Search Results for Data science. - Narrowed by: 2014 SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bscience.$0026qf$003dPUBDATE$002509Publication$002bDate$0025092014$0025092014$0026ic$003dtrue$0026ps$003d300?dt=list 2026-01-13T04:20:30Z Data smart : using data science to transform information into insight ent://SD_ILS/0/SD_ILS:516295 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Foreman, John W.<br/>Preferred Shelf Number&#160;QA76.9.D343 F67 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Foundations of statistical algorithms : with reference to R packages ent://SD_ILS/0/SD_ILS:365130 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Weihs, Claus, author.&#160;Mersmann, Olaf, author.&#160;Ligges, Uwe, author.<br/>Preferred Shelf Number&#160;QA276.4 W45 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Visualization and verbalization of data ent://SD_ILS/0/SD_ILS:545131 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Blasius, Jorg, 1957- editor. of compilation.&#160;Greenacre, Michael J., editor. of compilation.<br/>Preferred Shelf Number&#160;QA76.9 .I52 V57 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466589810">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Using R for Numerical Analysis in Science and Engineering ent://SD_ILS/0/SD_ILS:540514 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Bloomfield, Victor A., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;&nbsp;Q183.9<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315373799">Click here to view.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing Reproducible Research ent://SD_ILS/0/SD_ILS:542517 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Stodden, Victoria , editor.&#160;Leisch, Friedrich, editor.&#160;Peng, Roger D., editor.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;Q180.55 .S7<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315373461">Click here to view.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Instrumentation and Measurements ent://SD_ILS/0/SD_ILS:539514 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Northrop, Robert B., author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;&nbsp;TK7870 .N66 2015<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315275239">Click here to view.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Growth Curve Analysis and Visualization Using R ent://SD_ILS/0/SD_ILS:545512 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Mirman, Daniel, author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QH324.2<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315373218">Click here to view.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to scientific programming and simulation using R ent://SD_ILS/0/SD_ILS:364831 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Jones, Owen (Owen Dafydd), author.&#160;Maillardet, Robert, author.&#160;Robinson, Andrew (Andrew P.), author.<br/>Preferred Shelf Number&#160;Q183.9 J65 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Theory and Applications of Models of Computation 11th Annual Conference, TAMC 2014, Chennai, India, April 11-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485515 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Gopal, T V. editor.&#160;Agrawal, Manindra. editor.&#160;Li, Angsheng. editor.&#160;Cooper, S. Barry. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06089-7">https://doi.org/10.1007/978-3-319-06089-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Data Management 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:485543 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Jonker, Willem. editor.&#160;Petkovi&#263;, Milan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06811-4">https://doi.org/10.1007/978-3-319-06811-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology &ndash; AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485545 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Pointcheval, David. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06734-6">https://doi.org/10.1007/978-3-319-06734-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> DNA Computing and Molecular Programming 20th International Conference, DNA 20, Kyoto, Japan, September 22-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485696 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Murata, Satoshi. editor.&#160;Kobayashi, Satoshi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11295-4">https://doi.org/10.1007/978-3-319-11295-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:485697 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kott, Alexander. editor.&#160;Wang, Cliff. editor.&#160;Erbacher, Robert F. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485793 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Chow, Sherman S.M. editor.&#160;Camenisch, Jan. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13257-0">https://doi.org/10.1007/978-3-319-13257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Standardisation Research First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485842 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Chen, Liqun. editor.&#160;Mitchell, Chris. editor. (orcid)0000-0002-6118-0055&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14054-4">https://doi.org/10.1007/978-3-319-14054-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Spectral Dimensionality Reduction ent://SD_ILS/0/SD_ILS:487927 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Strange, Harry. author.&#160;Zwiggelaar, Reyer. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-03943-5">https://doi.org/10.1007/978-3-319-03943-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy and Trust in Cloud Systems ent://SD_ILS/0/SD_ILS:487946 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Nepal, Surya. editor.&#160;Pathan, Mukaddim. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-38586-5">https://doi.org/10.1007/978-3-642-38586-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Trends in Computer Networks and Distributed Systems Security Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487966 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Martinez Perez, Gregorio. editor.&#160;Thampi, Sabu M. editor.&#160;Ko, Ryan. editor.&#160;Shu, Lei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54525-2">https://doi.org/10.1007/978-3-642-54525-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488011 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Batten, Lynn. editor.&#160;Li, Gang. editor. (orcid)0000-0003-1583-641X&#160;Niu, Wenjia. editor.&#160;Warren, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45670-5">https://doi.org/10.1007/978-3-662-45670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and Security Systems Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488136 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kotulski, Zbigniew. editor.&#160;Ksiezopolski, Bogdan. editor.&#160;Mazur, Katarzyna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44893-9">https://doi.org/10.1007/978-3-662-44893-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Serialization and Persistent Objects Turning Data Structures into Efficient Databases ent://SD_ILS/0/SD_ILS:488080 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Soukup, Jiri. author.&#160;Mach&aacute;&#269;ek, Petr. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-39323-5">https://doi.org/10.1007/978-3-642-39323-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Biometrics in the New World The Cloud, Mobile Technology and Pervasive Identity ent://SD_ILS/0/SD_ILS:488199 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Ashbourn, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04159-9">https://doi.org/10.1007/978-3-319-04159-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Secrets in Communication Security ent://SD_ILS/0/SD_ILS:488222 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Xiao, Sheng. author.&#160;Gong, Weibo. author.&#160;Towsley, Don. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7831-7">https://doi.org/10.1007/978-1-4614-7831-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Code Breaking in the Pacific ent://SD_ILS/0/SD_ILS:488233 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Donovan, Peter. author.&#160;Mack, John. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08278-3">https://doi.org/10.1007/978-3-319-08278-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Symmetric Cryptographic Protocols ent://SD_ILS/0/SD_ILS:488387 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Ramkumar, Mahalingam. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07584-6">https://doi.org/10.1007/978-3-319-07584-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Hash Function BLAKE ent://SD_ILS/0/SD_ILS:488367 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Aumasson, Jean-Philippe. author.&#160;Meier, Willi. author.&#160;Phan, Raphael C.-W. author.&#160;Henzen, Luca. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44757-4">https://doi.org/10.1007/978-3-662-44757-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graph-Theoretic Concepts in Computer Science 40th International Workshop, WG 2014, Nouan-le-Fuzelier, France, June 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488501 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kratsch, Dieter. editor.&#160;Todinca, Ioan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12340-0">https://doi.org/10.1007/978-3-319-12340-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Automated Firewall Analytics Design, Configuration and Optimization ent://SD_ILS/0/SD_ILS:488519 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Al-Shaer, Ehab. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10371-6">https://doi.org/10.1007/978-3-319-10371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488522 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Gladyshev, Pavel. editor.&#160;Marrington, Andrew. editor.&#160;Baggili, Ibrahim. editor. (orcid)0000-0002-9574-9537&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14289-0">https://doi.org/10.1007/978-3-319-14289-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What Is Computer Science? An Information Security Perspective ent://SD_ILS/0/SD_ILS:488536 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Page, Daniel. author.&#160;Smart, Nigel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04042-4">https://doi.org/10.1007/978-3-319-04042-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488916 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Boureanu, Ioana. editor.&#160;Owesarski, Philippe. editor.&#160;Vaudenay, Serge. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07536-5">https://doi.org/10.1007/978-3-319-07536-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488934 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Linawati. editor.&#160;Mahendra, Made Sudiana. editor.&#160;Neuhold, Erich J. editor.&#160;Tjoa, A Min. editor.&#160;You, Ilsun. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55032-4">https://doi.org/10.1007/978-3-642-55032-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reversible Computation 6th International Conference, RC 2014, Kyoto, Japan, July 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488939 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Yamashita, Shigeru. editor.&#160;Minato, Shin-ichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08494-7">https://doi.org/10.1007/978-3-319-08494-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Future Internet Services and Systems Current Research ent://SD_ILS/0/SD_ILS:488944 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Heisel, Maritta. editor.&#160;Joosen, Wouter. editor.&#160;L&oacute;pez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07452-8">https://doi.org/10.1007/978-3-319-07452-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II ent://SD_ILS/0/SD_ILS:488956 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45608-8">https://doi.org/10.1007/978-3-662-45608-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488957 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45921-8">https://doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public-Key Cryptography -- PKC 2014 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488961 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Krawczyk, Hugo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54631-0">https://doi.org/10.1007/978-3-642-54631-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VII FOSAD 2012 / 2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:488996 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Aldini, Alessandro. editor.&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10082-1">https://doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Similarity Search and Applications 7th International Conference, SISAP 2014, Los Cabos, Mexico, October 29-31, 2104, Proceedings ent://SD_ILS/0/SD_ILS:488969 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Machado Traina, Agma Juci. editor.&#160;Traina Jr., Caetano. editor.&#160;Ferreira Cordeiro, Robson Leonardo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11988-5">https://doi.org/10.1007/978-3-319-11988-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security FC 2014 Workshops, BITCOIN and WAHC 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488971 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;B&ouml;hme, Rainer. editor.&#160;Brenner, Michael. editor.&#160;Moore, Tyler. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44774-1">https://doi.org/10.1007/978-3-662-44774-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488978 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Francillon, Aur&eacute;lien. editor.&#160;Rohatgi, Pankaj. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08302-5">https://doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Topics in Cryptology -- CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489005 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Benaloh, Josh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04852-9">https://doi.org/10.1007/978-3-319-04852-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489223 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43933-3">https://doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptographic Hardware and Embedded Systems -- CHES 2014 16th International Workshop, Busan, South Korea, September 23-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489052 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Batina, Lejla. editor. (orcid)0000-0003-0727-3573&#160;Robshaw, Matthew. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44709-3">https://doi.org/10.1007/978-3-662-44709-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489066 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44371-2">https://doi.org/10.1007/978-3-662-44371-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Progress in Cryptology -- INDOCRYPT 2014 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489068 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Meier, Willi. editor.&#160;Mukhopadhyay, Debdeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13039-2">https://doi.org/10.1007/978-3-319-13039-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Communication Communication, Multimedia, Security ent://SD_ILS/0/SD_ILS:489638 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Meinel, Christoph. author.&#160;Sack, Harald. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54331-9">https://doi.org/10.1007/978-3-642-54331-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Bayesian networks for probabilistic inference and decision analysis in forensic science ent://SD_ILS/0/SD_ILS:342015 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Taroni, Franco, author.&#160;Biedermann, Alex, author.&#160;Bozza, Silvia, author.&#160;Garbolino, Paolo, 1955- author.&#160;Aitken, C. G. G., author.<br/>Preferred Shelf Number&#160;ONLINE(342015.1)<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9781118914748">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118914762">http://dx.doi.org/10.1002/9781118914762</a> Wiley Online Library <a href="http://onlinelibrary.wiley.com/book/10.1002/9781118914762">http://onlinelibrary.wiley.com/book/10.1002/9781118914762</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9781118914748">http://proquest.tech.safaribooksonline.de/9781118914748</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Understanding Bitcoin Cryptography, Engineering and Economics. ent://SD_ILS/0/SD_ILS:342159 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Franco, Pedro.<br/>Preferred Shelf Number&#160;ONLINE(342159.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781119019138">http://dx.doi.org/10.1002/9781119019138</a> <a href="http://swb.eblib.com/patron/FullRecord.aspx?p=1822536">http://swb.eblib.com/patron/FullRecord.aspx?p=1822536</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Parallel science and engineering applications : the Charm++ approach ent://SD_ILS/0/SD_ILS:363562 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kale, Laxmikant V., editor.&#160;Bhatele, Abhinav, editor.<br/>Preferred Shelf Number&#160;TA345.5 P37 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Advanced structured prediction ent://SD_ILS/0/SD_ILS:364989 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Nowozin, Sebastian, 1980- editor.&#160;IEEE Xplore (Online Service), distributor.&#160;MIT Press, publisher.<br/>Preferred Shelf Number&#160;ONLINE(364989.1)<br/>Electronic Access&#160;Abstract with links to resource <a href="http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7008160">http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=7008160</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Discovering knowledge in data : an introduction to data mining ent://SD_ILS/0/SD_ILS:341929 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Larose, Daniel T., author.&#160;Larose, Chantal D., author.&#160;IEEE Computer Society.<br/>Preferred Shelf Number&#160;ONLINE(341929.1)<br/>Electronic Access&#160;Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1699137">http://public.eblib.com/choice/publicfullrecord.aspx?p=1699137</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118874059">http://dx.doi.org/10.1002/9781118874059</a> Books24x7 <a href="http://www.books24x7.com/marc.asp?bookid=63521">http://www.books24x7.com/marc.asp?bookid=63521</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Willful ignorance : the mismeasure of uncertainty ent://SD_ILS/0/SD_ILS:341864 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Weisberg, Herbert I., 1944- author.<br/>Preferred Shelf Number&#160;ONLINE(341864.1)<br/>Electronic Access&#160;Cover image <a href="http://catalogimages.wiley.com/images/db/jimages/9780470890448.jpg">http://catalogimages.wiley.com/images/db/jimages/9780470890448.jpg</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1718756">http://public.eblib.com/choice/publicfullrecord.aspx?p=1718756</a> ebrary <a href="http://site.ebrary.com/id/10887099">http://site.ebrary.com/id/10887099</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118839539">http://dx.doi.org/10.1002/9781118839539</a> MyiLibrary <a href="http://www.myilibrary.com?id=622062">http://www.myilibrary.com?id=622062</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography and network security : principles and practice ent://SD_ILS/0/SD_ILS:371288 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Stallings, William.<br/>Preferred Shelf Number&#160;TK5105.59 S713 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485743 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Gritzalis, Dimitris. editor.&#160;Kiayias, Aggelos. editor.&#160;Askoxylakis, Ioannis. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12280-9">https://doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486887 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kim, Yongdae. editor.&#160;Lee, Heejo. editor.&#160;Perrig, Adrian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05149-9">https://doi.org/10.1007/978-3-319-05149-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Pairing-Based Cryptography -- Pairing 2013 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486893 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Cao, Zhenfu. editor.&#160;Zhang, Fangguo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04873-4">https://doi.org/10.1007/978-3-319-04873-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486912 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Chakraborty, Rajat Subhra. editor.&#160;Matyas, Vashek. editor.&#160;Schaumont, Patrick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12060-7">https://doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sequences and Their Applications - SETA 2014 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487274 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Schmidt, Kai-Uwe. editor.&#160;Winterhof, Arne. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12325-7">https://doi.org/10.1007/978-3-319-12325-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Combinatorial Pattern Matching 25th Annual Symposium, CPM 2014, Moscow, Russia, June 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487392 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kulikov, Alexander S. editor.&#160;Kuznetsov, Sergei O. editor. (orcid)0000-0003-3284-9001&#160;Pevzner, Pavel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07566-2">https://doi.org/10.1007/978-3-319-07566-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487487 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;De Decker, Bart. editor.&#160;Z&uacute;quete, Andr&eacute;. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44885-4">https://doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Morphological Modeling of Terrains and Volume Data ent://SD_ILS/0/SD_ILS:487742 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;&#268;omi&#263;, Lidija. author.&#160;De Floriani, Leila. author.&#160;Magillo, Paola. author.&#160;Iuricich, Federico. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-2149-2">https://doi.org/10.1007/978-1-4939-2149-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Querying over Encrypted Data in Smart Grids ent://SD_ILS/0/SD_ILS:487757 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Wen, Mi. author.&#160;Lu, Rongxing. author.&#160;Liang, Xiaohui. author.&#160;Lei, Jingsheng. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06355-3">https://doi.org/10.1007/978-3-319-06355-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487762 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Danger, Jean Luc. editor.&#160;Debbabi, Mourad. editor.&#160;Marion, Jean-Yves. editor.&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Zincir Heywood, Nur. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-05302-8">https://doi.org/10.1007/978-3-319-05302-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:489123 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11203-9">https://doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2013 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489261 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Lange, Tanja. editor.&#160;Lauter, Kristin. editor.&#160;Lison&#283;k, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43414-7">https://doi.org/10.1007/978-3-662-43414-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication Networks for Smart Grids Making Smart Grid Real ent://SD_ILS/0/SD_ILS:489375 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Budka, Kenneth C. author.&#160;Deshpande, Jayant G. author.&#160;Thottan, Marina. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-6302-2">https://doi.org/10.1007/978-1-4471-6302-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Theoretic Security 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings ent://SD_ILS/0/SD_ILS:489420 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Padr&oacute;, Carles. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04268-8">https://doi.org/10.1007/978-3-319-04268-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489545 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Prakash, Atul. editor.&#160;Shyamasundar, Rudrapatna. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13841-1">https://doi.org/10.1007/978-3-319-13841-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing, Networking, and Informatics Proceedings of the International Conference on Advanced Computing, Networking, and Informatics, India, June 2013 ent://SD_ILS/0/SD_ILS:489466 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Mohapatra, Durga Prasad. editor.&#160;Patnaik, Srikanta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1665-0">https://doi.org/10.1007/978-81-322-1665-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of Security and Trust Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489471 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Abadi, Mart&iacute;n. editor.&#160;Kremer, Steve. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54792-8">https://doi.org/10.1007/978-3-642-54792-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Reconfigurable Systems Enhancing the Security Capabilities of Reconfigurable Hardware Architectures ent://SD_ILS/0/SD_ILS:488721 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Feller, Thomas. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07005-2">https://doi.org/10.1007/978-3-658-07005-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Information Management Using Linguistic Threshold Approach ent://SD_ILS/0/SD_ILS:484313 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Ogiela, Marek R. author.&#160;Ogiela, Urszula. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4471-5016-9">https://doi.org/10.1007/978-1-4471-5016-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Science and Cybersecurity ent://SD_ILS/0/SD_ILS:484756 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Pino, Robinson E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7597-2">https://doi.org/10.1007/978-1-4614-7597-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Smart Embedded Devices, Platforms and Applications ent://SD_ILS/0/SD_ILS:484765 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Markantonakis, Konstantinos. editor.&#160;Mayes, Keith. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7915-4">https://doi.org/10.1007/978-1-4614-7915-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Homomorphic Encryption and Applications ent://SD_ILS/0/SD_ILS:485761 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Yi, Xun. author.&#160;Paulet, Russell. author.&#160;Bertino, Elisa. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12229-8">https://doi.org/10.1007/978-3-319-12229-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Distributed Computing 28th International Symposium DISC 2014, Austin, TX, USA, October 12-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487074 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kuhn, Fabian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45174-8">https://doi.org/10.1007/978-3-662-45174-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Mathematics and Computational Science ent://SD_ILS/0/SD_ILS:487303 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Ko&ccedil;, &Ccedil;etin Kaya. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10683-0">https://doi.org/10.1007/978-3-319-10683-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trustworthy Execution on Mobile Devices ent://SD_ILS/0/SD_ILS:487333 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Vasudevan, Amit. author.&#160;McCune, Jonathan M. author.&#160;Newsome, James. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-8190-4">https://doi.org/10.1007/978-1-4614-8190-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithmic Aspects in Information and Management 10th International Conference, AAIM 2014, Vancouver, BC, Canada, July 8-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487788 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Gu, Qianping. editor.&#160;Hell, Pavol. editor.&#160;Yang, Boting. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07956-1">https://doi.org/10.1007/978-3-319-07956-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:487789 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kutylowski, Miroslaw. editor.&#160;Vaidya, Jaideep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11212-1">https://doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:487826 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;&Scaron;venda, Petr. editor.&#160;Stajano, Frank. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12400-1">https://doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Algorithms First International Conference, ICAA 2014, Kolkata, India, January 13-15, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487768 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Gupta, Prosenjit. editor.&#160;Zaroliagis, Christos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04126-1">https://doi.org/10.1007/978-3-319-04126-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Authentication in Insecure Environments Using Visual Cryptography and Non-Transferable Credentials in Practise ent://SD_ILS/0/SD_ILS:488308 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Pape, Sebastian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-07116-5">https://doi.org/10.1007/978-3-658-07116-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics X 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488324 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44952-3">https://doi.org/10.1007/978-3-662-44952-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing Platforms TPM2.0 in Context ent://SD_ILS/0/SD_ILS:488634 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Proudler, Graeme. author.&#160;Chen, Liqun. author.&#160;Dalton, Chris. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08744-3">https://doi.org/10.1007/978-3-319-08744-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Construction and Analysis of Cryptographic Functions ent://SD_ILS/0/SD_ILS:488664 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Budaghyan, Lilya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12991-4">https://doi.org/10.1007/978-3-319-12991-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptography in Constant Parallel Time ent://SD_ILS/0/SD_ILS:488823 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Applebaum, Benny. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-17367-7">https://doi.org/10.1007/978-3-642-17367-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:488918 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Chow, Sherman S.M. editor.&#160;Liu, Joseph K. editor.&#160;Hui, Lucas C.K. editor.&#160;Yiu, Siu Ming. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12475-9">https://doi.org/10.1007/978-3-319-12475-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Constructive Side-Channel Analysis and Secure Design 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:488920 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Prouff, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10175-0">https://doi.org/10.1007/978-3-319-10175-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488954 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;De Cristofaro, Emiliano. editor.&#160;Murdoch, Steven J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08506-7">https://doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488984 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Christin, Nicolas. editor.&#160;Safavi-Naini, Reihaneh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45472-5">https://doi.org/10.1007/978-3-662-45472-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488985 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Nguyen, Phong Q. editor.&#160;Oswald, Elisabeth. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55220-5">https://doi.org/10.1007/978-3-642-55220-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:488986 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Lee, Hyang-Sook. editor.&#160;Han, Dong-Guk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12160-4">https://doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 11th International Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014, Proceedings ent://SD_ILS/0/SD_ILS:488975 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Lindell, Yehuda. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54242-8">https://doi.org/10.1007/978-3-642-54242-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementation and Application of Automata 19th International Conference, CIAA 2014, Giessen, Germany, July 30 -- August 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489012 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Holzer, Markus. editor.&#160;Kutrib, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08846-4">https://doi.org/10.1007/978-3-319-08846-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I ent://SD_ILS/0/SD_ILS:489016 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Sarkar, Palash. editor.&#160;Iwata, Tetsu. editor. (orcid)0000-0002-4729-0979&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-45611-8">https://doi.org/10.1007/978-3-662-45611-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Experimental Algorithms 13th International Symposium, SEA 2014, Copenhagen, Denmark, June 29 -- July 1, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489020 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Gudmundsson, Joachim. editor.&#160;Katajainen, Jyrki. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-07959-2">https://doi.org/10.1007/978-3-319-07959-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489026 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Mauw, Sjouke. editor.&#160;Damsgaard Jensen, Christian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11851-2">https://doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Data Hiding and Multimedia Security IX Special Issue on Visual Cryptography ent://SD_ILS/0/SD_ILS:489032 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Shi, Yun Q. editor.&#160;Liu, Feng. editor.&#160;Yan, Weiqi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-55046-1">https://doi.org/10.1007/978-3-642-55046-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014. Proceedings ent://SD_ILS/0/SD_ILS:489091 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Au, Man Ho. editor.&#160;Carminati, Barbara. editor.&#160;Kuo, C.-C. Jay. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11698-3">https://doi.org/10.1007/978-3-319-11698-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Data and Security Engineering 1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489103 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Dang, Tran Khanh. editor. (orcid)0000-0002-7282-3589&#160;Wagner, Roland. editor.&#160;Neuhold, Erich J. editor.&#160;Takizawa, Makoto. editor.&#160;K&uuml;ng, Josef. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12778-1">https://doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489108 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Lin, Dongdai. editor.&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-12087-4">https://doi.org/10.1007/978-3-319-12087-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Public Key Infrastructures, Services and Applications 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:489121 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Katsikas, Sokratis. editor.&#160;Agudo, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-53997-8">https://doi.org/10.1007/978-3-642-53997-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Information Technology RAIT-2014 Proceedings ent://SD_ILS/0/SD_ILS:489166 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Biswas, G. P. editor.&#160;Mukhopadhyay, Sushanta. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-1856-2">https://doi.org/10.1007/978-81-322-1856-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital-Forensics and Watermarking 12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:489603 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Shi, Yun Qing. editor.&#160;Kim, Hyoung-Joong. editor.&#160;P&eacute;rez-Gonz&aacute;lez, Fernando. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43886-2">https://doi.org/10.1007/978-3-662-43886-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology -- CRYPTO 2014 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II ent://SD_ILS/0/SD_ILS:489575 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Garay, Juan A. editor.&#160;Gennaro, Rosario. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44381-1">https://doi.org/10.1007/978-3-662-44381-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algebraic Circuits ent://SD_ILS/0/SD_ILS:488768 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Lloris Ruiz, Antonio. author.&#160;Castillo Morales, Encarnaci&oacute;n. author.&#160;Parrilla Roure, Luis. author.&#160;Garc&iacute;a R&iacute;os, Antonio. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-642-54649-5">https://doi.org/10.1007/978-3-642-54649-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> C/C++ ile veri yap&#305;lar&#305; ve &ccedil;&ouml;z&uuml;ml&uuml; uygulamalar ent://SD_ILS/0/SD_ILS:310507 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Yumu&#351;ak, Nejat.&#160;Adak, M. Fatih.<br/>Preferred Shelf Number&#160;QA76.73.C15 Y86 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Algoritmalar ent://SD_ILS/0/SD_ILS:310665 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Uzunk&ouml;pr&uuml;, S&uuml;leyman.<br/>Preferred Shelf Number&#160;QA76.9.D35 U98 2014<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~2<br/> Handbook of nutrition and food ent://SD_ILS/0/SD_ILS:541730 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Berdanier, Carolyn D., editor. of compilation.&#160;Dwyer, Johanna T., editor. of compilation.&#160;Heber, David, editor. of compilation.<br/>Preferred Shelf Number&#160;QP141 .H36 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466505728">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Remote sensing for geoscientists : image analysis and integration ent://SD_ILS/0/SD_ILS:541738 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Prost, G. L., author.<br/>Preferred Shelf Number&#160;QE33.2 .R4 P76 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466561755">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Polysaccharides : natural fibers in food and nutrition ent://SD_ILS/0/SD_ILS:543722 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Benkeblia, Noureddine, editor.<br/>Preferred Shelf Number&#160;QP144 .F52 P65 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466571822">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Technologies for smart sensors and sensor fusion ent://SD_ILS/0/SD_ILS:544444 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Yallup, Kevin, editor.&#160;Iniewski, Krzysztof, editor.<br/>Preferred Shelf Number&#160;TK7872 .D48 T43 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315215587">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Robust response surfaces, regression, and positive data analyses ent://SD_ILS/0/SD_ILS:539672 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Das, Rabindra Nath, author.<br/>Preferred Shelf Number&#160;QA279 .D355 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466506800">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Analyzing and Modeling Rank Data ent://SD_ILS/0/SD_ILS:541217 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Marden, John I, author.<br/>Preferred Shelf Number&#160;QA278.75 M373 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482252491">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Parallel science and engineering applications : the Charm++ approach ent://SD_ILS/0/SD_ILS:541227 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Kale, Laxmikant V., editor.&#160;Bhatele, Abhinav, editor.<br/>Preferred Shelf Number&#160;TA345.5 .P37 P37 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466504134">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Big data : techniques and technologies in geoinformatics ent://SD_ILS/0/SD_ILS:541157 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Karimi, Hassan A., editor.<br/>Preferred Shelf Number&#160;G70.2 .B54 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466586550">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Multilinear subspace learning : dimensionality reduction of multidimensional data ent://SD_ILS/0/SD_ILS:543765 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Lu, Haiping, author.&#160;Plataniotis, Konstantinos N., author.&#160;Venetsanopoulos, A. N. (Anastasios N.), 1941- author.<br/>Preferred Shelf Number&#160;QA76.9 .D33 L825 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439857298">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Root cause analysis : a step-by-step guide to using the right tool at the right time ent://SD_ILS/0/SD_ILS:539429 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Barsalou, Matthew A., 1975- author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;TA169.55 .R66<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482258806">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Linked data management ent://SD_ILS/0/SD_ILS:540744 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Harth, Andreas, editor. of compilation.&#160;Hose, Katja, editor.&#160;Schenkel, Ralf, editor.<br/>Preferred Shelf Number&#160;Z666.73 .L56 L56 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466582415">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Science, technology and cultural heritage : proceedings of the Second International Congress on Science and Technology for the Conservation of Cultural Heritage, Sevilla, Spain, 24-27 June 2014 ent://SD_ILS/0/SD_ILS:543359 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;International Congress on Science and Technology for the Conservation of Cultural Heritage (2nd : 2014 : Sevilla, Spain)&#160;Rogerio-Candelera, Miguel Angel, editor.<br/>Preferred Shelf Number&#160;T173.8 .S35 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781315712420">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Principles of system identification : theory and practice ent://SD_ILS/0/SD_ILS:547509 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Tangirala, Arun K., 1974- author.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;QA402<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439896020">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014, Proceedings ent://SD_ILS/0/SD_ILS:489541 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Naccache, David. editor.&#160;Sauveron, Damien. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-43826-8">https://doi.org/10.1007/978-3-662-43826-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Non-Volatile Memories ent://SD_ILS/0/SD_ILS:530917 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Hong, Seungbum. editor.&#160;Auciello, Orlando. editor.&#160;Wouters, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4899-7537-9">https://doi.org/10.1007/978-1-4899-7537-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computing Handbook : Information Systems and Information Technology ent://SD_ILS/0/SD_ILS:541180 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Topi, Heikki, editor.&#160;Tucker, Allen, editor.&#160;Taylor and Francis.<br/>Preferred Shelf Number&#160;T58.5<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439898567">Click here to view.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:484564 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Abdalla, Michel. editor. (orcid)0000-0002-2447-4329&#160;De Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10879-7">https://doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for Implantable Medical Devices ent://SD_ILS/0/SD_ILS:484643 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Burleson, Wayne. editor.&#160;Carrara, Sandro. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-1674-6">https://doi.org/10.1007/978-1-4614-1674-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485513 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Huang, Xinyi. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-06320-1">https://doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:485473 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;J&uuml;rjens, Jan. editor.&#160;Piessens, Frank. editor.&#160;Bielova, Nataliia. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04897-0">https://doi.org/10.1007/978-3-319-04897-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 19th Nordic Conference, NordSec 2014, Troms&oslash;, Norway, October 15-17, 2014, Proceedings ent://SD_ILS/0/SD_ILS:485714 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Bernsmed, Karin. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11599-3">https://doi.org/10.1007/978-3-319-11599-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography -- SAC 2014 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485776 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Joux, Antoine. editor.&#160;Youssef, Amr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13051-4">https://doi.org/10.1007/978-3-319-13051-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Radio Frequency Identification: Security and Privacy Issues 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486671 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Saxena, Nitesh. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-13066-8">https://doi.org/10.1007/978-3-319-13066-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithm Theory -- SWAT 2014 14th Scandinavian Symposium and Workshops, SWAT 2014, Copenhagen, Denmark, July 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:486844 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;G&oslash;rtz, Inge Li. editor.&#160;Ravi, R. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08404-6">https://doi.org/10.1007/978-3-319-08404-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487278 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-08344-5">https://doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487372 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Yoshida, Maki. editor.&#160;Mouri, Koichi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09843-2">https://doi.org/10.1007/978-3-319-09843-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SOFSEM 2014: Theory and Practice of Computer Science 40th International Conference on Current Trends in Theory and Practice of Computer Science,Nov&yacute; Smokovec, Slovakia, January 26-29, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487593 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Geffert, Viliam. editor.&#160;Preneel, Bart. editor.&#160;Rovan, Branislav. editor.&#160;&Scaron;tuller, J&uacute;lius. editor.&#160;Tjoa, A Min. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-04298-5">https://doi.org/10.1007/978-3-319-04298-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:487453 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Mosca, Michele. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-11659-4">https://doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graph Transformation 7th International Conference, ICGT 2014, Held as Part of STAF 2014, York, UK, July 22-24, 2014, Proceedings ent://SD_ILS/0/SD_ILS:487471 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Giese, Holger. editor.&#160;K&ouml;nig, Barbara. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-09108-2">https://doi.org/10.1007/978-3-319-09108-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Knowledge-Based Driver Assistance Systems Traffic Situation Description and Situation Feature Relevance ent://SD_ILS/0/SD_ILS:487909 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Huelsen, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-05750-3">https://doi.org/10.1007/978-3-658-05750-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Cloud Storage Systems ent://SD_ILS/0/SD_ILS:487858 2026-01-13T04:20:30Z 2026-01-13T04:20:30Z Author&#160;Yang, Kan. author.&#160;Jia, Xiaohua. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-7873-7">https://doi.org/10.1007/978-1-4614-7873-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>