan. author.&#160;Shi, Weisong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02083-5">https://doi.org/10.1007/978-3-030-02083-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400247 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Ganapathy, Vinod. editor.&#160;Jaeger, Trent. editor.&#160;Shyamasundar, R.K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05171-6">https://doi.org/10.1007/978-3-030-05171-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400326 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Cortier, V&eacute;ronique. editor.&#160;Gor&eacute;, Rajeev. editor.&#160;Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Monitoring in P2P Botnets A Dual Perspective ent://SD_ILS/0/SD_ILS:400767 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Karuppayah, Shankar. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-9050-9">https://doi.org/10.1007/978-981-10-9050-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence Tools for Cyber Attribution ent://SD_ILS/0/SD_ILS:401866 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Nunes, Eric. author.&#160;Shakarian, Paulo. author.&#160;Simari, Gerardo I. author.&#160;Ruef, Andrew. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73788-1">https://doi.org/10.1007/978-3-319-73788-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management XII 12th IFIP WG 11.11 International Conference, IFIPTM 2018, Toronto, ON, Canada, July 10&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402007 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gal-Oz, Nurit. editor.&#160;Lewis, Peter R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95276-5">https://doi.org/10.1007/978-3-319-95276-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:402017 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Imine, Abdessamad. editor.&#160;Fernandez, Jos&eacute; M. editor. (orcid)0000-0001-9836-3595&#160;Marion, Jean-Yves. editor.&#160;Logrippo, Luigi. editor. (orcid)0000-0001-8804-0450&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Hybrid Information Processing First International Conference, ADHIP 2017, Harbin, China, July 17&ndash;18, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402205 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sun, Guanglu. editor.&#160;Liu, Shuai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73317-3">https://doi.org/10.1007/978-3-319-73317-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Networks and Intelligent Systems 3rd International Conference, INISCOM 2017, Ho Chi Minh City, Vietnam, September 4, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402381 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chen, Yuanfang. editor.&#160;Duong, Trung Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74176-5">https://doi.org/10.1007/978-3-319-74176-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Innovation and Interdisciplinary Solutions for Underserved Areas First International Conference, InterSol 2017 and Sixth Collogue National sur la Recherche en Informatique et ses Applications, CNRIA 2017, Dakar, Senegal, April 11&ndash;12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:402401 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;M. F. Kebe, Cheikh. editor.&#160;Gueye, Assane. editor.&#160;Ndiaye, Ababacar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72965-7">https://doi.org/10.1007/978-3-319-72965-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data hiding techniques in Windows OS : a practical approach to investigation and defense ent://SD_ILS/0/SD_ILS:459083 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hassan, Nihad Ahmad.&#160;Hijazi, Rami.&#160;Salminen, Helvi.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044490">http://www.sciencedirect.com/science/book/9780128044490</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic health records and medical big data : law and policy ent://SD_ILS/0/SD_ILS:390401 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hoffman, Sharona, author.<br/>Preferred Shelf Number&#160;KF3827.R4 H64 2016<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Raggo, Michael T.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting patient information : a decision-maker's guide to risk, prevention, and damage control ent://SD_ILS/0/SD_ILS:458833 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Cerrato, Paul, author.&#160;Andress, Jason, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128043929">https://www.sciencedirect.com/science/book/9780128043929</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Java programlama diliyle kriptoloji uygulamalar&#305; ent://SD_ILS/0/SD_ILS:380319 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bodur, H&uuml;seyin<br/>Preferred Shelf Number&#160;QA76.9.A25 B63 2016<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Information privacy fundamentals for librarians and information professionals ent://SD_ILS/0/SD_ILS:364505 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Givens, Cherie L., 1969- author.<br/>Preferred Shelf Number&#160;KF1263.C65 G58 2015<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> PCI compliance : understand and implement effective PCI data security standard compliance ent://SD_ILS/0/SD_ILS:355363 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Williams, Branden R., author.&#160;Chuvakin, Anton A., author.&#160;Milroy, Derek, editor<br/>Preferred Shelf Number&#160;ONLINE(355363.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128015797">http://www.sciencedirect.com/science/book/9780128015797</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Yarg&#305;tay kararlar&#305; &#305;&#351;&#305;&#287;&#305;nda T&uuml;rk Hukuku&rsquo;nda internet eri&#351;iminin engellenmesi ent://SD_ILS/0/SD_ILS:384619 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;G&ouml;rkemli, Burcu.<br/>Preferred Shelf Number&#160;KKX80.C65 G67 2015<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Measuring and managing information risk : a FAIR approach ent://SD_ILS/0/SD_ILS:355576 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Freund, Jack, author.&#160;Jones, Jack, author.<br/>Preferred Shelf Number&#160;ONLINE(355576.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124202313">http://www.sciencedirect.com/science/book/9780124202313</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> T&uuml;rk ceza kanununda haberle&#351;menin gizlili&#287;ini ihlal su&ccedil;lar&#305; ent://SD_ILS/0/SD_ILS:384144 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;G&uuml;rocak, &#304;smail.<br/>Preferred Shelf Number&#160;KKX3042 G87 2015<br/>Format:&#160;Books<br/>Availability&#160;Law Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:289995 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439841600">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NSA report liberty and security in a changing world ent://SD_ILS/0/SD_ILS:324150 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Swire, Peter P., group member.&#160;Sunstein, Cass R., group member.&#160;Stone, Geoffrey R., group member.&#160;Morell, Michael J., group member.&#160;Clarke, Richard A. (Richard Alan), 1951-, group member.<br/>Preferred Shelf Number&#160;ONLINE(324150.1)<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781400851270/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security fundamentals ent://SD_ILS/0/SD_ILS:342584 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Peltier, Thomas R., author.<br/>Preferred Shelf Number&#160;ONLINE(342584.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439810637">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security leader insights for information protection : lessons and strategies from leading security professionals ent://SD_ILS/0/SD_ILS:355760 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Fahy, Bob, editor.<br/>Preferred Shelf Number&#160;ONLINE(355760.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128008430">http://www.sciencedirect.com/science/book/9780128008430</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unauthorized access the crisis in online privacy and security ent://SD_ILS/0/SD_ILS:285321 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sloan, Robert H.&#160;Warner, Richard, 1946-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439830147">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Total information risk management maximizing the value of data and information assets ent://SD_ILS/0/SD_ILS:306693 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Borek, Alexander.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124055476">http://www.sciencedirect.com/science/book/9780124055476</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PCI compliance : the definitive guide ent://SD_ILS/0/SD_ILS:356423 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bhargav, Abhay, author.<br/>Preferred Shelf Number&#160;ONLINE(356423.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439887417">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anonymous communication networks : protecting privacy on the web ent://SD_ILS/0/SD_ILS:356657 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Peng, Kun, author.<br/>Preferred Shelf Number&#160;ONLINE(356657.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881606">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security without obscurity : a guide to confidentiality, authentication, and integrity ent://SD_ILS/0/SD_ILS:356681 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Stapleton, Jeffrey James, author.<br/>Preferred Shelf Number&#160;ONLINE(356681.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466592155">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols ent://SD_ILS/0/SD_ILS:147602 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Raggo, Michael T.&#160;Hosmer, Chet.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497435">http://www.sciencedirect.com/science/book/9781597497435</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The definitive guide to complying with the HIPAA/HITECH privacy and security rules ent://SD_ILS/0/SD_ILS:287167 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Trinckes, John J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466507685">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete book of data anonymization from planning to implementation ent://SD_ILS/0/SD_ILS:289065 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Raghunathan, Balaji.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439877319">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The complete guide to physical security ent://SD_ILS/0/SD_ILS:290667 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Baker, Paul, 1958-&#160;Benny, Daniel J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420099645">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information protection playbook ent://SD_ILS/0/SD_ILS:306649 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kane, Greg, editor of compilation.&#160;Koppel, Lorna, editor of compilation.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124172326">http://www.sciencedirect.com/science/book/9780124172326</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331279.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Unclonable Functions in Theory and Practice ent://SD_ILS/0/SD_ILS:331657 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;B&ouml;hm, Christoph. author.&#160;Hofer, Maximilian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331657.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5040-5">http://dx.doi.org/10.1007/978-1-4614-5040-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:331785 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331785.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331796.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Outlier Analysis ent://SD_ILS/0/SD_ILS:332026 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Aggarwal, Charu C. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332026.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6396-2">http://dx.doi.org/10.1007/978-1-4614-6396-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SmartData Privacy Meets Evolutionary Robotics ent://SD_ILS/0/SD_ILS:332030 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Harvey, Inman. editor.&#160;Cavoukian, Ann. editor.&#160;Tomko, George. editor.&#160;Borrett, Don. editor.&#160;Kwan, Hon. editor.<br/>Preferred Shelf Number&#160;ONLINE(332030.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6409-9">http://dx.doi.org/10.1007/978-1-4614-6409-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:332050 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332050.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:332861 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Taha, Sanaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332861.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Deterrence and IT Protection for Critical Infrastructures ent://SD_ILS/0/SD_ILS:332909 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Martellini, Maurizio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332909.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02279-6">http://dx.doi.org/10.1007/978-3-319-02279-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332915.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communications Security 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332941 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Qing, Sihan. editor.&#160;Zhou, Jianying. editor.&#160;Liu, Dongmei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332941.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02726-5">http://dx.doi.org/10.1007/978-3-319-02726-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332947 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Das, Sajal K. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Kantarcioglu, Murat. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332947.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings ent://SD_ILS/0/SD_ILS:332957 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Abdalla, Michel. editor.&#160;Nita-Rotaru, Cristina. editor.&#160;Dahab, Ricardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332957.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02937-5">http://dx.doi.org/10.1007/978-3-319-02937-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stabilization, Safety, and Security of Distributed Systems 15th International Symposium, SSS 2013, Osaka, Japan, November 13-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332964 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Higashino, Teruo. editor.&#160;Katayama, Yoshiaki. editor.&#160;Masuzawa, Toshimitsu. editor.&#160;Potop-Butucaru, Maria. editor.&#160;Yamashita, Masafumi. editor.<br/>Preferred Shelf Number&#160;ONLINE(332964.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03089-0">http://dx.doi.org/10.1007/978-3-319-03089-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Systems 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332976 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bloem, Roderick. editor.&#160;Lipp, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03491-1">http://dx.doi.org/10.1007/978-3-319-03491-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; INDOCRYPT 2013 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:332978 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Paul, Goutam. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332978.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03515-4">http://dx.doi.org/10.1007/978-3-319-03515-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberspace Safety and Security 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings ent://SD_ILS/0/SD_ILS:332984 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Guojun. editor.&#160;Ray, Indrakshi. editor.&#160;Feng, Dengguo. editor.&#160;Rajarajan, Muttukrishnan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03584-0">http://dx.doi.org/10.1007/978-3-319-03584-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333008 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Luiijf, Eric. editor.&#160;Hartel, Pieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333008.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-03964-0">http://dx.doi.org/10.1007/978-3-319-03964-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sensor Systems and Software 4th International ICST Conference, S-Cube 2013, Lucca, Italy, June 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333015 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zuniga, Marco. editor.&#160;Dini, Gianluca. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333015.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04166-7">http://dx.doi.org/10.1007/978-3-319-04166-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334078 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Pietro, Roberto. editor.&#160;Herranz, Javier. editor.&#160;Damiani, Ernesto. editor.&#160;State, Radu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334078.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35890-6">http://dx.doi.org/10.1007/978-3-642-35890-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334097 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Knudsen, Lars R. editor.&#160;Wu, Huapeng. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334097.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35999-6">http://dx.doi.org/10.1007/978-3-642-35999-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334794 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Dodge, Ronald C. editor.&#160;Futcher, Lynn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334794.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334878 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Capitani di Vimercati, Sabrina. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334878.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40012-4">http://dx.doi.org/10.1007/978-3-642-40012-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334880 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334880.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40026-1">http://dx.doi.org/10.1007/978-3-642-40026-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I ent://SD_ILS/0/SD_ILS:334881 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Canetti, Ran. editor.&#160;Garay, Juan A. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334881.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40041-4">http://dx.doi.org/10.1007/978-3-642-40041-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334707 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jacobson, Michael. editor.&#160;Locasto, Michael. editor.&#160;Mohassel, Payman. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334707.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38980-1">http://dx.doi.org/10.1007/978-3-642-38980-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2013, Beijing, China, August 3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334836 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, G. Alan. editor.&#160;Zheng, Xiaolong. editor.&#160;Chau, Michael. editor.&#160;Chen, Hsinchun. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334836.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39693-9">http://dx.doi.org/10.1007/978-3-642-39693-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I ent://SD_ILS/0/SD_ILS:335157 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335157.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II ent://SD_ILS/0/SD_ILS:335160 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sako, Kazue. editor.&#160;Sarkar, Palash. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335160.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335194 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bagchi, Aditya. editor.&#160;Ray, Indrakshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335194.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45204-8">http://dx.doi.org/10.1007/978-3-642-45204-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Coding 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335197 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Stam, Martijn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335197.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45239-0">http://dx.doi.org/10.1007/978-3-642-45239-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ISSE 2013 Securing Electronic Business Processes Highlights of the Information Security Solutions Europe 2013 Conference ent://SD_ILS/0/SD_ILS:335292 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Reimer, Helmut. editor.&#160;Pohlmann, Norbert. editor.&#160;Schneider, Wolfgang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-03371-2">http://dx.doi.org/10.1007/978-3-658-03371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Preserving in Social Networks ent://SD_ILS/0/SD_ILS:335299 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Chbeir, Richard. editor.&#160;Al Bouna, Bechara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335299.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-7091-0894-9">http://dx.doi.org/10.1007/978-3-7091-0894-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics applying metametrics to information security ent://SD_ILS/0/SD_ILS:289974 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Brotby, W. Krag.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439881538">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnets ent://SD_ILS/0/SD_ILS:331175 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tiirmaa-Klaar, Heli. author.&#160;Gassen, Jan. author.&#160;Gerhards-Padilla, Elmar. author.&#160;Martini, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331175.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331294.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Social Networks ent://SD_ILS/0/SD_ILS:331435 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Altshuler, Yaniv. editor.&#160;Elovici, Yuval. editor.&#160;Cremers, Armin B. editor.&#160;Aharony, Nadav. editor.&#160;Pentland, Alex. editor.<br/>Preferred Shelf Number&#160;ONLINE(331435.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4139-7">http://dx.doi.org/10.1007/978-1-4614-4139-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Iris Biometrics From Segmentation to Template Security ent://SD_ILS/0/SD_ILS:331810 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Rathgeb, Christian. author.&#160;Uhl, Andreas. author.&#160;Wild, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5571-4">http://dx.doi.org/10.1007/978-1-4614-5571-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:333021 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zia, Tanveer. editor.&#160;Zomaya, Albert. editor.&#160;Varadharajan, Vijay. editor.&#160;Mao, Morley. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333021.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-04283-1">http://dx.doi.org/10.1007/978-3-319-04283-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XVII ent://SD_ILS/0/SD_ILS:334063 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334063.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35840-1">http://dx.doi.org/10.1007/978-3-642-35840-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Networking 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334025 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Frey, Davide. editor.&#160;Raynal, Michel. editor.&#160;Sarkar, Saswati. editor.&#160;Shyamasundar, Rudrapatna K. editor.&#160;Sinha, Prasun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334025.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35668-1">http://dx.doi.org/10.1007/978-3-642-35668-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography &ndash; Pairing 2012 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334179 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Abdalla, Michel. editor.&#160;Lange, Tanja. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334179.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36334-4">http://dx.doi.org/10.1007/978-3-642-36334-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334184.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334470 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kwon, Taekyoung. editor.&#160;Lee, Mun-Kyu. editor.&#160;Kwon, Daesung. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334470.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Networks 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334505 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Singh, Karan. editor.&#160;Awasthi, Amit K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334505.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37949-9">http://dx.doi.org/10.1007/978-3-642-37949-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334514 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;J&oslash;sang, Audun. editor.&#160;Samarati, Pierangela. editor.&#160;Petrocchi, Marinella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334514.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334518 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Cuellar, Jorge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334518.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334519 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Deng, Robert H. editor.&#160;Feng, Tao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334519.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334760 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Rieck, Konrad. editor.&#160;Stewin, Patrick. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334760.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXVII 27th Annual IFIP WG 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334767 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Lingyu. editor.&#160;Shafiq, Basit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334767.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39256-6">http://dx.doi.org/10.1007/978-3-642-39256-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust First International Conference, HAS 2013, Held as Part of HCI International 2013, Las Vegas, NV, USA, July 21-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334786 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Marinos, Louis. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334786.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39345-7">http://dx.doi.org/10.1007/978-3-642-39345-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334863.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 4th International Conference, ICDF2C 2012, Lafayette, IN, USA, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334864 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Rogers, Marcus. editor.&#160;Seigfried-Spellar, Kathryn C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334864.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39891-9">http://dx.doi.org/10.1007/978-3-642-39891-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Economics of Information Security and Privacy ent://SD_ILS/0/SD_ILS:334810 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;B&ouml;hme, Rainer. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334810.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39498-0">http://dx.doi.org/10.1007/978-3-642-39498-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Interactive Theorem Proving 4th International Conference, ITP 2013, Rennes, France, July 22-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334825 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Blazy, Sandrine. editor.&#160;Paulin-Mohring, Christine. editor.&#160;Pichardie, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334825.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39634-2">http://dx.doi.org/10.1007/978-3-642-39634-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334746.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability, and Security in Information Systems and HCI IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, Regensburg, Germany, September 2-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334958 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Cuzzocrea, Alfredo. editor.&#160;Kittl, Christian. editor.&#160;Simos, Dimitris E. editor.&#160;Weippl, Edgar. editor.&#160;Xu, Lida. editor.<br/>Preferred Shelf Number&#160;ONLINE(334958.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40511-2">http://dx.doi.org/10.1007/978-3-642-40511-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334966 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bauschert, Thomas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334966.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334972 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Thampi, Sabu M. editor.&#160;Atrey, Pradeep K. editor.&#160;Fan, Chun-I. editor.&#160;Perez, Gregorio Martinez. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334972.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40576-1">http://dx.doi.org/10.1007/978-3-642-40576-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334976 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Awad, Ali Ismail. editor.&#160;Hassanien, Aboul Ella. editor.&#160;Baba, Kensuke. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures ent://SD_ILS/0/SD_ILS:334982 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Haataja, Keijo. author.&#160;Hypp&ouml;nen, Konstantin. author.&#160;Pasanen, Sanna. author.&#160;Toivanen, Pekka. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334982.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40646-1">http://dx.doi.org/10.1007/978-3-642-40646-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, M&aacute;laga, Spain, September 11-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334983 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lau, Kung-Kiu. editor.&#160;Lamersdorf, Winfried. editor.&#160;Pimentel, Ernesto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334983.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40651-5">http://dx.doi.org/10.1007/978-3-642-40651-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Public Key Infrastructures ent://SD_ILS/0/SD_ILS:334984 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Buchmann, Johannes A. author.&#160;Karatsiolis, Evangelos. author.&#160;Wiesmaier, Alexander. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334984.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40657-7">http://dx.doi.org/10.1007/978-3-642-40657-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335002 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Decker, Bart. editor.&#160;Dittmann, Jana. editor.&#160;Kraetzer, Christian. editor.&#160;Vielhauer, Claus. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335002.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 32nd International Conference, SAFECOMP 2013, Toulouse, France, September 24-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335005 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bitsch, Friedemann. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Ka&acirc;niche, Mohamed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335005.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40793-2">http://dx.doi.org/10.1007/978-3-642-40793-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335044 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Eder, Johann. editor.&#160;Bellahsene, Zohra. editor.<br/>Preferred Shelf Number&#160;ONLINE(335044.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41030-7">http://dx.doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructure Security 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335107 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Bologna, Sandro. editor.&#160;H&auml;mmerli, Bernhard. editor.&#160;Gritzalis, Dimitris. editor.&#160;Wolthusen, Stephen. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335107.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41476-3">http://dx.doi.org/10.1007/978-3-642-41476-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXI 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335142 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Stajano, Frank. editor.&#160;Anderson, Jonathan. editor.&#160;Bonneau, Joseph. editor.<br/>Preferred Shelf Number&#160;ONLINE(335142.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41717-7">http://dx.doi.org/10.1007/978-3-642-41717-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335225 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Su, Jinshu. editor.&#160;Zhao, Baokang. editor.&#160;Sun, Zhigang. editor.&#160;Wang, Xiaofeng. editor.&#160;Wang, Fei. editor.<br/>Preferred Shelf Number&#160;ONLINE(335225.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to the de-identification of personal health information ent://SD_ILS/0/SD_ILS:291730 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;El Emam, Khaled.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466579088">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of synchronous digital hierarchy ent://SD_ILS/0/SD_ILS:288127 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jain, Rajesh Kumar.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466517271">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical infrastructure homeland security and emergency preparedness ent://SD_ILS/0/SD_ILS:288161 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Radvanovsky, Robert.&#160;McDougall, Allan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466503465">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security policy development for compliance ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:288173 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Williams, Barry L.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466580596">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334635 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Gaborit, Philippe. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334635.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334726 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Cristofaro, Emiliano. editor.&#160;Wright, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334726.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz Der Weg zur Zertifizierung ent://SD_ILS/0/SD_ILS:337870 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kersten, Heinrich. author.&#160;Reuter, J&uuml;rgen. author.&#160;Schr&ouml;der, Klaus-Werner. author.&#160;Kersten, Heinrich. editor.&#160;Wolfenstetter, Klaus-Dieter. editor.<br/>Preferred Shelf Number&#160;ONLINE(337870.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-658-01724-8">http://dx.doi.org/10.1007/978-3-658-01724-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT-Risikomanagement mit System Praxisorientiertes Management von Informationssicherheits- und IT-Risiken ent://SD_ILS/0/SD_ILS:338328 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;K&ouml;nigs, Hans-Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(338328.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-2165-2">http://dx.doi.org/10.1007/978-3-8348-2165-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Netzwerk- und Datensicherheit Eine praktische Einf&uuml;hrung ent://SD_ILS/0/SD_ILS:338406 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kappes, Martin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(338406.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-8348-8612-5">http://dx.doi.org/10.1007/978-3-8348-8612-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced DPA Theory and Practice Towards the Security Limits of Secure Embedded Circuits ent://SD_ILS/0/SD_ILS:332116 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Peeters, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332116.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6783-0">http://dx.doi.org/10.1007/978-1-4614-6783-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332276.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332451.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Security Management ent://SD_ILS/0/SD_ILS:332865 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Al-Shaer, Ehab. editor.&#160;Ou, Xinming. editor.&#160;Xie, Geoffrey. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332865.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01433-3">http://dx.doi.org/10.1007/978-3-319-01433-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise Identity Management Towards an Investment Decision Support Approach ent://SD_ILS/0/SD_ILS:333923 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Royer, Denis. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333923.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Computing and Services International Conference, ISCTCS 2012, Beijing, China, May 28 &ndash; June 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334049 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Yuan, Yuyu. editor.&#160;Wu, Xu. editor.&#160;Lu, Yueming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334049.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35795-4">http://dx.doi.org/10.1007/978-3-642-35795-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing and Internet Technology 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334114 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hota, Chittaranjan. editor.&#160;Srimani, Pradip K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334114.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36071-8">http://dx.doi.org/10.1007/978-3-642-36071-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology &ndash; CT-RSA 2013 The Cryptographers&rsquo; Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334122 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Dawson, Ed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334122.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36095-4">http://dx.doi.org/10.1007/978-3-642-36095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334132.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:334140 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334140.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Passive and Active Measurement 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334223 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Roughan, Matthew. editor.&#160;Chang, Rocky. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334223.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36516-4">http://dx.doi.org/10.1007/978-3-642-36516-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334242 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Sahai, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334242.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36594-2">http://dx.doi.org/10.1007/978-3-642-36594-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334301 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Mustofa, Khabib. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;Weippl, Edgar. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE(334301.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36818-9">http://dx.doi.org/10.1007/978-3-642-36818-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334305 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Basin, David. editor.&#160;Mitchell, John C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334305.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334316 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Keromytis, Angelos D. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334316.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ad Hoc Networks 4th International ICST Conference, ADHOCNETS 2012, Paris, France, October 16-17, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334331 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Zheng, Jun. editor.&#160;Mitton, Nathalie. editor.&#160;Li, Jun. editor.&#160;Lorenz, Pascal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334331.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36958-2">http://dx.doi.org/10.1007/978-3-642-36958-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334399 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Leeuw, Elisabeth. editor.&#160;Mitchell, Chris. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334399.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334401 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Mangard, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334401.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334403 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Flegel, Ulrich. editor.&#160;Markatos, Evangelos. editor.&#160;Robertson, William. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334403.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management VII 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334582 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Fern&aacute;ndez-Gago, Carmen. editor.&#160;Martinelli, Fabio. editor.&#160;Pearson, Siani. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334582.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38323-6">http://dx.doi.org/10.1007/978-3-642-38323-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2013 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334587 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Johansson, Thomas. editor.&#160;Nguyen, Phong Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334587.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38348-9">http://dx.doi.org/10.1007/978-3-642-38348-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wired/Wireless Internet Communication 11th International Conference, WWIC 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334594 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Tsaoussidis, Vassilis. editor.&#160;Kassler, Andreas J. editor.&#160;Koucheryavy, Yevgeni. editor.&#160;Mellouk, Abdelhamid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334594.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38401-1">http://dx.doi.org/10.1007/978-3-642-38401-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334613 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Kuty&#322;owski, Miros&#322;aw. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334613.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38519-3">http://dx.doi.org/10.1007/978-3-642-38519-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334616 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Cavallaro, Lorenzo. editor.&#160;Gollmann, Dieter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334616.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2013 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334620 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Youssef, Amr. editor.&#160;Nitaj, Abderrahmane. editor.&#160;Hassanien, Aboul Ella. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334620.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38553-7">http://dx.doi.org/10.1007/978-3-642-38553-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web-Age Information Management 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334622 2024-05-24T10:30:35Z 2024-05-24T10:30:35Z Author&#160;Wang, Jianyong. editor.&#160;Xiong, Hui. editor.&#160;Ishikawa, Yoshiharu. editor.&#160;Xu, Jianliang. editor.&#160;Zhou, Junfeng. editor.<br/>Preferred Shelf Number&#160;ONLINE(334622.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38562-9">http://dx.doi.org/10.1007/978-3-642-38562-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>