Search Results for Mobile and Network Security. - Narrowed by: Machine learning. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMobile$002band$002bNetwork$002bSecurity.$0026qf$003dSUBJECT$002509Subject$002509Machine$002blearning.$002509Machine$002blearning.$0026ps$003d300? 2026-05-09T01:10:07Z Research in Computer Science 6th Conference, CRI 2023, Yaounde, Cameroon, December 12-13, 2023, Proceedings ent://SD_ILS/0/SD_ILS:604088 2026-05-09T01:10:07Z 2026-05-09T01:10:07Z Author&#160;Melatagia Yonta, Paulin. editor. (orcid)0000-0003-3479-2627&#160;Barkaoui, Kamel. editor. (orcid)0000-0001-7175-0448&#160;Ndoundam, Ren&eacute;. editor. (orcid)0000-0003-1105-762X&#160;Yenke, Omer-Blaise. editor. (orcid)0000-0001-9670-1001&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-63110-8">https://doi.org/10.1007/978-3-031-63110-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-05-09T01:10:07Z 2026-05-09T01:10:07Z Author&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Security Empowered by Artificial Intelligence ent://SD_ILS/0/SD_ILS:604049 2026-05-09T01:10:07Z 2026-05-09T01:10:07Z Author&#160;Chen, Yingying. editor.&#160;Wu, Jie. editor.&#160;Yu, Paul. editor.&#160;Wang, Xiaogang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53510-9">https://doi.org/10.1007/978-3-031-53510-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI-Driven Cybersecurity and Threat Intelligence Cyber Automation, Intelligent Decision-Making and Explainability ent://SD_ILS/0/SD_ILS:603381 2026-05-09T01:10:07Z 2026-05-09T01:10:07Z Author&#160;Sarker, Iqbal H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54497-2">https://doi.org/10.1007/978-3-031-54497-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Third International Conference on Information Management and Machine Intelligence ICIMMI 2021 ent://SD_ILS/0/SD_ILS:529071 2026-05-09T01:10:07Z 2026-05-09T01:10:07Z Author&#160;Goyal, Dinesh. editor.&#160;Kumar, Anil. editor.&#160;Piuri, Vincenzo. editor.&#160;Paprzycki, Marcin. editor. (orcid)0000-0002-8069-2152&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-2065-3">https://doi.org/10.1007/978-981-19-2065-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart and sustainable intelligent systems ent://SD_ILS/0/SD_ILS:596625 2026-05-09T01:10:07Z 2026-05-09T01:10:07Z Author&#160;Gupta, Namita, editor.&#160;Chatterjee, Prasenjit, 1982- editor.&#160;Choudhury, Tanupriya, editor.<br/>Preferred Shelf Number&#160;QA76.76 .E95 S63 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119752134">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119752134</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>