Search Results for Security systems - Narrowed by: Artificial Intelligence SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity$002bsystems$0026qf$003dSUBJECT$002509Subject$002509Artificial$002bIntelligence$002509Artificial$002bIntelligence$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2026-01-22T12:04:51Z Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-01-22T12:04:51Z 2026-01-22T12:04:51Z Author&#160;Reznik, Leonid, 1955- author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 R438 2022<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of human-machine systems ent://SD_ILS/0/SD_ILS:598467 2026-01-22T12:04:51Z 2026-01-22T12:04:51Z Author&#160;Fortino, Giancarlo, 1971- editor.<br/>Preferred Shelf Number&#160;TA167 .H36 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119863663">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119863663</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep reinforcement learning for wireless communications and networking : theory, applications and implementation ent://SD_ILS/0/SD_ILS:598462 2026-01-22T12:04:51Z 2026-01-22T12:04:51Z Author&#160;Hoang, Dinh Thai, 1986- author.<br/>Preferred Shelf Number&#160;TK5103.2 .H63 2023<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119873747</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> AI in healthcare : how artificial intelligence is changing IT operations and infrastructure services ent://SD_ILS/0/SD_ILS:596522 2026-01-22T12:04:51Z 2026-01-22T12:04:51Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;R859.7 .A78 S55 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119680079">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119680079</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-22T12:04:51Z 2026-01-22T12:04:51Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>