Search Results for Data protection. - Narrowed by: Computer network architectures.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetwork$002barchitectures.$002509Computer$002bnetwork$002barchitectures.$0026ps$003d300$0026isd$003dtrue?
2024-09-15T06:07:22Z
Harbour Protection Through Data Fusion Technologies
ent://SD_ILS/0/SD_ILS:170363
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Shahbazian, Elisa. editor. Rogova, Galina. editor. DeWeert, Michael J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4020-8883-4">http://dx.doi.org/10.1007/978-1-4020-8883-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400326
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Krimmer, Robert. editor. (orcid)0000-0002-0873-539X Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043 Cortier, Véronique. editor. Goré, Rajeev. editor. Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Applied Cryptography Engineering 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399906
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Chattopadhyay, Anupam. editor. (orcid)0000-0002-8818-6983 Rebeiro, Chester. editor. (orcid)0000-0001-8063-0026 Yarom, Yuval. editor. (orcid)0000-0003-0401-4197 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05072-6">https://doi.org/10.1007/978-3-030-05072-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network and Parallel Computing 15th IFIP WG 10.3 International Conference, NPC 2018, Muroran, Japan, November 29 – December 1, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400307
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Zhang, Feng. editor. (orcid)0000-0003-1983-7321 Zhai, Jidong. editor. Snir, Marc. editor. Jin, Hai. editor. Kasahara, Hironori. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05677-3">https://doi.org/10.1007/978-3-030-05677-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:400597
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Wang, Guojun. editor. (orcid)0000-0001-9875-4182 Chen, Jinjun. editor. Yang, Laurence T. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy and Identity Management. The Smart Revolution 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:401491
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Hansen, Marit. editor. Kosta, Eleni. editor. Nai-Fovino, Igor. editor. Fischer-Hübner, Simone. editor. (orcid)0000-0002-6938-4466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-92925-5">https://doi.org/10.1007/978-3-319-92925-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Blockchain First International Conference, SmartBlock 2018, Tokyo, Japan, December 10–12, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399024
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Qiu, Meikang. editor. (orcid)0000-0002-1004-0140 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05764-0">https://doi.org/10.1007/978-3-030-05764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Honeypot Frameworks and Their Applications: A New Framework
ent://SD_ILS/0/SD_ILS:399250
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author NG, Chee Keong. author. Pan, Lei. author. Xiang, Yang. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-7739-5">https://doi.org/10.1007/978-981-10-7739-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy III
ent://SD_ILS/0/SD_ILS:331294
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Schneier, Bruce. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331294.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334616
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Cavallaro, Lorenzo. editor. Gollmann, Dieter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334616.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-38530-8">http://dx.doi.org/10.1007/978-3-642-38530-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings
ent://SD_ILS/0/SD_ILS:334760
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Rieck, Konrad. editor. Stewin, Patrick. editor. Seifert, Jean-Pierre. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334760.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Netzwerk- und Datensicherheit Eine praktische Einführung
ent://SD_ILS/0/SD_ILS:338406
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Kappes, Martin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(338406.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-8348-8612-5">http://dx.doi.org/10.1007/978-3-8348-8612-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnets
ent://SD_ILS/0/SD_ILS:331175
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Tiirmaa-Klaar, Heli. author. Gassen, Jan. author. Gerhards-Padilla, Elmar. author. Martini, Peter. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331175.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:334403
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Flegel, Ulrich. editor. Markatos, Evangelos. editor. Robertson, William. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334403.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Modern Cryptography Primer Theoretical Foundations and Practical Applications
ent://SD_ILS/0/SD_ILS:335099
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Kościelny, Czesław. author. Kurkowski, Mirosław. author. Srebrny, Marian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335099.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Mobile Apps Mit Business-Apps ins Zeitalter mobiler Geschäftsprozesse
ent://SD_ILS/0/SD_ILS:194966
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Verclas, Stephan. editor. Linnhoff-Popien, Claudia. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-22259-7">http://dx.doi.org/10.1007/978-3-642-22259-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197367
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Schmidt, Andreas U. editor. Russello, Giovanni. editor. Krontiris, Ioannis. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings
ent://SD_ILS/0/SD_ILS:197425
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Kotenko, Igor. editor. Skormin, Victor. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-33704-8">http://dx.doi.org/10.1007/978-3-642-33704-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research in Cryptology 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197481
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Armknecht, Frederik. editor. Lucks, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34159-5">http://dx.doi.org/10.1007/978-3-642-34159-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital Forensics and Cyber Crime Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197609
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Gladyshev, Pavel. editor. Rogers, Marcus K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35515-8">http://dx.doi.org/10.1007/978-3-642-35515-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Trustworthy Ubiquitous Computing
ent://SD_ILS/0/SD_ILS:207047
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Khalil, Ismail. editor. Mantoro, Teddy. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.2991/978-94-91216-71-8">http://dx.doi.org/10.2991/978-94-91216-71-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptographic Protocol Security Analysis Based on Trusted Freshness
ent://SD_ILS/0/SD_ILS:195536
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Dong, Ling. author. Chen, Kefei. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-24073-7">http://dx.doi.org/10.1007/978-3-642-24073-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:195894
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Bouvry, Pascal. editor. Kłopotek, Mieczysław A. editor. Leprévost, Franck. editor. Marciniak, Małgorzata. editor. Mykowiecka, Agnieszka. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunications International Joint Conference, ICETE 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:197636
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Obaidat, Mohammad S. editor. Sevillano, José L. editor. Filipe, Joaquim. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-35755-8">http://dx.doi.org/10.1007/978-3-642-35755-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Spyware and Adware
ent://SD_ILS/0/SD_ILS:167516
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Aycock, John. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Apple's iPad im Enterprise-Einsatz Einsatzmöglichkeiten, Programmierung, Betrieb und Sicherheit im Unternehmen
ent://SD_ILS/0/SD_ILS:192969
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Oelmaier, Florian. author. Hörtreiter, Jochen. author. Seitz, Andreas. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-15437-9">http://dx.doi.org/10.1007/978-3-642-15437-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cyber Situational Awareness Issues and Research
ent://SD_ILS/0/SD_ILS:171874
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Jajodia, Sushil. editor. Liu, Peng. editor. Swarup, Vipin. editor. Wang, Cliff. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Distributed Computing and Networking 11th International Conference, ICDCN 2010, Kolkata, India, January 3-6, 2010. Proceedings
ent://SD_ILS/0/SD_ILS:191651
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Kant, Krishna. editor. Pemmaraju, Sriram V. editor. Sivalingam, Krishna M. editor. Wu, Jie. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11322-2">http://dx.doi.org/10.1007/978-3-642-11322-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network Intrusion Detection and Prevention Concepts and Techniques
ent://SD_ILS/0/SD_ILS:167906
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Ghorbani, Ali A. author. Lu, Wei. author. Tavallaee, Mahbod. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security Informatics
ent://SD_ILS/0/SD_ILS:172217
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Yang, Christopher C. editor. Chau, Michael. editor. Wang, Jau-Hwang. editor. Chen, Hsinchun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-1325-8">http://dx.doi.org/10.1007/978-1-4419-1325-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Threats in Cyber Security
ent://SD_ILS/0/SD_ILS:172782
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Probst, Christian W. editor. Hunker, Jeffrey. editor. Gollmann, Dieter. editor. Bishop, Matt. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Economics of Information Security and Privacy
ent://SD_ILS/0/SD_ILS:172736
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Moore, Tyler. editor. Pym, David. editor. Ioannidis, Christos. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6967-5">http://dx.doi.org/10.1007/978-1-4419-6967-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191712
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Gu, Qijun. editor. Zang, Wanyu. editor. Yu, Meng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Ad Hoc Networks First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191780
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Zheng, Jun. editor. Mao, Shiwen. editor. Midkiff, Scott F. editor. Zhu, Hua. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11723-7">http://dx.doi.org/10.1007/978-3-642-11723-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Les virus informatiques: théorie, pratique et applications
ent://SD_ILS/0/SD_ILS:176476
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Filiol, Éric. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-2-287-98240-8">http://dx.doi.org/10.1007/978-2-287-98240-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Integrated Management of Systems, Services, Processes and People in IT 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2009, Venice, Italy, October 27-28, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:191119
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Bartolini, Claudio. editor. Gaspary, Luciano Paschoal. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04989-7">http://dx.doi.org/10.1007/978-3-642-04989-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Advances in Communication and Networking Second International Conference on Future Generation Communication and Networking, FGCN 2008, Sanya, Hainan Island, China, December 13-15, 2008. Revised Selected Papers
ent://SD_ILS/0/SD_ILS:191309
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Kim, Tai-hoon. editor. Yang, Laurence T. editor. Park, Jong Hyuk. editor. Chang, Alan Chin-Chen. editor. Vasilakos, Thanos. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10236-3">http://dx.doi.org/10.1007/978-3-642-10236-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Future Generation Information Technology First International Conference, FGIT 2009, Jeju Island, Korea, December 10-12,2009. Proceedings
ent://SD_ILS/0/SD_ILS:191389
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Lee, Young-hoon. editor. Kim, Tai-hoon. editor. Fang, Wai-chi. editor. Ślęzak, Dominik. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10509-8">http://dx.doi.org/10.1007/978-3-642-10509-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Initiatives to Secure Cyberspace An Emerging Landscape
ent://SD_ILS/0/SD_ILS:164783
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Portnoy, Michael. editor. Goodman, Seymour. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Multi-Party Non-Repudiation Protocols and Applications
ent://SD_ILS/0/SD_ILS:167284
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Onieva, José A. author. Lopez, Javier. author. Zhou, Jianying. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Global Security, Safety, and Sustainability 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings
ent://SD_ILS/0/SD_ILS:190823
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Jahankhani, Hamid. editor. Hessami, Ali G. editor. Hsu, Feng. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04062-7">http://dx.doi.org/10.1007/978-3-642-04062-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security and Dependability for Ambient Intelligence
ent://SD_ILS/0/SD_ILS:167907
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Kokolakis, Spyros. editor. Gómez, Antonio Maña. editor. Spanoudakis, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Smart Cards, Tokens, Security and Applications
ent://SD_ILS/0/SD_ILS:166922
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Mayes, Keith E. author. Markantonakis, Konstantinos. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72198-9">http://dx.doi.org/10.1007/978-0-387-72198-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security for Telecommunications Networks
ent://SD_ILS/0/SD_ILS:166945
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Traynor, Patrick. author. McDaniel, Patrick. author. Porta, Thomas La. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-72442-3">http://dx.doi.org/10.1007/978-0-387-72442-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection Systems
ent://SD_ILS/0/SD_ILS:167451
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Mancini, Luigi V. editor. Pietro, Roberto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Insider Attack and Cyber Security Beyond the Hacker
ent://SD_ILS/0/SD_ILS:167459
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Stolfo, Salvatore J. editor. Bellovin, Steven M. editor. Keromytis, Angelos D. editor. Hershkop, Shlomo. editor. Smith, Sean W. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Based Information Systems 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings
ent://SD_ILS/0/SD_ILS:188752
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Takizawa, Makoto. editor. Barolli, Leonard. editor. Enokido, Tomoya. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85693-1">http://dx.doi.org/10.1007/978-3-540-85693-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Research in Cryptology Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
ent://SD_ILS/0/SD_ILS:189035
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Lucks, Stefan. editor. Sadeghi, Ahmad-Reza. editor. Wolf, Christopher. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88353-1">http://dx.doi.org/10.1007/978-3-540-88353-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Botnet Detection Countering the Largest Security Threat
ent://SD_ILS/0/SD_ILS:166626
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Lee, Wenke. editor. Wang, Cliff. editor. Dagon, David. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Vulnerability Analysis and Defense for the Internet
ent://SD_ILS/0/SD_ILS:167162
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Singh, Abhishek. editor. Singh, Baibhav. editor. Joseph, Hirosh. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-Business and Telecommunication Networks Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers
ent://SD_ILS/0/SD_ILS:186034
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Filipe, Joaquim. editor. Obaidat, Mohammad S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-70760-8">http://dx.doi.org/10.1007/978-3-540-70760-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Privacy-Respecting Intrusion Detection
ent://SD_ILS/0/SD_ILS:166560
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Flegel, Ulrich. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern
ent://SD_ILS/0/SD_ILS:185059
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Meier, Michael. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Network-Based Information Systems First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007. Proceedings
ent://SD_ILS/0/SD_ILS:187200
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Enokido, Tomoya. editor. Barolli, Leonard. editor. Takizawa, Makoto. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-74573-0">http://dx.doi.org/10.1007/978-3-540-74573-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
E-business and Telecommunication Networks Second International Conference, ICETE 2005, Reading, UK, October 3-7, 2005. Selected Papers
ent://SD_ILS/0/SD_ILS:187555
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Filipe, Joaquim. editor. Coelhas, Helder. editor. Saramago, Monica. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-75993-5">http://dx.doi.org/10.1007/978-3-540-75993-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedings
ent://SD_ILS/0/SD_ILS:187023
2024-09-15T06:07:22Z
2024-09-15T06:07:22Z
Author Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>