Search Results for Information security. - Narrowed by: Data mining. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dInformation$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T13:27:57Z Security analytics : a data centric approach to information security ent://SD_ILS/0/SD_ILS:592471 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Khurana, Mehak, editor.&#160;Mahajan, Shilpa, editor.<br/>Preferred Shelf Number&#160;QA76.9 .A25<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003206088">https://www.taylorfrancis.com/books/9781003206088</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology &ndash; ICISC 2018 21st International Conference, Seoul, South Korea, November 28&ndash;30, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483841 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology &ndash; ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8&ndash;12, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:484960 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377&#160;Moriai, Shiho. editor. (orcid)0000-0002-6072-6183&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3&ndash;5, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400830 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Chen, Xiaofeng. editor.&#160;Lin, Dongdai. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9&ndash;11, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400376 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Chen, Qingfeng. editor.&#160;Wu, Jia. editor.&#160;Zhang, Shichao. editor.&#160;Yuan, Changan. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334976 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Awad, Ali Ismail. editor.&#160;Hassanien, Aboul Ella. editor.&#160;Baba, Kensuke. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334976.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191308 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Gal, Cecilia S. editor.&#160;Kantor, Paul B. editor.&#160;Lesk, Michael E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligence and security informatics for international security : information sharing and data mining ent://SD_ILS/0/SD_ILS:119786 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Chen, Hsinchun.<br/>Preferred Shelf Number&#160;QA76.76.E95 C44 2006<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Efficient Secure Two-Party Protocols Techniques and Constructions ent://SD_ILS/0/SD_ILS:192608 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Hazay, Carmit. author.&#160;Lindell, Yehuda. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14303-8">http://dx.doi.org/10.1007/978-3-642-14303-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data warehousing and data mining techniques for cyber security ent://SD_ILS/0/SD_ILS:110434 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Singhal, Anoop, 1958-<br/>Preferred Shelf Number&#160;QA76.9.A25 S563 2007<br/>Format:&#160;Books<br/>Availability&#160;Beytepe Library~1<br/> Data Warehousing and Data Mining Techniques for Cyber Security ent://SD_ILS/0/SD_ILS:166379 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Singhal, Anoop. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47653-7">http://dx.doi.org/10.1007/978-0-387-47653-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Preserving Data Mining ent://SD_ILS/0/SD_ILS:165653 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Vaidya, Jaideep. author.&#160;Zhu, Yu Michael. author.&#160;Clifton, Christopher W. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29489-6">http://dx.doi.org/10.1007/978-0-387-29489-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of World Conference on Artificial Intelligence: Advances and Applications WCAIAA 2023 ent://SD_ILS/0/SD_ILS:528725 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Tripathi, Ashish Kumar. editor.&#160;Anand, Darpan. editor.&#160;Nagar, Atulya K. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5881-8">https://doi.org/10.1007/978-981-99-5881-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number&#160;HV6431 .I58 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> International Joint Conference CISIS'15 and ICEUTE'15 ent://SD_ILS/0/SD_ILS:529417 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Herrero, &Aacute;lvaro. editor. (orcid)0000-0002-2444-5384&#160;Baruque, Bruno. editor.&#160;Sedano, Javier. editor.&#160;Quinti&aacute;n, H&eacute;ctor. editor.&#160;Corchado, Emilio. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19713-5">https://doi.org/10.1007/978-3-319-19713-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Mining : Technologies, Techniques, Tools, and Trends ent://SD_ILS/0/SD_ILS:541168 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Thuraisingham, Bhavani, author.<br/>Preferred Shelf Number&#160;QA76.9 .D3 T487 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781482252507">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Web data mining and applications in business intelligence and counter-terrorism ent://SD_ILS/0/SD_ILS:540259 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D343 T48 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203499511">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Managing and mining multimedia databases ent://SD_ILS/0/SD_ILS:542852 2026-01-21T13:27:57Z 2026-01-21T13:27:57Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D3 T458 2001<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420042559">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>