Search Results for Security. - Narrowed by: Engineering mathematics.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Engineering$002bmathematics.$002509Engineering$002bmathematics.$0026ps$003d300$0026isd$003dtrue?dt=list
2024-11-29T04:39:46Z
Encyclopedia of Cryptography, Security and Privacy
ent://SD_ILS/0/SD_ILS:487070
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Jajodia, Sushil. editor. Samarati, Pierangela. editor. Yung, Moti. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-642-27739-9">https://doi.org/10.1007/978-3-642-27739-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligent Multimedia Analysis for Security Applications
ent://SD_ILS/0/SD_ILS:191792
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Sencar, Husrev Taha. editor. Velastin, Sergio. editor. Nikolaidis, Nikolaos. editor. Lian, Shiguo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-11756-5">http://dx.doi.org/10.1007/978-3-642-11756-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Encyclopedia of Cryptography and Security
ent://SD_ILS/0/SD_ILS:164930
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Handbook of Operations Research for Homeland Security
ent://SD_ILS/0/SD_ILS:331730
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Herrmann, Jeffrey W. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(331730.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-5278-2">http://dx.doi.org/10.1007/978-1-4614-5278-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Intelligence and Security Informatics Techniques and Applications
ent://SD_ILS/0/SD_ILS:185738
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Chen, Hsinchun. editor. Yang, Christopher C. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-69209-6">http://dx.doi.org/10.1007/978-3-540-69209-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Information Assurance and Security
ent://SD_ILS/0/SD_ILS:186171
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Nedjah, Nadia. editor. Abraham, Ajith. editor. Mourelle, Luiza de Macedo. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-71078-3">http://dx.doi.org/10.1007/978-3-540-71078-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Group Testing Theory in Network Security An Advanced Solution
ent://SD_ILS/0/SD_ILS:173597
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Thai, My T. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0128-5">http://dx.doi.org/10.1007/978-1-4614-0128-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Estimating Impact A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions
ent://SD_ILS/0/SD_ILS:172534
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Kott, Alexander. editor. Citrenbaum, Gary. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6235-5">http://dx.doi.org/10.1007/978-1-4419-6235-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS’08
ent://SD_ILS/0/SD_ILS:189000
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Corchado, Emilio. editor. Zunino, Rodolfo. editor. Gastaldo, Paolo. editor. Herrero, Álvaro. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-88181-0">http://dx.doi.org/10.1007/978-3-540-88181-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers
ent://SD_ILS/0/SD_ILS:190658
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Setola, Roberto. editor. Geretshuber, Stefan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Computational Intelligence in Security for Information Systems CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings
ent://SD_ILS/0/SD_ILS:190834
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Herrero, Álvaro. editor. Gastaldo, Paolo. editor. Zunino, Rodolfo. editor. Corchado, Emilio. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-04091-7">http://dx.doi.org/10.1007/978-3-642-04091-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Monitoring, Security, and Rescue Techniques in Multiagent Systems
ent://SD_ILS/0/SD_ILS:183313
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Dunin-Kęplicz, Barbara. author. Jankowski, Andrzej. author. Skowron, Andrzej. author. Szczuka, Marcin. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Mathematical Modelling for Next-Generation Cryptography CREST Crypto-Math Project
ent://SD_ILS/0/SD_ILS:401558
2024-11-29T04:39:46Z
2024-11-29T04:39:46Z
Author Takagi, Tsuyoshi. editor. Wakayama, Masato. editor. Tanaka, Keisuke. editor. Kunihiro, Noboru. editor. Kimoto, Kazufumi. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-5065-7">https://doi.org/10.1007/978-981-10-5065-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>