Arama Sonu&ccedil;lar&#305; Problems. - Daralt&#305;lm&#305;&#351;: Data protection. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dProblems.$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2026-04-04T06:32:04Z Mobile Authentication Problems and Solutions ent://SD_ILS/0/SD_ILS:331610 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Jakobsson, Markus. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331610.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-4878-5">http://dx.doi.org/10.1007/978-1-4614-4878-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:611907 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Camenisch, Jan. editor.&#160;Kesdo&#287;an, Do&#287;an. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-39028-4">https://doi.org/10.1007/978-3-319-39028-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:196240 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-27585-2">http://dx.doi.org/10.1007/978-3-642-27585-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security de-engineering : solving the problems in information risk management ent://SD_ILS/0/SD_ILS:545608 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Tibble, Ian., author.<br/>Yer Numaras&#305;&#160;HF5548.37 .T53 2011<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439868355">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193975 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Camenisch, Jan. editor.&#160;Kisimov, Valentin. editor.&#160;Dubovitskaya, Maria. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy and Anonymity in Information Management Systems New Techniques for New Practical Problems ent://SD_ILS/0/SD_ILS:176195 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Nin, Jordi. editor.&#160;Herranz, Javier. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-84996-238-4">http://dx.doi.org/10.1007/978-1-84996-238-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> iNetSec 2009 &ndash; Open Research Problems in Network Security IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191270 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Camenisch, Jan. editor.&#160;Kesdogan, Dogan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05437-2">http://dx.doi.org/10.1007/978-3-642-05437-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Safety-Critical Systems: Problems, Process and Practice Proceedings of the Seventeenth Safety-Critical Systems Symposium, Brighton, UK, 3&ndash;5 February 2009 ent://SD_ILS/0/SD_ILS:175957 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Dale, Chris. editor.&#160;Anderson, Tom. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-84882-349-5">http://dx.doi.org/10.1007/978-1-84882-349-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part II ent://SD_ILS/0/SD_ILS:606449 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0888-1">https://doi.org/10.1007/978-981-96-0888-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VI ent://SD_ILS/0/SD_ILS:606462 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0938-3">https://doi.org/10.1007/978-981-96-0938-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part VIII ent://SD_ILS/0/SD_ILS:606463 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0944-4">https://doi.org/10.1007/978-981-96-0944-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part III ent://SD_ILS/0/SD_ILS:606477 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0891-1">https://doi.org/10.1007/978-981-96-0891-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part I ent://SD_ILS/0/SD_ILS:606436 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0875-1">https://doi.org/10.1007/978-981-96-0875-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part V ent://SD_ILS/0/SD_ILS:606437 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0935-2">https://doi.org/10.1007/978-981-96-0935-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part VII ent://SD_ILS/0/SD_ILS:606438 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0941-3">https://doi.org/10.1007/978-981-96-0941-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings, Part IX ent://SD_ILS/0/SD_ILS:606427 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0947-5">https://doi.org/10.1007/978-981-96-0947-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Cryptology - ASIACRYPT 2024 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9-13, 2024, Proceedings. Part IV ent://SD_ILS/0/SD_ILS:606498 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chung, Kai-Min. editor. (orcid)0000-0002-3356-369X&#160;Sasaki, Yu. editor. (orcid)0000-0002-1273-2394&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-96-0894-2">https://doi.org/10.1007/978-981-96-0894-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Resilience: Applied Perspectives ent://SD_ILS/0/SD_ILS:609353 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Linkov, Igor. editor.&#160;Kott, Alexander. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-90109-6">https://doi.org/10.1007/978-3-031-90109-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security. ESORICS 2024 International Workshops SECAI, DisA, CPS4CIP, and SecAssure, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:610530 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Kalutarage, Harsha. editor. (orcid)0000-0001-6430-9558&#160;Yanai, Naoto. editor. (orcid)0000-0002-0817-6188&#160;Kozik, Rafa&#322;. editor. (orcid)0000-0001-7122-3306&#160;Ksieniewicz, Pawe&#322;. editor. (orcid)0000-0001-9578-8395<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-82362-6">https://doi.org/10.1007/978-3-031-82362-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Intelligence and Applications 26th International Conference, ICAI 2024, Held as Part of the World Congress in Computer Science, Computer Engineering and Applied Computing, CSCE 2024, Las Vegas, NV, USA, July 22-25, 2024, Revised Selected Papers ent://SD_ILS/0/SD_ILS:608336 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Arabnia, Hamid R. editor. (orcid)0000-0003-3943-0094&#160;Deligiannidis, Leonidas. editor. (orcid)0009-0002-3674-0142&#160;Amirian, Soheyla. editor. (orcid)0000-0002-7517-0739&#160;Shenavarmasouleh, Farzan. editor. (orcid)0000-0001-5485-232X&#160;Ghareh Mohammadi, Farid. editor. (orcid)0000-0002-8759-693X<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-86623-4">https://doi.org/10.1007/978-3-031-86623-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security. ESORICS 2024 International Workshops DPM, CBT, and CyberICPS, Bydgoszcz, Poland, September 16-20, 2024, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:607891 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Barker, Ken. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;P&eacute;rez-Sol&agrave;, Cristina. editor. (orcid)0000-0001-7534-1326&#160;Delgado-Segura, Sergi. editor. (orcid)0000-0001-7783-7288<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-82349-7">https://doi.org/10.1007/978-3-031-82349-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AISMA-2023: International Workshop on Advanced Information Security Management and Applications ent://SD_ILS/0/SD_ILS:606079 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Raza, Zahid. editor. (orcid)0000-0003-1906-6774&#160;Babenko, Mikhail. editor. (orcid)0000-0001-7066-0061&#160;Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332&#160;Lapina, Maria. editor.&#160;Zolotarev, Vyacheslav. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-77229-0">https://doi.org/10.1007/978-3-031-77229-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Building Cybersecurity Applications with Blockchain and Smart Contracts ent://SD_ILS/0/SD_ILS:602640 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;El Madhoun, Nour. editor. (orcid)0000-0001-7742-7748&#160;Dionysiou, Ioanna. editor.&#160;Bertin, Emmanuel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-50733-5">https://doi.org/10.1007/978-3-031-50733-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fluidware Novel Approaches for Large-Scale IoT Systems ent://SD_ILS/0/SD_ILS:604287 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Zambonelli, Franco. editor.&#160;Fortino, Giancarlo. editor.&#160;Re, Barbara. editor. (orcid)0000-0001-5374-2364&#160;Viroli, Mirko. editor. (orcid)0000-0003-2702-5702&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-62146-8">https://doi.org/10.1007/978-3-031-62146-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AISMA-2024: International Workshop on Advanced Information Security Management and Applications ent://SD_ILS/0/SD_ILS:605556 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Lapina, Maria. editor. (orcid)0000-0001-8117-9142&#160;Raza, Zahid. editor. (orcid)0000-0003-1906-6774&#160;Tchernykh, Andrei. editor. (orcid)0000-0001-5029-5212&#160;Sajid, Mohammad. editor. (orcid)0000-0001-8822-5332&#160;Zolotarev, Vyacheslav. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-72171-7">https://doi.org/10.1007/978-3-031-72171-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptocoding Based on Quasigroups ent://SD_ILS/0/SD_ILS:602350 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Mechkaroska, Daniela. author.&#160;Popovska-Mitrovikj, Aleksandra. author. (orcid)0000-0002-1578-6275&#160;Bakeva, Verica. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-50125-8">https://doi.org/10.1007/978-3-031-50125-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy Computing Theory and Technology ent://SD_ILS/0/SD_ILS:602562 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Li, Fenghua. author.&#160;Li, Hui. author.&#160;Niu, Ben. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-99-4943-4">https://doi.org/10.1007/978-981-99-4943-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Implementation and Analysis of Ciphers in Quantum Computing ent://SD_ILS/0/SD_ILS:603263 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Baksi, Anubhab. author.&#160;Jang, Kyungbae. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-97-0025-7">https://doi.org/10.1007/978-981-97-0025-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Reliability Engineering for Industrial Processes An Analytics Perspective ent://SD_ILS/0/SD_ILS:603298 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Kapur, P. K. editor. (orcid)0000-0001-8006-5952&#160;Pham, Hoang. editor.&#160;Singh, Gurinder. editor. (orcid)0000-0002-7827-1578&#160;Kumar, Vivek. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-55048-5">https://doi.org/10.1007/978-3-031-55048-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Theoretical Computer Science and Discrete Mathematics First International Conference, ICTCSDM 2016, Krishnankoil, India, December 19-21, 2016, Revised Selected Papers ent://SD_ILS/0/SD_ILS:616066 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Arumugam, S. editor.&#160;Bagga, Jay. editor.&#160;Beineke, Lowell W. editor.&#160;Panda, B.S. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-64419-6">https://doi.org/10.1007/978-3-319-64419-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:616346 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Kim, Kuinam. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-4154-9">https://doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings ent://SD_ILS/0/SD_ILS:618109 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor. (orcid)0000-0003-3535-942X&#160;Hartenstein, Hannes. editor.&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-67816-0">https://doi.org/10.1007/978-3-319-67816-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> String Analysis for Software Verification and Security ent://SD_ILS/0/SD_ILS:611157 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Bultan, Tevfik. author.&#160;Yu, Fang. author.&#160;Alkhalaf, Muath. author.&#160;Aydin, Abdulbaki. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-68670-7">https://doi.org/10.1007/978-3-319-68670-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Connected Environments for the Internet of Things Challenges and Solutions ent://SD_ILS/0/SD_ILS:612157 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Mahmood, Zaigham. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-70102-8">https://doi.org/10.1007/978-3-319-70102-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Research Advances in Cloud Computing ent://SD_ILS/0/SD_ILS:612458 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Chaudhary, Sanjay. editor.&#160;Somani, Gaurav. editor.&#160;Buyya, Rajkumar. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-5026-8">https://doi.org/10.1007/978-981-10-5026-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Anomaly Detection Principles and Algorithms ent://SD_ILS/0/SD_ILS:613149 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Mehrotra, Kishan G. author.&#160;Mohan, Chilukuri K. author.&#160;Huang, HuaMing. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-67526-8">https://doi.org/10.1007/978-3-319-67526-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Theory of Cryptography 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I ent://SD_ILS/0/SD_ILS:613304 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Kalai, Yael. editor.&#160;Reyzin, Leonid. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-70500-2">https://doi.org/10.1007/978-3-319-70500-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Network Coding ent://SD_ILS/0/SD_ILS:614769 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Zhang, Peng. author.&#160;Lin, Chuang. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-31083-1">https://doi.org/10.1007/978-3-319-31083-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Subjective Logic A Formalism for Reasoning Under Uncertainty ent://SD_ILS/0/SD_ILS:615866 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;J&oslash;sang, Audun. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-42337-1">https://doi.org/10.1007/978-3-319-42337-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Deception Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:611890 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-32699-3">https://doi.org/10.1007/978-3-319-32699-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Big Data Concepts, Theories, and Applications ent://SD_ILS/0/SD_ILS:612882 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Yu, Shui. editor.&#160;Guo, Song. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-27763-9">https://doi.org/10.1007/978-3-319-27763-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Computational Science XXVIII Special Issue on Cyberworlds and Cybersecurity ent://SD_ILS/0/SD_ILS:617816 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Gavrilova, Marina L. editor.&#160;Tan, C.J. Kenneth. editor.&#160;Sourin, Alexei. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-662-53090-0">https://doi.org/10.1007/978-3-662-53090-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:618047 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Dunkelman, Orr. editor.&#160;Keliher, Liam. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-31301-6">https://doi.org/10.1007/978-3-319-31301-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data and Applications Security and Privacy XXX 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings ent://SD_ILS/0/SD_ILS:611814 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Ranise, Silvio. editor. (orcid)0000-0001-7269-9285&#160;Swarup, Vipin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-41483-6">https://doi.org/10.1007/978-3-319-41483-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Social Network Analysis in Predictive Policing Concepts, Models and Methods ent://SD_ILS/0/SD_ILS:611926 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Tayebi, Mohammad A. author.&#160;Gl&auml;sser, Uwe. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-41492-8">https://doi.org/10.1007/978-3-319-41492-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Science and Applications (ICISA) 2016 ent://SD_ILS/0/SD_ILS:612828 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Kim, Kuinam J. editor.&#160;Joukov, Nikolai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-0557-2">https://doi.org/10.1007/978-981-10-0557-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence, Cyber Security and Computational Models Proceedings of ICC3 2015 ent://SD_ILS/0/SD_ILS:614422 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Senthilkumar, Muthukrishnan. editor.&#160;Ramasamy, Vijayalakshmi. editor.&#160;Sheen, Shina. editor.&#160;Veeramani, C. editor.&#160;Bonato, Anthony. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-0251-9">https://doi.org/10.1007/978-981-10-0251-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Foundations of Security Analysis and Design VIII FOSAD 2014/2015/2016 Tutorial Lectures ent://SD_ILS/0/SD_ILS:617849 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Aldini, Alessandro. editor. (orcid)0000-0002-7250-5011&#160;Lopez, Javier. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-43005-8">https://doi.org/10.1007/978-3-319-43005-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> 10 Don'ts on Your Digital Devices The Non-Techie's Survival Guide to Cyber Security and Privacy ent://SD_ILS/0/SD_ILS:618639 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Rzeszut, Eric. author.&#160;Bachrach, Daniel. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4842-0367-5">https://doi.org/10.1007/978-1-4842-0367-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine ent://SD_ILS/0/SD_ILS:618584 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Ruan, Xiaoyu. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4302-6572-6">https://doi.org/10.1007/978-1-4302-6572-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:543918 2026-04-04T06:32:04Z 2026-04-04T06:32:04Z Yazar&#160;Hill, David G. (David Gary), 1943, author.<br/>Yer Numaras&#305;&#160;QA76.9 .A25 H52 2009<br/>Elektronik Eri&#351;im&#160;<a href="https://www.taylorfrancis.com/books/9781439806937">Click here to view.</a><br/>Format:&#160;Kitap<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>