Search Results for Social learning. - Narrowed by: Cryptography. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSocial$002blearning.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ps$003d300?dt=list 2026-03-24T07:51:23Z Security and Privacy in Social Networks and Big Data 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607720 2026-03-24T07:51:23Z 2026-03-24T07:51:23Z Author&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861&#160;Aldwairi, Monther. editor. (orcid)0000-0003-1150-2404&#160;Raymond Choo, Kim-Kwang. editor. (orcid)0000-0001-9208-5336&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3774-4">https://doi.org/10.1007/978-981-96-3774-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-03-24T07:51:23Z 2026-03-24T07:51:23Z Author&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 D38 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethics in Computing A Concise Module ent://SD_ILS/0/SD_ILS:617386 2026-03-24T07:51:23Z 2026-03-24T07:51:23Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613608 2026-03-24T07:51:23Z 2026-03-24T07:51:23Z Author&#160;Hartmann, Sven. editor.&#160;Ma, Hui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616612 2026-03-24T07:51:23Z 2026-03-24T07:51:23Z Author&#160;Hartmann, Sven. editor.&#160;Ma, Hui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cyberdeception ent://SD_ILS/0/SD_ILS:614814 2026-03-24T07:51:23Z 2026-03-24T07:51:23Z Author&#160;Rowe, Neil C. author.&#160;Rrushi, Julian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>