Arama Sonu&ccedil;lar&#305; Wang, Cliff. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dWang$00252C$002bCliff.$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue? 2024-11-13T11:42:39Z Proactive and Dynamic Network Defense ent://SD_ILS/0/SD_ILS:486655 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Wang, Cliff. editor.&#160;Lu, Zhuo. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-10597-6">https://doi.org/10.1007/978-3-030-10597-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Introduction to Hardware Security and Trust ent://SD_ILS/0/SD_ILS:173063 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Tehranipoor, Mohammad. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-8080-9">http://dx.doi.org/10.1007/978-1-4419-8080-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Deception Techniques, Strategies, and Human Aspects ent://SD_ILS/0/SD_ILS:520297 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Bao, Tiffany. editor.&#160;Tambe, Milind. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(520297.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-031-16613-6">https://doi.org/10.1007/978-3-031-16613-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Autonomous Cyber Deception Reasoning, Adaptive Planning, and Evaluation of HoneyThings ent://SD_ILS/0/SD_ILS:482942 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Al-Shaer, Ehab. editor.&#160;Wei, Jinpeng. editor. (orcid)0000-0002-6982-7386&#160;Hamlen, Kevin W. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-02110-8">https://doi.org/10.1007/978-3-030-02110-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security ent://SD_ILS/0/SD_ILS:483947 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Cybenko, George. editor.&#160;Liu, Peng. editor.&#160;Wang, Cliff. editor.&#160;Wellman, Michael. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications ent://SD_ILS/0/SD_ILS:518429 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Lu, Zhou. author.&#160;Wang, Wenye. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;XX(518429.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-23288-1">https://doi.org/10.1007/978-3-319-23288-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Warfare Building the Scientific Foundation ent://SD_ILS/0/SD_ILS:518532 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Jajodia, Sushil. editor.&#160;Shakarian, Paulo. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Yer Numaras&#305;&#160;XX(518532.1)<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-14039-1">https://doi.org/10.1007/978-3-319-14039-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Fundamentals of Sketch-Based Passwords A General Framework ent://SD_ILS/0/SD_ILS:487393 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Riggan, Benjamin S. author.&#160;Snyder, Wesley E. author.&#160;Wang, Cliff. author.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-13629-5">https://doi.org/10.1007/978-3-319-13629-5</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Cloud Computing ent://SD_ILS/0/SD_ILS:487956 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Jajodia, Sushil. editor.&#160;Kant, Krishna. editor.&#160;Samarati, Pierangela. editor.&#160;Singhal, Anoop. editor.&#160;Swarup, Vipin. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-1-4614-9278-8">https://doi.org/10.1007/978-1-4614-9278-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Defense and Situational Awareness ent://SD_ILS/0/SD_ILS:485697 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Kott, Alexander. editor.&#160;Wang, Cliff. editor.&#160;Erbacher, Robert F. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="https://doi.org/10.1007/978-3-319-11391-3">https://doi.org/10.1007/978-3-319-11391-3</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Moving Target Defense II Application of Game Theory and Adversarial Modeling ent://SD_ILS/0/SD_ILS:331766 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Subrahmanian, V.S. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.<br/>Yer Numaras&#305;&#160;ONLINE(331766.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-5416-8">http://dx.doi.org/10.1007/978-1-4614-5416-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats ent://SD_ILS/0/SD_ILS:173823 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Jajodia, Sushil. editor.&#160;Ghosh, Anup K. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;Wang, X. Sean. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4614-0977-9">http://dx.doi.org/10.1007/978-1-4614-0977-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Cyber Situational Awareness Issues and Research ent://SD_ILS/0/SD_ILS:171874 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Jajodia, Sushil. editor.&#160;Liu, Peng. editor.&#160;Swarup, Vipin. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-1-4419-0140-8">http://dx.doi.org/10.1007/978-1-4419-0140-8</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Botnet Detection Countering the Largest Security Threat ent://SD_ILS/0/SD_ILS:166626 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Lee, Wenke. editor.&#160;Wang, Cliff. editor.&#160;Dagon, David. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-68768-1">http://dx.doi.org/10.1007/978-0-387-68768-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Malware Detection ent://SD_ILS/0/SD_ILS:166294 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Christodorescu, Mihai. editor.&#160;Jha, Somesh. editor.&#160;Maughan, Douglas. editor.&#160;Song, Dawn. editor.&#160;Wang, Cliff. editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-44599-1">http://dx.doi.org/10.1007/978-0-387-44599-1</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks ent://SD_ILS/0/SD_ILS:166337 2024-11-13T11:42:39Z 2024-11-13T11:42:39Z Yazar&#160;Poovendran, Radha. editor.&#160;Roy, Sumit. editor.&#160;Wang, Cliff. editor.&#160;SpringerLink (Online service)<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://dx.doi.org/10.1007/978-0-387-46276-9">http://dx.doi.org/10.1007/978-0-387-46276-9</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>