Search Results for Security Science and Technology. - Narrowed by: Data mining. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bScience$002band$002bTechnology.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ps$003d300?dt=list 2026-03-22T08:35:10Z Data Science and Big Data Analytics Proceedings of IDBA 2023 ent://SD_ILS/0/SD_ILS:602901 2026-03-22T08:35:10Z 2026-03-22T08:35:10Z Author&#160;Mishra, Durgesh. editor.&#160;Yang, Xin She. editor. (orcid)0000-0001-8231-5556&#160;Unal, Aynur. editor.&#160;Jat, Dharm Singh. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9179-2">https://doi.org/10.1007/978-981-99-9179-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the International Conference on Intelligent Systems and Networks ICISN 2024, 22-23 March 2024, Hanoi, Vietnam ent://SD_ILS/0/SD_ILS:604979 2026-03-22T08:35:10Z 2026-03-22T08:35:10Z Author&#160;Nguyen, Thi Dieu Linh. editor.&#160;Dawson, Maurice. editor.&#160;Ngoc, Le Anh. editor.&#160;Lam, Kwok Yan. editor. (orcid)0000-0001-7479-7970&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-5504-2">https://doi.org/10.1007/978-981-97-5504-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-Driven Technology for Engineering Systems Health Management Design Approach, Feature Construction, Fault Diagnosis, Prognosis, Fusion and Decisions ent://SD_ILS/0/SD_ILS:614256 2026-03-22T08:35:10Z 2026-03-22T08:35:10Z Author&#160;Niu, Gang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2032-2">https://doi.org/10.1007/978-981-10-2032-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:611588 2026-03-22T08:35:10Z 2026-03-22T08:35:10Z Author&#160;Akhgar, Babak. editor.&#160;Bayerl, P. Saskia. editor.&#160;Sampson, Fraser. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mining Social Networks and Security Informatics ent://SD_ILS/0/SD_ILS:336224 2026-03-22T08:35:10Z 2026-03-22T08:35:10Z Author&#160;&Ouml;zyer, Tansel. editor.&#160;Erdem, Zeki. editor.&#160;Rokne, Jon. editor.&#160;Khoury, Suheil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336224.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6359-3">http://dx.doi.org/10.1007/978-94-007-6359-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>