Arama Sonuçları Anomaly detection (Computer security) - Daraltılmış: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dAnomaly$002bdetection$002b$002528Computer$002bsecurity$002529$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ps$003d300?dt=list
2026-04-03T11:45:25Z
Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part II
ent://SD_ILS/0/SD_ILS:610761
2026-04-03T11:45:25Z
2026-04-03T11:45:25Z
Yazar Ceci, Michelangelo. editor. Hollmén, Jaakko. editor. Todorovski, Ljupčo. editor. Vens, Celine. editor. Džeroski, Sašo. editor. (orcid)0000-0003-2363-712X<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-71246-8">https://doi.org/10.1007/978-3-319-71246-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part I
ent://SD_ILS/0/SD_ILS:618161
2026-04-03T11:45:25Z
2026-04-03T11:45:25Z
Yazar Ceci, Michelangelo. editor. Hollmén, Jaakko. editor. Todorovski, Ljupčo. editor. Vens, Celine. editor. Džeroski, Sašo. editor. (orcid)0000-0003-2363-712X<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-71249-9">https://doi.org/10.1007/978-3-319-71249-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18-22, 2017, Proceedings, Part III
ent://SD_ILS/0/SD_ILS:618461
2026-04-03T11:45:25Z
2026-04-03T11:45:25Z
Yazar Altun, Yasemin. editor. Das, Kamalika. editor. Mielikäinen, Taneli. editor. Malerba, Donato. editor. (orcid)0000-0001-8432-4608 Stefanowski, Jerzy. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-71273-4">https://doi.org/10.1007/978-3-319-71273-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Network Traffic Anomaly Detection and Prevention Concepts, Techniques, and Tools
ent://SD_ILS/0/SD_ILS:618425
2026-04-03T11:45:25Z
2026-04-03T11:45:25Z
Yazar Bhuyan, Monowar H. author. Bhattacharyya, Dhruba K. author. Kalita, Jugal K. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-65188-0">https://doi.org/10.1007/978-3-319-65188-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Computer Safety, Reliability, and Security 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings
ent://SD_ILS/0/SD_ILS:611434
2026-04-03T11:45:25Z
2026-04-03T11:45:25Z
Yazar Skavhaug, Amund. editor. Guiochet, Jérémie. editor. Bitsch, Friedemann. editor. (orcid)0000-0001-6152-4121 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-45477-1">https://doi.org/10.1007/978-3-319-45477-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>