Arama Sonu&ccedil;lar&#305; Deep Learning - Daralt&#305;lm&#305;&#351;: Computer security. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dDeep$002bLearning$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2026-01-21T20:12:40Z Artificial Neural Networks and Machine Learning &ndash; ICANN 2019: Deep Learning 28th International Conference on Artificial Neural Networks, Munich, Germany, September 17&ndash;19, 2019, Proceedings, Part II ent://SD_ILS/0/SD_ILS:486596 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Tetko, Igor V. editor. (orcid)0000-0002-6855-0012&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Karpov, Pavel. editor. (orcid)0000-0003-4786-9806&#160;Theis, Fabian. editor. (orcid)0000-0002-2419-1943&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30484-3">https://doi.org/10.1007/978-3-030-30484-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Intrusion Detection using Deep Learning A Feature Learning Approach ent://SD_ILS/0/SD_ILS:399859 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Kim, Kwangjo. author.&#160;Aminanto, Muhamad Erza. author.&#160;Tanuwidjaja, Harry Chandra. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-1444-5">https://doi.org/10.1007/978-981-13-1444-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Deep Learning in Medical Image Analysis and Multimodal Learning for Clinical Decision Support 4th International Workshop, DLMIA 2018, and 8th International Workshop, ML-CDS 2018, Held in Conjunction with MICCAI 2018, Granada, Spain, September 20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400575 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Stoyanov, Danail. editor.&#160;Taylor, Zeike. editor.&#160;Carneiro, Gustavo. editor. (orcid)0000-0002-5571-6220&#160;Syeda-Mahmood, Tanveer. editor.&#160;Martel, Anne. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00889-5">https://doi.org/10.1007/978-3-030-00889-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Generative AI, cybersecurity, and ethics ent://SD_ILS/0/SD_ILS:599597 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Islam, Ray (Mohammad Rubyet), author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394279326</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing models for cybersecurity and wireless communications ent://SD_ILS/0/SD_ILS:599707 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Kumar, Budati Anil, edited.&#160;Kumar, Singamaneni Kranthi, edited.&#160;Li, Xingwang (Computer scientist), edited.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q36 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394271429</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Next-generation systems and secure computing ent://SD_ILS/0/SD_ILS:599779 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Barman, Subhabrata, editor.&#160;Koley, Santanu, editor.&#160;Joardar, Subhankar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 N49 2025<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394228522</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The techno-legal dynamics of cyber crimes in Industry 5.0 ent://SD_ILS/0/SD_ILS:599801 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Kaur, Gagandeep, editor&#160;Choudhury, Tanupriya editor&#160;Balamurugan, S. editor<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394242177</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent approaches to cyber security ent://SD_ILS/0/SD_ILS:556106 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Shekokar, Narendra M., editor.&#160;Vasudevan, Hari, 1969- editor.&#160;Durbha, Surya Srinivas, editor.&#160;Michalas, Antonis, editor.&#160;Nagarhalli, Tatwadarshi P., editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;Taylor & Francis <a href="https://www.taylorfrancis.com/books/9781003408307">https://www.taylorfrancis.com/books/9781003408307</a> OCLC metadata license agreement <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automated secure computing for next-generation systems ent://SD_ILS/0/SD_ILS:598752 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Tyagi, Amit Kumar, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 A98 2024<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394213948</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quantum computing in cybersecurity ent://SD_ILS/0/SD_ILS:598685 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Rawat, Romil, editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 Q83 2023<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401">https://onlinelibrary.wiley.com/doi/book/10.1002/9781394167401</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber security and digital forensics ent://SD_ILS/0/SD_ILS:597326 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Ghonge, Mangesh, 1984- editor.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity in smart homes : architectures, solutions and technologies ent://SD_ILS/0/SD_ILS:597626 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;Khatoun, Rida, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119987451</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security issues and privacy concerns in Industry 4.0 applications ent://SD_ILS/0/SD_ILS:596945 2026-01-21T20:12:40Z 2026-01-21T20:12:40Z Yazar&#160;David, Shiblin, author.&#160;Anand, R. S., author.&#160;Jeyakrishnan, V., author.&#160;Niranjanamurthy, M., author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 D38 2021<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119776529</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>