Arama Sonuçları Information theory. - Daraltılmış: Security systems.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dInformation$002btheory.$0026qf$003dSUBJECT$002509Subject$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list
2026-04-04T17:46:10Z
Intelligent Predictive Maintenance
ent://SD_ILS/0/SD_ILS:604470
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Liu, Min. author. (orcid)0000-0002-8902-5460 Li, Ling. author. Yan, Feng. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-97-2677-6">https://doi.org/10.1007/978-981-97-2677-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
SCION: A Secure Internet Architecture
ent://SD_ILS/0/SD_ILS:613238
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Perrig, Adrian. author. Szalachowski, Pawel. author. Reischuk, Raphael M. author. Chuat, Laurent. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-67080-5">https://doi.org/10.1007/978-3-319-67080-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Data-Driven Remaining Useful Life Prognosis Techniques Stochastic Models, Methods and Applications
ent://SD_ILS/0/SD_ILS:614165
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Si, Xiao-Sheng. author. Zhang, Zheng-Xin. author. Hu, Chang-Hua. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-662-54030-5">https://doi.org/10.1007/978-3-662-54030-5</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Fusion Methodologies in Crisis Management Higher Level Fusion and Decision Making
ent://SD_ILS/0/SD_ILS:614780
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Rogova, Galina. editor. Scott, Peter. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-22527-2">https://doi.org/10.1007/978-3-319-22527-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptology Transmitted Message Protection From Deterministic Chaos up to Optical Vortices
ent://SD_ILS/0/SD_ILS:616596
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Izmailov, Igor. author. Poizner, Boris. author. Romanov, Ilia. author. Smolskiy, Sergey. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-30125-9">https://doi.org/10.1007/978-3-319-30125-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure Data Deletion
ent://SD_ILS/0/SD_ILS:617190
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Reardon, Joel. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-28778-2">https://doi.org/10.1007/978-3-319-28778-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Cryptography Made Simple
ent://SD_ILS/0/SD_ILS:617695
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Smart, Nigel. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-21936-3">https://doi.org/10.1007/978-3-319-21936-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Why Cryptography Should Not Rely on Physical Attack Complexity
ent://SD_ILS/0/SD_ILS:529557
2026-04-04T17:46:10Z
2026-04-04T17:46:10Z
Yazar Krämer, Juliane. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-287-787-1">https://doi.org/10.1007/978-981-287-787-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>