Search Results for Data Structures and Information Theory. - Narrowed by: Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bStructures$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026ps$003d300?dt=list 2025-12-08T16:31:36Z Smart Technologies in Data Science and Communication Proceedings of SMART-DSC 2022 ent://SD_ILS/0/SD_ILS:526914 2025-12-08T16:31:36Z 2025-12-08T16:31:36Z Author&#160;Ogudo, Kingsley A. editor.&#160;Saha, Sanjoy Kumar. editor.&#160;Bhattacharyya, Debnath. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-6880-8">https://doi.org/10.1007/978-981-19-6880-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Technologies and Emerging Sciences ICCTES 2021 ent://SD_ILS/0/SD_ILS:526691 2025-12-08T16:31:36Z 2025-12-08T16:31:36Z Author&#160;Maurya, Sudhanshu. editor.&#160;Peddoju, Sateesh K. editor.&#160;Ahmad, Badlishah. editor.&#160;Chihi, Ines. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2538-2">https://doi.org/10.1007/978-981-19-2538-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Robustness under Large-Scale Attacks ent://SD_ILS/0/SD_ILS:331604 2025-12-08T16:31:36Z 2025-12-08T16:31:36Z Author&#160;Zhou, Qing. author.&#160;Gao, Long. author.&#160;Liu, Ruifang. author.&#160;Cui, Shuguang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331604.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4860-0">http://dx.doi.org/10.1007/978-1-4614-4860-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Preserving Machine Learning for Speech Processing ent://SD_ILS/0/SD_ILS:331555 2025-12-08T16:31:36Z 2025-12-08T16:31:36Z Author&#160;Pathak, Manas A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331555.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4639-2">http://dx.doi.org/10.1007/978-1-4614-4639-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2025-12-08T16:31:36Z 2025-12-08T16:31:36Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2025-12-08T16:31:36Z 2025-12-08T16:31:36Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>