Search Results for Computer networks. - Narrowed by: System safety. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Subject$002509System$002bsafety.$002509System$002bsafety.$0026ic$003dtrue$0026ps$003d300? 2024-09-04T12:27:28Z Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applications ent://SD_ILS/0/SD_ILS:483042 2024-09-04T12:27:28Z 2024-09-04T12:27:28Z Author&#160;M&ouml;ller, Dietmar P.F. author.&#160;Haas, Roland E. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2024-09-04T12:27:28Z 2024-09-04T12:27:28Z Author&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Failure Investigation A Near-Miss Analysis Approach ent://SD_ILS/0/SD_ILS:402680 2024-09-04T12:27:28Z 2024-09-04T12:27:28Z Author&#160;Eloff, Jan. author.&#160;Bihina Bella, Madeleine. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61334-5">https://doi.org/10.1007/978-3-319-61334-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Designing for Network and Service Continuity in Wireless Mesh Networks ent://SD_ILS/0/SD_ILS:331552 2024-09-04T12:27:28Z 2024-09-04T12:27:28Z Author&#160;Pathak, Parth H. author.&#160;Dutta, Rudra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331552.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4627-9">http://dx.doi.org/10.1007/978-1-4614-4627-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Computation in Stochastic Models with Applications The RG-Factorization ent://SD_ILS/0/SD_ILS:191701 2024-09-04T12:27:28Z 2024-09-04T12:27:28Z Author&#160;Li, Quan-Lin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11492-2">http://dx.doi.org/10.1007/978-3-642-11492-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers ent://SD_ILS/0/SD_ILS:190658 2024-09-04T12:27:28Z 2024-09-04T12:27:28Z Author&#160;Setola, Roberto. editor.&#160;Geretshuber, Stefan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>