Search Results for Threats. - Narrowed by: Computer Communication Networks. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bCommunication$002bNetworks.$002509Computer$002bCommunication$002bNetworks.$0026ps$003d300?dt=list 2026-03-21T22:56:07Z Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:616353 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Traor&eacute;, Issa. editor.&#160;Awad, Ahmed. editor.&#160;Woungang, Isaac. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-48947-6">https://doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> HCI for Cybersecurity, Privacy and Trust 7th International Conference, HCI-CPT 2025, Held as Part of the 27th HCI International Conference, HCII 2025, Gothenburg, Sweden, June 22-27, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:608890 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Moallem, Abbas. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-92840-6">https://doi.org/10.1007/978-3-031-92840-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 17th International Symposium, FPS 2024, Montr&eacute;al, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:609540 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Adi, Kamel. editor. (orcid)0000-0003-2869-0333&#160;Bourdeau, Simon. editor. (orcid)0000-0001-6660-3398&#160;Durand, Christel. editor.&#160;Viet Triem Tong, Val&eacute;rie. editor. (orcid)0000-0003-4838-2952&#160;Dulipovici, Alina. editor. (orcid)0000-0002-8847-5056<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87499-4">https://doi.org/10.1007/978-3-031-87499-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy in Smart Environments ent://SD_ILS/0/SD_ILS:605758 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Pitropakis, Nikolaos. editor. (orcid)0000-0002-3392-9970&#160;Katsikas, Sokratis. editor. (orcid)0000-0003-2966-9683&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-66708-4">https://doi.org/10.1007/978-3-031-66708-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Satellite Communications and Networks ent://SD_ILS/0/SD_ILS:606655 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;H&ouml;yhty&auml;, Marko. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-72927-0">https://doi.org/10.1007/978-3-031-72927-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Foundations and Practice of Security 17th International Symposium, FPS 2024, Montr&eacute;al, QC, Canada, December 9-11, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:608979 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Adi, Kamel. editor. (orcid)0000-0003-2869-0333&#160;Bourdeau, Simon. editor. (orcid)0000-0001-6660-3398&#160;Durand, Christel. editor.&#160;Viet Triem Tong, Val&eacute;rie. editor. (orcid)0000-0003-4838-2952&#160;Dulipovici, Alina. editor. (orcid)0000-0002-8847-5056<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-87496-3">https://doi.org/10.1007/978-3-031-87496-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Backdoor Attacks against Learning-Based Algorithms ent://SD_ILS/0/SD_ILS:603703 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Li, Shaofeng. author.&#160;Zhu, Haojin. author.&#160;Wu, Wen. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-57389-7">https://doi.org/10.1007/978-3-031-57389-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Recent Advances in Next-Generation Data Science Third Southwest Data Science Conference, SDSC 2024, Waco, TX, USA, March 22, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:604820 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Han, Henry. editor. (orcid)0000-0003-0273-6719&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-67871-4">https://doi.org/10.1007/978-3-031-67871-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:602382 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Kizza, Joseph Migga. author. (orcid)0009-0001-1564-4277&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-47549-8">https://doi.org/10.1007/978-3-031-47549-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Security of Highly Critical Wireless Networks ent://SD_ILS/0/SD_ILS:612666 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Martellini, Maurizio. author.&#160;Abaimov, Stanislav. author.&#160;Gaycken, Sandro. author.&#160;Wilson, Clay. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-52905-9">https://doi.org/10.1007/978-3-319-52905-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Guide to Security in SDN and NFV Challenges, Opportunities, and Applications ent://SD_ILS/0/SD_ILS:613138 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Zhu, Shao Ying. editor.&#160;Scott-Hayward, Sandra. editor.&#160;Jacquin, Ludovic. editor.&#160;Hill, Richard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-64653-4">https://doi.org/10.1007/978-3-319-64653-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Grid Inspired Future Technologies Second EAI International Conference, SmartGIFT 2017, London, UK, March 27-28, 2017, Proceedings ent://SD_ILS/0/SD_ILS:615450 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Lau, Eng Tseng. editor.&#160;Chai, Michael K.K. editor.&#160;Chen, Yue. editor.&#160;Jung, Oliver. editor.&#160;Leung, Victor C.M. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-61813-5">https://doi.org/10.1007/978-3-319-61813-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile Payment Systems Secure Network Architectures and Protocols ent://SD_ILS/0/SD_ILS:617756 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;T&eacute;llez, Jes&uacute;s. author.&#160;Zeadally, Sherali. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-23033-7">https://doi.org/10.1007/978-3-319-23033-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber-security of SCADA and Other Industrial Control Systems ent://SD_ILS/0/SD_ILS:610788 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Colbert, Edward J. M. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-32125-7">https://doi.org/10.1007/978-3-319-32125-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:614769 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Zhang, Peng. author.&#160;Lin, Chuang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Elements of Cloud Computing Security A Survey of Key Practicalities ent://SD_ILS/0/SD_ILS:617823 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Alani, Mohammed M. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-41411-9">https://doi.org/10.1007/978-3-319-41411-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android Application Security A Semantics and Context-Aware Approach ent://SD_ILS/0/SD_ILS:615865 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Zhang, Mu. author.&#160;Yin, Heng. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-47812-8">https://doi.org/10.1007/978-3-319-47812-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent Computing, Communication and Devices Proceedings of ICCD 2014, Volume 1 ent://SD_ILS/0/SD_ILS:530378 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Jain, Lakhmi C. editor.&#160;Patnaik, Srikanta. editor.&#160;Ichalkaranje, Nikhil. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-81-322-2012-1">https://doi.org/10.1007/978-81-322-2012-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of Space Security Policies, Applications and Programs ent://SD_ILS/0/SD_ILS:530452 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Schrogl, Kai-Uwe. editor.&#160;Hays, Peter L. editor.&#160;Robinson, Jana. editor.&#160;Moura, Denis. editor.&#160;Giannopapa, Christina. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4614-2029-3">https://doi.org/10.1007/978-1-4614-2029-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The InfoSec Handbook An Introduction to Information Security ent://SD_ILS/0/SD_ILS:618581 2026-03-21T22:56:07Z 2026-03-21T22:56:07Z Author&#160;Nayak, Umesha. author.&#160;Rao, Umesh Hodeghatta. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4302-6383-8">https://doi.org/10.1007/978-1-4302-6383-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>