Search Results for Computer security -- Case studies. - Narrowed by: Data Engineering.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity$002b--$002bCase$002bstudies.$0026qf$003dSUBJECT$002509Subject$002509Data$002bEngineering.$002509Data$002bEngineering.$0026ps$003d300?dt=list2026-04-06T04:30:42ZIntelligent Systems, Blockchain, and Communication Technologies Selected papers from the 2nd International Conference on Intelligent Systems, Blockchain, and Communication Technologies (ISBCom25), Volume 2ent://SD_ILS/0/SD_ILS:6106052026-04-06T04:30:42Z2026-04-06T04:30:42ZAuthor Abdelgawad, Ahmed. editor. Hameed, Alaa Ali. editor. Jamil, Akhtar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-032-09562-6">https://doi.org/10.1007/978-3-032-09562-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AI Technologies for Information Systems and Management Science Proceedings of 6th International Conference on Information Systems and Management Science (ISMS) 2023 - Volume 1ent://SD_ILS/0/SD_ILS:6060282026-04-06T04:30:42Z2026-04-06T04:30:42ZAuthor Garg, Lalit. editor. (orcid)0000-0002-3868-0481 Kesswani, Nishtha. editor. Brigui, Imene. editor. Dewangan, Bhupesh Kr. editor. Shukla, R. N. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-66410-6">https://doi.org/10.1007/978-3-031-66410-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>