Arama Sonuçları Electrical engineering. - Daraltılmış: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dElectrical$002bengineering.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?
2024-12-01T19:55:03Z
Big Data Privacy Preservation for Cyber-Physical Systems
ent://SD_ILS/0/SD_ILS:483634
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Pan, Miao. author. Wang, Jingyi. author. Errapotu, Sai Mounika. author. Zhang, Xinyue. author. Ding, Jiahao. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-13370-2">https://doi.org/10.1007/978-3-030-13370-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Dynamic Games for Network Security
ent://SD_ILS/0/SD_ILS:401109
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75871-8">https://doi.org/10.1007/978-3-319-75871-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Privacy-Enhancing Fog Computing and Its Applications
ent://SD_ILS/0/SD_ILS:399066
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Lin, Xiaodong. author. Ni, Jianbing. author. Shen, Xuemin (Sherman). author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-02113-9">https://doi.org/10.1007/978-3-030-02113-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security and Privacy in Smart Grid
ent://SD_ILS/0/SD_ILS:399960
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Abdallah, Asmaa. author. Shen, Xuemin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-93677-2">https://doi.org/10.1007/978-3-319-93677-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Adversary Detection For Cognitive Radio Networks
ent://SD_ILS/0/SD_ILS:401405
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar He, Xiaofan. author. Dai, Huaiyu. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-75868-8">https://doi.org/10.1007/978-3-319-75868-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
PBX Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:331279
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331279.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-1656-2">http://dx.doi.org/10.1007/978-1-4614-1656-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Mobile Phone Security and Forensics A Practical Approach
ent://SD_ILS/0/SD_ILS:173990
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Androulidakis, Iosif I. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-1650-0">http://dx.doi.org/10.1007/978-1-4614-1650-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Information Technology Convergence, Secure and Trust Computing, and Data Management ITCS 2012 & STA 2012
ent://SD_ILS/0/SD_ILS:206735
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Park, Jong Hyuk (James). editor. Kim, Jongsung. editor. Zou, Deqing. editor. Lee, Yang Sun. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-94-007-5083-8">http://dx.doi.org/10.1007/978-94-007-5083-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proceedings of the International Conference on IT Convergence and Security 2011
ent://SD_ILS/0/SD_ILS:206494
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Kim, Kuinam J. editor. Ahn, Seong Jin. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-94-007-2911-7">http://dx.doi.org/10.1007/978-94-007-2911-7</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Machine Learning and Systems Engineering
ent://SD_ILS/0/SD_ILS:205490
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Ao, Sio-Iong. editor. Rieger, Burghard. editor. Amouzegar, Mahyar A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-90-481-9419-3">http://dx.doi.org/10.1007/978-90-481-9419-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
IT Security Management IT Securiteers - Setting up an IT Security Function
ent://SD_ILS/0/SD_ILS:205344
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Partida, Alberto. author. Andina, Diego. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-90-481-8882-6">http://dx.doi.org/10.1007/978-90-481-8882-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Industrial Control Systems Security and Resiliency Practice and Theory
ent://SD_ILS/0/SD_ILS:484767
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Rieger, Craig. editor. Ray, Indrajit. editor. Zhu, Quanyan. editor. Haney, Michael A. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-18214-4">https://doi.org/10.1007/978-3-030-18214-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Proactive and Dynamic Network Defense
ent://SD_ILS/0/SD_ILS:486655
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Wang, Cliff. editor. Lu, Zhuo. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Learning-based VANET Communication and Security Techniques
ent://SD_ILS/0/SD_ILS:483960
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Xiao, Liang. author. Zhuang, Weihua. author. Zhou, Sheng. author. Chen, Cailian. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-01731-6">https://doi.org/10.1007/978-3-030-01731-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Malicious Attack Propagation and Source Identification
ent://SD_ILS/0/SD_ILS:482633
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Jiang, Jiaojiao. author. Wen, Sheng. author. Liu, Bo. author. Yu, Shui. author. Xiang, Yang. author.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-02179-5">https://doi.org/10.1007/978-3-030-02179-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
5G Enabled Secure Wireless Networks
ent://SD_ILS/0/SD_ILS:483926
2024-12-01T19:55:03Z
2024-12-01T19:55:03Z
Yazar Jayakody, Dushantha Nalin K. editor. Srinivasan, Kathiravan. editor. Sharma, Vishal. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-030-03508-2">https://doi.org/10.1007/978-3-030-03508-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>