Search Results for Social learning. - Narrowed by: Cryptography.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSocial$002blearning.$0026qf$003dSUBJECT$002509Subject$002509Cryptography.$002509Cryptography.$0026ic$003dtrue$0026ps$003d300?dt=list2026-03-24T12:38:11ZSecurity and Privacy in Social Networks and Big Data 10th International Symposium, SocialSec 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedingsent://SD_ILS/0/SD_ILS:6077202026-03-24T12:38:11Z2026-03-24T12:38:11ZAuthor Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861 Aldwairi, Monther. editor. (orcid)0000-0003-1150-2404 Raymond Choo, Kim-Kwang. editor. (orcid)0000-0001-9208-5336 Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345 Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-3774-4">https://doi.org/10.1007/978-981-96-3774-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security issues and privacy concerns in Industry 4.0 applicationsent://SD_ILS/0/SD_ILS:5969452026-03-24T12:38:11Z2026-03-24T12:38:11ZAuthor David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethics in Computing A Concise Moduleent://SD_ILS/0/SD_ILS:6173862026-03-24T12:38:11Z2026-03-24T12:38:11ZAuthor Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-29106-2">https://doi.org/10.1007/978-3-319-29106-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part Ient://SD_ILS/0/SD_ILS:6136082026-03-24T12:38:11Z2026-03-24T12:38:11ZAuthor Hartmann, Sven. editor. Ma, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part IIent://SD_ILS/0/SD_ILS:6166122026-03-24T12:38:11Z2026-03-24T12:38:11ZAuthor Hartmann, Sven. editor. Ma, Hui. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introduction to Cyberdeceptionent://SD_ILS/0/SD_ILS:6148142026-03-24T12:38:11Z2026-03-24T12:38:11ZAuthor Rowe, Neil C. author. Rrushi, Julian. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-41187-3">https://doi.org/10.1007/978-3-319-41187-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>