Search Results for Computer Security. - Narrowed by: Machine learning
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Machine$002blearning$002509Machine$002blearning$0026ic$003dtrue$0026ps$003d300?
2026-01-25T12:17:27Z
Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning
ent://SD_ILS/0/SD_ILS:599999
2026-01-25T12:17:27Z
2026-01-25T12:17:27Z
Author Mohanty, Sachi Nandan, editor.<br/>Preferred Shelf Number QA76.9 .A25 P76 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
AI and machine learning for network and security management
ent://SD_ILS/0/SD_ILS:598294
2026-01-25T12:17:27Z
2026-01-25T12:17:27Z
Author Wu, Yulei, author. Ge, Jingguo, author. Li, Tong, author.<br/>Preferred Shelf Number Q335 .W8 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Machine intelligence, big data analytics, and IoT in image processing : practical applications
ent://SD_ILS/0/SD_ILS:598220
2026-01-25T12:17:27Z
2026-01-25T12:17:27Z
Preferred Shelf Number Q325.5 .M33 2023<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Deep learning approaches to cloud security
ent://SD_ILS/0/SD_ILS:597294
2026-01-25T12:17:27Z
2026-01-25T12:17:27Z
Author Rathore, Pramod Singh, 1988- editor.<br/>Preferred Shelf Number QA76.585<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security
ent://SD_ILS/0/SD_ILS:596235
2026-01-25T12:17:27Z
2026-01-25T12:17:27Z
Author Almalawi, Abdulmohsen, author. Tari, Zahir, 1961- author. Fahad, Adil, author. Yi, Xun, author.<br/>Preferred Shelf Number TJ222 .A46 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Game theory and machine learning for cyber security
ent://SD_ILS/0/SD_ILS:597035
2026-01-25T12:17:27Z
2026-01-25T12:17:27Z
Author Kamhoua, Charles A., editor. Kiekintveld, Christopher D., editor. Fang, Fei, 1989- editor. Zhu, Quanyan, editor.<br/>Preferred Shelf Number TK5105.59 .G353 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>