Arama Sonu&ccedil;lar&#305; Computer Security. - Daralt&#305;lm&#305;&#351;: Machine learning SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bSecurity.$0026qf$003dSUBJECT$002509Konu$002509Machine$002blearning$002509Machine$002blearning$0026ps$003d300? 2026-01-24T23:03:40Z Protecting and mitigating against cyber threats : deploying artificial intelligence and machine learning ent://SD_ILS/0/SD_ILS:599999 2026-01-24T23:03:40Z 2026-01-24T23:03:40Z Yazar&#160;Mohanty, Sachi Nandan, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 P76 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394305216</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AI and machine learning for network and security management ent://SD_ILS/0/SD_ILS:598294 2026-01-24T23:03:40Z 2026-01-24T23:03:40Z Yazar&#160;Wu, Yulei, author.&#160;Ge, Jingguo, author.&#160;Li, Tong, author.<br/>Yer Numaras&#305;&#160;Q335 .W8 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine intelligence, big data analytics, and IoT in image processing : practical applications ent://SD_ILS/0/SD_ILS:598220 2026-01-24T23:03:40Z 2026-01-24T23:03:40Z Yer Numaras&#305;&#160;Q325.5 .M33 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119865513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Deep learning approaches to cloud security ent://SD_ILS/0/SD_ILS:597294 2026-01-24T23:03:40Z 2026-01-24T23:03:40Z Yazar&#160;Rathore, Pramod Singh, 1988- editor.<br/>Yer Numaras&#305;&#160;QA76.585<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119760542</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Game theory and machine learning for cyber security ent://SD_ILS/0/SD_ILS:597035 2026-01-24T23:03:40Z 2026-01-24T23:03:40Z Yazar&#160;Kamhoua, Charles A., editor.&#160;Kiekintveld, Christopher D., editor.&#160;Fang, Fei, 1989- editor.&#160;Zhu, Quanyan, editor.<br/>Yer Numaras&#305;&#160;TK5105.59 .G353 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> SCADA security : machine learning concepts for intrusion detection and prevention : SCADA-based IDs security ent://SD_ILS/0/SD_ILS:596235 2026-01-24T23:03:40Z 2026-01-24T23:03:40Z Yazar&#160;Almalawi, Abdulmohsen, author.&#160;Tari, Zahir, 1961- author.&#160;Fahad, Adil, author.&#160;Yi, Xun, author.<br/>Yer Numaras&#305;&#160;TJ222 .A46 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119606383</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>