Search Results for Security. - Narrowed by: Mathematics.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Mathematics.$002509Mathematics.$0026ic$003dtrue$0026ps$003d300?2024-12-11T15:26:24ZAdvances in Sensing with Security Applicationsent://SD_ILS/0/SD_ILS:1691362024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Byrnes, Jim. editor. Ostheimer, Gerald. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/1-4020-4295-7">http://dx.doi.org/10.1007/1-4020-4295-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Encyclopedia of Cryptography and Securityent://SD_ILS/0/SD_ILS:1649302024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Tilborg, Henk C. A. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/0-387-23483-7">http://dx.doi.org/10.1007/0-387-23483-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Game Theoretic Risk Analysis of Security Threatsent://SD_ILS/0/SD_ILS:1678442024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Bier, Vicki M. editor. Azaiez, M. Naceur. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-0-387-87767-9">http://dx.doi.org/10.1007/978-0-387-87767-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part Ient://SD_ILS/0/SD_ILS:3351572024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335157.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42033-7">http://dx.doi.org/10.1007/978-3-642-42033-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part IIent://SD_ILS/0/SD_ILS:3351602024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Sako, Kazue. editor. Sarkar, Palash. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(335160.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-42045-0">http://dx.doi.org/10.1007/978-3-642-42045-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedingsent://SD_ILS/0/SD_ILS:3329472024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Das, Sajal K. editor. Nita-Rotaru, Cristina. editor. Kantarcioglu, Murat. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE(332947.1)<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-319-02786-9">http://dx.doi.org/10.1007/978-3-319-02786-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Group Testing Theory in Network Security An Advanced Solutionent://SD_ILS/0/SD_ILS:1735972024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Thai, My T. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4614-0128-5">http://dx.doi.org/10.1007/978-1-4614-0128-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975002024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Grossklags, Jens. editor. Walrand, Jean. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34266-0">http://dx.doi.org/10.1007/978-3-642-34266-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2012 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedingsent://SD_ILS/0/SD_ILS:1975592024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Wang, Xiaoyun. editor. Sako, Kazue. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-34961-4">http://dx.doi.org/10.1007/978-3-642-34961-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959002024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Baras, John S. editor. Katz, Jonathan. editor. Altman, Eitan. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25280-8">http://dx.doi.org/10.1007/978-3-642-25280-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2011 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedingsent://SD_ILS/0/SD_ILS:1959312024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Lee, Dong Hoon. editor. Wang, Xiaoyun. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-25385-0">http://dx.doi.org/10.1007/978-3-642-25385-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Decision and Game Theory for Security First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935242024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Alpcan, Tansu. editor. Buttyán, Levente. editor. Baras, John S. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17197-0">http://dx.doi.org/10.1007/978-3-642-17197-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology - ASIACRYPT 2010 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedingsent://SD_ILS/0/SD_ILS:1935822024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Abe, Masayuki. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-17373-8">http://dx.doi.org/10.1007/978-3-642-17373-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Estimating Impact A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventionsent://SD_ILS/0/SD_ILS:1725342024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Kott, Alexander. editor. Citrenbaum, Gary. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4419-6235-5">http://dx.doi.org/10.1007/978-1-4419-6235-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Cryptology – ASIACRYPT 2009 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedingsent://SD_ILS/0/SD_ILS:1913462024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Matsui, Mitsuru. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-642-10366-7">http://dx.doi.org/10.1007/978-3-642-10366-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Securityent://SD_ILS/0/SD_ILS:1880612024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Goodall, John R. editor. Conti, Gregory. editor. Ma, Kwan-Liu. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 – June 1, 2005, Chiba, Japanent://SD_ILS/0/SD_ILS:1651652024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Sasaki, Ryoichi. editor. Qing, Sihan. editor. Okamoto, Eiji. editor. Yoshiura, Hiroshi. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Harbour Protection Through Data Fusion Technologiesent://SD_ILS/0/SD_ILS:1703632024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Shahbazian, Elisa. editor. Rogova, Galina. editor. DeWeert, Michael J. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4020-8883-4">http://dx.doi.org/10.1007/978-1-4020-8883-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hamiltonian Dynamical Systems and Applicationsent://SD_ILS/0/SD_ILS:1700182024-12-11T15:26:24Z2024-12-11T15:26:24ZAuthor Craig, Walter. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1007/978-1-4020-6964-2">http://dx.doi.org/10.1007/978-1-4020-6964-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>