Search Results for Detection. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dDetection.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300? 2026-04-21T10:24:35Z Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:167451 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Mancini, Luigi V. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversary Detection For Cognitive Radio Networks ent://SD_ILS/0/SD_ILS:401405 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anomaly Detection Principles and Algorithms ent://SD_ILS/0/SD_ILS:613149 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Mehrotra, Kishan G. author.&#160;Mohan, Chilukuri K. author.&#160;Huang, HuaMing. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identification and Mitigation of Fraudulent Online Transactions Using Authentication and Fraud Detection System ent://SD_ILS/0/SD_ILS:606269 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Khattri, Vipin. author.&#160;Kumar Nayak, Sandeep. author.&#160;Kumar Singh, Deepak. author.&#160;Bhateja, Vikrant. author. (orcid)0000-0002-3259-8874&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-4888-4">https://doi.org/10.1007/978-981-97-4888-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:604263 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Maggi, Federico. editor. (orcid)0000-0003-1073-8036&#160;Egele, Manuel. editor. (orcid)0000-0001-5038-2682&#160;Payer, Mathias. editor. (orcid)0000-0001-5054-7547&#160;Carminati, Michele. editor. (orcid)0000-0001-8284-6074&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64171-8">https://doi.org/10.1007/978-3-031-64171-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 14th International Conference, DIMVA 2017, Bonn, Germany, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612534 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Polychronakis, Michalis. editor.&#160;Meier, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60876-1">https://doi.org/10.1007/978-3-319-60876-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools ent://SD_ILS/0/SD_ILS:618425 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Bhuyan, Monowar H. author.&#160;Bhattacharyya, Dhruba K. author.&#160;Kalita, Jugal K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 13th International Conference, DIMVA 2016, San Sebasti&aacute;n, Spain, July 7-8, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616097 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Caballero, Juan. editor.&#160;Zurutuza, Urko. editor.&#160;Rodr&iacute;guez, Ricardo J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40667-1">https://doi.org/10.1007/978-3-319-40667-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334760 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rieck, Konrad. editor.&#160;Stewin, Patrick. editor.&#160;Seifert, Jean-Pierre. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334760.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334403 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Flegel, Ulrich. editor.&#160;Markatos, Evangelos. editor.&#160;Robertson, William. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334403.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37300-8">http://dx.doi.org/10.1007/978-3-642-37300-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> A Survey of Data Leakage Detection and Prevention Solutions ent://SD_ILS/0/SD_ILS:174080 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Shabtai, Asaf. author.&#160;Elovici, Yuval. author.&#160;Rokach, Lior. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-2053-8">http://dx.doi.org/10.1007/978-1-4614-2053-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks Critical Information Infrastructure Protection ent://SD_ILS/0/SD_ILS:204062 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Raghavan, S.V. editor.&#160;Dawson, E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-81-322-0277-6">http://dx.doi.org/10.1007/978-81-322-0277-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:167906 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Ghorbani, Ali A. author.&#160;Lu, Wei. author.&#160;Tavallaee, Mahbod. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190460 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Flegel, Ulrich. editor.&#160;Bruschi, Danilo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02918-9">http://dx.doi.org/10.1007/978-3-642-02918-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185981 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Zamboni, Diego. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70542-0">http://dx.doi.org/10.1007/978-3-540-70542-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Intrusion Detection 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:188841 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Lippmann, Richard. editor.&#160;Kirda, Engin. editor.&#160;Trachtenberg, Ari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87403-4">http://dx.doi.org/10.1007/978-3-540-87403-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection effektiv! Modellierung und Analyse von Angriffsmustern ent://SD_ILS/0/SD_ILS:185059 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Meier, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-48258-1">http://dx.doi.org/10.1007/978-3-540-48258-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:186912 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;H&auml;mmerli, Bernhard. editor.&#160;Sommer, Robin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605671 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75764-8">https://doi.org/10.1007/978-3-031-75764-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Federated Cyber Intelligence Federated Learning for Cybersecurity ent://SD_ILS/0/SD_ILS:608186 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Tabrizchi, Hamed. author. (orcid)0000-0001-9250-2232&#160;Aghasi, Ali. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86592-3">https://doi.org/10.1007/978-3-031-86592-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 19th International Conference, CRiSIS 2024, Aix-en-Provence, France, November 26-28, 2024, Proceedings ent://SD_ILS/0/SD_ILS:608228 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Collart-Dutilleul, Simon. editor. (orcid)0000-0003-4292-6584&#160;Ouchani, Samir. editor. (orcid)0000-0002-7997-8225&#160;Cuppens, Nora. editor. (orcid)0000-0001-8792-0413&#160;Cuppens, Fr&eacute;d&eacute;ric. editor. (orcid)0000-0003-1124-2200&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-89350-6">https://doi.org/10.1007/978-3-031-89350-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXXIX 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gj&oslash;vik, Norway, June 23-24, 2025, Proceedings ent://SD_ILS/0/SD_ILS:609053 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Shafiq, Basit. editor. (orcid)0000-0002-7862-6682&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-96590-6">https://doi.org/10.1007/978-3-031-96590-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:601805 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64948-6">https://doi.org/10.1007/978-3-031-64948-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605517 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64954-7">https://doi.org/10.1007/978-3-031-64954-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605670 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75757-0">https://doi.org/10.1007/978-3-031-75757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Securing the Connected World Exploring Emerging Threats and Innovative Solutions ent://SD_ILS/0/SD_ILS:608011 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Thampi, Sabu M. editor. (orcid)0000-0001-6453-5520&#160;Thomas, Tony. editor. (orcid)0000-0002-9323-6607&#160;Mukherjee, Preetam. editor. (orcid)0000-0003-2549-6578&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82826-3">https://doi.org/10.1007/978-3-031-82826-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Unleashing the Power of Blockchain and IoT for Water Informatics ent://SD_ILS/0/SD_ILS:609189 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rawat, Sur Singh. editor.&#160;Malsa, Nitima. editor.&#160;Kumar, Gyanendra. editor.&#160;Gupta, Vimal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3886-4">https://doi.org/10.1007/978-981-96-3886-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606510 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Patil, Vishwas T. editor. (orcid)0000-0001-7714-2291&#160;Krishnan, Ram. editor. (orcid)0000-0002-7402-553X&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80020-7">https://doi.org/10.1007/978-3-031-80020-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607656 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Song, Houbing Herbert. editor. (orcid)0000-0003-2631-9223&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3531-3">https://doi.org/10.1007/978-981-96-3531-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Management and Wireless Networks 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608220 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Daimi, Kevin. editor.&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86637-1">https://doi.org/10.1007/978-3-031-86637-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image Processing, Computer Vision, and Pattern Recognition and Information and Knowledge Engineering 28th International Conference, IPCV 2024, and 23rd International Conference, IKE 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:609535 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;Ghareh Mohammadi, Farid. editor. (orcid)0000-0002-8759-693X&#160;Shenavarmasouleh, Farzan. editor. (orcid)0000-0001-5485-232X&#160;Amirian, Soheyla. editor. (orcid)0000-0002-7517-0739&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-85933-5">https://doi.org/10.1007/978-3-031-85933-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Demystifying AI and ML for Cyber-Threat Intelligence ent://SD_ILS/0/SD_ILS:609747 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Yang, Ming. editor.&#160;Mohanty, Sachi Nandan. editor.&#160;Satpathy, Suneeta. editor.&#160;Hu, Shu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90723-4">https://doi.org/10.1007/978-3-031-90723-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AISMA-2023: International Workshop on Advanced Information Security Management and Applications ent://SD_ILS/0/SD_ILS:606079 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Raza, Zahid. editor. (orcid)0000-0003-1906-6774&#160;Babenko, Mikhail. editor. (orcid)0000-0001-7066-0061&#160;Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332&#160;Lapina, Maria. editor.&#160;Zolotarev, Vyacheslav. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-77229-0">https://doi.org/10.1007/978-3-031-77229-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Malware Offensive and Defensive Systems ent://SD_ILS/0/SD_ILS:602026 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Almomani, Iman. editor.&#160;Maglaras, Leandros A. editor.&#160;Ferrag, Mohamed Amine. editor.&#160;Ayres, Nick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience Fundamentals ent://SD_ILS/0/SD_ILS:602876 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Tjoa, Simon. author.&#160;Gafi&#263;, Melisa. author.&#160;Kieseberg, Peter. author. (orcid)0000-0002-2847-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-52064-8">https://doi.org/10.1007/978-3-031-52064-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:603309 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kim, Dan Dongseong. editor. (orcid)0000-0003-2605-187X&#160;Chen, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2458-1">https://doi.org/10.1007/978-981-97-2458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Face Recognition ent://SD_ILS/0/SD_ILS:602213 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Li, Stan Z. editor.&#160;Jain, Anil K. editor.&#160;Deng, Jiankang. editor. (orcid)0000-0002-3709-6216&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-43567-6">https://doi.org/10.1007/978-3-031-43567-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602288 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Shao, Jun. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9614-8">https://doi.org/10.1007/978-981-99-9614-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Techniques of Artificial Intelligence in IT Security Systems ent://SD_ILS/0/SD_ILS:602624 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Korytkowski, Marcin. author. (orcid)0000-0002-6002-2733&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53854-4">https://doi.org/10.1007/978-3-031-53854-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Watermarking Latest Developments and Trends ent://SD_ILS/0/SD_ILS:602650 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kumar Sahu, Aditya. editor. (orcid)0000-0003-4257-0688&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9803-6">https://doi.org/10.1007/978-981-99-9803-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Security Modern Trends and Challenges ent://SD_ILS/0/SD_ILS:603127 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Gountia, Debasis. editor. (orcid)0000-0002-9079-1074&#160;Dalei, Dilip Kumar. editor.&#160;Mishra, Subhankar. editor. (orcid)0000-0002-9910-7291&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0407-1">https://doi.org/10.1007/978-981-97-0407-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the International Conference on Intelligent Computing, Communication and Information Security ICICCIS 2022 ent://SD_ILS/0/SD_ILS:528020 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Devedzic, Vladan. editor.&#160;Agarwal, Basant. editor.&#160;Gupta, Mukesh Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1373-2">https://doi.org/10.1007/978-981-99-1373-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security, Trust and Privacy Models, and Architectures in IoT Environments ent://SD_ILS/0/SD_ILS:526748 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Fotia, Lidia. editor.&#160;Messina, Fabrizio. editor.&#160;Rosaci, Domenico. editor.&#160;Sarn&eacute;, Giuseppe M.L. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21940-5">https://doi.org/10.1007/978-3-031-21940-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fusion of Machine Learning Paradigms Theory and Applications ent://SD_ILS/0/SD_ILS:526924 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Hatzilygeroudis, Ioannis K. editor.&#160;Tsihrintzis, George A. editor.&#160;Jain, Lakhmi C. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-22371-6">https://doi.org/10.1007/978-3-031-22371-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Application Development: Practice and Experience 12th Industry Symposium in Conjunction with 18th ICDCIT 2022 ent://SD_ILS/0/SD_ILS:527017 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Singh, Jagannath. editor.&#160;Das, Debasish. editor.&#160;Kumar, Lov. editor.&#160;Krishna, Aneesh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-6893-8">https://doi.org/10.1007/978-981-19-6893-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Smart Home Networks ent://SD_ILS/0/SD_ILS:527231 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Meng, Yan. author.&#160;Zhu, Haojin. author.&#160;Shen, Xuemin (Sherman). author. (orcid)0000-0002-4140-287X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-24185-7">https://doi.org/10.1007/978-3-031-24185-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2 ent://SD_ILS/0/SD_ILS:527448 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kondo, Kazuhiro. editor.&#160;Horng, Mong-Fong. editor.&#160;Pan, Jeng-Shyang. editor.&#160;Hu, Pei. editor. (orcid)0000-0003-3711-4952&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-0105-0">https://doi.org/10.1007/978-981-99-0105-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology for Competitive Strategies (ICTCS 2021) ICT: Applications and Social Interfaces ent://SD_ILS/0/SD_ILS:527470 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Joshi, Amit. editor.&#160;Mahmud, Mufti. editor.&#160;Ragel, Roshan G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-0095-2">https://doi.org/10.1007/978-981-19-0095-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Computational and Communication Paradigms Proceedings of ICACCP 2023 ent://SD_ILS/0/SD_ILS:528431 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Borah, Samarjeet. editor.&#160;Gandhi, Tapan K. editor.&#160;Piuri, Vincenzo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4284-8">https://doi.org/10.1007/978-981-99-4284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence in Cyber Security: Theories and Applications ent://SD_ILS/0/SD_ILS:528553 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Bhardwaj, Tushar. editor.&#160;Upadhyay, Himanshu. editor.&#160;Sharma, Tarun Kumar. editor.&#160;Fernandes, Steven Lawrence. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28581-3">https://doi.org/10.1007/978-3-031-28581-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Explainable AI for Cybersecurity ent://SD_ILS/0/SD_ILS:528936 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Pan, Zhixin. author.&#160;Mishra, Prabhat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-46479-9">https://doi.org/10.1007/978-3-031-46479-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Data Analytics and Management ICDAM 2023, Volume 3 ent://SD_ILS/0/SD_ILS:529027 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Swaroop, Abhishek. editor.&#160;Polkowski, Zdzislaw. editor.&#160;Correia, S&eacute;rgio Duarte. editor.&#160;Virdee, Bal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-6550-2">https://doi.org/10.1007/978-981-99-6550-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Data Analytics and Management ICDAM 2023, Volume 4 ent://SD_ILS/0/SD_ILS:529039 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Swaroop, Abhishek. editor.&#160;Polkowski, Zdzislaw. editor.&#160;Correia, S&eacute;rgio Duarte. editor.&#160;Virdee, Bal. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-6553-3">https://doi.org/10.1007/978-981-99-6553-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Recent Innovations in Computing ICRIC 2022, Volume 1 ent://SD_ILS/0/SD_ILS:529010 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Singh, Yashwant. editor.&#160;Singh, Pradeep Kumar. editor.&#160;Kolekar, Maheshkumar H. editor.&#160;Kar, Arpan Kumar. editor.&#160;Gon&ccedil;alves, Paulo J. Sequeira. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9876-8">https://doi.org/10.1007/978-981-19-9876-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2023 ent://SD_ILS/0/SD_ILS:529021 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Ranganathan, G. editor.&#160;EL Allioui, Youssouf. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology for Competitive Strategies (ICTCS 2022) ICT: Applications and Social Interfaces ent://SD_ILS/0/SD_ILS:527746 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Joshi, Amit. editor.&#160;Mahmud, Mufti. editor.&#160;Ragel, Roshan G. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-9638-2">https://doi.org/10.1007/978-981-19-9638-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023 ent://SD_ILS/0/SD_ILS:528415 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Giri, Debasis. editor.&#160;Gollmann, Dieter. editor.&#160;Ponnusamy, S. editor.&#160;Kouichi, Sakurai. editor.&#160;Stanimirovi&#263;, Predrag S. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022 ent://SD_ILS/0/SD_ILS:528784 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Gunjan, Vinit Kumar. editor.&#160;Zurada, Jacek M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of Fourth International Conference on Computer and Communication Technologies IC3T 2022 ent://SD_ILS/0/SD_ILS:528786 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Reddy, K. Ashoka. editor.&#160;Devi, B. Rama. editor.&#160;George, Boby. editor.&#160;Raju, K. Srujan. editor.&#160;Sellathurai, Mathini. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-8563-8">https://doi.org/10.1007/978-981-19-8563-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023 ent://SD_ILS/0/SD_ILS:528801 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Chaki, Nabendu. editor.&#160;Roy, Nilanjana Dutta. editor.&#160;Debnath, Papiya. editor.&#160;Saeed, Khalid. editor. (orcid)0000-0002-7741-7045&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3878-0">https://doi.org/10.1007/978-981-99-3878-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1 ent://SD_ILS/0/SD_ILS:529113 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rathore, Vijay Singh. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Piuri, Vincenzo. editor.&#160;Surendiran, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Frontiers in Computing and Systems COMSYS 2022 ent://SD_ILS/0/SD_ILS:527858 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Sarkar, Ram. editor.&#160;Pal, Sujata. editor.&#160;Basu, Subhadip. editor.&#160;Plewczynski, Dariusz. editor.&#160;Bhattacharjee, Debotosh. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2680-0">https://doi.org/10.1007/978-981-99-2680-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and privacy in the Internet of things : architectures, techniques, and applications ent://SD_ILS/0/SD_ILS:597184 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Awad, Ali Ismail, editor.&#160;Abawajy, Jemal H., 1982- editor.<br/>Preferred Shelf Number&#160;TK5105.8857 .S444 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119607755</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:610761 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Ceci, Michelangelo. editor.&#160;Hollm&eacute;n, Jaakko. editor.&#160;Todorovski, Ljup&#269;o. editor.&#160;Vens, Celine. editor.&#160;D&#382;eroski, Sa&scaron;o. editor. (orcid)0000-0003-2363-712X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71246-8">https://doi.org/10.1007/978-3-319-71246-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Video Analytics. Face and Facial Expression Recognition and Audience Measurement Third International Workshop, VAAM 2016, and Second International Workshop, FFER 2016, Cancun, Mexico, December 4, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611125 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Nasrollahi, Kamal. editor.&#160;Distante, Cosimo. editor.&#160;Hua, Gang. editor.&#160;Cavallaro, Andrea. editor.&#160;Moeslund, Thomas B. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-56687-0">https://doi.org/10.1007/978-3-319-56687-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Analysis for Software Verification and Security ent://SD_ILS/0/SD_ILS:611157 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Bultan, Tevfik. author.&#160;Yu, Fang. author.&#160;Alkhalaf, Muath. author.&#160;Aydin, Abdulbaki. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68670-7">https://doi.org/10.1007/978-3-319-68670-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XIII 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611592 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67208-3">https://doi.org/10.1007/978-3-319-67208-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions, and Defenses 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612555 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Dacier, Marc. editor.&#160;Bailey, Michael. editor.&#160;Polychronakis, Michalis. editor.&#160;Antonakakis, Manos. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66332-6">https://doi.org/10.1007/978-3-319-66332-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Cryptography and Machine Learning First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613097 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Dolev, Shlomi. editor.&#160;Lodha, Sachin. editor. (orcid)0000-0001-5771-4977&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60080-2">https://doi.org/10.1007/978-3-319-60080-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:613268 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Alsmadi, Izzat M. editor. (orcid)0000-0001-7832-5081&#160;Karabatis, George. editor.&#160;Aleroud, Ahmed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44257-0">https://doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613555 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;Singh, Virendra. editor. (orcid)0000-0002-9113-5167&#160;Vaidya, Jaideep. editor. (orcid)0000-0002-7420-6947&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72598-7">https://doi.org/10.1007/978-3-319-72598-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 21st Pacific-Asia Conference, PAKDD 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:610799 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kim, Jinho. editor.&#160;Shim, Kyuseok. editor.&#160;Cao, Longbing. editor.&#160;Lee, Jae-Gil. editor.&#160;Lin, Xuemin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57529-2">https://doi.org/10.1007/978-3-319-57529-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Risks and Security of Internet and Systems 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611536 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lanet, Jean-Louis. editor.&#160;Legay, Axel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-54876-0">https://doi.org/10.1007/978-3-319-54876-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:615923 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Pieprzyk, Josef. editor.&#160;Suriadi, Suriadi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59870-3">https://doi.org/10.1007/978-3-319-59870-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:615933 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Pieprzyk, Josef. editor.&#160;Suriadi, Suriadi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60055-0">https://doi.org/10.1007/978-3-319-60055-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616796 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Tuncer, Daphne. editor.&#160;Koch, Robert. editor.&#160;Badonnel, R&eacute;mi. editor.&#160;Stiller, Burkhard. editor. (orcid)0000-0002-7461-7463&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60774-0">https://doi.org/10.1007/978-3-319-60774-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 21st Pacific-Asia Conference, PAKDD 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:616033 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kim, Jinho. editor.&#160;Shim, Kyuseok. editor.&#160;Cao, Longbing. editor.&#160;Lee, Jae-Gil. editor.&#160;Lin, Xuemin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57454-7">https://doi.org/10.1007/978-3-319-57454-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermarking 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616228 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Kraetzer, Christian. editor.&#160;Shi, Yun-Qing. editor.&#160;Dittmann, Jana. editor.&#160;Kim, Hyoung Joong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64185-0">https://doi.org/10.1007/978-3-319-64185-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image Analysis and Recognition 14th International Conference, ICIAR 2017, Montreal, QC, Canada, July 5-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:616240 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Karray, Fakhri. editor.&#160;Campilho, Aur&eacute;lio. editor.&#160;Cheriet, Farida. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59876-5">https://doi.org/10.1007/978-3-319-59876-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616288 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66399-9">https://doi.org/10.1007/978-3-319-66399-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618161 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Ceci, Michelangelo. editor.&#160;Hollm&eacute;n, Jaakko. editor.&#160;Todorovski, Ljup&#269;o. editor.&#160;Vens, Celine. editor.&#160;D&#382;eroski, Sa&scaron;o. editor. (orcid)0000-0003-2363-712X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71249-9">https://doi.org/10.1007/978-3-319-71249-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:618179 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Geng, Wen-dong. author.&#160;Wang, Yuan-qin. author.&#160;Dong, Zheng-hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-1888-6">https://doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fraud Prevention in Online Digital Advertising ent://SD_ILS/0/SD_ILS:618267 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Zhu, Xingquan. author. (orcid)0000-0003-4129-9611&#160;Tao, Haicheng. author.&#160;Wu, Zhiang. author.&#160;Cao, Jie. author.&#160;Kalish, Kristopher. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-56793-8">https://doi.org/10.1007/978-3-319-56793-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 9th International Symposium, FPS 2016, Qu&eacute;bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618301 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Wang, Lingyu. editor. (orcid)0000-0002-7441-7541&#160;Cuppens-Boulahia, Nora. editor.&#160;Tawbi, Nadia. editor.&#160;Garcia-Alfaro, Joaquin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-51966-1">https://doi.org/10.1007/978-3-319-51966-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part III ent://SD_ILS/0/SD_ILS:618461 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Altun, Yasemin. editor.&#160;Das, Kamalika. editor.&#160;Mielik&auml;inen, Taneli. editor.&#160;Malerba, Donato. editor. (orcid)0000-0001-8432-4608&#160;Stefanowski, Jerzy. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-71273-4">https://doi.org/10.1007/978-3-319-71273-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security - ESORICS 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:618102 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Foley, Simon N. editor.&#160;Gollmann, Dieter. editor.&#160;Snekkenes, Einar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66402-6">https://doi.org/10.1007/978-3-319-66402-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617875 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Batten, Lynn. editor.&#160;Kim, Dong Seong. editor.&#160;Zhang, Xuyun. editor.&#160;Li, Gang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5421-1">https://doi.org/10.1007/978-981-10-5421-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618258 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rass, Stefan. editor.&#160;An, Bo. editor.&#160;Kiekintveld, Christopher. editor.&#160;Fang, Fei. editor.&#160;Schauer, Stefan. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68711-7">https://doi.org/10.1007/978-3-319-68711-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611434 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Skavhaug, Amund. editor.&#160;Guiochet, J&eacute;r&eacute;mie. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Decision and Game Theory for Security 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611619 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Zhu, Quanyan. editor.&#160;Alpcan, Tansu. editor.&#160;Panaousis, Emmanouil. editor.&#160;Tambe, Milind. editor.&#160;Casey, William. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47413-7">https://doi.org/10.1007/978-3-319-47413-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611907 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Camenisch, Jan. editor.&#160;Kesdo&#287;an, Do&#287;an. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:615414 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Androulidakis, I.I. author.&#160;Kioupakis, Fragkiskos - Emmanouil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Image Analysis and Recognition 13th International Conference, ICIAR 2016, in Memory of Mohamed Kamel, P&oacute;voa de Varzim, Portugal, July 13-15, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616199 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Campilho, Aur&eacute;lio. editor.&#160;Karray, Fakhri. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41501-7">https://doi.org/10.1007/978-3-319-41501-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Fingerprinting ent://SD_ILS/0/SD_ILS:614393 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Wang, Cliff. editor.&#160;Gerdes, Ryan M. editor.&#160;Guan, Yong. editor.&#160;Kasera, Sneha Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6601-1">https://doi.org/10.1007/978-1-4939-6601-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616731 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Batten, Lynn. editor.&#160;Li, Gang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2741-3">https://doi.org/10.1007/978-981-10-2741-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618112 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Ray, Indrajit. editor.&#160;Gaur, Manoj Singh. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Sanghi, Dheeraj. editor.&#160;Kamakoti, V. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49806-5">https://doi.org/10.1007/978-3-319-49806-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 S34 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Surviving security : how to integrate people, process, and technology ent://SD_ILS/0/SD_ILS:547266 2026-04-21T10:24:35Z 2026-04-21T10:24:35Z Author&#160;Andress, Amanda., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 A545 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203501405">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>