Search Results for Computer security. - Narrowed by: 0984 SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$0025090984$0025090984$0026ps$003d300?dt=list 2026-01-01T13:03:19Z BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:693276 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Powell, Nelson Henry, III, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780</a><br/>Format:&#160;Books<br/> Cyber-Physical Security of an Electric Microgrid ent://SD_ILS/0/SD_ILS:690868 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Palaniswamy, Prashanth, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606</a><br/>Format:&#160;Books<br/> Visualizing the Motion Flow of Crowds ent://SD_ILS/0/SD_ILS:691710 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Zhao, Zheng, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10809903">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10809903</a><br/>Format:&#160;Books<br/> Behavioral Based Biometrics Using Keystroke Dynamics for User Authentication ent://SD_ILS/0/SD_ILS:692801 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Ogemuno, Emamuzo Cletus, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10814998">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10814998</a><br/>Format:&#160;Books<br/> The History of Steganography and the Threat Posed to the United States and the Rest of the International Community ent://SD_ILS/0/SD_ILS:692995 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Burney, Micaela L., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10815667</a><br/>Format:&#160;Books<br/> Specificationless Intrusion Detection Using Thermodynamic Formalism of Free Energy ent://SD_ILS/0/SD_ILS:688046 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Hutton, William James, III., author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10641513">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10641513</a><br/>Format:&#160;Books<br/> Private and Trustworthy Computation Using Additive Cryptographic Primitives ent://SD_ILS/0/SD_ILS:678055 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Tsoutsos, Nektarios Georgios, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10642986</a><br/>Format:&#160;Books<br/> Malware Detection and Cyber Security via Compression ent://SD_ILS/0/SD_ILS:680659 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Raff, Edward, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10811037</a><br/>Format:&#160;Books<br/> A Secure and Low-Power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networks ent://SD_ILS/0/SD_ILS:696397 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Bandekar, Ashutosh, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10901969">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10901969</a><br/>Format:&#160;Books<br/> Assessing Security Architectures to Protect Against Malware in Embedded Narrow Artificial Intelligence Robots ent://SD_ILS/0/SD_ILS:687423 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Sylvertooth, Randall Earl, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10902464</a><br/>Format:&#160;Books<br/> Hierarchical Representation Learning with Connectionist Models ent://SD_ILS/0/SD_ILS:696688 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Wang, De, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10903178">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10903178</a><br/>Format:&#160;Books<br/> Mitigating Privilege Escalation ent://SD_ILS/0/SD_ILS:681827 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Brookes, Scott, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822683">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10822683</a><br/>Format:&#160;Books<br/> VLSI implementation of public key cryptography algorithms ent://SD_ILS/0/SD_ILS:683881 2026-01-01T13:03:19Z 2026-01-01T13:03:19Z by&#160;Keshavarzi, Parviz, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10836298</a><br/>Format:&#160;Books<br/>