Search Results for Information security. - Narrowed by: Data mining.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ps$003d300$0026isd$003dtrue?2026-01-21T13:27:57ZSecurity analytics : a data centric approach to information securityent://SD_ILS/0/SD_ILS:5924712026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Khurana, Mehak, editor. Mahajan, Shilpa, editor.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206088">https://www.taylorfrancis.com/books/9781003206088</a>
OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4838412026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4849602026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4008302026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4003762026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349762026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papersent://SD_ILS/0/SD_ILS:1913082026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Gal, Cecilia S. editor. Kantor, Paul B. editor. Lesk, Michael E. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Efficient Secure Two-Party Protocols Techniques and Constructionsent://SD_ILS/0/SD_ILS:1926082026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Hazay, Carmit. author. Lindell, Yehuda. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data warehousing and data mining techniques for cyber securityent://SD_ILS/0/SD_ILS:1104342026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Singhal, Anoop, 1958-<br/>Preferred Shelf Number QA76.9.A25 S563 2007<br/>Format: Books<br/>Availability Beytepe Library~1<br/>Data Warehousing and Data Mining Techniques for Cyber Securityent://SD_ILS/0/SD_ILS:1663792026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Singhal, Anoop. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy Preserving Data Miningent://SD_ILS/0/SD_ILS:1656532026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Vaidya, Jaideep. author. Zhu, Yu Michael. author. Clifton, Christopher W. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligent Computing and Applications Proceedings of ICDIC 2020ent://SD_ILS/0/SD_ILS:5286782026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Rao, B. Narendra Kumar. editor. Balasubramanian, R. editor. Wang, Shiuh-Jeng. editor. Nayak, Richi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Proceedings of World Conference on Artificial Intelligence: Advances and Applications WCAIAA 2023ent://SD_ILS/0/SD_ILS:5287252026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Tripathi, Ashish Kumar. editor. Anand, Darpan. editor. Nagar, Atulya K. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-99-5881-8">https://doi.org/10.1007/978-981-99-5881-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Artificial intelligence and data mining approaches in security frameworksent://SD_ILS/0/SD_ILS:5969572026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applicationsent://SD_ILS/0/SD_ILS:5965412026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Pani, Subhendu Kumar, 1980- editor. Singh, Sanjay Kumar, 1963- editor. Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number HV6431 .I58 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>International Joint Conference CISIS'15 and ICEUTE'15ent://SD_ILS/0/SD_ILS:5294172026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Herrero, Álvaro. editor. (orcid)0000-0002-2444-5384 Baruque, Bruno. editor. Sedano, Javier. editor. Quintián, Héctor. editor. Corchado, Emilio. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-19713-5">https://doi.org/10.1007/978-3-319-19713-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Data Mining : Technologies, Techniques, Tools, and Trendsent://SD_ILS/0/SD_ILS:5411682026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Thuraisingham, Bhavani, author.<br/>Preferred Shelf Number QA76.9 .D3 T487 2014<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781482252507">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Web data mining and applications in business intelligence and counter-terrorisment://SD_ILS/0/SD_ILS:5402592026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number QA76.9 .D343 T48 2003<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9780203499511">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>Managing and mining multimedia databasesent://SD_ILS/0/SD_ILS:5428522026-01-21T13:27:57Z2026-01-21T13:27:57ZAuthor Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number QA76.9 .D3 T458 2001<br/>Electronic Access <a href="https://www.taylorfrancis.com/books/9781420042559">Click here to view.</a><br/>Format: Books<br/>Availability Online Library~1<br/>