Search Results for System security. - Narrowed by: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystem$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list 2026-03-22T05:19:17Z Network and System Security 18th International Conference, NSS 2024, Abu Dhabi, United Arab Emirates, November 20-22, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607656 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Song, Houbing Herbert. editor. (orcid)0000-0003-2631-9223&#160;Di Pietro, Roberto. editor. (orcid)0000-0003-1909-0336&#160;Alrabaee, Saed. editor. (orcid)0000-0001-8842-493X&#160;Tubishat, Mohammad. editor. (orcid)0000-0003-1464-8345&#160;Al-kfairy, Mousa. editor. (orcid)0000-0003-3180-3861<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-3531-3">https://doi.org/10.1007/978-981-96-3531-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security and Intelligent Systems Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 1 ent://SD_ILS/0/SD_ILS:606730 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Bhateja, Vikrant. editor.&#160;Lin, Hong. editor.&#160;Simic, Milan. editor.&#160;Attique Khan, Muhammad. editor. (orcid)0000-0001-5723-3858&#160;Garg, Harish. editor. (orcid)0000-0001-9099-8422<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-4892-1">https://doi.org/10.1007/978-981-97-4892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced methodologies and technologies in system security, information privacy, and forensics ent://SD_ILS/0/SD_ILS:482009 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Khosrow-Pour, Mehdi, 1951- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7492-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613462 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Yan, Zheng. editor. (orcid)0000-0002-9697-2108&#160;Molva, Refik. editor.&#160;Mazurczyk, Wojciech. editor.&#160;Kantola, Raimo. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64701-2">https://doi.org/10.1007/978-3-319-64701-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:618017 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Chen, Jiageng. editor.&#160;Piuri, Vincenzo. editor.&#160;Su, Chunhua. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46298-1">https://doi.org/10.1007/978-3-319-46298-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334638 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Lopez, Javier. editor.&#160;Huang, Xinyi. editor.&#160;Sandhu, Ravi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334638.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-38631-2">http://dx.doi.org/10.1007/978-3-642-38631-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network and System Security 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197529 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Xu, Li. editor.&#160;Bertino, Elisa. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34601-9">http://dx.doi.org/10.1007/978-3-642-34601-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Analysis and Design of Next-Generation Software Architectures Generative AI, Cybersecurity, and Cloud Computing ent://SD_ILS/0/SD_ILS:608484 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Langer, Arthur M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-76212-3">https://doi.org/10.1007/978-3-031-76212-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609259 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609291 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609680 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Dalla Preda, Mila. editor. (orcid)0000-0003-2761-4347&#160;Schrittwieser, Sebastian. editor. (orcid)0000-0003-2115-2022&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00627-1">https://doi.org/10.1007/978-3-032-00627-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609681 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Coppens, Bart. editor. (orcid)0000-0002-7628-9264&#160;Volckaert, Bruno. editor. (orcid)0000-0003-0575-5894&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00630-1">https://doi.org/10.1007/978-3-032-00630-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609682 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Coppens, Bart. editor. (orcid)0000-0002-7628-9264&#160;Volckaert, Bruno. editor. (orcid)0000-0003-0575-5894&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00635-6">https://doi.org/10.1007/978-3-032-00635-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part IV ent://SD_ILS/0/SD_ILS:609683 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Coppens, Bart. editor. (orcid)0000-0002-7628-9264&#160;Volckaert, Bruno. editor. (orcid)0000-0003-0575-5894&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00639-4">https://doi.org/10.1007/978-3-032-00639-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security 20th International Conference, ARES 2025, Ghent, Belgium, August 11-14, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609691 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Dalla Preda, Mila. editor. (orcid)0000-0003-2761-4347&#160;Schrittwieser, Sebastian. editor. (orcid)0000-0003-2115-2022&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00624-0">https://doi.org/10.1007/978-3-032-00624-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:601805 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64948-6">https://doi.org/10.1007/978-3-031-64948-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605517 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Duan, Haixin. editor. (orcid)0000-0003-0083-733X&#160;Debbabi, Mourad. editor.&#160;de Carn&eacute; de Carnavalet, Xavier. editor. (orcid)0000-0003-2664-3963&#160;Luo, Xiapu. editor.&#160;Du, Xiaojiang. editor. (orcid)0000-0003-4235-9671<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-64954-7">https://doi.org/10.1007/978-3-031-64954-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605670 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75757-0">https://doi.org/10.1007/978-3-031-75757-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605671 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Mouha, Nicky. editor. (orcid)0000-0001-8861-782X&#160;Nikiforakis, Nick. editor. (orcid)0000-0002-9366-357X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-75764-8">https://doi.org/10.1007/978-3-031-75764-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Systems Security 20th International Conference, ICISS 2024, Jaipur, India, December 16-20, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606510 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Patil, Vishwas T. editor. (orcid)0000-0001-7714-2291&#160;Krishnan, Ram. editor. (orcid)0000-0002-7402-553X&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-80020-7">https://doi.org/10.1007/978-3-031-80020-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning for Cyber Security 6th International Conference, ML4CS 2024, Hangzhou, China, December 27-29, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607910 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Xiang, Yang. editor. (orcid)0000-0001-5252-0831&#160;Shen, Jian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4566-4">https://doi.org/10.1007/978-981-96-4566-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609277 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Systems and Security Proceedings of ICISS 2024 ent://SD_ILS/0/SD_ILS:609937 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Giri, Debasis. editor.&#160;Ho, Anthony T. S. editor.&#160;Ochiai, Hideki. editor.&#160;Mandal, Mrinal. editor.&#160;Sinha, Koushik. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-4273-1">https://doi.org/10.1007/978-981-96-4273-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XVIII 18th IFIP WG 11.10 International Conference, ICCIP 2024, Arlington, VA, USA, March 18-19, 2024, Proceedings ent://SD_ILS/0/SD_ILS:607445 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-81888-2">https://doi.org/10.1007/978-3-031-81888-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Availability, Reliability and Security ARES 2025 International Workshops, Ghent, Belgium, August 11-14, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:610236 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Coppens, Bart. editor. (orcid)0000-0002-7628-9264&#160;Volckaert, Bruno. editor. (orcid)0000-0003-0575-5894&#160;Naessens, Vincent. editor. (orcid)0000-0002-9255-4902&#160;De Sutter, Bjorn. editor. (orcid)0000-0003-0317-2089&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-032-00633-2">https://doi.org/10.1007/978-3-032-00633-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing IT Service Security Methods and Recipes for User Organizations and Providers Along the Supply Chain ent://SD_ILS/0/SD_ILS:603666 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;von Faber, Eberhard. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55533-6">https://doi.org/10.1007/978-3-031-55533-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:604086 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61489-7">https://doi.org/10.1007/978-3-031-61489-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advanced Techniques of Artificial Intelligence in IT Security Systems ent://SD_ILS/0/SD_ILS:602624 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Korytkowski, Marcin. author. (orcid)0000-0002-6002-2733&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53854-4">https://doi.org/10.1007/978-3-031-53854-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability Engineering for Industrial Processes An Analytics Perspective ent://SD_ILS/0/SD_ILS:603298 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Kapur, P. K. editor. (orcid)0000-0001-8006-5952&#160;Pham, Hoang. editor.&#160;Singh, Gurinder. editor. (orcid)0000-0002-7827-1578&#160;Kumar, Vivek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55048-5">https://doi.org/10.1007/978-3-031-55048-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Theory and Practice 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 - March 1, 2024, Proceedings ent://SD_ILS/0/SD_ILS:603949 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Bouzefrane, Samia. editor. (orcid)0000-0002-0979-1289&#160;Sauveron, Damien. editor. (orcid)0000-0001-7948-6143&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-60391-4">https://doi.org/10.1007/978-3-031-60391-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Execution Environments ent://SD_ILS/0/SD_ILS:604058 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Shepherd, Carlton. author.&#160;Markantonakis, Konstantinos. author. (orcid)0000-0003-3975-9033&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55561-9">https://doi.org/10.1007/978-3-031-55561-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applied Cryptography and Network Security Workshops ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:604032 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Andreoni, Martin. editor. (orcid)0000-0002-4170-4341&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-61486-6">https://doi.org/10.1007/978-3-031-61486-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of ICE-TEAS 2024, Volume 2 ent://SD_ILS/0/SD_ILS:605178 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Rathore, Vijay Singh. editor.&#160;Piuri, Vincenzo. editor. (orcid)0000-0003-3178-8198&#160;Babo, Rosalina. editor. (orcid)0000-0002-8505-8783&#160;Tiwari, Vivek. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3991-2">https://doi.org/10.1007/978-981-97-3991-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data-Centric Security in Software Defined Networks (SDN) ent://SD_ILS/0/SD_ILS:603213 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Amanowicz, Marek. author.&#160;Szwaczyk, Sebastian. author. (orcid)0000-0002-3657-4685&#160;Wrona, Konrad. author. (orcid)0000-0002-3362-9820&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55517-6">https://doi.org/10.1007/978-3-031-55517-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Technology Security Modern Trends and Challenges ent://SD_ILS/0/SD_ILS:603127 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Gountia, Debasis. editor. (orcid)0000-0002-9079-1074&#160;Dalei, Dilip Kumar. editor.&#160;Mishra, Subhankar. editor. (orcid)0000-0002-9910-7291&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0407-1">https://doi.org/10.1007/978-981-97-0407-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:603331 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Mosbah, Mohamed. editor. (orcid)0000-0001-6031-4237&#160;S&egrave;des, Florence. editor.&#160;Tawbi, Nadia. editor.&#160;Ahmed, Toufik. editor.&#160;Boulahia-Cuppens, Nora. editor. (orcid)0000-0001-8792-0413<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57537-2">https://doi.org/10.1007/978-3-031-57537-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 16th International Symposium, FPS 2023, Bordeaux, France, December 11-13, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:604777 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Mosbah, Mohamed. editor. (orcid)0000-0001-6031-4237&#160;S&egrave;des, Florence. editor.&#160;Tawbi, Nadia. editor.&#160;Ahmed, Toufik. editor.&#160;Boulahia-Cuppens, Nora. editor. (orcid)0000-0001-8792-0413<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57540-2">https://doi.org/10.1007/978-3-031-57540-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security. SAFECOMP 2024 Workshops DECSoS, SASSUR, TOASTS, and WAISE, Florence, Italy, September 17, 2024, Proceedings ent://SD_ILS/0/SD_ILS:605083 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ceccarelli, Andrea. editor. (orcid)0000-0002-2291-2428&#160;Trapp, Mario. editor.&#160;Bondavalli, Andrea. editor. (orcid)0000-0001-7366-6530&#160;Schoitsch, Erwin. editor. (orcid)0000-0002-0335-5443&#160;Gallina, Barbara. editor. (orcid)0000-0002-6952-1053<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-68738-9">https://doi.org/10.1007/978-3-031-68738-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of ICE-TEAS 2024, Volume 1 ent://SD_ILS/0/SD_ILS:605354 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Rathore, Vijay Singh. editor.&#160;Manuel R. S. Tavares, Jo&atilde;o. editor. (orcid)0000-0001-7603-6526&#160;Tuba, Eva. editor.&#160;Devedzic, Vladan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-3745-1">https://doi.org/10.1007/978-981-97-3745-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606703 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Chen, Biwen. editor. (orcid)0000-0002-7314-8271&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Huang, Min. editor. (orcid)0000-0003-2744-0455&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0151-6">https://doi.org/10.1007/978-981-96-0151-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 7th International Conference, FCS 2024, Chongqing, China, July 26-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606704 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Chen, Biwen. editor. (orcid)0000-0002-7314-8271&#160;Fu, Xinwen. editor. (orcid)0000-0003-2391-7789&#160;Huang, Min. editor. (orcid)0000-0003-2744-0455&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-96-0154-7">https://doi.org/10.1007/978-981-96-0154-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Frontiers in Cyber Security 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers ent://SD_ILS/0/SD_ILS:602287 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Yang, Haomiao. editor.&#160;Lu, Rongxing. editor. (orcid)0000-0001-5720-0941&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-9331-4">https://doi.org/10.1007/978-981-99-9331-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602673 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0945-8">https://doi.org/10.1007/978-981-97-0945-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Cryptology 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602684 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ge, Chunpeng. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0942-7">https://doi.org/10.1007/978-981-97-0942-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:602750 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor. (orcid)0000-0001-8792-0413&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54204-6">https://doi.org/10.1007/978-3-031-54204-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:602834 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Abie, Habtamu. editor. (orcid)0000-0003-0866-5050&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Verderame, Luca. editor. (orcid)0000-0001-7155-7429&#160;Cambiaso, Enrico. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-54129-2">https://doi.org/10.1007/978-3-031-54129-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security and Privacy 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:604317 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Zhu, Tianqing. editor. (orcid)0000-0003-3411-7947&#160;Li, Yannan. editor. (orcid)0000-0002-4407-9027&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-5101-3">https://doi.org/10.1007/978-981-97-5101-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceeding of the 18th IIH-MSP 2022 Kitakyushu, Japan, Volume 2 ent://SD_ILS/0/SD_ILS:527448 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Kondo, Kazuhiro. editor.&#160;Horng, Mong-Fong. editor.&#160;Pan, Jeng-Shyang. editor.&#160;Hu, Pei. editor. (orcid)0000-0003-3711-4952&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-0105-0">https://doi.org/10.1007/978-981-99-0105-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Intelligence and Analytics The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 ent://SD_ILS/0/SD_ILS:526849 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Xu, Zheng. editor.&#160;Alrabaee, Saed. editor.&#160;Loyola-Gonz&aacute;lez, Octavio. editor.&#160;Cahyani, Niken Dwi Wahyu. editor.&#160;Ab Rahman, Nurul Hidayah. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31775-0">https://doi.org/10.1007/978-3-031-31775-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications ICMISC 2022 ent://SD_ILS/0/SD_ILS:528784 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Gunjan, Vinit Kumar. editor.&#160;Zurada, Jacek M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-6088-8">https://doi.org/10.1007/978-981-19-6088-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Blockchain Technology Real-World Applications ent://SD_ILS/0/SD_ILS:529096 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Panda, Sandeep Kumar. editor.&#160;Mishra, Vaibhav. editor.&#160;Dash, Sujata Priyambada. editor.&#160;Pani, Ashis Kumar. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-22835-3">https://doi.org/10.1007/978-3-031-22835-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of the Ninth International Conference on Mathematics and Computing ICMC 2023 ent://SD_ILS/0/SD_ILS:528415 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Giri, Debasis. editor.&#160;Gollmann, Dieter. editor.&#160;Ponnusamy, S. editor.&#160;Kouichi, Sakurai. editor.&#160;Stanimirovi&#263;, Predrag S. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3080-7">https://doi.org/10.1007/978-981-99-3080-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Soft Computing for Security Applications Proceedings of ICSCS 2023 ent://SD_ILS/0/SD_ILS:529021 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ranganathan, G. editor.&#160;EL Allioui, Youssouf. editor.&#160;Piramuthu, Selwyn. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-3608-3">https://doi.org/10.1007/978-981-99-3608-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing and Applications Proceedings of ICDIC 2020 ent://SD_ILS/0/SD_ILS:528678 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Rao, B. Narendra Kumar. editor.&#160;Balasubramanian, R. editor.&#160;Wang, Shiuh-Jeng. editor.&#160;Nayak, Richi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-19-4162-7">https://doi.org/10.1007/978-981-19-4162-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Emerging Trends in Expert Applications and Security Proceedings of 2nd ICETEAS 2023, Volume 1 ent://SD_ILS/0/SD_ILS:529113 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Rathore, Vijay Singh. editor.&#160;Tavares, Jo&atilde;o Manuel R. S. editor.&#160;Piuri, Vincenzo. editor.&#160;Surendiran, B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-99-1909-3">https://doi.org/10.1007/978-981-99-1909-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611601 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Obana, Satoshi. editor. (orcid)0000-0003-4795-4779&#160;Chida, Koji. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64200-0">https://doi.org/10.1007/978-3-319-64200-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trusted Computing and Information Security 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:611756 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Xu, Ming. editor.&#160;Qin, Zheng. editor.&#160;Yan, Fei. editor.&#160;Fu, Shaojing. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-7080-8">https://doi.org/10.1007/978-981-10-7080-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Communication Networks 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings ent://SD_ILS/0/SD_ILS:612065 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Deng, Robert. editor.&#160;Weng, Jian. editor.&#160;Ren, Kui. editor.&#160;Yegneswaran, Vinod. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59608-2">https://doi.org/10.1007/978-3-319-59608-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:612754 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Sun, Yunchuan. editor.&#160;Song, Houbing. editor. (orcid)0000-0003-2631-9223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:613268 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Alsmadi, Izzat M. editor. (orcid)0000-0001-7832-5081&#160;Karabatis, George. editor.&#160;Aleroud, Ahmed. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44257-0">https://doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings ent://SD_ILS/0/SD_ILS:613538 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Nguyen, Phong Q. editor.&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-69659-1">https://doi.org/10.1007/978-3-319-69659-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Safety, Reliability, and Security SAFECOMP 2017 Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615972 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Tonetta, Stefano. editor.&#160;Schoitsch, Erwin. editor.&#160;Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-66284-8">https://doi.org/10.1007/978-3-319-66284-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 21st Pacific-Asia Conference, PAKDD 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part II ent://SD_ILS/0/SD_ILS:610799 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Kim, Jinho. editor.&#160;Shim, Kyuseok. editor.&#160;Cao, Longbing. editor.&#160;Lee, Jae-Gil. editor.&#160;Lin, Xuemin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57529-2">https://doi.org/10.1007/978-3-319-57529-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:611465 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Lin, Chung-Wei. author.&#160;Sangiovanni-Vincentelli, Alberto. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-51328-7">https://doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings ent://SD_ILS/0/SD_ILS:612149 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Thampi, Sabu M. editor.&#160;Mart&iacute;nez P&eacute;rez, Gregorio. editor. (orcid)0000-0001-5532-6604&#160;Westphall, Carlos Becker. editor.&#160;Hu, Jiankun. editor.&#160;Fan, Chun I. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-6898-0">https://doi.org/10.1007/978-981-10-6898-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:614176 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Mishra, Prabhat. editor.&#160;Bhunia, Swarup. editor.&#160;Tehranipoor, Mark. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-49025-0">https://doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Challenges and Approaches in Internet of Things ent://SD_ILS/0/SD_ILS:615231 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Misra, Sridipta. author.&#160;Maheswaran, Muthucumaru. author.&#160;Hashmi, Salman. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44230-3">https://doi.org/10.1007/978-3-319-44230-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Verifiable Privacy Protection for Vehicular Communication Systems ent://SD_ILS/0/SD_ILS:617820 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;F&ouml;rster, David. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-18550-3">https://doi.org/10.1007/978-3-658-18550-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamentals of Secure System Modelling ent://SD_ILS/0/SD_ILS:617827 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Matulevi&#269;ius, Raimundas. author. (orcid)0000-0002-1829-4794&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61717-6">https://doi.org/10.1007/978-3-319-61717-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Building an Effective IoT Ecosystem for Your Business ent://SD_ILS/0/SD_ILS:613936 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Sinha, Sudhi R. author.&#160;Park, Youngchoon. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57391-5">https://doi.org/10.1007/978-3-319-57391-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Knowledge Discovery and Data Mining 21st Pacific-Asia Conference, PAKDD 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:616033 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Kim, Jinho. editor.&#160;Shim, Kyuseok. editor.&#160;Cao, Longbing. editor.&#160;Lee, Jae-Gil. editor.&#160;Lin, Xuemin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-57454-7">https://doi.org/10.1007/978-3-319-57454-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XI 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:617656 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Rice, Mason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-70395-4">https://doi.org/10.1007/978-3-319-70395-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Applications and Techniques in Information Security 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings ent://SD_ILS/0/SD_ILS:617875 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Batten, Lynn. editor.&#160;Kim, Dong Seong. editor.&#160;Zhang, Xuyun. editor.&#160;Li, Gang. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-5421-1">https://doi.org/10.1007/978-981-10-5421-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618109 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Hartenstein, Hannes. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Inspired Future Technologies First International Conference, SmartGIFT 2016, Liverpool, UK, May 19-20, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618319 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Hu, Jia. editor.&#160;Leung, Victor C. M. editor.&#160;Yang, Kun. editor.&#160;Zhang, Yan. editor.&#160;Gao, Jianliang. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47729-9">https://doi.org/10.1007/978-3-319-47729-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 9th International Conference, CRITIS 2014, Limassol, Cyprus, October 13-15, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611602 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Panayiotou, Christos G. editor.&#160;Ellinas, Georgios. editor.&#160;Kyriakides, Elias. editor.&#160;Polycarpou, Marios M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31664-2">https://doi.org/10.1007/978-3-319-31664-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings ent://SD_ILS/0/SD_ILS:613262 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Livraga, Giovanni. editor.&#160;Torra, Vicen&ccedil;. editor.&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Martinelli, Fabio. editor.&#160;Suri, Neeraj. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47072-6">https://doi.org/10.1007/978-3-319-47072-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure System Design and Trustable Computing ent://SD_ILS/0/SD_ILS:614266 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Chang, Chip-Hong. editor.&#160;Potkonjak, Miodrag. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-14971-4">https://doi.org/10.1007/978-3-319-14971-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Second International Symposium, CSS 2015, Coeur d'Alene, ID, USA, April 7-8, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:615811 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Haltinner, Kristin. editor.&#160;Sarathchandra, Dilshani. editor.&#160;Alves-Foss, Jim. editor.&#160;Chang, Kevin. editor.&#160;Conte de Leon, Daniel. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28313-5">https://doi.org/10.1007/978-3-319-28313-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Computing and Communications 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings ent://SD_ILS/0/SD_ILS:610801 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Mueller, Peter. editor.&#160;Thampi, Sabu M. editor.&#160;Alam Bhuiyan, Md Zakirul. editor.&#160;Ko, Ryan. editor.&#160;Doss, Robin. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2738-3">https://doi.org/10.1007/978-981-10-2738-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Information and Computer Security 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings ent://SD_ILS/0/SD_ILS:610832 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ogawa, Kazuto. editor.&#160;Yoshioka, Katsunari. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44524-3">https://doi.org/10.1007/978-3-319-44524-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings ent://SD_ILS/0/SD_ILS:611458 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Lecomte, Thierry. editor.&#160;Pinger, Ralf. editor.&#160;Romanovsky, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-33951-1">https://doi.org/10.1007/978-3-319-33951-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Cloud Storage Security Concepts, Designs and Optimized Practices ent://SD_ILS/0/SD_ILS:611448 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Galibus, Tatiana. author.&#160;Krasnoproshin, Viktor V. author. (orcid)0000-0002-9463-4869&#160;de Oliveira Albuquerque, Robson. author.&#160;Pignaton de Freitas, Edison. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44962-3">https://doi.org/10.1007/978-3-319-44962-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613608 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Hartmann, Sven. editor.&#160;Ma, Hui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44403-1">https://doi.org/10.1007/978-3-319-44403-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:614769 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Zhang, Peng. author.&#160;Lin, Chuang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology and Network Security 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ent://SD_ILS/0/SD_ILS:616213 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Foresti, Sara. editor. (orcid)0000-0002-1658-6734&#160;Persiano, Giuseppe. editor. (orcid)0000-0001-6579-4807&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48965-0">https://doi.org/10.1007/978-3-319-48965-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security-Aware Device-to-Device Communications Underlaying Cellular Networks ent://SD_ILS/0/SD_ILS:616855 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Zhang, Aiqing. author.&#160;Zhou, Liang. author.&#160;Wang, Lei. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32458-6">https://doi.org/10.1007/978-3-319-32458-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Device Management Mobility Evaluation in Small and Medium-Sized Enterprises ent://SD_ILS/0/SD_ILS:617806 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Pierer, Markus. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-658-15046-4">https://doi.org/10.1007/978-3-658-15046-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The New Codebreakers Essays Dedicated to David Kahn on the Occasion of His 85th Birthday ent://SD_ILS/0/SD_ILS:617822 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ryan, Peter Y. A. editor.&#160;Naccache, David. editor.&#160;Quisquater, Jean-Jacques. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-49301-4">https://doi.org/10.1007/978-3-662-49301-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Resiliency Analytics for Smart Grids Static and Dynamic Approaches ent://SD_ILS/0/SD_ILS:611086 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Al-Shaer, Ehab. author.&#160;Rahman, Mohammad Ashiqur. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32871-3">https://doi.org/10.1007/978-3-319-32871-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Application Security A Semantics and Context-Aware Approach ent://SD_ILS/0/SD_ILS:615865 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Zhang, Mu. author.&#160;Yin, Heng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure IT Systems 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings ent://SD_ILS/0/SD_ILS:616019 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Brumley, Billy Bob. editor.&#160;R&ouml;ning, Juha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47560-8">https://doi.org/10.1007/978-3-319-47560-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618414 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Aspinall, David. editor.&#160;Camenisch, Jan. editor.&#160;Hansen, Marit. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Raab, Charles. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41763-9">https://doi.org/10.1007/978-3-319-41763-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Database and Expert Systems Applications 27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part II ent://SD_ILS/0/SD_ILS:616612 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Hartmann, Sven. editor.&#160;Ma, Hui. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-44406-2">https://doi.org/10.1007/978-3-319-44406-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security of Industrial Control Systems and Cyber Physical Systems First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015 Vienna, Austria, September 21-22, 2015 Revised Selected Papers ent://SD_ILS/0/SD_ILS:618129 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;B&eacute;cue, Adrien. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0003-3101-5347<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-40385-4">https://doi.org/10.1007/978-3-319-40385-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:529962 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Enterprise architecture and information assurance : developing a secure foundation ent://SD_ILS/0/SD_ILS:538768 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Scholz, James A., author.<br/>Preferred Shelf Number&#160;QA76.9 .D314 S34 2014<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439841600">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> Practical Hadoop Security ent://SD_ILS/0/SD_ILS:618551 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Lakhe, Bhushan. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6545-0">https://doi.org/10.1007/978-1-4302-6545-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Privacy Engineer's Manifesto Getting from Policy to Code to QA to Value ent://SD_ILS/0/SD_ILS:618599 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Dennedy, Michelle. author.&#160;Fox, Jonathan. author.&#160;Finneran, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6356-2">https://doi.org/10.1007/978-1-4302-6356-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Healthcare Information Privacy and Security Regulatory Compliance and Data Security in the Age of Electronic Health Records ent://SD_ILS/0/SD_ILS:618605 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Robichau, Bernard Peter. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6677-8">https://doi.org/10.1007/978-1-4302-6677-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> PRAGMATIC security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:541797 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Brotby, W. Krag., author.&#160;Hinson, Gary.&#160;Kabay, Michel E.<br/>Preferred Shelf Number&#160;HD30.38 .B76 2013<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781439881538">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:544973 2026-03-22T05:19:17Z 2026-03-22T05:19:17Z Author&#160;Herrmann, Debra S., author.<br/>Preferred Shelf Number&#160;QA76.9 .A25 H47 2002<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9781420031492">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>