Search Results for Speech. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSpeech.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300?
2026-02-20T11:33:58Z
Speech Enhancement Techniques for Digital Hearing Aids
ent://SD_ILS/0/SD_ILS:482802
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Borisagar, Komal R. author. Thanki, Rohit M. author. (orcid)0000-0002-0645-6266 Sedani, Bhavin S. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-96821-6">https://doi.org/10.1007/978-3-319-96821-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Speech and Computer 20th International Conference, SPECOM 2018, Leipzig, Germany, September 18–22, 2018, Proceedings
ent://SD_ILS/0/SD_ILS:399805
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Karpov, Alexey. editor. (orcid)0000-0003-3424-652X Jokisch, Oliver. editor. (orcid)0000-0001-7411-4420 Potapova, Rodmonga. editor. (orcid)0000-0002-7532-9156 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-99579-3">https://doi.org/10.1007/978-3-319-99579-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Generative AI, cybersecurity, and ethics
ent://SD_ILS/0/SD_ILS:599597
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Islam, Ray (Mohammad Rubyet), author.<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
The techno-legal dynamics of cyber crimes in Industry 5.0
ent://SD_ILS/0/SD_ILS:599801
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Kaur, Gagandeep, editor Choudhury, Tanupriya editor Balamurugan, S. editor<br/>Preferred Shelf Number QA76.9 .A25<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Security issues and privacy concerns in Industry 4.0 applications
ent://SD_ILS/0/SD_ILS:596945
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author David, Shiblin, author. Anand, R. S., author. Jeyakrishnan, V., author. Niranjanamurthy, M., author.<br/>Preferred Shelf Number QA76.9 .A25 D38 2021<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Recent Trends in Communication, Computing, and Electronics Select Proceedings of IC3E 2018
ent://SD_ILS/0/SD_ILS:484464
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Khare, Ashish. editor. Tiwary, Uma Shankar. editor. (orcid)0000-0001-7206-9013 Sethi, Ishwar K. editor. Singh, Nar. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-13-2685-1">https://doi.org/10.1007/978-981-13-2685-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Women Securing the Future with TIPPSS for IoT Trust, Identity, Privacy, Protection, Safety, Security for the Internet of Things
ent://SD_ILS/0/SD_ILS:484904
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Hudson, Florence D. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15705-0">https://doi.org/10.1007/978-3-030-15705-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Medical Imaging and its Security in Telemedicine Applications
ent://SD_ILS/0/SD_ILS:487428
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Thanki, Rohit. author. (orcid)0000-0002-0645-6266 Borra, Surekha. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-93311-5">https://doi.org/10.1007/978-3-319-93311-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Internet of Things Security and Data Protection
ent://SD_ILS/0/SD_ILS:485847
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Ziegler, Sébastien. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04984-3">https://doi.org/10.1007/978-3-030-04984-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Biometric-Based Physical and Cybersecurity Systems
ent://SD_ILS/0/SD_ILS:484246
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Obaidat, Mohammad S. editor. Traore, Issa. editor. (orcid)0000-0003-2987-8047 Woungang, Isaac. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-98734-7">https://doi.org/10.1007/978-3-319-98734-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Digital forensics
ent://SD_ILS/0/SD_ILS:593346
2026-02-20T11:33:58Z
2026-02-20T11:33:58Z
Author Årnes, André, 1976- editor.<br/>Preferred Shelf Number HV8079 .C65<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119262442</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>