Search Results for Threats. - Narrowed by: Data mining. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dThreats.$0026qf$003dSUBJECT$002509Subject$002509Data$002bmining.$002509Data$002bmining.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-03-23T03:53:36Z Technological Innovations in Sensing and Detection of Chemical, Biological, Radiological, Nuclear Threats and Ecological Terrorism ent://SD_ILS/0/SD_ILS:206380 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Vaseashta, Ashok. editor.&#160;Braman, Eric. editor.&#160;Susmann, Philip. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2488-4">http://dx.doi.org/10.1007/978-94-007-2488-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Intelligent data analytics for terror threat prediction : architectures, methodologies, techniques and applications ent://SD_ILS/0/SD_ILS:596541 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Pani, Subhendu Kumar, 1980- editor.&#160;Singh, Sanjay Kumar, 1963- editor.&#160;Garg, Lalit, 1977- editor.<br/>Preferred Shelf Number&#160;HV6431 .I58 2021<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119711629</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Preferred Shelf Number&#160;Q335<br/>Electronic Access&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation Real and Near Real Time Analysis and Decision Making System ent://SD_ILS/0/SD_ILS:611693 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Zohuri, Bahman. author.&#160;Moghaddam, Masoud. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-53417-6">https://doi.org/10.1007/978-3-319-53417-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Analytics and Decision Support for Cybersecurity Trends, Methodologies and Applications ent://SD_ILS/0/SD_ILS:615552 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Palomares Carrascosa, Iv&aacute;n. editor.&#160;Kalutarage, Harsha Kumara. editor.&#160;Huang, Yan. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-59439-2">https://doi.org/10.1007/978-3-319-59439-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Anomaly Detection Principles and Algorithms ent://SD_ILS/0/SD_ILS:613149 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Mehrotra, Kishan G. author.&#160;Mohan, Chilukuri K. author.&#160;Huang, HuaMing. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Google It Total Information Awareness ent://SD_ILS/0/SD_ILS:617269 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Lee, Newton. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-1-4939-6415-4">https://doi.org/10.1007/978-1-4939-6415-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Web data mining and applications in business intelligence and counter-terrorism ent://SD_ILS/0/SD_ILS:540259 2026-03-23T03:53:36Z 2026-03-23T03:53:36Z Author&#160;Thuraisingham, Bhavani M., author.<br/>Preferred Shelf Number&#160;QA76.9 .D343 T48 2003<br/>Electronic Access&#160;<a href="https://www.taylorfrancis.com/books/9780203499511">Click here to view.</a><br/>Format:&#160;Books<br/>Availability&#160;Online Library~1<br/>