Arama Sonuçları Telecommunication systems. - Daraltılmış: Data protection.
SirsiDynix Enterprise
https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dTelecommunication$002bsystems.$0026qf$003dSUBJECT$002509Konu$002509Data$002bprotection.$002509Data$002bprotection.$0026ic$003dtrue$0026ps$003d300?dt=list
2024-11-25T19:22:17Z
Intrusion Detection for IP-Based Multimedia Communications over Wireless Networks
ent://SD_ILS/0/SD_ILS:332461
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Tang, Jin. author. Cheng, Yu. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332461.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-8996-2">http://dx.doi.org/10.1007/978-1-4614-8996-2</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Location Privacy Protection in Mobile Networks
ent://SD_ILS/0/SD_ILS:332468
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Liu, Xinxin. author. Li, Xiaolin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332468.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-9074-6">http://dx.doi.org/10.1007/978-1-4614-9074-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security Assessment in Vehicular Networks
ent://SD_ILS/0/SD_ILS:332479
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Du, Suguo. author. Zhu, Haojin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332479.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-9357-0">http://dx.doi.org/10.1007/978-1-4614-9357-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Secure IP Mobility Management for VANET
ent://SD_ILS/0/SD_ILS:332861
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Taha, Sanaa. author. Shen, Xuemin. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(332861.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-3-319-01351-0">http://dx.doi.org/10.1007/978-3-319-01351-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Moving Target Defense II Application of Game Theory and Adversarial Modeling
ent://SD_ILS/0/SD_ILS:331766
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Jajodia, Sushil. editor. Ghosh, Anup K. editor. Subrahmanian, V.S. editor. Swarup, Vipin. editor. Wang, Cliff. editor.<br/>Yer Numarası ONLINE(331766.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Structured Peer-to-Peer Systems Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
ent://SD_ILS/0/SD_ILS:331785
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Korzun, Dmitry. author. Gurtov, Andrei. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE(331785.1)<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4614-5483-0">http://dx.doi.org/10.1007/978-1-4614-5483-0</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>
Security in Embedded Devices
ent://SD_ILS/0/SD_ILS:172275
2024-11-25T19:22:17Z
2024-11-25T19:22:17Z
Yazar Gebotys, Catherine H. author. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/978-1-4419-1530-6">http://dx.doi.org/10.1007/978-1-4419-1530-6</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>