Search Results for Security. - Narrowed by: Telecommunication. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSecurity.$0026qf$003dSUBJECT$002509Subject$002509Telecommunication.$002509Telecommunication.$0026ic$003dtrue$0026ps$003d300? 2024-11-07T10:39:45Z Practical VoIP security ent://SD_ILS/0/SD_ILS:253669 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Porter, Thomas.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490603">http://www.sciencedirect.com/science/book/9781597490603</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Grid Computing Security ent://SD_ILS/0/SD_ILS:184773 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Chakrabarti, Anirban. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-44493-0">http://dx.doi.org/10.1007/978-3-540-44493-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security ent://SD_ILS/0/SD_ILS:165912 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Xiao, Yang. editor.&#160;Shen, Xuemin Sherman. editor.&#160;Du, Ding-Zhu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-33112-6">http://dx.doi.org/10.1007/978-0-387-33112-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Embedded Devices ent://SD_ILS/0/SD_ILS:172275 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Gebotys, Catherine H. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Micro-Grid Systems Security and Privacy ent://SD_ILS/0/SD_ILS:399573 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Kayem, Anne V. D. M. editor.&#160;Wolthusen, Stephen D. editor.&#160;Meinel, Christoph. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-91427-5">https://doi.org/10.1007/978-3-319-91427-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Power and Technology ent://SD_ILS/0/SD_ILS:401003 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75307-2">https://doi.org/10.1007/978-3-319-75307-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dynamic Games for Network Security ent://SD_ILS/0/SD_ILS:401109 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;He, Xiaofan. author.&#160;Dai, Huaiyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer and Network Security Essentials ent://SD_ILS/0/SD_ILS:402651 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Daimi, Kevin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-58424-9">https://doi.org/10.1007/978-3-319-58424-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security for Wireless Implantable Medical Devices ent://SD_ILS/0/SD_ILS:332220 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Hei, Xiali. author.&#160;Du, Xiaojiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332220.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7153-0">http://dx.doi.org/10.1007/978-1-4614-7153-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Assessment in Vehicular Networks ent://SD_ILS/0/SD_ILS:332479 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Du, Suguo. author.&#160;Zhu, Haojin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332479.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Network Security Theories and Applications ent://SD_ILS/0/SD_ILS:334222 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Chen, Lei. author.&#160;Ji, Jiahuang. author.&#160;Zhang, Zihong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334222.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36511-9">http://dx.doi.org/10.1007/978-3-642-36511-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2012 ent://SD_ILS/0/SD_ILS:336088 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Kim, Kuinam J. editor.&#160;Chung, Kyung-Yong. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336088.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-5860-5">http://dx.doi.org/10.1007/978-94-007-5860-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security for Automatic Speaker Identification ent://SD_ILS/0/SD_ILS:173281 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;El-Samie, Fathi E. Abd. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-9698-5">http://dx.doi.org/10.1007/978-1-4419-9698-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Information and Communication Security ent://SD_ILS/0/SD_ILS:190841 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Stavroulakis, Peter. editor.&#160;Stamp, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04117-4">http://dx.doi.org/10.1007/978-3-642-04117-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Technology Applications, Management, and Security ent://SD_ILS/0/SD_ILS:166880 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Powell, Steven. editor.&#160;Shim, J.P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71787-6">http://dx.doi.org/10.1007/978-0-387-71787-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network-Aware Security for Group Communications ent://SD_ILS/0/SD_ILS:166640 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Sun, Yan. author.&#160;Trappe, Wade. author.&#160;Liu, K. J. R. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68848-0">http://dx.doi.org/10.1007/978-0-387-68848-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> New Technologies, Mobility and Security ent://SD_ILS/0/SD_ILS:169739 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Labiod, Houda. editor.&#160;Badra, Mohamad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6270-4">http://dx.doi.org/10.1007/978-1-4020-6270-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 1 ent://SD_ILS/0/SD_ILS:400069 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6451-7">https://doi.org/10.1007/978-981-10-6451-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Security in Wireless Cooperative Networks ent://SD_ILS/0/SD_ILS:398980 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Wang, Li. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61863-0">https://doi.org/10.1007/978-3-319-61863-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Convergence and Security 2017 Volume 2 ent://SD_ILS/0/SD_ILS:402118 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Kim, Kuinam J. editor.&#160;Kim, Hyuncheol. editor.&#160;Baek, Nakhoon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6454-8">https://doi.org/10.1007/978-981-10-6454-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:331279 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331279.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332451.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Network Security and Privacy ent://SD_ILS/0/SD_ILS:166802 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Makki, S. Kami. editor.&#160;Reiher, Peter. editor.&#160;Makki, Kia. editor.&#160;Pissinou, Niki. editor.&#160;Makki, Shamila. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71058-7">http://dx.doi.org/10.1007/978-0-387-71058-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security in the 21st Century ent://SD_ILS/0/SD_ILS:165001 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Lee, D. T. editor.&#160;Shieh, S. P. editor.&#160;Tygar, J. D. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b104203">http://dx.doi.org/10.1007/b104203</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Formal Correctness of Security Protocols With 62 Figures and 4 Tables ent://SD_ILS/0/SD_ILS:185368 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Bella, Giampaolo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68136-6">http://dx.doi.org/10.1007/978-3-540-68136-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the 2nd Workshop on Communication Security Cryptography and Physical Layer Security ent://SD_ILS/0/SD_ILS:399520 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Baldi, Marco. editor. (orcid)0000-0002-8754-5526&#160;Quaglia, Elizabeth A. editor.&#160;Tomasin, Stefano. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59265-7">https://doi.org/10.1007/978-3-319-59265-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:399157 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Li, Tongtong. author.&#160;Song, Tianlong. author.&#160;Liang, Yuan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:401543 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Sayed-Mouchaweh, Moamar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74962-4">https://doi.org/10.1007/978-3-319-74962-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Practical Information Security A Competency-Based Education Course ent://SD_ILS/0/SD_ILS:401941 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Alsmadi, Izzat. author.&#160;Burdwell, Robert. author.&#160;Aleroud&nbsp;, Ahmed. author.&#160;Wahbeh, Abdallah. author.&#160;Al-Qudah, Mahmoud. author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-72119-4">https://doi.org/10.1007/978-3-319-72119-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Symposium on Sensor Networks, Systems and Security Advances in Computing and Networking with Applications ent://SD_ILS/0/SD_ILS:400016 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Rao, Nageswara S.V. editor.&#160;Brooks, Richard R. editor.&#160;Wu, Chase Q. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-75683-7">https://doi.org/10.1007/978-3-319-75683-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Trends in Systems, Security and Sustainability Proceedings of WS4 2017 ent://SD_ILS/0/SD_ILS:400671 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Yang, Xin-She. editor.&#160;Nagar, Atulya K. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6916-1">https://doi.org/10.1007/978-981-10-6916-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security ent://SD_ILS/0/SD_ILS:331785 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Korzun, Dmitry. author.&#160;Gurtov, Andrei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331785.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Convergence Security, Robotics, Automations and Communication ent://SD_ILS/0/SD_ILS:336345 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Park, James J. (Jong Hyuk). editor.&#160;Barolli, Leonard. editor.&#160;Xhafa, Fatos. editor.&#160;Jeong, Hwa-Young. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336345.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6996-0">http://dx.doi.org/10.1007/978-94-007-6996-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless Networks and Security Issues, Challenges and Research Trends ent://SD_ILS/0/SD_ILS:334140 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Khan, Shafiullah. editor.&#160;Khan Pathan, Al-Sakib. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334140.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36169-2">http://dx.doi.org/10.1007/978-3-642-36169-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the International Conference on IT Convergence and Security 2011 ent://SD_ILS/0/SD_ILS:206494 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Kim, Kuinam J. editor.&#160;Ahn, Seong Jin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2911-7">http://dx.doi.org/10.1007/978-94-007-2911-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:173990 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Multimedia Communications, Services and Security 5th International Conference, MCSS 2012, Krakow, Poland, May 31&ndash;June 1, 2012. Proceedings ent://SD_ILS/0/SD_ILS:196945 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Dziech, Andrzej. editor.&#160;Czy&#380;ewski, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-30721-8">http://dx.doi.org/10.1007/978-3-642-30721-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Voice over IP Networks Quality of Service, Pricing and Security ent://SD_ILS/0/SD_ILS:192617 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Verma, Pramode K. author.&#160;Wang, Ling. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14330-4">http://dx.doi.org/10.1007/978-3-642-14330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT Security Management IT Securiteers - Setting up an IT Security Function ent://SD_ILS/0/SD_ILS:205344 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Partida, Alberto. author.&#160;Andina, Diego. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-90-481-8882-6">http://dx.doi.org/10.1007/978-90-481-8882-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID Security Techniques, Protocols and System-on-Chip Design ent://SD_ILS/0/SD_ILS:167344 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Kitsos, Paris. editor.&#160;Zhang, Yan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-76481-8">http://dx.doi.org/10.1007/978-0-387-76481-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Voice over IP in Wireless Heterogeneous Networks Signalling, Mobility, and Security ent://SD_ILS/0/SD_ILS:169878 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Fathi, Hanane. author.&#160;Chakraborty, Shyam S. author.&#160;Prasad, Ramjee. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-6631-3">http://dx.doi.org/10.1007/978-1-4020-6631-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> RFID Security and Privacy Concepts, Protocols, and Architectures ent://SD_ILS/0/SD_ILS:188328 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Henrici, Dirk. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79076-1">http://dx.doi.org/10.1007/978-3-540-79076-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Terrestrial Trunked Radio - Tetra A Global Security Tool ent://SD_ILS/0/SD_ILS:186206 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Stavroulakis, Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/3-540-71192-9">http://dx.doi.org/10.1007/3-540-71192-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185039 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Leitold, Herbert. editor.&#160;Markatos, Evangelos P. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:182782 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Molva, Refik. editor.&#160;Tsudik, Gene. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182328 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Castelluccia, Claude. editor.&#160;Hartenstein, Hannes. editor.&#160;Paar, Christof. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Preferred Shelf Number&#160;ONLINE(331766.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hop Integrity in the Internet ent://SD_ILS/0/SD_ILS:165645 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Huang, Chin-Tser. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/0-387-29444-9">http://dx.doi.org/10.1007/0-387-29444-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information and Communication Technology Proceedings of ICICT 2016 ent://SD_ILS/0/SD_ILS:399048 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Mishra, Durgesh Kumar. editor.&#160;Azar, Ahmad Taher. editor.&#160;Joshi, Amit. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27&ndash;29, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399860 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Galinina, Olga. editor. (orcid)0000-0002-5386-1061&#160;Andreev, Sergey. editor. (orcid)0000-0001-8223-3665&#160;Balandin, Sergey. editor. (orcid)0000-0003-3238-4830&#160;Koucheryavy, Yevgeni. editor. (orcid)0000-0003-3976-297X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-01168-0">https://doi.org/10.1007/978-3-030-01168-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Integration, Interconnection, and Interoperability of IoT Systems ent://SD_ILS/0/SD_ILS:401418 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Gravina, Raffaele. editor.&#160;Palau, Carlos E. editor.&#160;Manso, Marco. editor.&#160;Liotta, Antonio. editor.&#160;Fortino, Giancarlo. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61300-0">https://doi.org/10.1007/978-3-319-61300-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sustainable Interdependent Networks From Theory to Application ent://SD_ILS/0/SD_ILS:402493 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Amini, M. Hadi. editor.&#160;Boroojeni, Kianoosh G. editor.&#160;Iyengar, S.S. editor.&#160;Pardalos, Panos M. editor.&#160;Blaabjerg, Frede. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-74412-4">https://doi.org/10.1007/978-3-319-74412-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Networked Inference with Unreliable Data Sources ent://SD_ILS/0/SD_ILS:399621 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Vempaty, Aditya. author.&#160;Kailkhura, Bhavya. author.&#160;Varshney, Pramod K. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-13-2312-6">https://doi.org/10.1007/978-981-13-2312-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Algorithms and Applications ALAP 2018 ent://SD_ILS/0/SD_ILS:399838 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Das, Sajal K. editor.&#160;Chaki, Nabendu. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8102-6">https://doi.org/10.1007/978-981-10-8102-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Inside Radio: An Attack and Defense Guide ent://SD_ILS/0/SD_ILS:401641 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Yang, Qing. author.&#160;Huang, Lin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8447-8">https://doi.org/10.1007/978-981-10-8447-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Sky Alert! When Satellites Fail ent://SD_ILS/0/SD_ILS:331285 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Johnson, Les. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(331285.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1830-6">http://dx.doi.org/10.1007/978-1-4614-1830-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks ent://SD_ILS/0/SD_ILS:332461 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Tang, Jin. author.&#160;Cheng, Yu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332461.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Location Privacy Protection in Mobile Networks ent://SD_ILS/0/SD_ILS:332468 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Liu, Xinxin. author.&#160;Li, Xiaolin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332468.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:332050 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332050.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IP Mobility Management for VANET ent://SD_ILS/0/SD_ILS:332861 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Taha, Sanaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(332861.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334292.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging wireless networks concepts, techniques, and applications ent://SD_ILS/0/SD_ILS:290789 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Makaya, Christian.&#160;Pierre, Samuel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439821367">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Communications Key technologies and future applications ent://SD_ILS/0/SD_ILS:247687 2024-11-07T10:39:45Z 2024-11-07T10:39:45Z Author&#160;Smyth, Peter, ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1049/PBBT009E">http://dx.doi.org/10.1049/PBBT009E</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>