Search Results for - Narrowed by: SpringerLink (Online service) - Computer science. - Data protection. - Data structures (Computer science). - Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026te$003dILS$0026rt$003dfalse$00257C$00257C$00257CISBN$00257C$00257C$00257CISBN$0026ps$003d300$0026isd$003dtrue? 2024-08-30T00:27:42Z Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-08-30T00:27:42Z 2024-08-30T00:27:42Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-08-30T00:27:42Z 2024-08-30T00:27:42Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-08-30T00:27:42Z 2024-08-30T00:27:42Z Author&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-08-30T00:27:42Z 2024-08-30T00:27:42Z Author&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>