Search Results for Core. - Narrowed by: Cryptology. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dCore.$0026qf$003dSUBJECT$002509Subject$002509Cryptology.$002509Cryptology.$0026ps$003d300?dt=list 2026-03-24T02:45:34Z Introduction to Biometrics ent://SD_ILS/0/SD_ILS:605790 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Jain, Anil K. author.&#160;Ross, Arun A. author. (orcid)0000-0001-8850-3013&#160;Nandakumar, Karthik. author. (orcid)0000-0002-6274-9725&#160;Swearingen, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61675-4">https://doi.org/10.1007/978-3-031-61675-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2022 ent://SD_ILS/0/SD_ILS:601864 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Roy, Bimal Kumar. editor.&#160;Chaturvedi, Atul. editor.&#160;Tsaban, Boaz. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2229-1">https://doi.org/10.1007/978-981-99-2229-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security with Machine Learning Proceedings of ICCNSML 2023 ent://SD_ILS/0/SD_ILS:603303 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Chaturvedi, Atul. editor.&#160;Hasan, Sartaj Ul. editor. (orcid)0000-0002-7962-3221&#160;Roy, Bimal Kumar. editor.&#160;Tsaban, Boaz. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0641-9">https://doi.org/10.1007/978-981-97-0641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Secure Networks, Blockchains and Smart Contract Technologies ent://SD_ILS/0/SD_ILS:605174 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Chung, Jong-Moon. author. (orcid)0000-0002-1652-6635&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-65866-2">https://doi.org/10.1007/978-3-031-65866-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:617303 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Hameurlain, Abdelkader. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Thoai, Nam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54173-9">https://doi.org/10.1007/978-3-662-54173-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory and Models for Cyber Situation Awareness ent://SD_ILS/0/SD_ILS:616045 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Liu, Peng. editor.&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61152-5">https://doi.org/10.1007/978-3-319-61152-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI Special Issue on Data and Security Engineering ent://SD_ILS/0/SD_ILS:617354 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Hameurlain, Abdelkader. editor.&#160;K&uuml;ng, Josef. editor.&#160;Wagner, Roland. editor.&#160;Dang, Tran Khanh. editor.&#160;Thoai, Nam. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-56266-6">https://doi.org/10.1007/978-3-662-56266-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:611086 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Al-Shaer, Ehab. author.&#160;Rahman, Mohammad Ashiqur. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ten Laws for Security ent://SD_ILS/0/SD_ILS:617805 2026-03-24T02:45:34Z 2026-03-24T02:45:34Z Author&#160;Diehl, Eric. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42641-9">https://doi.org/10.1007/978-3-319-42641-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>