Search Results for Mathematical Applications in Computer Science. - Narrowed by: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMathematical$002bApplications$002bin$002bComputer$002bScience.$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300? 2026-05-18T05:51:19Z Fractional-order Modeling and Control of Dynamic Systems ent://SD_ILS/0/SD_ILS:617205 2026-05-18T05:51:19Z 2026-05-18T05:51:19Z Author&#160;Tepljakov, Aleksei. author. (orcid)0000-0002-7158-8484&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52950-9">https://doi.org/10.1007/978-3-319-52950-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:614378 2026-05-18T05:51:19Z 2026-05-18T05:51:19Z Author&#160;Oreku, George S. author.&#160;Pazynyuk, Tamara. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21269-2">https://doi.org/10.1007/978-3-319-21269-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-05-18T05:51:19Z 2026-05-18T05:51:19Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>