Arama Sonu&ccedil;lar&#305; Computer networks. - Daralt&#305;lm&#305;&#351;: System safety. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bnetworks.$0026qf$003dSUBJECT$002509Konu$002509System$002bsafety.$002509System$002bsafety.$0026ps$003d300? 2025-02-18T08:45:38Z Guide to Automotive Connectivity and Cybersecurity Trends, Technologies, Innovations and Applications ent://SD_ILS/0/SD_ILS:483042 2025-02-18T08:45:38Z 2025-02-18T08:45:38Z Yazar&#160;M&ouml;ller, Dietmar P.F. author.&#160;Haas, Roland E. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-73512-2">https://doi.org/10.1007/978-3-319-73512-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2025-02-18T08:45:38Z 2025-02-18T08:45:38Z Yazar&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software Failure Investigation A Near-Miss Analysis Approach ent://SD_ILS/0/SD_ILS:402680 2025-02-18T08:45:38Z 2025-02-18T08:45:38Z Yazar&#160;Eloff, Jan. author.&#160;Bihina Bella, Madeleine. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-61334-5">https://doi.org/10.1007/978-3-319-61334-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Designing for Network and Service Continuity in Wireless Mesh Networks ent://SD_ILS/0/SD_ILS:331552 2025-02-18T08:45:38Z 2025-02-18T08:45:38Z Yazar&#160;Pathak, Parth H. author.&#160;Dutta, Rudra. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331552.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4627-9">http://dx.doi.org/10.1007/978-1-4614-4627-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Constructive Computation in Stochastic Models with Applications The RG-Factorization ent://SD_ILS/0/SD_ILS:191701 2025-02-18T08:45:38Z 2025-02-18T08:45:38Z Yazar&#160;Li, Quan-Lin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11492-2">http://dx.doi.org/10.1007/978-3-642-11492-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Critical Information Infrastructure Security Third International Workshop, CRITIS 2008, Rome, Italy, October13-15, 2008. Revised Papers ent://SD_ILS/0/SD_ILS:190658 2025-02-18T08:45:38Z 2025-02-18T08:45:38Z Yazar&#160;Setola, Roberto. editor.&#160;Geretshuber, Stefan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03552-4">http://dx.doi.org/10.1007/978-3-642-03552-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>