Search Results for Machine learning - Narrowed by: Security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMachine$002blearning$0026qf$003dSUBJECT$002509Subject$002509Security.$002509Security.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-24T13:23:15Z Data exfiltration threats and prevention techniques : machine learning and memory-based data security ent://SD_ILS/0/SD_ILS:598245 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;Tari, Zahir, 1961- author.&#160;Sohrabi, Nasrin, 1982- author.&#160;Samadi, Yasaman, 1993- author.&#160;Suaboot, Jakapan, 1984- author.<br/>Preferred Shelf Number&#160;TK5105.59 .T365 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119898900</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep learning for intrusion detection : techniques and applications ent://SD_ILS/0/SD_ILS:600319 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;Masoodi, Faheem Syeed, editor.&#160;Bamhdi, Alwi, editor.<br/>Preferred Shelf Number&#160;TK5105.59 .D44 2026<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394285198</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Next generation data science and blockchain technology for Industry 5.0 : concepts and paradigms ent://SD_ILS/0/SD_ILS:600050 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;Tyagi, Amit Kumar, editor.<br/>Preferred Shelf Number&#160;T59.6 .N49 2025<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394245215</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy for 6G Massive IoT. ent://SD_ILS/0/SD_ILS:599629 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;Mantas, Georgios.&#160;Saghezchi, Firooz.&#160;Rodriguez, Jonathan.&#160;Sucasas, Victor.<br/>Preferred Shelf Number&#160;TK5103.252<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119988007</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 5G explained : security and deployment of advanced mobile communications ent://SD_ILS/0/SD_ILS:594896 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;Penttinen, Jyrki T. J., author.<br/>Preferred Shelf Number&#160;TK5103.483 .P46 2019<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119275695</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity program development for business : the essential planning guide ent://SD_ILS/0/SD_ILS:594455 2026-01-24T13:23:15Z 2026-01-24T13:23:15Z Author&#160;Moschovitis, Christos J. P., author.<br/>Preferred Shelf Number&#160;HD30.2<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119430018</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>