Search Results for Computer Security - Narrowed by: SpringerLink (Online service) - English - Law and legislation. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Law$002band$002blegislation.$002509Law$002band$002blegislation.$0026te$003dILS$0026ps$003d300?dt=list 2024-07-13T01:30:25Z Advances in Computing and Data Sciences Third International Conference, ICACDS 2019, Ghaziabad, India, April 12&ndash;13, 2019, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:483873 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Singh, Mayank. editor.&#160;Gupta, P.K. editor.&#160;Tyagi, Vipin. editor.&#160;Flusser, Jan. editor.&#160;&Ouml;ren, Tuncer. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-9939-8">https://doi.org/10.1007/978-981-13-9939-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15&ndash;16, 2019, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:483888 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Luhach, Ashish Kumar. editor.&#160;Jat, Dharm Singh. editor.&#160;Hawari, Kamarul Bin Ghazali. editor.&#160;Gao, Xiao-Zhi. editor.&#160;Lingras, Pawan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27&ndash;28, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484186 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Dolev, Shlomi. editor.&#160;Hendler, Danny. editor.&#160;Lodha, Sachin. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-20951-3">https://doi.org/10.1007/978-3-030-20951-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime ent://SD_ILS/0/SD_ILS:483013 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 &ndash; November 1, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487069 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Alpcan, Tansu. editor. (orcid)0000-0002-7434-3239&#160;Vorobeychik, Yevgeniy. editor. (orcid)0000-0003-2471-5345&#160;Baras, John S. editor. (orcid)0000-0002-4955-8561&#160;D&aacute;n, Gy&ouml;rgy. editor. (orcid)0000-0002-4876-0223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-32430-8">https://doi.org/10.1007/978-3-030-32430-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485829 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Guo, Fuchun. editor. (orcid)0000-0001-6939-7710&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-14234-6">https://doi.org/10.1007/978-3-030-14234-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485944 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Cybenko, George. editor. (orcid)0000-0001-7734-2912&#160;Pym, David. editor. (orcid)0000-0002-6504-5838&#160;Fila, Barbara. editor. (orcid)0000-0002-1824-7621&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26&ndash;28, 2019, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:486379 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24268-8">https://doi.org/10.1007/978-3-030-24268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Security 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I ent://SD_ILS/0/SD_ILS:486636 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Sun, Xingming. editor. (orcid)0000-0003-1390-399X&#160;Pan, Zhaoqing. editor. (orcid)0000-0003-1390-399X&#160;Bertino, Elisa. editor. (orcid)0000-0002-4029-7051&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-24274-9">https://doi.org/10.1007/978-3-030-24274-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy vs. Security ent://SD_ILS/0/SD_ILS:487072 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Stalla-Bourdillon, Sophie. author.&#160;Phillips, Joshua. author.&#160;Ryan, Mark D. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6530-9">https://doi.org/10.1007/978-1-4471-6530-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Switzerland ent://SD_ILS/0/SD_ILS:489573 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Dunn Cavelty, Myriam. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10620-5">https://doi.org/10.1007/978-3-319-10620-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Electronic Identity ent://SD_ILS/0/SD_ILS:484375 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;de Andrade, Norberto Nuno Gomes. author.&#160;Chen-Wilson, Lisha. author.&#160;Argles, David. author.&#160;Wills, Gary. author.&#160;Schiano di Zenise, Michele. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6449-4">https://doi.org/10.1007/978-1-4471-6449-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489496 2024-07-13T01:30:25Z 2024-07-13T01:30:25Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45355-1">https://doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>