Arama Sonu&ccedil;lar&#305; Computer Security - Daralt&#305;lm&#305;&#351;: Intelligence artificielle. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity$0026qf$003dSUBJECT$002509Konu$002509Intelligence$002bartificielle.$002509Intelligence$002bartificielle.$0026ps$003d300? 2026-01-23T11:39:38Z Intelligent security systems : how artificial intelligence, machine learning and data science work for and against computer security ent://SD_ILS/0/SD_ILS:597085 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Reznik, Leonid, 1955- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 R438 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119771579</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Edge of intelligence : exploring the frontiers of AI at the edge ent://SD_ILS/0/SD_ILS:599759 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Mahajan, Shubham, editor.&#160;Munirathinam, Sathyan, editor.&#160;Raj, Pethuru, editor.<br/>Yer Numaras&#305;&#160;Q335 .E34 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394314409</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Inside cyber : how AI, 5G, IoT, and quantum computing will transform privacy and our security ent://SD_ILS/0/SD_ILS:599222 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Brooks, Chuck (Writer of Inside cyber), author.<br/>Yer Numaras&#305;&#160;HC79 .T4 B735 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394310562</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart edge computing : an operation research perspective ent://SD_ILS/0/SD_ILS:598978 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Chakraborty, Rajdeep, editor.&#160;Ghosh, Anupam, editor.&#160;Mandal, Jyotsna Kumar, editor.&#160;Choudhury, Tanupriya, editor.&#160;Chatterjee, Prasenjit, editor.<br/>Yer Numaras&#305;&#160;QA76.583<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394277599</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Conversational artificial intelligence ent://SD_ILS/0/SD_ILS:598905 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Rawat, Romil, 1986- editor.&#160;Chakrawarti, Rajesh Kumar, editor&#160;Sarangi, Sanjaya Kumar, editor&#160;Vyas, Piyush, editor&#160;Alamanda, Mary Sowjanya, editor<br/>Yer Numaras&#305;&#160;Q335 .C66 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394200801</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applying artificial intelligence in cyber security analytics and cyber threat detection ent://SD_ILS/0/SD_ILS:599037 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Mahajan, Shilpa, editor.&#160;Khurana, Mehak, editor.&#160;Estrela, Vania Vieira, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A674 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394196470</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AI and machine learning for network and security management ent://SD_ILS/0/SD_ILS:598294 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Wu, Yulei, author.&#160;Ge, Jingguo, author.&#160;Li, Tong, author.<br/>Yer Numaras&#305;&#160;Q335 .W8 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Understanding artificial intelligence : fundamentals and applications ent://SD_ILS/0/SD_ILS:597672 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Liu, Albert Chun-Chen, author.&#160;Law, Oscar Ming Kin, author.&#160;Law, Iain, author.<br/>Yer Numaras&#305;&#160;Q335 .L58 2022<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119858393</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence and data mining approaches in security frameworks ent://SD_ILS/0/SD_ILS:596957 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Bhargava, Neeraj.&#160;Bhargava, Ritu.&#160;Rathore, Pramod Singh, 1988-&#160;Agrawal, Rashmi, 1978-<br/>Yer Numaras&#305;&#160;Q335<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent network management and control : intelligent security, multi-criteria optimization, cloud computing, Internet of Vehicles, intelligent radio ent://SD_ILS/0/SD_ILS:596652 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Benmammar, Badr.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119817840</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial intelligence, cybersecurity and cyber defense ent://SD_ILS/0/SD_ILS:596423 2026-01-23T11:39:38Z 2026-01-23T11:39:38Z Yazar&#160;Ventre, Daniel, author.<br/>Yer Numaras&#305;&#160;Q335 .V46 2020 EB<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119788195</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>