Arama Sonu&ccedil;lar&#305; Computer security. - Daralt&#305;lm&#305;&#351;: Privacy. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Konu$002509Privacy.$002509Privacy.$0026ps$003d300?dt=list 2026-03-14T20:40:39Z Blockchain Technology Cross-Chain Regulation and Privacy ent://SD_ILS/0/SD_ILS:608625 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Jiang, Peng. author.&#160;Zhu, Liehuang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-4395-0">https://doi.org/10.1007/978-981-96-4395-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II ent://SD_ILS/0/SD_ILS:609277 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-9098-5">https://doi.org/10.1007/978-981-96-9098-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:605581 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor. (orcid)0000-0003-0848-0873&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-8540-7">https://doi.org/10.1007/978-981-97-8540-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Security and Privacy Protection Second International Conference, DSPP 2024, Xi'an, China, October 25-28, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:605582 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Chen, Xiaofeng. editor.&#160;Huang, Xinyi. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-8546-9">https://doi.org/10.1007/978-981-97-8546-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Socio-Technical Aspects in Security 12th International Workshop, STAST 2022, Copenhagen, Denmark, September 29, 2022, Revised Selected Papers ent://SD_ILS/0/SD_ILS:607629 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Mehrnezhad, Maryam. editor. (orcid)0000-0002-4223-6885&#160;Parkin, Simon. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-83072-3">https://doi.org/10.1007/978-3-031-83072-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware Handbook of Prevention and Detection ent://SD_ILS/0/SD_ILS:606034 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Gritzalis, Dimitris. editor. (orcid)0000-0002-7793-6128&#160;Choo, Kim-Kwang Raymond. editor.&#160;Patsakis, Constantinos. editor. (orcid)0000-0002-4460-9331&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-66245-4">https://doi.org/10.1007/978-3-031-66245-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III ent://SD_ILS/0/SD_ILS:609291 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-9101-2">https://doi.org/10.1007/978-981-96-9101-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I ent://SD_ILS/0/SD_ILS:609259 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Susilo, Willy. editor. (orcid)0000-0002-1562-5105&#160;Pieprzyk, Josef. editor. (orcid)0000-0002-1917-6466&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-9095-4">https://doi.org/10.1007/978-981-96-9095-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Technical and Regulatory Perspectives on Information Retrieval and Recommender Systems Fairness, Transparency, and Privacy ent://SD_ILS/0/SD_ILS:605682 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Schedl, Markus. author.&#160;Anelli, Vito Walter. author.&#160;Lex, Elisabeth. author. (orcid)0000-0001-5293-2967&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-69978-8">https://doi.org/10.1007/978-3-031-69978-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Physical Layer Security in Power Line Communications Fundamentals, Models and Applications ent://SD_ILS/0/SD_ILS:604239 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Hernandez Fernandez, Javier. author.&#160;Omri, Aymen. author.&#160;Di Pietro, Roberto. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-57349-1">https://doi.org/10.1007/978-3-031-57349-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Intelligence for Security Enhancing Protection in a Changing World ent://SD_ILS/0/SD_ILS:604105 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Sipola, Tuomo. editor. (orcid)0000-0002-2354-0400&#160;Alatalo, Janne. editor.&#160;Wolfmayr, Monika. editor.&#160;Kokkonen, Tero. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-57452-8">https://doi.org/10.1007/978-3-031-57452-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in Italy Governance, Policies and Ecosystem ent://SD_ILS/0/SD_ILS:605213 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Martino, Luigi. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-64396-5">https://doi.org/10.1007/978-3-031-64396-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia Watermarking Latest Developments and Trends ent://SD_ILS/0/SD_ILS:602650 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Kumar Sahu, Aditya. editor. (orcid)0000-0003-4257-0688&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-9803-6">https://doi.org/10.1007/978-981-99-9803-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Face De-identification: Safeguarding Identities in the Digital Era ent://SD_ILS/0/SD_ILS:604216 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Wen, Yunqian. author.&#160;Liu, Bo. author. (orcid)0000-0002-3603-6617&#160;Song, Li. author.&#160;Cao, Jingyi. author.&#160;Xie, Rong. author.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-58222-6">https://doi.org/10.1007/978-3-031-58222-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Planning A Practical Approach ent://SD_ILS/0/SD_ILS:602364 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Lincke, Susan. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-43118-0">https://doi.org/10.1007/978-3-031-43118-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Web 3.0 ent://SD_ILS/0/SD_ILS:604981 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Shen, Meng. author. (orcid)0000-0002-1867-0972&#160;Tang, Xiangyun. author.&#160;Wang, Wei. author. (orcid)0000-0002-5974-1589&#160;Zhu, Liehuang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-5752-7">https://doi.org/10.1007/978-981-97-5752-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Continuous Biometric Authentication Systems An Overview ent://SD_ILS/0/SD_ILS:602322 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Smith-Creasey, Max. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-49071-2">https://doi.org/10.1007/978-3-031-49071-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android Malware Detection and Adversarial Methods ent://SD_ILS/0/SD_ILS:603645 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Niu, Weina. author.&#160;Zhang, Xiaosong. author.&#160;Yan, Ran. author.&#160;Gong, Jiacheng. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-1459-9">https://doi.org/10.1007/978-981-97-1459-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Shakedown The Complete Guide to Understanding and Combating Ransomware ent://SD_ILS/0/SD_ILS:604673 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Halikias, Harry. author. (orcid)0009-0005-2072-4705&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-65438-1">https://doi.org/10.1007/978-3-031-65438-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Voice Processing Systems against Malicious Voice Attacks ent://SD_ILS/0/SD_ILS:601901 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Sun, Kun. author.&#160;Wang, Shu. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-44748-8">https://doi.org/10.1007/978-3-031-44748-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to Cybersecurity A Multidisciplinary Challenge ent://SD_ILS/0/SD_ILS:601841 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Sharp, Robin. author. (orcid)0000-0002-8593-267X&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-41463-3">https://doi.org/10.1007/978-3-031-41463-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Blockchains A Handbook on Fundamentals, Platforms and Applications ent://SD_ILS/0/SD_ILS:602803 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Ruj, Sushmita. editor.&#160;Kanhere, Salil S. editor.&#160;Conti, Mauro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-32146-7">https://doi.org/10.1007/978-3-031-32146-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Decision Making and Security Risk Management for IoT Environments ent://SD_ILS/0/SD_ILS:602620 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Boulila, Wadii. editor.&#160;Ahmad, Jawad. editor. (orcid)0000-0001-6289-8248&#160;Koubaa, Anis. editor.&#160;Driss, Maha. editor.&#160;Farah, Imed Riadh. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-47590-0">https://doi.org/10.1007/978-3-031-47590-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Differential Privacy and Applications ent://SD_ILS/0/SD_ILS:616482 2026-03-14T20:40:39Z 2026-03-14T20:40:39Z Yazar&#160;Zhu, Tianqing. author.&#160;Li, Gang. author.&#160;Zhou, Wanlei. author.&#160;Yu, Philip S. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-62004-6">https://doi.org/10.1007/978-3-319-62004-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>