Search Results for Malware analysis. - Narrowed by: Computer networks&nbsp;. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMalware$002banalysis.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$0025C2$0025A0.$002509Computer$002bnetworks$0025C2$0025A0.$0026ps$003d300$0026isd$003dtrue? 2026-04-26T15:08:02Z Advances in Information and Computer Security 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605157 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Minematsu, Kazuhiko. editor. (orcid)0000-0002-3427-6772&#160;Mimura, Mamoru. editor. (orcid)0000-0003-4323-9911&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-7737-2">https://doi.org/10.1007/978-981-97-7737-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security, Privacy and Digital Forensics Select Proceedings of the International Conference, ICISPD 2022 ent://SD_ILS/0/SD_ILS:601918 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Patel, Sankita J. editor.&#160;Chaudhary, Naveen Kumar. editor.&#160;Gohil, Bhavesh N. editor.&#160;Iyengar, S. S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-5091-1">https://doi.org/10.1007/978-981-99-5091-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Information Security and Applications 4th International Conference, EISA 2023, Hangzhou, China, December 6-7, 2023, Proceedings ent://SD_ILS/0/SD_ILS:602288 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Shao, Jun. editor.&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9614-8">https://doi.org/10.1007/978-981-99-9614-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 5th International Conference, ML4CS 2023, Yanuca Island, Fiji, December 4-6, 2023, Proceedings ent://SD_ILS/0/SD_ILS:603309 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Kim, Dan Dongseong. editor. (orcid)0000-0003-2605-187X&#160;Chen, Chao. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-2458-1">https://doi.org/10.1007/978-981-97-2458-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:603331 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Mosbah, Mohamed. editor. (orcid)0000-0001-6031-4237&#160;S&egrave;des, Florence. editor.&#160;Tawbi, Nadia. editor.&#160;Ahmed, Toufik. editor.&#160;Boulahia-Cuppens, Nora. editor. (orcid)0000-0001-8792-0413<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57537-2">https://doi.org/10.1007/978-3-031-57537-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Computational Intelligence ICCI 2022 ent://SD_ILS/0/SD_ILS:528100 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Tiwari, Ritu. editor.&#160;Pavone, Mario F. editor.&#160;Saraswat, Mukesh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-2854-5">https://doi.org/10.1007/978-981-99-2854-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Network Security 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617319 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Rak, Jacek. editor.&#160;Bay, John. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;Popyack, Leonard. editor.&#160;Skormin, Victor. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-65127-9">https://doi.org/10.1007/978-3-319-65127-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research in Attacks, Intrusions, and Defenses 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611806 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Monrose, Fabian. editor.&#160;Dacier, Marc. editor.&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617&#160;Garcia-Alfaro, Joaquin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-45719-2">https://doi.org/10.1007/978-3-319-45719-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Science and Applications ent://SD_ILS/0/SD_ILS:530137 2026-04-26T15:08:02Z 2026-04-26T15:08:02Z Author&#160;Kim, Kuinam J. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-46578-3">https://doi.org/10.1007/978-3-662-46578-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>