Search Results for Problems. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dProblems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300$0026isd$003dtrue?dt=list 2026-04-04T03:50:55Z Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331610.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611907 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Camenisch, Jan. editor.&#160;Kesdo&#287;an, Do&#287;an. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196240 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Tibble, Ian., author.<br/>Preferred Shelf Number&#160;HF5548.37 .T53 2011<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193975 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Camenisch, Jan. editor.&#160;Kisimov, Valentin. editor.&#160;Dubovitskaya, Maria. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems ent://SD_ILS/0/SD_ILS:176195 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Nin, Jordi. editor.&#160;Herranz, Javier. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84996-238-4">http://dx.doi.org/10.1007/978-1-84996-238-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> iNetSec 2009 &ndash; Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191270 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Safety-Critical Systems: Problems, Process and Practice Proceedings of the Seventeenth Safety-Critical Systems Symposium, Brighton, UK, 3&ndash;5 February 2009 ent://SD_ILS/0/SD_ILS:175957 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Dale, Chris. editor.&#160;Anderson, Tom. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-84882-349-5">http://dx.doi.org/10.1007/978-1-84882-349-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606449 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0888-1">https://doi.org/10.1007/978-981-96-0888-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:606462 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0938-3">https://doi.org/10.1007/978-981-96-0938-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII ent://SD_ILS/0/SD_ILS:606463 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0944-4">https://doi.org/10.1007/978-981-96-0944-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606477 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0891-1">https://doi.org/10.1007/978-981-96-0891-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606436 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0875-1">https://doi.org/10.1007/978-981-96-0875-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part V ent://SD_ILS/0/SD_ILS:606437 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0935-2">https://doi.org/10.1007/978-981-96-0935-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:606438 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0941-3">https://doi.org/10.1007/978-981-96-0941-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:606427 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0947-5">https://doi.org/10.1007/978-981-96-0947-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part IV ent://SD_ILS/0/SD_ILS:606498 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0894-2">https://doi.org/10.1007/978-981-96-0894-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial Intelligence and Applications 26th International Conference, ICAI 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608336 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;Amirian, Soheyla. editor. (orcid)0000-0002-7517-0739&#160;Shenavarmasouleh, Farzan. editor. (orcid)0000-0001-5485-232X&#160;Ghareh Mohammadi, Farid. editor. (orcid)0000-0002-8759-693X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-86623-4">https://doi.org/10.1007/978-3-031-86623-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AISMA-2023: International Workshop on Advanced Information Security Management and Applications ent://SD_ILS/0/SD_ILS:606079 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Raza, Zahid. editor. (orcid)0000-0003-1906-6774&#160;Babenko, Mikhail. editor. (orcid)0000-0001-7066-0061&#160;Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332&#160;Lapina, Maria. editor.&#160;Zolotarev, Vyacheslav. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-77229-0">https://doi.org/10.1007/978-3-031-77229-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building Cybersecurity Applications with Blockchain and Smart Contracts ent://SD_ILS/0/SD_ILS:602640 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;El Madhoun, Nour. editor. (orcid)0000-0001-7742-7748&#160;Dionysiou, Ioanna. editor.&#160;Bertin, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50733-5">https://doi.org/10.1007/978-3-031-50733-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fluidware Novel Approaches for Large-Scale IoT Systems ent://SD_ILS/0/SD_ILS:604287 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Zambonelli, Franco. editor.&#160;Fortino, Giancarlo. editor.&#160;Re, Barbara. editor. (orcid)0000-0001-5374-2364&#160;Viroli, Mirko. editor. (orcid)0000-0003-2702-5702&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-62146-8">https://doi.org/10.1007/978-3-031-62146-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AISMA-2024: International Workshop on Advanced Information Security Management and Applications ent://SD_ILS/0/SD_ILS:605556 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Lapina, Maria. editor. (orcid)0000-0001-8117-9142&#160;Raza, Zahid. editor. (orcid)0000-0003-1906-6774&#160;Tchernykh, Andrei. editor. (orcid)0000-0001-5029-5212&#160;Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332&#160;Zolotarev, Vyacheslav. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72171-7">https://doi.org/10.1007/978-3-031-72171-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptocoding Based on Quasigroups ent://SD_ILS/0/SD_ILS:602350 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Mechkaroska, Daniela. author.&#160;Popovska-Mitrovikj, Aleksandra. author. (orcid)0000-0002-1578-6275&#160;Bakeva, Verica. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-50125-8">https://doi.org/10.1007/978-3-031-50125-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy Computing Theory and Technology ent://SD_ILS/0/SD_ILS:602562 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Li, Fenghua. author.&#160;Li, Hui. author.&#160;Niu, Ben. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-4943-4">https://doi.org/10.1007/978-981-99-4943-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementation and Analysis of Ciphers in Quantum Computing ent://SD_ILS/0/SD_ILS:603263 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Baksi, Anubhab. author.&#160;Jang, Kyungbae. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0025-7">https://doi.org/10.1007/978-981-97-0025-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability Engineering for Industrial Processes An Analytics Perspective ent://SD_ILS/0/SD_ILS:603298 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Kapur, P. K. editor. (orcid)0000-0001-8006-5952&#160;Pham, Hoang. editor.&#160;Singh, Gurinder. editor. (orcid)0000-0002-7827-1578&#160;Kumar, Vivek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55048-5">https://doi.org/10.1007/978-3-031-55048-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theoretical Computer Science and Discrete Mathematics First International Conference, ICTCSDM 2016, Krishnankoil, India, December 19-21, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616066 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Arumugam, S. editor.&#160;Bagga, Jay. editor.&#160;Beineke, Lowell W. editor.&#160;Panda, B.S. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64419-6">https://doi.org/10.1007/978-3-319-64419-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:616346 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Kim, Kuinam. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-4154-9">https://doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618109 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Hartenstein, Hannes. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> String Analysis for Software Verification and Security ent://SD_ILS/0/SD_ILS:611157 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Bultan, Tevfik. author.&#160;Yu, Fang. author.&#160;Alkhalaf, Muath. author.&#160;Aydin, Abdulbaki. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-68670-7">https://doi.org/10.1007/978-3-319-68670-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Connected Environments for the Internet of Things Challenges and Solutions ent://SD_ILS/0/SD_ILS:612157 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70102-8">https://doi.org/10.1007/978-3-319-70102-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Research Advances in Cloud Computing ent://SD_ILS/0/SD_ILS:612458 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Chaudhary, Sanjay. editor.&#160;Somani, Gaurav. editor.&#160;Buyya, Rajkumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5026-8">https://doi.org/10.1007/978-981-10-5026-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anomaly Detection Principles and Algorithms ent://SD_ILS/0/SD_ILS:613149 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Mehrotra, Kishan G. author.&#160;Mohan, Chilukuri K. author.&#160;Huang, HuaMing. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613304 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Kalai, Yael. editor.&#160;Reyzin, Leonid. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:614769 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Zhang, Peng. author.&#160;Lin, Chuang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Subjective Logic A Formalism for Reasoning Under Uncertainty ent://SD_ILS/0/SD_ILS:615866 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;J&oslash;sang, Audun. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:611890 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:612882 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Yu, Shui. editor.&#160;Guo, Song. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:617816 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Gavrilova, Marina L. editor.&#160;Tan, C.J. Kenneth. editor.&#160;Sourin, Alexei. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-53090-0">https://doi.org/10.1007/978-3-662-53090-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618047 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Dunkelman, Orr. editor.&#160;Keliher, Liam. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:611814 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Swarup, Vipin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social Network Analysis in Predictive Policing Concepts, Models and Methods ent://SD_ILS/0/SD_ILS:611926 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Tayebi, Mohammad A. author.&#160;Gl&auml;sser, Uwe. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41492-8">https://doi.org/10.1007/978-3-319-41492-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:612828 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Kim, Kuinam J. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 ent://SD_ILS/0/SD_ILS:614422 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Senthilkumar, Muthukrishnan. editor.&#160;Ramasamy, Vijayalakshmi. editor.&#160;Sheen, Shina. editor.&#160;Veeramani, C. editor.&#160;Bonato, Anthony. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-0251-9">https://doi.org/10.1007/978-981-10-0251-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:617849 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> 10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacy ent://SD_ILS/0/SD_ILS:618639 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Rzeszut, Eric. author.&#160;Bachrach, Daniel. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4842-0367-5">https://doi.org/10.1007/978-1-4842-0367-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-04-04T03:50:55Z 2026-04-04T03:50:55Z Author&#160;Hill, David G. (David Gary), 1943, author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H52 2009<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>