Search Results for Security, International - Narrowed by: Data mining.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$00252C$002bInternational$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ic$003dtrue$0026ps$003d300?dt=list2024-12-22T15:43:40ZAdvances in Cryptology – ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part IIent://SD_ILS/0/SD_ILS:4849602024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Galbraith, Steven D. editor. (orcid)0000-0001-7114-8377 Moriai, Shiho. editor. (orcid)0000-0002-6072-6183 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34621-8">https://doi.org/10.1007/978-3-030-34621-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology – ICISC 2018 21st International Conference, Seoul, South Korea, November 28–30, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4838412024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Lee, Kwangsu. editor. (orcid)0000-0003-1910-8890 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12146-4">https://doi.org/10.1007/978-3-030-12146-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27–29, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4866492024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Doss, Robin. editor. (orcid)0000-0001-6143-6850 Piramuthu, Selwyn. editor. Zhou, Wei. editor. (orcid)0000-0002-9965-9870 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Applications and Techniques in Information Security 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4003762024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Chen, Qingfeng. editor. Wu, Jia. editor. Zhang, Shichao. editor. Yuan, Changan. editor. Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2907-4">https://doi.org/10.1007/978-981-13-2907-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Information Security and Cryptology 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:4008302024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Chen, Xiaofeng. editor. Lin, Dongdai. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-75160-3">https://doi.org/10.1007/978-3-319-75160-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Future Data and Security Engineering 5th International Conference, FDSE 2018, Ho Chi Minh City, Vietnam, November 28–30, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3994042024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Dang, Tran Khanh. editor. Küng, Josef. editor. Wagner, Roland. editor. Thoai, Nam. editor. Takizawa, Makoto. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-03192-3">https://doi.org/10.1007/978-3-030-03192-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cryptology and Network Security 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papersent://SD_ILS/0/SD_ILS:3993472024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Capkun, Srdjan. editor. Chow, Sherman S. M. editor. (orcid)0000-0001-7306-453X SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-02641-7">https://doi.org/10.1007/978-3-030-02641-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedingsent://SD_ILS/0/SD_ILS:3994502024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Dinur, Itai. editor. Dolev, Shlomi. editor. Lodha, Sachin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94147-9">https://doi.org/10.1007/978-3-319-94147-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Trust, Privacy, and Security in Digital Business 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349302024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Furnell, Steven. editor. Lambrinoudakis, Costas. editor. Lopez, Javier. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334930.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40343-9">http://dx.doi.org/10.1007/978-3-642-40343-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Security of Information and Communication Networks First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3349762024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Awad, Ali Ismail. editor. Hassanien, Aboul Ella. editor. Baba, Kensuke. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(334976.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-40597-6">http://dx.doi.org/10.1007/978-3-642-40597-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Proceedings of the International Conference on IT Convergence and Security 2011ent://SD_ILS/0/SD_ILS:2064942024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Kim, Kuinam J. editor. Ahn, Seong Jin. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-94-007-2911-7">http://dx.doi.org/10.1007/978-94-007-2911-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papersent://SD_ILS/0/SD_ILS:1900972024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Bonchi, Francesco. editor. Ferrari, Elena. editor. Jiang, Wei. editor. Malin, Bradley. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-01718-6">http://dx.doi.org/10.1007/978-3-642-01718-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1857752024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Yang, Christopher C. editor. Chen, Hsinchun. editor. Chau, Michael. editor. Chang, Kuiyu. editor. Lang, Sheau-Dong. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:1881432024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Bonchi, Francesco. editor. Ferrari, Elena. editor. Malin, Bradley. editor. Saygin, Yücel. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedingsent://SD_ILS/0/SD_ILS:1888152024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13–15, 2007 Proceedingsent://SD_ILS/0/SD_ILS:1870232024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Gorodetsky, Vladimir. editor. Kotenko, Igor. editor. Skormin, Victor A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Intelligence and security informatics for international security : information sharing and data miningent://SD_ILS/0/SD_ILS:1197862024-12-22T15:43:40Z2024-12-22T15:43:40ZAuthor Chen, Hsinchun.<br/>Preferred Shelf Number QA76.76.E95 C44 2006<br/>Format: Books<br/>Availability Beytepe Library~1<br/>