Search Results for Science. - Narrowed by: E-Book - English - Communications Engineering, Networks. - Data Structures, Cryptology and Information Theory. - Data protection. - Telecommunication.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dScience.$0026qf$003dITYPE$002509Material$002bType$0025091$00253AE-KITAP$002509E-Book$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Communications$002bEngineering$00252C$002bNetworks.$002509Communications$002bEngineering$00252C$002bNetworks.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026ic$003dtrue$0026te$003dILS$0026ps$003d300?
2024-09-10T05:35:37Z
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-09-10T05:35:37Z
2024-09-10T05:35:37Z
Author Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332468.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-09-10T05:35:37Z
2024-09-10T05:35:37Z
Author Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Preferred Shelf Number ONLINE(331766.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>