Search Results for Classification -- methods - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dClassification$002b--$002bmethods$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-04-12T20:35:50Z Innovations in Information and Communication Technologies Proceedings of ICIICT 2022 ent://SD_ILS/0/SD_ILS:528373 2026-04-12T20:35:50Z 2026-04-12T20:35:50Z Author&#160;Garg, Deepak. editor.&#160;Kumar, Neeraj. editor.&#160;Iqbal, Rahat. editor.&#160;Gupta, Suneet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-3796-5">https://doi.org/10.1007/978-981-19-3796-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology for Competitive Strategies (ICTCS 2022) ICT: Applications and Social Interfaces ent://SD_ILS/0/SD_ILS:527746 2026-04-12T20:35:50Z 2026-04-12T20:35:50Z Author&#160;Joshi, Amit. editor.&#160;Mahmud, Mufti. editor.&#160;Ragel, Roshan G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9638-2">https://doi.org/10.1007/978-981-19-9638-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure ICT Service Provisioning for Cloud, Mobile and Beyond ESARIS: The Answer to the Demands of Industrialized IT Production Balancing Between Buyers and Providers ent://SD_ILS/0/SD_ILS:613582 2026-04-12T20:35:50Z 2026-04-12T20:35:50Z Author&#160;von Faber, Eberhard. author.&#160;Behnsen, Wolfgang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-16482-9">https://doi.org/10.1007/978-3-658-16482-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 28th International Conference, DEXA 2017, Lyon, France, August 28-31, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618255 2026-04-12T20:35:50Z 2026-04-12T20:35:50Z Author&#160;Benslimane, Djamal. editor.&#160;Damiani, Ernesto. editor.&#160;Grosky, William I. editor.&#160;Hameurlain, Abdelkader. editor.&#160;Sheth, Amit. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64468-4">https://doi.org/10.1007/978-3-319-64468-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools ent://SD_ILS/0/SD_ILS:618425 2026-04-12T20:35:50Z 2026-04-12T20:35:50Z Author&#160;Bhuyan, Monowar H. author.&#160;Bhattacharyya, Dhruba K. author.&#160;Kalita, Jugal K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>