Search Results for Telecommunication. - Narrowed by: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dTelecommunication.$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list 2026-04-12T23:31:07Z Security Issues in Mobile NFC Devices ent://SD_ILS/0/SD_ILS:529509 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Roland, Michael. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-15488-6">https://doi.org/10.1007/978-3-319-15488-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Why Cryptography Should Not Rely on Physical Attack Complexity ent://SD_ILS/0/SD_ILS:529557 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Kr&auml;mer, Juliane. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Modeling Attack Security of Physical Unclonable Functions based on Arbiter PUFs ent://SD_ILS/0/SD_ILS:529011 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Wisiol, Nils. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-29207-1">https://doi.org/10.1007/978-3-031-29207-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Resilience: Navigating Disruption and Safeguarding Data Privacy ent://SD_ILS/0/SD_ILS:603395 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Shandilya, Shishir Kumar. author. (orcid)0000-0002-3308-4445&#160;Datta, Agni. author.&#160;Kartik, Yash. author.&#160;Nagar, Atulya. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-53290-0">https://doi.org/10.1007/978-3-031-53290-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Communication Technologies and Security Challenges in IoT Present and Future ent://SD_ILS/0/SD_ILS:603032 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Prasad, Ajay. editor.&#160;Singh, Thipendra P. editor. (orcid)0000-0002-9991-6494&#160;Dwivedi Sharma, Samidha. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-97-0052-3">https://doi.org/10.1007/978-981-97-0052-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Design for Resilient Computer Systems ent://SD_ILS/0/SD_ILS:604307 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Schagaev, Igor. author.&#160;Gutknecht, J&uuml;rg. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-55139-0">https://doi.org/10.1007/978-3-031-55139-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Active System Control Design of System Resilience ent://SD_ILS/0/SD_ILS:606972 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Schagaev, Igor. author.&#160;Kirk, Brian. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-77181-1">https://doi.org/10.1007/978-3-031-77181-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity Vigilance and Security Engineering of Internet of Everything ent://SD_ILS/0/SD_ILS:602065 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Naseer Qureshi, Kashif. editor.&#160;Newe, Thomas. editor.&#160;Jeon, Gwanggil. editor. (orcid)0000-0002-0651-4278&#160;Chehri, Abdellah. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-45162-1">https://doi.org/10.1007/978-3-031-45162-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Malware Offensive and Defensive Systems ent://SD_ILS/0/SD_ILS:602026 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Almomani, Iman. editor.&#160;Maglaras, Leandros A. editor.&#160;Ferrag, Mohamed Amine. editor.&#160;Ayres, Nick. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-34969-0">https://doi.org/10.1007/978-3-031-34969-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Papers from International Conference on Advanced Computing &amp; Next-Generation Communication (ICACNGC 2022) ent://SD_ILS/0/SD_ILS:602934 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Abd El-Latif, Ahmed A. editor.&#160;Tawalbeh, Lo'ai. editor.&#160;Maleh, Yassine. editor. (orcid)0000-0003-4704-5364&#160;Gupta, Brij B. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-51097-7">https://doi.org/10.1007/978-3-031-51097-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introduction to Satellite Ground Segment Systems Engineering Principles and Operational Aspects ent://SD_ILS/0/SD_ILS:527101 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Nejad, Bobby. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-15900-8">https://doi.org/10.1007/978-3-031-15900-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The NICE Cyber Security Framework Cyber Security Intelligence and Analytics ent://SD_ILS/0/SD_ILS:527712 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Alsmadi, Izzat. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-21651-0">https://doi.org/10.1007/978-3-031-21651-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Connectivity of Communication Networks ent://SD_ILS/0/SD_ILS:614670 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Mao, Guoqiang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52989-9">https://doi.org/10.1007/978-3-319-52989-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Application of Social Media in Crisis Management Advanced Sciences and Technologies for Security Applications ent://SD_ILS/0/SD_ILS:611931 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Akhgar, Babak. editor.&#160;Staniforth, Andrew. editor.&#160;Waddington, David. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52419-1">https://doi.org/10.1007/978-3-319-52419-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:612754 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Sun, Yunchuan. editor.&#160;Song, Houbing. editor. (orcid)0000-0003-2631-9223&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Compressive Sensing Based Algorithms for Electronic Defence ent://SD_ILS/0/SD_ILS:612816 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Mishra, Amit Kumar. author.&#160;Verster, Ryno Strauss. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-46700-9">https://doi.org/10.1007/978-3-319-46700-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of International Conference on Communication and Networks ComNet 2016 ent://SD_ILS/0/SD_ILS:617248 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Modi, Nilesh. editor.&#160;Verma, Pramode. editor.&#160;Trivedi, Bhushan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-2750-5">https://doi.org/10.1007/978-981-10-2750-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Strategic Engineering for Cloud Computing and Big Data Analytics ent://SD_ILS/0/SD_ILS:618221 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Hosseinian-Far, Amin. editor.&#160;Ramachandran, Muthu. editor.&#160;Sarwar, Dilshad. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52491-7">https://doi.org/10.1007/978-3-319-52491-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:616283 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Zhu, Liehuang. author.&#160;Zhang, Zijian. author.&#160;Xu, Chang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network Radar Countermeasure Systems Integrating Radar and Radar Countermeasures ent://SD_ILS/0/SD_ILS:615401 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Jiang, Qiuxi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-48471-5">https://doi.org/10.1007/978-3-662-48471-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Industrial Espionage and Technical Surveillance Counter Measurers ent://SD_ILS/0/SD_ILS:615414 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Androulidakis, I.I. author.&#160;Kioupakis, Fragkiskos - Emmanouil. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-28666-2">https://doi.org/10.1007/978-3-319-28666-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:614000 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:614378 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Oreku, George S. author.&#160;Pazynyuk, Tamara. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-21269-2">https://doi.org/10.1007/978-3-319-21269-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fusion Methodologies in Crisis Management Higher Level Fusion and Decision Making ent://SD_ILS/0/SD_ILS:614780 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Rogova, Galina. editor.&#160;Scott, Peter. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-22527-2">https://doi.org/10.1007/978-3-319-22527-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Design for Resilient Computer Systems ent://SD_ILS/0/SD_ILS:617729 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Schagaev, Igor. author.&#160;Thomas, Kaegi. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29465-0">https://doi.org/10.1007/978-3-319-29465-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing the Complexity of Critical Infrastructures A Modelling and Simulation Approach ent://SD_ILS/0/SD_ILS:618185 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Setola, Roberto. editor.&#160;Rosato, Vittorio. editor.&#160;Kyriakides, Elias. editor.&#160;Rome, Erich. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-51043-9">https://doi.org/10.1007/978-3-319-51043-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices ent://SD_ILS/0/SD_ILS:616596 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Izmailov, Igor. author.&#160;Poizner, Boris. author.&#160;Romanov, Ilia. author.&#160;Smolskiy, Sergey. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:615733 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Locating, Classifying and Countering Agile Land Vehicles With Applications to Command Architectures ent://SD_ILS/0/SD_ILS:617901 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Sworder, David D. author.&#160;Boyd, John E. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-19431-8">https://doi.org/10.1007/978-3-319-19431-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile and Wireless Technology 2015 ent://SD_ILS/0/SD_ILS:530548 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Kim, Kuinam J. editor.&#160;Wattanapongsakorn, Naruemon. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-47669-7">https://doi.org/10.1007/978-3-662-47669-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Monitoring, Control, and Security of Critical Infrastructure Systems ent://SD_ILS/0/SD_ILS:530587 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Kyriakides, Elias. editor.&#160;Polycarpou, Marios. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-662-44160-2">https://doi.org/10.1007/978-3-662-44160-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security: Analytics, Technology and Automation ent://SD_ILS/0/SD_ILS:529962 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Lehto, Martti. editor.&#160;Neittaanm&auml;ki, Pekka. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-18302-2">https://doi.org/10.1007/978-3-319-18302-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ring Resonator Systems to Perform Optical Communication Enhancement Using Soliton ent://SD_ILS/0/SD_ILS:529197 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Amiri, Iraj Sadegh. author.&#160;Afroozeh, Abdolkarim. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-287-197-8">https://doi.org/10.1007/978-981-287-197-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ultrasonic Nondestructive Evaluation Systems Industrial Application Issues ent://SD_ILS/0/SD_ILS:529257 2026-04-12T23:31:07Z 2026-04-12T23:31:07Z Author&#160;Burrascano, Pietro. editor.&#160;Callegari, Sergio. editor.&#160;Montisci, Augusto. editor.&#160;Ricci, Marco. editor.&#160;Versaci, Mario. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-10566-6">https://doi.org/10.1007/978-3-319-10566-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>