Arama Sonu&ccedil;lar&#305; Computer networks--Security measures. - Daralt&#305;lm&#305;&#351;: Machine learning. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bnetworks--Security$002bmeasures.$0026qf$003dSUBJECT$002509Konu$002509Machine$002blearning.$002509Machine$002blearning.$0026ps$003d300?dt=list 2026-03-14T20:45:13Z Handbook of AI-driven threat detection and prevention : a holistic approach ent://SD_ILS/0/SD_ILS:569783 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Bhambri, Pankaj, editor.&#160;Anand A., Jose, 1975- editor.<br/>Yer Numaras&#305;&#160;TK5105.59<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003521020">https://www.taylorfrancis.com/books/9781003521020</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Research in Computer Science 6th Conference, CRI 2023, Yaounde, Cameroon, December 12-13, 2023, Proceedings ent://SD_ILS/0/SD_ILS:604088 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Melatagia Yonta, Paulin. editor. (orcid)0000-0003-3479-2627&#160;Barkaoui, Kamel. editor. (orcid)0000-0001-7175-0448&#160;Ndoundam, Ren&eacute;. editor. (orcid)0000-0003-1105-762X&#160;Yenke, Omer-Blaise. editor. (orcid)0000-0001-9670-1001&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-63110-8">https://doi.org/10.1007/978-3-031-63110-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Security Empowered by Artificial Intelligence ent://SD_ILS/0/SD_ILS:604049 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Chen, Yingying. editor.&#160;Wu, Jie. editor.&#160;Yu, Paul. editor.&#160;Wang, Xiaogang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-53510-9">https://doi.org/10.1007/978-3-031-53510-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AI-Driven Cybersecurity and Threat Intelligence Cyber Automation, Intelligent Decision-Making and Explainability ent://SD_ILS/0/SD_ILS:603381 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Sarker, Iqbal H. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-54497-2">https://doi.org/10.1007/978-3-031-54497-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advanced computer science applications : recent trends in AI, machine learning, and network security ent://SD_ILS/0/SD_ILS:583149 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Singh, Karan, 1981- editor.&#160;Banda, Latha, 1983- editor.&#160;Manjul, Manisha, 1982- editor.<br/>Yer Numaras&#305;&#160;Q335 .A38 2023<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003369066">https://www.taylorfrancis.com/books/9781003369066</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine learning, blockchain, and cyber security in smart environments : applications and challenges ent://SD_ILS/0/SD_ILS:562630 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Tanwar, Sarvesh, editor.&#160;Badotra, Sumit, editor.&#160;Rana, Ajay, editor.<br/>Yer Numaras&#305;&#160;TA347 .A78 M333 2023<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003240310">https://www.taylorfrancis.com/books/9781003240310</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AI and machine learning for network and security management ent://SD_ILS/0/SD_ILS:598294 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Wu, Yulei, author.&#160;Ge, Jingguo, author.&#160;Li, Tong, author.<br/>Yer Numaras&#305;&#160;Q335 .W8 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119835905</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Game theory and machine learning for cyber security ent://SD_ILS/0/SD_ILS:597035 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Kamhoua, Charles A., editor.&#160;Kiekintveld, Christopher D., editor.&#160;Fang, Fei, 1989- editor.&#160;Zhu, Quanyan, editor.<br/>Yer Numaras&#305;&#160;TK5105.59 .G353 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119723950</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security Workshops ACNS 2019 Satellite Workshops, SiMLA, Cloud S&amp;P, AIBlock, and AIoTS, Bogota, Colombia, June 5&ndash;7, 2019, Proceedings ent://SD_ILS/0/SD_ILS:484047 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Zhou, Jianying. editor. (orcid)0000-0003-0594-0432&#160;Deng, Robert. editor. (orcid)0000-0003-3491-8146&#160;Li, Zhou. editor.&#160;Majumdar, Suryadipta. editor. (orcid)0000-0002-6501-4214&#160;Meng, Weizhi. editor. (orcid)0000-0003-4384-5786<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-29729-9">https://doi.org/10.1007/978-3-030-29729-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network anomaly detection : a machine learning perspective ent://SD_ILS/0/SD_ILS:547748 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Bhattacharyya, Dhruba K., author.&#160;Kalita, Jugal Kumar, author.<br/>Yer Numaras&#305;&#160;TK5105.59 .B474 2014<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781466582095">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:544823 2026-03-14T20:45:13Z 2026-03-14T20:45:13Z Yazar&#160;Vemuri, V. Rao.<br/>Yer Numaras&#305;&#160;TK5105.59 .E62 2005<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781420031225">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>