Arama Sonu&ccedil;lar&#305; Privacy - Daralt&#305;lm&#305;&#351;: Security systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dPrivacy$0026qf$003dSUBJECT$002509Konu$002509Security$002bsystems.$002509Security$002bsystems.$0026ps$003d300?dt=list 2026-03-22T19:24:40Z Artificial Intelligence Security and Privacy Second International Conference, AIS&amp;P 2024, Guangzhou, China, December 6-7, 2024, Proceedings ent://SD_ILS/0/SD_ILS:606953 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Zhang, Fangguo. editor. (orcid)0000-0002-0486-6413&#160;Lin, Weiwei. editor. (orcid)0000-0001-6876-1795&#160;Yan, Hongyang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-1148-5">https://doi.org/10.1007/978-981-96-1148-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&amp;P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part II ent://SD_ILS/0/SD_ILS:602517 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Vaidya, Jaideep. editor.&#160;Gabbouj, Moncef. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-9788-6">https://doi.org/10.1007/978-981-99-9788-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Resilience: Navigating Disruption and Safeguarding Data Privacy ent://SD_ILS/0/SD_ILS:603395 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Shandilya, Shishir Kumar. author. (orcid)0000-0002-3308-4445&#160;Datta, Agni. author.&#160;Kartik, Yash. author.&#160;Nagar, Atulya. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-53290-0">https://doi.org/10.1007/978-3-031-53290-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Intelligence Security and Privacy First International Conference on Artificial Intelligence Security and Privacy, AIS&amp;P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I ent://SD_ILS/0/SD_ILS:602516 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Vaidya, Jaideep. editor.&#160;Gabbouj, Moncef. editor.&#160;Li, Jin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-9785-5">https://doi.org/10.1007/978-981-99-9785-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:611932 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Jiang, Richard. editor. (orcid)0000-0003-1721-9474&#160;Al-maadeed, Somaya. editor.&#160;Bouridane, Ahmed. editor.&#160;Crookes, Prof. Danny. editor.&#160;Beghdadi, Azeddine. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-47301-7">https://doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and Privacy-Preserving Data Communication in Internet of Things ent://SD_ILS/0/SD_ILS:616283 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Zhu, Liehuang. author.&#160;Zhang, Zijian. author.&#160;Xu, Chang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-3235-6">https://doi.org/10.1007/978-981-10-3235-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity 9th European Interdisciplinary Cybersecurity Conference, EICC 2025, Rennes, France, June 18-19, 2025, Proceedings ent://SD_ILS/0/SD_ILS:608908 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Pra&ccedil;a, Isabel. editor. (orcid)0000-0002-2519-9859&#160;Bernardi, Simona. editor. (orcid)0000-0002-2605-6243&#160;In&aacute;cio, Pedro R.M. editor. (orcid)0000-0001-8221-0666&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-94855-8">https://doi.org/10.1007/978-3-031-94855-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Framework and Defense Mechanisms for IoT Reactive Jamming Attacks ent://SD_ILS/0/SD_ILS:604581 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Alaba, Fadele Ayotunde. author.&#160;Rocha, Alvaro. author. (orcid)0000-0002-0750-8187&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-65929-4">https://doi.org/10.1007/978-3-031-65929-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Edge and Fog Computing Enabled AI for IoT and Smart Cities Includes selected Papers from International Conference on Advanced Computing &amp; Next-Generation Communication (ICACNGC 2022) ent://SD_ILS/0/SD_ILS:602934 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Abd El-Latif, Ahmed A. editor.&#160;Tawalbeh, Lo'ai. editor.&#160;Maleh, Yassine. editor. (orcid)0000-0003-4704-5364&#160;Gupta, Brij B. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-51097-7">https://doi.org/10.1007/978-3-031-51097-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybersecurity Vigilance and Security Engineering of Internet of Everything ent://SD_ILS/0/SD_ILS:602065 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Naseer Qureshi, Kashif. editor.&#160;Newe, Thomas. editor.&#160;Jeon, Gwanggil. editor. (orcid)0000-0002-0651-4278&#160;Chehri, Abdellah. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-45162-1">https://doi.org/10.1007/978-3-031-45162-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> We have root : even more advice from Schneier on security ent://SD_ILS/0/SD_ILS:595432 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Schneier, Bruce, 1963- author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 S36 2019<br/>Elektronik Eri&#351;im&#160;<a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119653554</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure and Trustworthy Transportation Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:612754 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Sun, Yunchuan. editor.&#160;Song, Houbing. editor. (orcid)0000-0003-2631-9223&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-3892-1">https://doi.org/10.1007/978-981-10-3892-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Audio Watermarking Fundamentals, Techniques and Challenges ent://SD_ILS/0/SD_ILS:616023 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Xiang, Yong. author.&#160;Hua, Guang. author.&#160;Yan, Bin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-4289-8">https://doi.org/10.1007/978-981-10-4289-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> VoIP and PBX Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:614000 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-29721-7">https://doi.org/10.1007/978-3-319-29721-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile Phone Security and Forensics A Practical Approach ent://SD_ILS/0/SD_ILS:615733 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Androulidakis, Iosif I. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-29742-2">https://doi.org/10.1007/978-3-319-29742-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cybercrime, Digital Forensics and Jurisdiction ent://SD_ILS/0/SD_ILS:529976 2026-03-22T19:24:40Z 2026-03-22T19:24:40Z Yazar&#160;Chawki, Mohamed. author.&#160;Darwish, Ashraf. author.&#160;Khan, Mohammad Ayoub. author.&#160;Tyagi, Sapna. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-15150-2">https://doi.org/10.1007/978-3-319-15150-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>