Arama Sonuçları Big data - Daraltılmış: Data protection.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dBig$002bdata$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026pe$003dd$00253A$0026ps$003d300?dt=list2024-12-30T20:22:30ZHandbook of Big Data and IoT Securityent://SD_ILS/0/SD_ILS:4858492024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Dehghantanha, Ali. editor. (orcid)0000-0002-9294-7554 Choo, Kim-Kwang Raymond. editor. (orcid)0000-0001-9208-5336 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-10543-3">https://doi.org/10.1007/978-3-030-10543-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data – BigData 2019 8th International Congress, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25–30, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4862772024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Chen, Keke. editor. (orcid)0000-0002-9996-156X Seshadri, Sangeetha. editor. Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853 SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-23551-2">https://doi.org/10.1007/978-3-030-23551-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data Privacy Preservation for Cyber-Physical Systemsent://SD_ILS/0/SD_ILS:4836342024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Pan, Miao. author. Wang, Jingyi. author. Errapotu, Sai Mounika. author. Zhang, Xinyue. author. Ding, Jiahao. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-13370-2">https://doi.org/10.1007/978-3-030-13370-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federationent://SD_ILS/0/SD_ILS:4019072024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Petrenko, Sergei. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-79036-7">https://doi.org/10.1007/978-3-319-79036-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security with Intelligent Computing and Big-data Servicesent://SD_ILS/0/SD_ILS:4008722024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Peng, Sheng-Lung. editor. Wang, Shiuh-Jeng. editor. Balas, Valentina Emilia. editor. Zhao, Ming. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-76451-1">https://doi.org/10.1007/978-3-319-76451-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Ubiquitous Computing and Computing Security of IoTent://SD_ILS/0/SD_ILS:4826452024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Jeyanthi, N. editor. Abraham, Ajith. editor. Mcheick, Hamid. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01566-4">https://doi.org/10.1007/978-3-030-01566-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Büyük veri uygulamalarında kişisel veri mahremiyeti : uzmanlık tezient://SD_ILS/0/SD_ILS:4246382024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Akıncı, Ayşe Nur.<br/>Yer Numarası JC571 A35 2019<br/>Format: Kitap<br/>Durum Beytepe Kütüphanesi~1<br/>Network Intrusion Detection using Deep Learning A Feature Learning Approachent://SD_ILS/0/SD_ILS:3998592024-12-30T20:22:30Z2024-12-30T20:22:30ZYazar Kim, Kwangjo. author. Aminanto, Muhamad Erza. author. Tanuwidjaja, Harry Chandra. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>