Search Results for - Narrowed by: English - 2018 - Mobile communication systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dPUBDATE$002509Publication$002bDate$0025092018$0025092018$0026qf$003dSUBJECT$002509Subject$002509Mobile$002bcommunication$002bsystems.$002509Mobile$002bcommunication$002bsystems.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2024-08-27T04:14:23Z Privacy-Enhancing Fog Computing and Its Applications ent://SD_ILS/0/SD_ILS:399066 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Lin, Xiaodong. author.&#160;Ni, Jianbing. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Smart Cities Software Services and Cyber Infrastructure ent://SD_ILS/0/SD_ILS:399377 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Maheswaran, Muthucumaru. editor.&#160;Badidi, Elarbi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-97271-8">https://doi.org/10.1007/978-3-319-97271-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile network forensics : emerging research and opportunities ent://SD_ILS/0/SD_ILS:481796 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Sharevski, Filipo, 1985- author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms, methods, and applications in mobile computing and communications ent://SD_ILS/0/SD_ILS:481760 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Waluyo, Agustinus Borgy, 1973- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5693-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5693-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Mobile Data Privacy ent://SD_ILS/0/SD_ILS:399883 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Gkoulalas-Divanis, Aris. editor.&#160;Bettini, Claudio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98161-1">https://doi.org/10.1007/978-3-319-98161-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2024-08-27T04:14:23Z 2024-08-27T04:14:23Z Author&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>