Search Results for Computer security. - Narrowed by: 0984SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$0025090984$0025090984$0026ps$003d300?dt=list2026-01-01T13:03:19ZBATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:6932762026-01-01T13:03:19Z2026-01-01T13:03:19Zby Powell, Nelson Henry, III, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780</a><br/>Format: Books<br/>Cyber-Physical Security of an Electric Microgrident://SD_ILS/0/SD_ILS:6908682026-01-01T13:03:19Z2026-01-01T13:03:19Zby Palaniswamy, Prashanth, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606</a><br/>Format: Books<br/>Visualizing the Motion Flow of Crowdsent://SD_ILS/0/SD_ILS:6917102026-01-01T13:03:19Z2026-01-01T13:03:19Zby Zhao, Zheng, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10809903">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10809903</a><br/>Format: Books<br/>Behavioral Based Biometrics Using Keystroke Dynamics for User Authenticationent://SD_ILS/0/SD_ILS:6928012026-01-01T13:03:19Z2026-01-01T13:03:19Zby Ogemuno, Emamuzo Cletus, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10814998">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10814998</a><br/>Format: Books<br/>The History of Steganography and the Threat Posed to the United States and the Rest of the International Communityent://SD_ILS/0/SD_ILS:6929952026-01-01T13:03:19Z2026-01-01T13:03:19Zby Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format: Books<br/>Specificationless Intrusion Detection Using Thermodynamic Formalism of Free Energyent://SD_ILS/0/SD_ILS:6880462026-01-01T13:03:19Z2026-01-01T13:03:19Zby Hutton, William James, III., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10641513">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10641513</a><br/>Format: Books<br/>Private and Trustworthy Computation Using Additive Cryptographic Primitivesent://SD_ILS/0/SD_ILS:6780552026-01-01T13:03:19Z2026-01-01T13:03:19Zby Tsoutsos, Nektarios Georgios, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986</a><br/>Format: Books<br/>Malware Detection and Cyber Security via Compressionent://SD_ILS/0/SD_ILS:6806592026-01-01T13:03:19Z2026-01-01T13:03:19Zby Raff, Edward, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037</a><br/>Format: Books<br/>A Secure and Low-Power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networksent://SD_ILS/0/SD_ILS:6963972026-01-01T13:03:19Z2026-01-01T13:03:19Zby Bandekar, Ashutosh, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10901969">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10901969</a><br/>Format: Books<br/>Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robotsent://SD_ILS/0/SD_ILS:6874232026-01-01T13:03:19Z2026-01-01T13:03:19Zby Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format: Books<br/>Hierarchical Representation Learning with Connectionist Modelsent://SD_ILS/0/SD_ILS:6966882026-01-01T13:03:19Z2026-01-01T13:03:19Zby Wang, De, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10903178">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10903178</a><br/>Format: Books<br/>Mitigating Privilege Escalationent://SD_ILS/0/SD_ILS:6818272026-01-01T13:03:19Z2026-01-01T13:03:19Zby Brookes, Scott, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822683">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822683</a><br/>Format: Books<br/>VLSI implementation of public key cryptography algorithmsent://SD_ILS/0/SD_ILS:6838812026-01-01T13:03:19Z2026-01-01T13:03:19Zby Keshavarzi, Parviz, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298</a><br/>Format: Books<br/>