Search Results for Intrusion detection systems (Computer security) SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dIntrusion$002bdetection$002bsystems$002b$002528Computer$002bsecurity$002529$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-20T13:56:22Z Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Management and Wireless Networks 23rd International Conference, SAM 2024 and 23rd International Conference, ICWN 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608220 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Daimi, Kevin. editor.&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86637-1">https://doi.org/10.1007/978-3-031-86637-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Empowered by Artificial Intelligence ent://SD_ILS/0/SD_ILS:604049 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Chen, Yingying. editor.&#160;Wu, Jie. editor.&#160;Yu, Paul. editor.&#160;Wang, Xiaogang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53510-9">https://doi.org/10.1007/978-3-031-53510-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Optimization Techniques for Automotive Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:528168 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Kukkala, Vipin Kumar. editor.&#160;Pasricha, Sudeep. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-28016-0">https://doi.org/10.1007/978-3-031-28016-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Protection in a Post-Pandemic Society Laws, Regulations, Best Practices and Recent Solutions ent://SD_ILS/0/SD_ILS:520503 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Hewage, Chaminda. editor.&#160;Rahulamathavan, Yogachandran. editor.&#160;Ratnayake, Deepthi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34006-2">https://doi.org/10.1007/978-3-031-34006-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> ARTIFICIAL INTELLIGENCE FOR INTRUSION DETECTION SYSTEMS ent://SD_ILS/0/SD_ILS:560871 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Swarnkar, Mayank, editor.&#160;Rajput, Shyam Singh, editor.<br/>Preferred Shelf Number&#160;TK5105.59<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003346340">https://www.taylorfrancis.com/books/9781003346340</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security ent://SD_ILS/0/SD_ILS:596235 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Almalawi, Abdulmohsen, author.&#160;Tari, Zahir, 1961- author.&#160;Fahad, Adil, author.&#160;Yi, Xun, author.<br/>Preferred Shelf Number&#160;TJ222 .A46 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools ent://SD_ILS/0/SD_ILS:618425 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Bhuyan, Monowar H. author.&#160;Bhattacharyya, Dhruba K. author.&#160;Kalita, Jugal K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Bradley, Jaron, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:547748 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Preferred Shelf Number&#160;TK5105.59 .B474 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Snort 2.0 intrusion detection ent://SD_ILS/0/SD_ILS:254005 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Beale, Jay.&#160;Foster, James C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836746">http://www.sciencedirect.com/science/book/9781931836746</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information security management handbook on CD-ROM ent://SD_ILS/0/SD_ILS:547768 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Nozaki, Micki Krause.&#160;Tipton, Harold F.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H36 2002<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781466515611">https://www.taylorfrancis.com/books/9781466515611</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure computers and networks : analysis, design, and implementation ent://SD_ILS/0/SD_ILS:540568 2026-03-20T13:56:22Z 2026-03-20T13:56:22Z Author&#160;Fisch, Eric A.&#160;White, Gregory B.<br/>Preferred Shelf Number&#160;QA76.9 .A25 F5334 2000<br/>Electronic Access&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9780367802127">https://www.taylorfrancis.com/books/9780367802127</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>