Search Results for Computer security. - Narrowed by: Machine learning.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Machine$002blearning.$002509Machine$002blearning.$0026pe$003dd$00253A$0026ps$003d300?dt=list2024-12-27T08:40:47ZEnhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:2847932024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Vemuri, V. Rao.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031225">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5–7, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4840472024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Zhou, Jianying. editor. (orcid)0000-0003-0594-0432 Deng, Robert. editor. (orcid)0000-0003-3491-8146 Li, Zhou. editor. Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214 Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Ecosystem of e-Business: Technologies, Stakeholders, and Connections 17th Workshop on e-Business, WeB 2018, Santa Clara, CA, USA, December 12, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4850892024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Xu, Jennifer J. editor. (orcid)0000-0001-5615-9967 Zhu, Bin. editor. Liu, Xiao. editor. Shaw, Michael J. editor. Zhang, Han. editor. (orcid)0000-0002-6258-2486<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22784-5">https://doi.org/10.1007/978-3-030-22784-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>ICT Systems Security and Privacy Protection 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4859972024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Dhillon, Gurpreet. editor. Karlsson, Fredrik. editor. Hedström, Karin. editor. Zúquete, André. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22312-0">https://doi.org/10.1007/978-3-030-22312-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network anomaly detection : a machine learning perspectiveent://SD_ILS/0/SD_ILS:2854132024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Bhattacharyya, Dhruba K., author. Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466582095">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:2852212024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data mining and machine learning in cybersecurityent://SD_ILS/0/SD_ILS:2907432024-12-27T08:40:47Z2024-12-27T08:40:47ZAuthor Dua, Sumeet. Du, Xian.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439839430">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>