Arama Sonuçları Thuraisingham, Bhavani.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dThuraisingham$00252C$002bBhavani.$0026ic$003dtrue$0026ps$003d300?dt=list2024-11-26T06:34:28ZBuilding trustworthy semantic websent://SD_ILS/0/SD_ILS:2894182024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420013221">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security and Privacy in Communication Networks 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:5185452024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani. editor. Wang, XiaoFeng. editor. Yegneswaran, Vinod. editor. SpringerLink (Online service)<br/>Yer Numarası XX(518545.1)<br/>Elektronik Erişim <a href="https://doi.org/10.1007/978-3-319-28865-9">https://doi.org/10.1007/978-3-319-28865-9</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure semantic service-oriented systemsent://SD_ILS/0/SD_ILS:2851052024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420073324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Database and applications security integrating information security and data managementent://SD_ILS/0/SD_ILS:2845522024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203486061">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Web data mining and applications in business intelligence and counter-terrorisment://SD_ILS/0/SD_ILS:2864312024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780203499511">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>XML databases and the semantic Webent://SD_ILS/0/SD_ILS:2856422024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420000023">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Managing and mining multimedia databasesent://SD_ILS/0/SD_ILS:2877232024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781420042559">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure data provenance and inference control with semantic webent://SD_ILS/0/SD_ILS:3564242024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M., author. Cadenhead, Tyrone, author. Kantarcioglu, Murat, author. Khadilkar, Vaibhav, author.<br/>Yer Numarası ONLINE(356424.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466569447">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Developing and securing the cloudent://SD_ILS/0/SD_ILS:3426312024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Thuraisingham, Bhavani M., author.<br/>Yer Numarası ONLINE(342631.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439862926">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Data mining tools for malware detectionent://SD_ILS/0/SD_ILS:2871022024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Masud, Mehedy. Khan, Latifur. Thuraisingham, Bhavani M.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439854556">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conferenceent://SD_ILS/0/SD_ILS:1657962024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Dowland, Paul. editor. Furnell, Steve. editor. Thuraisingham, Bhavani. editor. Wang, X. Sean. editor. SpringerLink (Online service)<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/0-387-31167-X">http://dx.doi.org/10.1007/0-387-31167-X</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Intelligence and Security Informatics IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedingsent://SD_ILS/0/SD_ILS:1840722024-11-26T06:34:28Z2024-11-26T06:34:28ZYazar Mehrotra, Sharad. editor. Zeng, Daniel D. editor. Chen, Hsinchun. editor. Thuraisingham, Bhavani. editor. Wang, Fei-Yue. editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://dx.doi.org/10.1007/11760146">http://dx.doi.org/10.1007/11760146</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>