Arama Sonuçları Kumar. - Daraltılmış: Computer security.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dKumar.$0026qf$003dSUBJECT$002509Konu$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?2025-12-25T17:24:48ZUbiquitous Communications and Network Computing First International Conference, UBICNET 2017, Bangalore, India, August 3-5, 2017, Proceedingsent://SD_ILS/0/SD_ILS:4023202025-12-25T17:24:48Z2025-12-25T17:24:48ZYazar Kumar, Navin. editor. Thakre, Arpita. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-73423-1">https://doi.org/10.1007/978-3-319-73423-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part Ient://SD_ILS/0/SD_ILS:4838882025-12-25T17:24:48Z2025-12-25T17:24:48ZYazar Luhach, Ashish Kumar. editor. Jat, Dharm Singh. editor. Hawari, Kamarul Bin Ghazali. editor. Gao, Xiao-Zhi. editor. Lingras, Pawan. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0108-1">https://doi.org/10.1007/978-981-15-0108-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Advanced Informatics for Computing Research Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part IIent://SD_ILS/0/SD_ILS:4869992025-12-25T17:24:48Z2025-12-25T17:24:48ZYazar Luhach, Ashish Kumar. editor. Jat, Dharm Singh. editor. Hawari, Kamarul Bin Ghazali. editor. Gao, Xiao-Zhi. editor. Lingras, Pawan. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-15-0111-1">https://doi.org/10.1007/978-981-15-0111-1</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Information and Communication Technology Proceedings of ICICT 2016ent://SD_ILS/0/SD_ILS:3990482025-12-25T17:24:48Z2025-12-25T17:24:48ZYazar Mishra, Durgesh Kumar. editor. Azar, Ahmad Taher. editor. Joshi, Amit. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-10-5508-9">https://doi.org/10.1007/978-981-10-5508-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Big Data Processing Using Spark in Cloudent://SD_ILS/0/SD_ILS:4834002025-12-25T17:24:48Z2025-12-25T17:24:48ZYazar Mittal, Mamta. editor. Balas, Valentina E. editor. Goyal, Lalit Mohan. editor. Kumar, Raghvendra. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-981-13-0550-4">https://doi.org/10.1007/978-981-13-0550-4</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3, 2013ent://SD_ILS/0/SD_ILS:4888842025-12-25T17:24:48Z2025-12-25T17:24:48ZYazar Krishnan, G. Sai Sundara. editor. Anitha, R. editor. Lekshmi, R. S. editor. Kumar, M. Senthil. editor. Bonato, Anthony. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-81-322-1680-3">https://doi.org/10.1007/978-81-322-1680-3</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>