Search Results for Information Theory. - Narrowed by: Security systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list
2026-03-26T10:45:56Z
Intelligent Predictive Maintenance
ent://SD_ILS/0/SD_ILS:604470
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Liu, Min. author. (orcid)0000-0002-8902-5460 Li, Ling. author. Yan, Feng. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-97-2677-6">https://doi.org/10.1007/978-981-97-2677-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
SCION: A Secure Internet Architecture
ent://SD_ILS/0/SD_ILS:613238
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Perrig, Adrian. author. Szalachowski, Pawel. author. Reischuk, Raphael M. author. Chuat, Laurent. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Data-Driven Remaining Useful Life Prognosis Techniques Stochastic Models, Methods and Applications
ent://SD_ILS/0/SD_ILS:614165
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Si, Xiao-Sheng. author. Zhang, Zheng-Xin. author. Hu, Chang-Hua. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-662-54030-5">https://doi.org/10.1007/978-3-662-54030-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices
ent://SD_ILS/0/SD_ILS:616596
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Izmailov, Igor. author. Poizner, Boris. author. Romanov, Ilia. author. Smolskiy, Sergey. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Fusion Methodologies in Crisis Management Higher Level Fusion and Decision Making
ent://SD_ILS/0/SD_ILS:614780
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Rogova, Galina. editor. Scott, Peter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-22527-2">https://doi.org/10.1007/978-3-319-22527-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Cryptography Made Simple
ent://SD_ILS/0/SD_ILS:617695
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Smart, Nigel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Secure Data Deletion
ent://SD_ILS/0/SD_ILS:617190
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Reardon, Joel. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Why Cryptography Should Not Rely on Physical Attack Complexity
ent://SD_ILS/0/SD_ILS:529557
2026-03-26T10:45:56Z
2026-03-26T10:45:56Z
Author Krämer, Juliane. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>