Search Results for Computer security - Narrowed by: Machine learning. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Machine$002blearning.$002509Machine$002blearning.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?dt=list 2024-12-23T12:18:51Z Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:284793 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Vemuri, V. Rao.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Ecosystem of e-Business: Technologies, Stakeholders, and Connections 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485089 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Xu, Jennifer J. editor. (orcid)0000-0001-5615-9967&#160;Zhu, Bin. editor.&#160;Liu, Xiao. editor.&#160;Shaw, Michael J. editor.&#160;Zhang, Han. editor. (orcid)0000-0002-6258-2486<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22784-5">https://doi.org/10.1007/978-3-030-22784-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning and cognitive science applications in cyber security ent://SD_ILS/0/SD_ILS:482151 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Khan, Muhammad Salman, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485997 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Dhillon, Gurpreet. editor.&#160;Karlsson, Fredrik. editor.&#160;Hedstr&ouml;m, Karin. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:285413 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:285221 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Mena, Jesus.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data mining and machine learning in cybersecurity ent://SD_ILS/0/SD_ILS:290743 2024-12-23T12:18:51Z 2024-12-23T12:18:51Z Author&#160;Dua, Sumeet.&#160;Du, Xian.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>