Search Results for Computer security. - Narrowed by: Speech processing systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Speech$002bprocessing$002bsystems.$002509Speech$002bprocessing$002bsystems.$0026ic$003dtrue$0026ps$003d300? 2024-09-24T14:40:20Z Biometric-Based Physical and Cybersecurity Systems ent://SD_ILS/0/SD_ILS:484246 2024-09-24T14:40:20Z 2024-09-24T14:40:20Z Author&#160;Obaidat, Mohammad S. editor.&#160;Traore, Issa. editor. (orcid)0000-0003-2987-8047&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Communication, Computing, and Electronics Select Proceedings of IC3E 2018 ent://SD_ILS/0/SD_ILS:484464 2024-09-24T14:40:20Z 2024-09-24T14:40:20Z Author&#160;Khare, Ashish. editor.&#160;Tiwary, Uma Shankar. editor. (orcid)0000-0001-7206-9013&#160;Sethi, Ishwar K. editor.&#160;Singh, Nar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2685-1">https://doi.org/10.1007/978-981-13-2685-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Speech Enhancement Techniques for Digital Hearing Aids ent://SD_ILS/0/SD_ILS:482802 2024-09-24T14:40:20Z 2024-09-24T14:40:20Z Author&#160;Borisagar, Komal R. author.&#160;Thanki, Rohit M. author. (orcid)0000-0002-0645-6266&#160;Sedani, Bhavin S. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things Security and Data Protection ent://SD_ILS/0/SD_ILS:485847 2024-09-24T14:40:20Z 2024-09-24T14:40:20Z Author&#160;Ziegler, S&eacute;bastien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Medical Imaging and its Security in Telemedicine Applications ent://SD_ILS/0/SD_ILS:487428 2024-09-24T14:40:20Z 2024-09-24T14:40:20Z Author&#160;Thanki, Rohit. author. (orcid)0000-0002-0645-6266&#160;Borra, Surekha. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things ent://SD_ILS/0/SD_ILS:484904 2024-09-24T14:40:20Z 2024-09-24T14:40:20Z Author&#160;Hudson, Florence D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>