Search Results for Information Systems. - Narrowed by: SpringerLink (Online service) - 2005 - Computer Communication Networks. - Data structures (Computer science). SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bSystems.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dPUBDATE$002509Publication$002bDate$0025092005$0025092005$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$002509Data$002bstructures$002b$002528Computer$002bscience$002529.$0026te$003dILS$0026ps$003d300$0026isd$003dtrue? 2024-09-10T15:53:39Z Mining Sequential Patterns from Large Data Sets ent://SD_ILS/0/SD_ILS:165033 2024-09-10T15:53:39Z 2024-09-10T15:53:39Z Author&#160;Wang, Wei. author.&#160;Yang, Jiong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104937">http://dx.doi.org/10.1007/b104937</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:164876 2024-09-10T15:53:39Z 2024-09-10T15:53:39Z Author&#160;McGuire, Tommy M. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-09-10T15:53:39Z 2024-09-10T15:53:39Z Author&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:164923 2024-09-10T15:53:39Z 2024-09-10T15:53:39Z Author&#160;Robinson, Philip. editor.&#160;Vogt, Harald. editor.&#160;Wagealla, Waleed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Net-Centric Approaches to Intelligence and National Security ent://SD_ILS/0/SD_ILS:165242 2024-09-10T15:53:39Z 2024-09-10T15:53:39Z Author&#160;Ladner, Roy. editor.&#160;Petry, Frederick E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:165267 2024-09-10T15:53:39Z 2024-09-10T15:53:39Z Author&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>