Search Results for Computer systems -- Design. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bsystems$002b--$002bDesign.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-04-15T22:07:13Z Advances in Digital Forensics XX 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4-5, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:606873 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Kurkowski, Elizabeth. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-71025-4">https://doi.org/10.1007/978-3-031-71025-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing ent://SD_ILS/0/SD_ILS:608484 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Langer, Arthur M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CyberSecurity in a DevOps Environment From Requirements to Monitoring ent://SD_ILS/0/SD_ILS:602151 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Sadovykh, Andrey. editor.&#160;Truscan, Dragos. editor.&#160;Mallouli, Wissam. editor.&#160;Cavalli, Ana Rosa. editor.&#160;Seceleanu, Cristina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-42212-6">https://doi.org/10.1007/978-3-031-42212-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:615035 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Guo, Song. editor.&#160;Wei, Guiyi. editor.&#160;Xiang, Yang. editor. (orcid)0000-0001-5252-0831&#160;Lin, Xiaodong. editor.&#160;Lorenz, Pascal. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49580-4">https://doi.org/10.1007/978-3-319-49580-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cards, Tokens, Security and Applications ent://SD_ILS/0/SD_ILS:617853 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Mayes, Keith. editor.&#160;Markantonakis, Konstantinos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-50500-8">https://doi.org/10.1007/978-3-319-50500-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools ent://SD_ILS/0/SD_ILS:618425 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Bhuyan, Monowar H. author.&#160;Bhattacharyya, Dhruba K. author.&#160;Kalita, Jugal K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:611465 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Lin, Chung-Wei. author.&#160;Sangiovanni-Vincentelli, Alberto. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-51328-7">https://doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:617849 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XII 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611549 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46279-0">https://doi.org/10.1007/978-3-319-46279-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616421 2026-04-15T22:07:13Z 2026-04-15T22:07:13Z Author&#160;Tryfonas, Theo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-39381-0">https://doi.org/10.1007/978-3-319-39381-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>