Arama Sonu&ccedil;lar&#305; Communication systems. - Daralt&#305;lm&#305;&#351;: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dCommunication$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026pe$003dd$00253A$0026ps$003d300?dt=list 2024-10-21T10:59:43Z Physical Layer Approaches for Securing Wireless Communication Systems ent://SD_ILS/0/SD_ILS:332050 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Wen, Hong. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332050.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-6510-2">http://dx.doi.org/10.1007/978-1-4614-6510-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems 4th International Conference, MobiSec 2012, Frankfurt am Main, Germany, June 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197367 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Krontiris, Ioannis. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33392-7">http://dx.doi.org/10.1007/978-3-642-33392-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191712 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Gu, Qijun. editor.&#160;Zang, Wanyu. editor.&#160;Yu, Meng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11526-4">http://dx.doi.org/10.1007/978-3-642-11526-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings ent://SD_ILS/0/SD_ILS:482942 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Al-Shaer, Ehab. editor.&#160;Wei, Jinpeng. editor. (orcid)0000-0002-6982-7386&#160;Hamlen, Kevin W. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Handbook of Multimedia Information Security: Techniques and Applications ent://SD_ILS/0/SD_ILS:483348 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Singh, Amit Kumar. editor.&#160;Mohan, Anand. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15887-3">https://doi.org/10.1007/978-3-030-15887-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applications and Techniques in Information Security 10th International Conference, ATIS 2019, Thanjavur, India, November 22&ndash;24, 2019, Proceedings ent://SD_ILS/0/SD_ILS:483576 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Shankar Sriram, V. S. editor. (orcid)0000-0001-7870-7944&#160;Subramaniyaswamy, V. editor.&#160;Sasikaladevi, N. editor. (orcid)0000-0002-0841-502X&#160;Zhang, Leo. editor.&#160;Batten, Lynn. editor. (orcid)0000-0003-4525-2423<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0871-4">https://doi.org/10.1007/978-981-15-0871-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Big Data Privacy Preservation for Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:483634 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Pan, Miao. author.&#160;Wang, Jingyi. author.&#160;Errapotu, Sai Mounika. author.&#160;Zhang, Xinyue. author.&#160;Ding, Jiahao. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-13370-2">https://doi.org/10.1007/978-3-030-13370-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Learning-based VANET Communication and Security Techniques ent://SD_ILS/0/SD_ILS:483960 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Xiao, Liang. author.&#160;Zhuang, Weihua. author.&#160;Zhou, Sheng. author.&#160;Chen, Cailian. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01731-6">https://doi.org/10.1007/978-3-030-01731-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy for Next-Generation Wireless Networks ent://SD_ILS/0/SD_ILS:484125 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Zhong, Sheng. author.&#160;Zhong, Hong. author.&#160;Huang, Xinyi. author.&#160;Yang, Panlong. author.&#160;Shi, Jin. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01150-5">https://doi.org/10.1007/978-3-030-01150-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless Internet 11th EAI International Conference, WiCON 2018, Taipei, Taiwan, October 15-16, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484276 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Chen, Jiann-Liang. editor.&#160;Pang, Ai-Chun. editor.&#160;Deng, Der-Jiunn. editor.&#160;Lin, Chun-Cheng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-06158-6">https://doi.org/10.1007/978-3-030-06158-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Testbeds and Research Infrastructures for the Development of Networks and Communities 13th EAI International Conference, TridentCom 2018, Shanghai, China, December 1-3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484288 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Gao, Honghao. editor.&#160;Yin, Yuyu. editor.&#160;Yang, Xiaoxian. editor.&#160;Miao, Huaikou. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-12971-2">https://doi.org/10.1007/978-3-030-12971-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Database Systems for Advanced Applications DASFAA 2019 International Workshops: BDMS, BDQM, and GDMA, Chiang Mai, Thailand, April 22&ndash;25, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484429 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Li, Guoliang. editor.&#160;Yang, Jun. editor.&#160;Gama, Joao. editor. (orcid)0000-0003-3357-1195&#160;Natwichai, Juggapong. editor.&#160;Tong, Yongxin. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-18590-9">https://doi.org/10.1007/978-3-030-18590-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Industrial Control Systems Security and Resiliency Practice and Theory ent://SD_ILS/0/SD_ILS:484767 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Rieger, Craig. editor.&#160;Ray, Indrajit. editor.&#160;Zhu, Quanyan. editor.&#160;Haney, Michael A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Infrastructure Protection XIII 13th IFIP WG 11.10 International Conference, ICCIP 2019, Arlington, VA, USA, March 11&ndash;12, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:486939 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34647-8">https://doi.org/10.1007/978-3-030-34647-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud Computing &ndash; CLOUD 2019 12th International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25&ndash;30, 2019, Proceedings ent://SD_ILS/0/SD_ILS:482766 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Da Silva, Dilma. editor.&#160;Wang, Qingyang. editor. (orcid)0000-0002-5729-2898&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-23502-4">https://doi.org/10.1007/978-3-030-23502-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems Security 15th International Conference, ICISS 2019, Hyderabad, India, December 16&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484509 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Garg, Deepak. editor. (orcid)0000-0002-0888-3093&#160;Kumar, N. V. Narendra. editor.&#160;Shyamasundar, Rudrapatna K. editor. (orcid)0000-0001-6966-0507&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-36945-3">https://doi.org/10.1007/978-3-030-36945-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blockchain Technology in Internet of Things ent://SD_ILS/0/SD_ILS:484527 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Zhu, Liehuang. author.&#160;Gai, Keke. author.&#160;Li, Meng. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-21766-2">https://doi.org/10.1007/978-3-030-21766-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercryptography: Applicable Cryptography for Cyberspace Security ent://SD_ILS/0/SD_ILS:484533 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Yan, Song Y. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-72536-9">https://doi.org/10.1007/978-3-319-72536-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Frontiers in Cyber Security Second International Conference, FCS 2019, Xi'an, China, November 15&ndash;17, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486019 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Shen, Bazhong. editor.&#160;Wang, Baocang. editor. (orcid)0000-0002-2554-4464&#160;Han, Jinguang. editor. (orcid)0000-0002-4993-9452&#160;Yu, Yong. editor. (orcid)0000-0003-0667-077X&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-15-0818-9">https://doi.org/10.1007/978-981-15-0818-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malicious Attack Propagation and Source Identification ent://SD_ILS/0/SD_ILS:482633 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Jiang, Jiaojiao. author.&#160;Wen, Sheng. author.&#160;Liu, Bo. author.&#160;Yu, Shui. author.&#160;Xiang, Yang. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Ad Hoc Networks 10th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings ent://SD_ILS/0/SD_ILS:484933 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Zheng, Jun. editor.&#160;Xiang, Wei. editor.&#160;Lorenz, Pascal. editor.&#160;Mao, Shiwen. editor.&#160;Yan, Feng. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05888-3">https://doi.org/10.1007/978-3-030-05888-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile Internet Security Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19&ndash;22, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485193 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;You, Ilsun. editor. (orcid)0000-0002-0604-3445&#160;Chen, Hsing-Chung. editor.&#160;Sharma, Vishal. editor.&#160;Kotenko, Igor. editor. (orcid)0000-0001-6859-7120&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-3732-1">https://doi.org/10.1007/978-981-13-3732-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Future Network Systems and Security 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27&ndash;29, 2019, Proceedings ent://SD_ILS/0/SD_ILS:486649 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Doss, Robin. editor. (orcid)0000-0001-6143-6850&#160;Piramuthu, Selwyn. editor.&#160;Zhou, Wei. editor. (orcid)0000-0002-9965-9870&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-34353-8">https://doi.org/10.1007/978-3-030-34353-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Proactive and Dynamic Network Defense ent://SD_ILS/0/SD_ILS:486655 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Wang, Cliff. editor.&#160;Lu, Zhuo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances of Science and Technology 6th EAI International Conference, ICAST 2018, Bahir Dar, Ethiopia, October 5-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486686 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Zimale, Fasikaw Atanaw. editor.&#160;Enku Nigussie, Temesgen. editor.&#160;Fanta, Solomon Workneh. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-15357-1">https://doi.org/10.1007/978-3-030-15357-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cognitive Radio Oriented Wireless Networks 13th EAI International Conference, CROWNCOM 2018, Ghent, Belgium, September 18&ndash;20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486744 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Moerman, Ingrid. editor. (orcid)0000-0003-2377-3674&#160;Marquez-Barja, Johann. editor. (orcid)0000-0001-5660-3597&#160;Shahid, Adnan. editor. (orcid)0000-0003-1943-6261&#160;Liu, Wei. editor.&#160;Giannoulis, Spilios. editor. (orcid)0000-0002-3190-8770<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05490-8">https://doi.org/10.1007/978-3-030-05490-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Industrial Networks and Intelligent Systems 5th EAI International Conference, INISCOM 2019, Ho Chi Minh City, Vietnam, August 19, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487049 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Duong, Trung Quang. editor.&#160;Vo, Nguyen-Son. editor.&#160;Nguyen, Loi K. editor.&#160;Vien, Quoc-Tuan. editor.&#160;Nguyen, Van-Dinh. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30149-1">https://doi.org/10.1007/978-3-030-30149-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy-Enhancing Fog Computing and Its Applications ent://SD_ILS/0/SD_ILS:399066 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Lin, Xiaodong. author.&#160;Ni, Jianbing. author.&#160;Shen, Xuemin (Sherman). author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Smart Grid ent://SD_ILS/0/SD_ILS:399960 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Abdallah, Asmaa. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Raggo, Michael T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331796.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332915.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Modern Cryptography Primer Theoretical Foundations and Practical Applications ent://SD_ILS/0/SD_ILS:335099 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Ko&#347;cielny, Czes&#322;aw. author.&#160;Kurkowski, Miros&#322;aw. author.&#160;Srebrny, Marian. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335099.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41386-5">http://dx.doi.org/10.1007/978-3-642-41386-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Botnets ent://SD_ILS/0/SD_ILS:331175 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Tiirmaa-Klaar, Heli. author.&#160;Gassen, Jan. author.&#160;Gerhards-Padilla, Elmar. author.&#160;Martini, Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331175.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Economics of Information Security and Privacy III ent://SD_ILS/0/SD_ILS:331294 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Schneier, Bruce. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331294.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-1981-5">http://dx.doi.org/10.1007/978-1-4614-1981-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332276.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332451.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:291123 2024-10-21T10:59:43Z 2024-10-21T10:59:43Z Yazar&#160;Willett, Keith D.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849380686">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>