Search Results for System theory. - Narrowed by: Computer security.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dSystem$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list
2026-03-26T15:02:18Z
Quantum computing models for cybersecurity and wireless communications
ent://SD_ILS/0/SD_ILS:599707
2026-03-26T15:02:18Z
2026-03-26T15:02:18Z
Author Kumar, Budati Anil, edited. Kumar, Singamaneni Kranthi, edited. Li, Xingwang (Computer scientist), edited.<br/>Preferred Shelf Number QA76.9 .A25 Q36 2025<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:609259
2026-03-26T15:02:18Z
2026-03-26T15:02:18Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:609277
2026-03-26T15:02:18Z
2026-03-26T15:02:18Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:609291
2026-03-26T15:02:18Z
2026-03-26T15:02:18Z
Author Susilo, Willy. editor. (orcid)0000-0002-1562-5105 Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>
Artificial intelligence and data mining approaches in security frameworks
ent://SD_ILS/0/SD_ILS:596957
2026-03-26T15:02:18Z
2026-03-26T15:02:18Z
Author Bhargava, Neeraj. Bhargava, Ritu. Rathore, Pramod Singh, 1988- Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number Q335<br/>Electronic Access <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>