Arama Sonu&ccedil;lar&#305; Security. - Daralt&#305;lm&#305;&#351;: Information systems. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dSecurity.$0026qf$003dSUBJECT$002509Konu$002509Information$002bsystems.$002509Information$002bsystems.$0026te$003dILS$0026ps$003d300?dt=list 2024-12-27T02:20:34Z Practical Internet Security ent://SD_ILS/0/SD_ILS:165679 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Vacca, John R. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-29844-3">http://dx.doi.org/10.1007/978-0-387-29844-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in E-Learning ent://SD_ILS/0/SD_ILS:165224 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Weippl, Edgar. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b136702">http://dx.doi.org/10.1007/b136702</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Electronic Healthcare Information Security ent://SD_ILS/0/SD_ILS:167753 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Shoniregun, Charles A. author.&#160;Dube, Kudakwashe. author.&#160;Mtenzi, Fredrick. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-84919-5">http://dx.doi.org/10.1007/978-0-387-84919-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Online Business Security Systems ent://SD_ILS/0/SD_ILS:166641 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Williams, Godfried B. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68850-3">http://dx.doi.org/10.1007/978-0-387-68850-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider Threats in Cyber Security ent://SD_ILS/0/SD_ILS:172782 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Probst, Christian W. editor.&#160;Hunker, Jeffrey. editor.&#160;Gollmann, Dieter. editor.&#160;Bishop, Matt. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-7133-3">http://dx.doi.org/10.1007/978-1-4419-7133-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Dependability for Ambient Intelligence ent://SD_ILS/0/SD_ILS:167907 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kokolakis, Spyros. editor.&#160;G&oacute;mez, Antonio Ma&ntilde;a. editor.&#160;Spanoudakis, George. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88775-3">http://dx.doi.org/10.1007/978-0-387-88775-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Security Policies and Procedures ent://SD_ILS/0/SD_ILS:166393 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Frye, Douglas W. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-47955-2">http://dx.doi.org/10.1007/978-0-387-47955-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Synchronizing Internet Protocol Security (SIPSec) ent://SD_ILS/0/SD_ILS:166600 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68569-4">http://dx.doi.org/10.1007/978-0-387-68569-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Electronic Postage Systems Technology, Security, Economics ent://SD_ILS/0/SD_ILS:166296 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bleumer, Gerrit. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44606-6">http://dx.doi.org/10.1007/978-0-387-44606-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and the Networked Society ent://SD_ILS/0/SD_ILS:332915 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Gregory, Mark A. author.&#160;Glance, David. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332915.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-319-02390-8">http://dx.doi.org/10.1007/978-3-319-02390-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Engineering for Service-Oriented Architectures ent://SD_ILS/0/SD_ILS:188468 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Hafner, Michael. author.&#160;Breu, Ruth. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-79539-1">http://dx.doi.org/10.1007/978-3-540-79539-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open Source Systems Security Certification ent://SD_ILS/0/SD_ILS:167460 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Damiani, Ernesto. author.&#160;Ardagna, Claudio Agostino. author.&#160;El Ioini, Nabil. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77324-7">http://dx.doi.org/10.1007/978-0-387-77324-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security Practice and Experience 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399972 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Su, Chunhua. editor.&#160;Kikuchi, Hiroaki. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99807-7">https://doi.org/10.1007/978-3-319-99807-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cryptology and Network Security 17th International Conference, CANS 2018, Naples, Italy, September 30 &ndash; October 3, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399945 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Camenisch, Jan. editor. (orcid)0000-0001-6654-9459&#160;Papadimitratos, Panos. editor. (orcid)0000-0002-3267-5374&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00434-7">https://doi.org/10.1007/978-3-030-00434-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information and Communications Security 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400052 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Naccache, David. editor. (orcid)0000-0002-8651-6555&#160;Xu, Shouhuai. editor. (orcid)0000-0001-8034-0942&#160;Qing, Sihan. editor.&#160;Samarati, Pierangela. editor. (orcid)0000-0001-7395-4620&#160;Blanc, Gregory. editor. (orcid)0000-0001-8150-6617<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01950-1">https://doi.org/10.1007/978-3-030-01950-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399699 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99073-6">https://doi.org/10.1007/978-3-319-99073-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:399718 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Lopez, Javier. editor.&#160;Zhou, Jianying. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-98989-1">https://doi.org/10.1007/978-3-319-98989-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 21st International Conference, ISC 2018, Guildford, UK, September 9&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400194 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Liqun. editor. (orcid)0000-0003-2680-4907&#160;Manulis, Mark. editor. (orcid)0000-0002-1512-9670&#160;Schneider, Steve. editor. (orcid)0000-0001-8365-6993&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99136-8">https://doi.org/10.1007/978-3-319-99136-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Social Networks ent://SD_ILS/0/SD_ILS:332451 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Liang, Xiaohui. author.&#160;Lu, Rongxing. author.&#160;Lin, Xiaodong. author.&#160;Shen, Xuemin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332451.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-8857-6">http://dx.doi.org/10.1007/978-1-4614-8857-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Insider Attack and Cyber Security Beyond the Hacker ent://SD_ILS/0/SD_ILS:167459 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Stolfo, Salvatore J. editor.&#160;Bellovin, Steven M. editor.&#160;Keromytis, Angelos D. editor.&#160;Hershkop, Shlomo. editor.&#160;Smith, Sean W. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77322-3">http://dx.doi.org/10.1007/978-0-387-77322-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Embedded Java Security Security for Mobile Devices ent://SD_ILS/0/SD_ILS:175522 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Debbabi, Mourad. author.&#160;Saleh, Mohamed. author.&#160;Talhi, Chamseddine. author.&#160;Zhioua, Sami. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-84628-711-4">http://dx.doi.org/10.1007/978-1-84628-711-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Assurance Security in the Information Environment ent://SD_ILS/0/SD_ILS:175440 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Blyth, Andrew. author.&#160;Kovacich, Gerald L. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-84628-489-9">http://dx.doi.org/10.1007/1-84628-489-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Impacts and Risk Assessment of Technology for Internet Security Enabled Information Small-Medium Enterprises (TEISMES) ent://SD_ILS/0/SD_ILS:165267 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Shoniregun, Charles A. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b137376">http://dx.doi.org/10.1007/b137376</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> GeoSpatial Visual Analytics Geographical Information Processing and Visual Analytics for Environmental Security ent://SD_ILS/0/SD_ILS:204921 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Amicis, Raffaele De. editor.&#160;Stojanovic, Radovan. editor.&#160;Conti, Giuseppe. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-90-481-2899-0">http://dx.doi.org/10.1007/978-90-481-2899-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Wireless Communications under Hostile Jamming: Security and Efficiency ent://SD_ILS/0/SD_ILS:399157 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Li, Tongtong. author.&#160;Song, Tianlong. author.&#160;Liang, Yuan. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-13-0821-5">https://doi.org/10.1007/978-981-13-0821-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quality, Reliability, Security and Robustness in Heterogeneous Systems 13th International Conference, QShine 2017, Dalian, China, December 16 -17, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400873 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Wang, Lei. editor.&#160;Qiu, Tie. editor.&#160;Zhao, Wenbing. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-78078-8">https://doi.org/10.1007/978-3-319-78078-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security, Privacy, and Anonymity in Computation, Communication, and Storage 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400597 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Wang, Guojun. editor. (orcid)0000-0001-9875-4182&#160;Chen, Jinjun. editor.&#160;Yang, Laurence T. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05345-1">https://doi.org/10.1007/978-3-030-05345-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems ent://SD_ILS/0/SD_ILS:401543 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Sayed-Mouchaweh, Moamar. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-74962-4">https://doi.org/10.1007/978-3-319-74962-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Radio Frequency Identification. Security and Privacy Issues 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334132 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Hoepman, Jaap-Henk. editor.&#160;Verbauwhede, Ingrid. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334132.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36140-1">http://dx.doi.org/10.1007/978-3-642-36140-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security FC 2013 Workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335088 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Adams, Andrew A. editor.&#160;Brenner, Michael. editor.&#160;Smith, Matthew. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335088.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41320-9">http://dx.doi.org/10.1007/978-3-642-41320-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Systems: Development, Learning, Security 6th SIGSAND/PLAIS EuroSymposium 2013, Gda&#324;sk, Poland, September 26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335020 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Wrycza, Stanis&#322;aw. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335020.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-40855-7">http://dx.doi.org/10.1007/978-3-642-40855-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing Risk and Information Security Protect to Enable ent://SD_ILS/0/SD_ILS:330694 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Harkins, Malcolm. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(330694.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4302-5114-9">http://dx.doi.org/10.1007/978-1-4302-5114-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Foundations and Practice of Security 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334365 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Miri, Ali. editor.&#160;Tawbi, Nadia. editor.<br/>Yer Numaras&#305;&#160;ONLINE(334365.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-37119-6">http://dx.doi.org/10.1007/978-3-642-37119-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334720 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Boyd, Colin. editor.&#160;Simpson, Leonie. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334720.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39059-3">http://dx.doi.org/10.1007/978-3-642-39059-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Security and Privacy Trust in the Digital World and Cyber Security and Privacy EU Forum 2013, Brussels, Belgium, April 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335073 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Felici, Massimo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335073.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41205-9">http://dx.doi.org/10.1007/978-3-642-41205-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Provable Security 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335077 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Susilo, Willy. editor.&#160;Reyhanitabar, Reza. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335077.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41227-1">http://dx.doi.org/10.1007/978-3-642-41227-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Technology Convergence Security, Robotics, Automations and Communication ent://SD_ILS/0/SD_ILS:336345 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Park, James J. (Jong Hyuk). editor.&#160;Barolli, Leonard. editor.&#160;Xhafa, Fatos. editor.&#160;Jeong, Hwa-Young. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(336345.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6996-0">http://dx.doi.org/10.1007/978-94-007-6996-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:334863 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334863.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39884-1">http://dx.doi.org/10.1007/978-3-642-39884-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197080 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Susilo, Willy. editor.&#160;Mu, Yi. editor.&#160;Seberry, Jennifer. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-31448-3">http://dx.doi.org/10.1007/978-3-642-31448-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust, Privacy and Security in Digital Business 9th International Conference, TrustBus 2012, Vienna, Austria, September 3-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197202 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Katsikas, Sokratis. editor.&#160;Quirchmayr, Gerald. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32287-7">http://dx.doi.org/10.1007/978-3-642-32287-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197299 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Visconti, Ivan. editor.&#160;Prisco, Roberto. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32928-9">http://dx.doi.org/10.1007/978-3-642-32928-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197303 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Keromytis, Angelos D. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-32946-3">http://dx.doi.org/10.1007/978-3-642-32946-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197328 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Aschenbruck, Nils. editor.&#160;Martini, Peter. editor.&#160;Meier, Michael. editor.&#160;T&ouml;lle, Jens. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33161-9">http://dx.doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Provable Security 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197346 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Takagi, Tsuyoshi. editor.&#160;Wang, Guilin. editor.&#160;Qin, Zhiguang. editor.&#160;Jiang, Shaoquan. editor.&#160;Yu, Yong. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33272-2">http://dx.doi.org/10.1007/978-3-642-33272-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Computing and Information Security Second International Conference, NCIS 2012, Shanghai, China, December 7-9, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197580 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Lei, Jingsheng. editor.&#160;Wang, Fu Lee. editor.&#160;Li, Mo. editor.&#160;Luo, Yuan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35211-9">http://dx.doi.org/10.1007/978-3-642-35211-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Intelligent Information Systems International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers ent://SD_ILS/0/SD_ILS:195894 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bouvry, Pascal. editor.&#160;K&#322;opotek, Mieczys&#322;aw A. editor.&#160;Lepr&eacute;vost, Franck. editor.&#160;Marciniak, Ma&#322;gorzata. editor.&#160;Mykowiecka, Agnieszka. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25261-7">http://dx.doi.org/10.1007/978-3-642-25261-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Security and Security Data 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers ent://SD_ILS/0/SD_ILS:196019 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;MacKinnon, Lachlan M. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-25704-9">http://dx.doi.org/10.1007/978-3-642-25704-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 &ndash; December 3, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:197541 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Wu, Chuan-Kun. editor.&#160;Yung, Moti. editor.&#160;Lin, Dongdai. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-34704-7">http://dx.doi.org/10.1007/978-3-642-34704-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Privacy Management and Autonomous Spontaneous Security 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:194013 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cavalli, Ana. editor.&#160;Leneutre, Jean. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19348-4">http://dx.doi.org/10.1007/978-3-642-19348-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence in Security for Information Systems 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-M&aacute;laga, Spain, June 8-10, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194663 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Herrero, &Aacute;lvaro. editor.&#160;Corchado, Emilio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21323-6">http://dx.doi.org/10.1007/978-3-642-21323-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Future Challenges in Security and Privacy for Academia and Industry 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194696 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Camenisch, Jan. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Murayama, Yuko. editor.&#160;Portmann, Armand. editor.&#160;Rieder, Carlos. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21424-0">http://dx.doi.org/10.1007/978-3-642-21424-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Managing the Dynamics of Networks and Services 5th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2011, Nancy, France, June 13-17, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194715 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chrisment, Isabelle. editor.&#160;Couch, Alva. editor.&#160;Badonnel, R&eacute;mi. editor.&#160;Waldburger, Martin. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21484-4">http://dx.doi.org/10.1007/978-3-642-21484-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia Communications, Services and Security 4th International Conference, MCSS 2011, Krakow, Poland, June 2-3, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194724 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Dziech, Andrzej. editor.&#160;Czy&#380;ewski, Andrzej. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-21512-4">http://dx.doi.org/10.1007/978-3-642-21512-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data and Applications Security and Privacy XXV 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194997 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Li, Yingjiu. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22348-8">http://dx.doi.org/10.1007/978-3-642-22348-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust, Privacy and Security in Digital Business 8th International Conference, TrustBus 2011, Toulouse, France, August 29 - September 2, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195171 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Furnell, Steven. editor.&#160;Lambrinoudakis, Costas. editor.&#160;Pernul, G&uuml;nther. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22890-2">http://dx.doi.org/10.1007/978-3-642-22890-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193823 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Burmester, Mike. editor.&#160;Tsudik, Gene. editor.&#160;Magliveras, Spyros. editor.&#160;Ili&#263;, Ivana. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-18178-8">http://dx.doi.org/10.1007/978-3-642-18178-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Open Research Problems in Network Security IFIP WG 11.4 International Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193975 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Camenisch, Jan. editor.&#160;Kisimov, Valentin. editor.&#160;Dubovitskaya, Maria. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-19228-9">http://dx.doi.org/10.1007/978-3-642-19228-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2011, Beijing, China, July 9, 2011. Proceedings ent://SD_ILS/0/SD_ILS:194897 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chau, Michael. editor.&#160;Wang, G. Alan. editor.&#160;Zheng, Xiaolong. editor.&#160;Chen, Hsinchun. editor.&#160;Zeng, Daniel. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22039-5">http://dx.doi.org/10.1007/978-3-642-22039-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Protocols XVI 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:194926 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Matyas, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22137-8">http://dx.doi.org/10.1007/978-3-642-22137-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Network Security and Applications 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 ent://SD_ILS/0/SD_ILS:195058 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Wyld, David C. editor.&#160;Wozniak, Michal. editor.&#160;Chaki, Nabendu. editor.&#160;Meghanathan, Natarajan. editor.&#160;Nagamalai, Dhinaharan. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-22540-6">http://dx.doi.org/10.1007/978-3-642-22540-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Availability, Reliability and Security for Business, Enterprise and Health Information Systems IFIP WG 8.4/8.9 International Cross Domain Conference and Workshop, ARES 2011, Vienna, Austria, August 22-26, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195302 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Tjoa, A Min. editor.&#160;Quirchmayr, Gerald. editor.&#160;You, Ilsun. editor.&#160;Xu, Lida. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23300-5">http://dx.doi.org/10.1007/978-3-642-23300-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security-Enriched Urban Computing and Smart Grid Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings ent://SD_ILS/0/SD_ILS:195496 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chang, Ruay-Shiung. editor.&#160;Kim, Tai-hoon. editor.&#160;Peng, Sheng-Lung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-23948-9">http://dx.doi.org/10.1007/978-3-642-23948-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192387 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Hsinchun. editor.&#160;Chau, Michael. editor.&#160;Li, Shu-hsing. editor.&#160;Urs, Shalini. editor.&#160;Srinivasa, Srinath. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13601-6">http://dx.doi.org/10.1007/978-3-642-13601-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192431 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Foresti, Sara. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13739-6">http://dx.doi.org/10.1007/978-3-642-13739-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Financial Cryptography and Data Security FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:192838 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Sion, Radu. editor.&#160;Curtmola, Reza. editor.&#160;Dietrich, Sven. editor.&#160;Kiayias, Aggelos. editor.&#160;Miret, Josep M. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14992-4">http://dx.doi.org/10.1007/978-3-642-14992-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Security &ndash; ESORICS 2010 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192988 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Gritzalis, Dimitris. editor.&#160;Preneel, Bart. editor.&#160;Theoharidou, Marianthi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15497-3">http://dx.doi.org/10.1007/978-3-642-15497-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy &ndash; Silver Linings in the Cloud 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192911 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Rannenberg, Kai. editor.&#160;Varadharajan, Vijay. editor.&#160;Weber, Christian. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15257-3">http://dx.doi.org/10.1007/978-3-642-15257-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192312 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bandyopadhyay, Samir Kumar. editor.&#160;Adi, Wael. editor.&#160;Kim, Tai-hoon. editor.&#160;Xiao, Yang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13365-7">http://dx.doi.org/10.1007/978-3-642-13365-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mechanisms for Autonomous Management of Networks and Services 4th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2010, Zurich, Switzerland, June 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192513 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Stiller, Burkhard. editor.&#160;Turck, Filip. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-13986-4">http://dx.doi.org/10.1007/978-3-642-13986-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Trust, Privacy and Security in Digital Business 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192877 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Katsikas, Sokratis. editor.&#160;Lopez, Javier. editor.&#160;Soriano, Miguel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15152-1">http://dx.doi.org/10.1007/978-3-642-15152-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Global Security, Safety, and Sustainability 6th International Conference, ICGS3 2010, Braga, Portugal, September 1-3, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193062 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Tenreiro de Magalh&atilde;es, S&eacute;rgio. editor.&#160;Jahankhani, Hamid. editor.&#160;Hessami, Ali G. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15717-2">http://dx.doi.org/10.1007/978-3-642-15717-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security-Enriched Urban Computing and Smart Grid First International Conference, SUComS 2010, Daejeon, Korea, September 15-17, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193297 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kim, Tai-hoon. editor.&#160;Stoica, Adrian. editor.&#160;Chang, Ruay-Shiung. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16444-6">http://dx.doi.org/10.1007/978-3-642-16444-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Computational Science X Special Issue on Security in Computing, Part I ent://SD_ILS/0/SD_ILS:193619 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17499-5">http://dx.doi.org/10.1007/978-3-642-17499-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems Second International ICST Conference, MobiSec 2010, Catania, Sicily, Italy, May 27-28, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:193620 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Russello, Giovanni. editor.&#160;Lioy, Antonio. editor.&#160;Prasad, Neeli R. editor.&#160;Lian, Shiguo. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17502-2">http://dx.doi.org/10.1007/978-3-642-17502-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Protocols 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193703 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Christianson, Bruce. editor.&#160;Crispo, Bruno. editor.&#160;Malcolm, James A. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17773-6">http://dx.doi.org/10.1007/978-3-642-17773-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security for Web Services and Service-Oriented Architectures ent://SD_ILS/0/SD_ILS:188902 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bertino, Elisa. author.&#160;Martino, Lorenzo. author.&#160;Paci, Federica. author.&#160;Squicciarini, Anna. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-87742-4">http://dx.doi.org/10.1007/978-3-540-87742-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Recent Trends in Network Security and Applications Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings ent://SD_ILS/0/SD_ILS:192667 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Meghanathan, Natarajan. editor.&#160;Boumerdassi, Selma. editor.&#160;Chaki, Nabendu. editor.&#160;Nagamalai, Dhinaharan. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-14478-3">http://dx.doi.org/10.1007/978-3-642-14478-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Web Application Security Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:193191 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Serr&atilde;o, Carlos. editor.&#160;Aguilera D&iacute;az, Vicente. editor.&#160;Cerullo, Fabio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-16120-9">http://dx.doi.org/10.1007/978-3-642-16120-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security Technology, Disaster Recovery and Business Continuity International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings ent://SD_ILS/0/SD_ILS:193653 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kim, Tai-hoon. editor.&#160;Fang, Wai-chi. editor.&#160;Khan, Muhammad Khurram. editor.&#160;Arnett, Kirk P. editor.&#160;Kang, Heau-jo. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-17610-4">http://dx.doi.org/10.1007/978-3-642-17610-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2009, Bangkok, Thailand, April 27, 2009. Proceedings ent://SD_ILS/0/SD_ILS:189978 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Hsinchun. editor.&#160;Yang, Christopher C. editor.&#160;Chau, Michael. editor.&#160;Li, Shu-Hsing. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01393-5">http://dx.doi.org/10.1007/978-3-642-01393-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Transactions on Computational Science IV Special Issue on Security in Computing ent://SD_ILS/0/SD_ILS:189853 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Gavrilova, Marina L. editor.&#160;Tan, C. J. Kenneth. editor.&#160;Moreno, Edward David. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01004-0">http://dx.doi.org/10.1007/978-3-642-01004-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy, Security, and Trust in KDD Second ACM SIGKDD International Workshop, PinKDD 2008, Las Vegas, NV, USA, August 24, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190097 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bonchi, Francesco. editor.&#160;Ferrari, Elena. editor.&#160;Jiang, Wei. editor.&#160;Malin, Bradley. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01718-6">http://dx.doi.org/10.1007/978-3-642-01718-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Mobile Information and Communication Systems First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190947 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Schmidt, Andreas U. editor.&#160;Lian, Shiguo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04434-2">http://dx.doi.org/10.1007/978-3-642-04434-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Safety, Reliability, and Security 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190960 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Buth, Bettina. editor.&#160;Rabe, Gerd. editor.&#160;Seyfarth, Till. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04468-7">http://dx.doi.org/10.1007/978-3-642-04468-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Quality of Service in Heterogeneous Networks 6th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and 3rd International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications, AAA-IDEA 2009, Las Palmas, Gran Canaria, November 23-25, 2009 Proceedings ent://SD_ILS/0/SD_ILS:191426 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bartolini, Novella. editor.&#160;Nikoletseas, Sotiris. editor.&#160;Sinha, Prasun. editor.&#160;Cardellini, Valeria. editor.&#160;Mahanti, Anirban. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10625-5">http://dx.doi.org/10.1007/978-3-642-10625-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190173 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Abdalla, Michel. editor.&#160;Pointcheval, David. editor.&#160;Fouque, Pierre-Alain. editor.&#160;Vergnaud, Damien. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-01957-9">http://dx.doi.org/10.1007/978-3-642-01957-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Scalability of Networks and Services Third International Conference on Autonomous Infrastructure, Management and Security, AIMS 2009 Enschede, The Netherlands, June 30&ndash;July 2, 2009. Proceedings ent://SD_ILS/0/SD_ILS:190380 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Sadre, Ramin. editor.&#160;Pras, Aiko. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-02627-0">http://dx.doi.org/10.1007/978-3-642-02627-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Communication Networks 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191214 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Yan. editor.&#160;Dimitriou, Tassos D. editor.&#160;Zhou, Jianying. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-05284-2">http://dx.doi.org/10.1007/978-3-642-05284-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Internet-Security aus Software-Sicht Ein Leitfaden zur Software-Erstellung f&uuml;r sicherheitskritische Bereiche ent://SD_ILS/0/SD_ILS:185643 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kriha, Walter. author.&#160;Schmitz, Roland. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68906-5">http://dx.doi.org/10.1007/978-3-540-68906-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185647 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bellovin, Steven M. editor.&#160;Gennaro, Rosario. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-68914-0">http://dx.doi.org/10.1007/978-3-540-68914-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185775 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Yang, Christopher C. editor.&#160;Chen, Hsinchun. editor.&#160;Chau, Michael. editor.&#160;Chang, Kuiyu. editor.&#160;Lang, Sheau-Dong. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69304-8">http://dx.doi.org/10.1007/978-3-540-69304-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings ent://SD_ILS/0/SD_ILS:189356 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Ortiz-Arroyo, Daniel. editor.&#160;Larsen, Henrik Legind. editor.&#160;Zeng, Daniel Dajun. editor.&#160;Hicks, David. editor.&#160;Wagner, Gerhard. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89900-6">http://dx.doi.org/10.1007/978-3-540-89900-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Global E-Security 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings ent://SD_ILS/0/SD_ILS:185814 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Jahankhani, Hamid. editor.&#160;Revett, Kenneth. editor.&#160;Palmer-Brown, Dominic. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69403-8">http://dx.doi.org/10.1007/978-3-540-69403-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Resilient Networks and Services Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings ent://SD_ILS/0/SD_ILS:186000 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Hausheer, David. editor.&#160;Sch&ouml;nw&auml;lder, J&uuml;rgen. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-70587-1">http://dx.doi.org/10.1007/978-3-540-70587-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy, Security, and Trust in KDD First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:188143 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bonchi, Francesco. editor.&#160;Ferrari, Elena. editor.&#160;Malin, Bradley. editor.&#160;Saygin, Y&uuml;cel. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-78478-4">http://dx.doi.org/10.1007/978-3-540-78478-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:189188 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Schulzrinne, Henning. editor.&#160;State, Radu. editor.&#160;Niccolini, Saverio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89054-6">http://dx.doi.org/10.1007/978-3-540-89054-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Terrorism Informatics Knowledge Management and Data Mining for Homeland Security ent://SD_ILS/0/SD_ILS:166857 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Hsinchun. editor.&#160;Reid, Edna. editor.&#160;Sinai, Joshua. editor.&#160;Silke, Andrew. editor.&#160;Ganor, Boaz. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-71613-8">http://dx.doi.org/10.1007/978-0-387-71613-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security, Privacy, and Trust in Modern Data Management ent://SD_ILS/0/SD_ILS:185914 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Petkovi&#263;, Milan. editor.&#160;Jonker, Willem. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-69861-6">http://dx.doi.org/10.1007/978-3-540-69861-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics Pacific Asia Workshop, PAISI 2007, Chengdu, China, April 11-12, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186311 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Yang, Christopher C. editor.&#160;Zeng, Daniel. editor.&#160;Chau, Michael. editor.&#160;Chang, Kuiyu. editor.&#160;Yang, Qing. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-71549-8">http://dx.doi.org/10.1007/978-3-540-71549-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics: Biosurveillance Second NSF Workshop, BioSurveillance 2007, New Brunswick, NJ, USA, May 22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186600 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Zeng, Daniel. editor.&#160;Gotham, Ivan. editor.&#160;Komatsu, Ken. editor.&#160;Lynch, Cecil. editor.&#160;Thurmond, Mark. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72608-1">http://dx.doi.org/10.1007/978-3-540-72608-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186640 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Katz, Jonathan. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72738-5">http://dx.doi.org/10.1007/978-3-540-72738-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007 St. Petersburg, Russia, September 13&ndash;15, 2007 Proceedings ent://SD_ILS/0/SD_ILS:187023 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Gorodetsky, Vladimir. editor.&#160;Kotenko, Igor. editor.&#160;Skormin, Victor A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73986-9">http://dx.doi.org/10.1007/978-3-540-73986-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Inter-Domain Management First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186709 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Bandara, Arosha K. editor.&#160;Burgess, Mark. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-72986-0">http://dx.doi.org/10.1007/978-3-540-72986-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007. Proceedings ent://SD_ILS/0/SD_ILS:186798 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Stajano, Frank. editor.&#160;Meadows, Catherine. editor.&#160;Capkun, Srdjan. editor.&#160;Moore, Tyler. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-73275-4">http://dx.doi.org/10.1007/978-3-540-73275-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Access Control Systems Security, Identity Management and Trust Models ent://SD_ILS/0/SD_ILS:165433 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Benantar, Messaoud. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/0-387-27716-1">http://dx.doi.org/10.1007/0-387-27716-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Machine Learning and Data Mining for Computer Security Methods and Applications ent://SD_ILS/0/SD_ILS:175344 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Maloof, Marcus A. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-84628-253-5">http://dx.doi.org/10.1007/1-84628-253-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics International Workshop, WISI 2006, Singapore, April 9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:183715 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Hsinchun. editor.&#160;Wang, Fei-Yue. editor.&#160;Yang, Christopher C. editor.&#160;Zeng, Daniel. editor.&#160;Chau, Michael. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11734628">http://dx.doi.org/10.1007/11734628</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security@Work Pragmatische Konzeption und Implementierung von IT-Sicherheit mit L&ouml;ungsbeispielen auf Open-Source-Basis ent://SD_ILS/0/SD_ILS:184358 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Eschweiler, J&ouml;g. author.&#160;Atencio Psille, Daniel E. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/3-540-36226-6">http://dx.doi.org/10.1007/3-540-36226-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communications and Multimedia Security 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006. Proceedings ent://SD_ILS/0/SD_ILS:185039 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Leitold, Herbert. editor.&#160;Markatos, Evangelos P. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11909033">http://dx.doi.org/10.1007/11909033</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Ad-Hoc and Sensor Networks Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers ent://SD_ILS/0/SD_ILS:185732 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Butty&aacute;n, Levente. editor.&#160;Gligor, Virgil D. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11964254">http://dx.doi.org/10.1007/11964254</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184072 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Mehrotra, Sharad. editor.&#160;Zeng, Daniel D. editor.&#160;Chen, Hsinchun. editor.&#160;Thuraisingham, Bhavani. editor.&#160;Wang, Fei-Yue. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Emerging Trends in Information and Communication Security International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184130 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;M&uuml;ller, G&uuml;nter. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11766155">http://dx.doi.org/10.1007/11766155</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184150 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Zhou, Jianying. editor.&#160;Yung, Moti. editor.&#160;Bao, Feng. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11767480">http://dx.doi.org/10.1007/11767480</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Multimedia Content Representation, Classification and Security International Workshop, MRCS 2006, Istanbul, Turkey, September 11-13, 2006. Proceedings ent://SD_ILS/0/SD_ILS:184726 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Gunsel, Bilge. editor.&#160;Jain, Anil K. editor.&#160;Tekalp, A. Murat. editor.&#160;Sankur, B&uuml;lent. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11848035">http://dx.doi.org/10.1007/11848035</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics for International Security Information Sharing and Data Mining ent://SD_ILS/0/SD_ILS:165714 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Chen, Hsinchun. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/0-387-30332-4">http://dx.doi.org/10.1007/0-387-30332-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference May 30 &ndash; June 1, 2005, Chiba, Japan ent://SD_ILS/0/SD_ILS:165165 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Sasaki, Ryoichi. editor.&#160;Qing, Sihan. editor.&#160;Okamoto, Eiji. editor.&#160;Yoshiura, Hiroshi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b135818">http://dx.doi.org/10.1007/b135818</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Net-Centric Approaches to Intelligence and National Security ent://SD_ILS/0/SD_ILS:165242 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Ladner, Roy. editor.&#160;Petry, Frederick E. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b137009">http://dx.doi.org/10.1007/b137009</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Air Pollution Modeling for Environmental Security Proceedings of the NATO Advanced Research Workshop on Advances in Air Pollution Modeling for Environmental Security Borovetz, Bulgaria 8&ndash;12 May 2004 ent://SD_ILS/0/SD_ILS:168877 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Farag&oacute;, Istv&aacute;n. editor.&#160;Georgiev, Krassimir. editor.&#160;Havasi, &Aacute;gnes. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-4020-3351-6">http://dx.doi.org/10.1007/1-4020-3351-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyberspace Security and Defense: Research Issues Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense: Research Issues Gdansk, Poland 6&ndash;9 September 2004 ent://SD_ILS/0/SD_ILS:168883 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kowalik, Janusz S. editor.&#160;Gorski, Janusz. editor.&#160;Sachenko, Anatoly. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/1-4020-3381-8">http://dx.doi.org/10.1007/1-4020-3381-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Formal Aspects in Security and Trust IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), World Computer Congress, August 22&ndash;27, 2004, Toulouse, France ent://SD_ILS/0/SD_ILS:165011 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Dimitrakos, Theo. editor.&#160;Martinelli, Fabio. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b104303">http://dx.doi.org/10.1007/b104303</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy, Security and Trust within the Context of Pervasive Computing ent://SD_ILS/0/SD_ILS:164923 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Robinson, Philip. editor.&#160;Vogt, Harald. editor.&#160;Wagealla, Waleed. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b101573">http://dx.doi.org/10.1007/b101573</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Applied Cryptography and Network Security Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings ent://SD_ILS/0/SD_ILS:182721 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Ioannidis, John. editor.&#160;Keromytis, Angelos. editor.&#160;Yung, Moti. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b137093">http://dx.doi.org/10.1007/b137093</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Monitoring, Security, and Rescue Techniques in Multiagent Systems ent://SD_ILS/0/SD_ILS:183313 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Dunin-K&#281;plicz, Barbara. author.&#160;Jankowski, Andrzej. author.&#160;Skowron, Andrzej. author.&#160;Szczuka, Marcin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/3-540-32370-8">http://dx.doi.org/10.1007/3-540-32370-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security in Ad-hoc and Sensor Networks First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers ent://SD_ILS/0/SD_ILS:182328 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Castelluccia, Claude. editor.&#160;Hartenstein, Hannes. editor.&#160;Paar, Christof. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b105219">http://dx.doi.org/10.1007/b105219</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security and Privacy in Ad-hoc and Sensor Networks Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers ent://SD_ILS/0/SD_ILS:182782 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Molva, Refik. editor.&#160;Tsudik, Gene. editor.&#160;Westhoff, Dirk. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11601494">http://dx.doi.org/10.1007/11601494</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Computational Intelligence and Security International Conference, CIS 2005, Xi&rsquo;an, China, December 15-19, 2005, Proceedings, Part II ent://SD_ILS/0/SD_ILS:182769 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Hao, Yue. editor.&#160;Liu, Jiming. editor.&#160;Wang, Yu-Ping. editor.&#160;Cheung, Yiu-ming. editor.&#160;Yin, Hujun. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11596981">http://dx.doi.org/10.1007/11596981</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183127 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kantor, Paul. editor.&#160;Muresan, Gheorghe. editor.&#160;Roberts, Fred. editor.&#160;Zeng, Daniel D. editor.&#160;Wang, Fei-Yue. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b136511">http://dx.doi.org/10.1007/b136511</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Communications and Multimedia Security 9th IFIP TC-6 TC-11International Conference, CMS 2005, Salzburg, Austria, September 19 &ndash; 21, 2005. Proceedings ent://SD_ILS/0/SD_ILS:183049 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Dittmann, Jana. editor.&#160;Katzenbeisser, Stefan. editor.&#160;Uhl, Andreas. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/11552055">http://dx.doi.org/10.1007/11552055</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Data Privacy Management, Cryptocurrencies and Blockchain Technology ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399660 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Garcia-Alfaro, Joaquin. editor. (orcid)0000-0002-7453-4393&#160;Herrera-Joancomart&iacute;, Jordi. editor. (orcid)0000-0002-4935-4681&#160;Livraga, Giovanni. editor. (orcid)0000-0003-2661-8573&#160;Rios, Ruben. editor. (orcid)0000-0002-6251-4897&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00305-0">https://doi.org/10.1007/978-3-030-00305-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Electronic Voting Third International Joint Conference, E-Vote-ID 2018, Bregenz, Austria, October 2-5, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400326 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Krimmer, Robert. editor. (orcid)0000-0002-0873-539X&#160;Volkamer, Melanie. editor. (orcid)0000-0003-2674-4043&#160;Cortier, V&eacute;ronique. editor.&#160;Gor&eacute;, Rajeev. editor.&#160;Hapsara, Manik. editor. (orcid)0000-0002-8653-063X<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00419-4">https://doi.org/10.1007/978-3-030-00419-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Threat Intelligence ent://SD_ILS/0/SD_ILS:400906 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Dehghantanha, Ali. editor.&#160;Conti, Mauro. editor. (orcid)0000-0002-3612-1934&#160;Dargahi, Tooska. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-73951-9">https://doi.org/10.1007/978-3-319-73951-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Modelling and Verification of Secure Exams ent://SD_ILS/0/SD_ILS:401571 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Giustolisi, Rosario. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-67107-9">https://doi.org/10.1007/978-3-319-67107-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Spyware and Adware ent://SD_ILS/0/SD_ILS:167516 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Aycock, John. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77741-2">http://dx.doi.org/10.1007/978-0-387-77741-2</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:171874 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Jajodia, Sushil. editor.&#160;Liu, Peng. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adaptive Cryptographic Access Control ent://SD_ILS/0/SD_ILS:172654 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kayem, Anne V. D. M. author.&#160;Akl, Selim G. author.&#160;Martin, Patrick. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-6655-1">http://dx.doi.org/10.1007/978-1-4419-6655-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Practical Signcryption ent://SD_ILS/0/SD_ILS:189264 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Dent, Alexander W. editor.&#160;Zheng, Yuliang. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-540-89411-7">http://dx.doi.org/10.1007/978-3-540-89411-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Network Intrusion Detection and Prevention Concepts and Techniques ent://SD_ILS/0/SD_ILS:167906 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Ghorbani, Ali A. author.&#160;Lu, Wei. author.&#160;Tavallaee, Mahbod. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-88771-5">http://dx.doi.org/10.1007/978-0-387-88771-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Multi-Party Non-Repudiation Protocols and Applications ent://SD_ILS/0/SD_ILS:167284 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Onieva, Jos&eacute; A. author.&#160;Lopez, Javier. author.&#160;Zhou, Jianying. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-75630-1">http://dx.doi.org/10.1007/978-0-387-75630-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Identifying Malicious Code Through Reverse Engineering ent://SD_ILS/0/SD_ILS:167947 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Singh, Abhishek. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-89468-3">http://dx.doi.org/10.1007/978-0-387-89468-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Global Initiatives to Secure Cyberspace An Emerging Landscape ent://SD_ILS/0/SD_ILS:164783 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Portnoy, Michael. editor.&#160;Goodman, Seymour. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09764-0">http://dx.doi.org/10.1007/978-0-387-09764-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Vulnerability Analysis and Defense for the Internet ent://SD_ILS/0/SD_ILS:167162 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Singh, Abhishek. editor.&#160;Singh, Baibhav. editor.&#160;Joseph, Hirosh. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-74390-5">http://dx.doi.org/10.1007/978-0-387-74390-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion Detection Systems ent://SD_ILS/0/SD_ILS:167451 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Mancini, Luigi V. editor.&#160;Pietro, Roberto. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-77265-3">http://dx.doi.org/10.1007/978-0-387-77265-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Data Management in Decentralized Systems ent://SD_ILS/0/SD_ILS:165430 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Yu, Ting. editor.&#160;Jajodia, Sushil. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-27696-0">http://dx.doi.org/10.1007/978-0-387-27696-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Privacy-Respecting Intrusion Detection ent://SD_ILS/0/SD_ILS:166560 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Flegel, Ulrich. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68254-9">http://dx.doi.org/10.1007/978-0-387-68254-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Preserving Privacy in On-Line Analytical Processing (OLAP) ent://SD_ILS/0/SD_ILS:166336 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Wang, Lingyu. author.&#160;Jajodia, Sushil. author.&#160;Wijesekera, Duminda. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46274-5">http://dx.doi.org/10.1007/978-0-387-46274-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intrusion Detection and Correlation Challenges and Solutions ent://SD_ILS/0/SD_ILS:164919 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kruegel, Christopher. author.&#160;Valeur, Fredrik. author.&#160;Vigna, Giovanni. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b101493">http://dx.doi.org/10.1007/b101493</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> The Austin Protocol Compiler ent://SD_ILS/0/SD_ILS:164876 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;McGuire, Tommy M. author.&#160;Gouda, Mohamed G. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/b101038">http://dx.doi.org/10.1007/b101038</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Harbour Protection Through Data Fusion Technologies ent://SD_ILS/0/SD_ILS:170363 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Shahbazian, Elisa. editor.&#160;Rogova, Galina. editor.&#160;DeWeert, Michael J. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4020-8883-4">http://dx.doi.org/10.1007/978-1-4020-8883-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Intelligent Information Processing IX 10th IFIP TC 12 International Conference, IIP 2018, Nanning, China, October 19-22, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399107 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Shi, Zhongzhi. editor.&#160;Mercier-Laurent, Eunika. editor.&#160;Li, Jiuyong. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00828-4">https://doi.org/10.1007/978-3-030-00828-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Brain Inspired Cognitive Systems 9th International Conference, BICS 2018, Xi'an, China, July 7-8, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399295 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Ren, Jinchang. editor.&#160;Hussain, Amir. editor.&#160;Zheng, Jiangbin. editor.&#160;Liu, Cheng-Lin. editor.&#160;Luo, Bin. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-00563-4">https://doi.org/10.1007/978-3-030-00563-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Pattern Recognition and Computer Vision First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:399364 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Lai, Jian-Huang. editor.&#160;Liu, Cheng-Lin. editor.&#160;Chen, Xilin. editor.&#160;Zhou, Jie. editor.&#160;Tan, Tieniu. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-03398-9">https://doi.org/10.1007/978-3-030-03398-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part I ent://SD_ILS/0/SD_ILS:400083 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Manolopoulos, Yannis. editor. (orcid)0000-0003-4026-4329&#160;Hammer, Barbara. editor.&#160;Iliadis, Lazaros. editor.&#160;Maglogiannis, Ilias. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01418-6">https://doi.org/10.1007/978-3-030-01418-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Distributed Computing and Internet Technology 14th International Conference, ICDCIT 2018, Bhubaneswar, India, January 11&ndash;13, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400479 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Negi, Atul. editor. (orcid)0000-0001-5707-130X&#160;Bhatnagar, Raj. editor.&#160;Parida, Laxmi. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-72344-0">https://doi.org/10.1007/978-3-319-72344-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:400514 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Manolopoulos, Yannis. editor. (orcid)0000-0003-4026-4329&#160;Hammer, Barbara. editor.&#160;Iliadis, Lazaros. editor.&#160;Maglogiannis, Ilias. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01424-7">https://doi.org/10.1007/978-3-030-01424-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Artificial Neural Networks and Machine Learning &ndash; ICANN 2018 27th International Conference on Artificial Neural Networks, Rhodes, Greece, October 4-7, 2018, Proceedings, Part II ent://SD_ILS/0/SD_ILS:400541 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;K&#367;rkov&aacute;, V&#283;ra. editor. (orcid)0000-0002-8181-2128&#160;Manolopoulos, Yannis. editor. (orcid)0000-0003-4026-4329&#160;Hammer, Barbara. editor.&#160;Iliadis, Lazaros. editor.&#160;Maglogiannis, Ilias. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-01421-6">https://doi.org/10.1007/978-3-030-01421-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Edge Computing &ndash; EDGE 2018 Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings ent://SD_ILS/0/SD_ILS:401594 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Liu, Shijun. editor. (orcid)0000-0002-4108-1391&#160;Tekinerdogan, Bedir. editor. (orcid)0000-0002-8538-7261&#160;Aoyama, Mikio. editor.&#160;Zhang, Liang-Jie. editor. (orcid)0000-0002-6219-0853&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-94340-4">https://doi.org/10.1007/978-3-319-94340-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Modern Data Strategy ent://SD_ILS/0/SD_ILS:401792 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Fleckenstein, Mike. author.&#160;Fellows, Lorraine. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-68993-7">https://doi.org/10.1007/978-3-319-68993-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cloud Infrastructures, Services, and IoT Systems for Smart Cities Second EAI International Conference, IISSC 2017 and CN4IoT 2017, Brindisi, Italy, April 20&ndash;21, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401875 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Longo, Antonella. editor.&#160;Zappatore, Marco. editor.&#160;Villari, Massimo. editor.&#160;Rana, Omer. editor.&#160;Bruneo, Dario. editor. (orcid)0000-0002-6080-9077<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-67636-4">https://doi.org/10.1007/978-3-319-67636-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Research and Practical Issues of Enterprise Information Systems 12th IFIP WG 8.9 Working Conference, CONFENIS 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18&ndash;19, 2018, Proceedings ent://SD_ILS/0/SD_ILS:399694 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Tjoa, A Min. editor. (orcid)0000-0002-8295-9252&#160;Raffai, Maria. editor. (orcid)0000-0001-6934-6366&#160;Doucek, Petr. editor. (orcid)0000-0002-5647-661X&#160;Novak, Niina Maarit. editor. (orcid)0000-0003-4352-7534&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99040-8">https://doi.org/10.1007/978-3-319-99040-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Computing and Communication Third International Conference, SmartCom 2018, Tokyo, Japan, December 10&ndash;12, 2018, Proceedings ent://SD_ILS/0/SD_ILS:400107 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Qiu, Meikang. editor. (orcid)0000-0002-1004-0140&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-05755-8">https://doi.org/10.1007/978-3-030-05755-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Guide to Vulnerability Analysis for Computer Networks and Systems An Artificial Intelligence Approach ent://SD_ILS/0/SD_ILS:400393 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Parkinson, Simon. editor. (orcid)0000-0002-1747-9914&#160;Crampton, Andrew. editor. (orcid)0000-0002-4635-9102&#160;Hill, Richard. editor. (orcid)0000-0003-0105-7730&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-92624-7">https://doi.org/10.1007/978-3-319-92624-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Digital Transformation: Challenges and Opportunities 16th Workshop on e-Business, WeB 2017, Seoul, South Korea, December 10, 2017, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400416 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Cho, Wooje. editor.&#160;Fan, Ming. editor. (orcid)0000-0002-4303-5313&#160;Shaw, Michael J. editor.&#160;Yoo, Byungjoon. editor.&#160;Zhang, Han. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-99936-4">https://doi.org/10.1007/978-3-319-99936-4</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Smart Secure Systems &ndash; IoT and Analytics Perspective Second International Conference on Intelligent Information Technologies. ICIIT 2017, Chennai, India, December 20-22, 2017, Proceedings ent://SD_ILS/0/SD_ILS:400428 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Venkataramani, Guru Prasadh. editor.&#160;Sankaranarayanan, Karthik. editor.&#160;Mukherjee, Saswati. editor.&#160;Arputharaj, Kannan. editor.&#160;Sankara Narayanan, Swamynathan. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-981-10-7635-0">https://doi.org/10.1007/978-981-10-7635-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> HCI in Business, Government, and Organizations 5th International Conference, HCIBGO 2018, Held as Part of HCI International 2018, Las Vegas, NV, USA, July 15-20, 2018, Proceedings ent://SD_ILS/0/SD_ILS:402655 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Nah, Fiona Fui-Hoon. editor.&#160;Xiao, Bo Sophia. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-91716-0">https://doi.org/10.1007/978-3-319-91716-0</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Personal Satellite Services 4th International ICST Conference, PSATS 2012, Bradford, UK, March 22-23, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334292 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Pillai, Prashant. editor.&#160;Shorey, Rajeev. editor.&#160;Ferro, Erina. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334292.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36787-8">http://dx.doi.org/10.1007/978-3-642-36787-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Advances in Digital Forensics IX 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335063 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(335063.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41148-9">http://dx.doi.org/10.1007/978-3-642-41148-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> On the Move to Meaningful Internet Systems: OTM 2013 Conferences Confederated International Conferences: CoopIS, DOA-Trusted Cloud, and ODBASE 2013, Graz, Austria, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:335044 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Meersman, Robert. editor.&#160;Panetto, Herv&eacute;. editor.&#160;Dillon, Tharam. editor.&#160;Eder, Johann. editor.&#160;Bellahsene, Zohra. editor.<br/>Yer Numaras&#305;&#160;ONLINE(335044.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-41030-7">http://dx.doi.org/10.1007/978-3-642-41030-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Botnets ent://SD_ILS/0/SD_ILS:331175 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Tiirmaa-Klaar, Heli. author.&#160;Gassen, Jan. author.&#160;Gerhards-Padilla, Elmar. author.&#160;Martini, Peter. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331175.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-5216-3">http://dx.doi.org/10.1007/978-1-4471-5216-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Automatic Malware Analysis An Emulator Based Approach ent://SD_ILS/0/SD_ILS:331796 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Yin, Heng. author.&#160;Song, Dawn. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(331796.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5523-3">http://dx.doi.org/10.1007/978-1-4614-5523-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android Malware ent://SD_ILS/0/SD_ILS:332276 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Jiang, Xuxian. author.&#160;Zhou, Yajin. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(332276.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-7394-7">http://dx.doi.org/10.1007/978-1-4614-7394-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Public-Key Cryptography &ndash; PKC 2013 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 &ndash; March 1, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334184 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Kurosawa, Kaoru. editor.&#160;Hanaoka, Goichiro. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334184.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36362-7">http://dx.doi.org/10.1007/978-3-642-36362-7</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> E-Voting and Identify 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:334746 2024-12-27T02:20:34Z 2024-12-27T02:20:34Z Yazar&#160;Heather, James. editor.&#160;Schneider, Steve. editor.&#160;Teague, Vanessa. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE(334746.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-3-642-39185-9">http://dx.doi.org/10.1007/978-3-642-39185-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>