Search Results for Deception. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDeception.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-04-05T13:55:40Z Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:611890 2026-04-05T13:55:40Z 2026-04-05T13:55:40Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings ent://SD_ILS/0/SD_ILS:482942 2026-04-05T13:55:40Z 2026-04-05T13:55:40Z Author&#160;Al-Shaer, Ehab. editor.&#160;Wei, Jinpeng. editor. (orcid)0000-0002-6982-7386&#160;Hamlen, Kevin W. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-04-05T13:55:40Z 2026-04-05T13:55:40Z Author&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Financial Cryptography and Data Security 20th International Conference, FC 2016, Christ Church, Barbados, February 22-26, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:612685 2026-04-05T13:55:40Z 2026-04-05T13:55:40Z Author&#160;Grossklags, Jens. editor.&#160;Preneel, Bart. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-54970-4">https://doi.org/10.1007/978-3-662-54970-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-04-05T13:55:40Z 2026-04-05T13:55:40Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:529962 2026-04-05T13:55:40Z 2026-04-05T13:55:40Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>