Search Results for Computer security. - Narrowed by: Electrical engineering.SirsiDynix Enterprisehttp://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Electrical$002bengineering.$002509Electrical$002bengineering.$0026ps$003d300?dt=list2026-04-02T05:08:35ZComputer Communication, Networking and Internet Security Proceedings of IC3T 2016ent://SD_ILS/0/SD_ILS:4817142026-04-02T05:08:35Z2026-04-02T05:08:35Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format: Electronic Resources<br/>BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networksent://SD_ILS/0/SD_ILS:6932762026-04-02T05:08:35Z2026-04-02T05:08:35Zby Powell, Nelson Henry, III, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816780</a><br/>Format: Books<br/>Eleventh hour CISSP : study guideent://SD_ILS/0/SD_ILS:11831382026-04-02T05:08:35Z2026-04-02T05:08:35Zby Conrad, Eric, 1967-<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781597495660">https://www.sciencedirect.com/science/book/9781597495660</a><br/>Format: Electronic Resources<br/>On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Gridsent://SD_ILS/0/SD_ILS:4802902026-04-02T05:08:35Z2026-04-02T05:08:35Zby Borges de Oliveira, Fábio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Intelligent Computing and Communicationent://SD_ILS/0/SD_ILS:4816062026-04-02T05:08:35Z2026-04-02T05:08:35Zby Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format: Electronic Resources<br/>Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016ent://SD_ILS/0/SD_ILS:4817642026-04-02T05:08:35Z2026-04-02T05:08:35Zby Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format: Electronic Resources<br/>Computing and Network Sustainability Proceedings of IRSCNS 2016ent://SD_ILS/0/SD_ILS:4817722026-04-02T05:08:35Z2026-04-02T05:08:35Zby Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format: Electronic Resources<br/>Information Science and Applications 2017 ICISA 2017ent://SD_ILS/0/SD_ILS:4817842026-04-02T05:08:35Z2026-04-02T05:08:35Zby Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format: Electronic Resources<br/>Security Challenges and Approaches in Internet of Thingsent://SD_ILS/0/SD_ILS:4805242026-04-02T05:08:35Z2026-04-02T05:08:35Zby Misra, Sridipta. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44230-3">http://dx.doi.org/10.1007/978-3-319-44230-3</a><br/>Format: Electronic Resources<br/>Vehicular Cyber Physical Systems Adaptive Connectivity and Securityent://SD_ILS/0/SD_ILS:4805402026-04-02T05:08:35Z2026-04-02T05:08:35Zby Rawat, Danda B. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44494-9">http://dx.doi.org/10.1007/978-3-319-44494-9</a><br/>Format: Electronic Resources<br/>Smart Grids: Security and Privacy Issuesent://SD_ILS/0/SD_ILS:4805722026-04-02T05:08:35Z2026-04-02T05:08:35Zby Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format: Electronic Resources<br/>Information Security Practices Emerging Threats and Perspectivesent://SD_ILS/0/SD_ILS:4808202026-04-02T05:08:35Z2026-04-02T05:08:35Zby Traoré, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format: Electronic Resources<br/>Information Fusion for Cyber-Security Analyticsent://SD_ILS/0/SD_ILS:4805282026-04-02T05:08:35Z2026-04-02T05:08:35Zby Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format: Electronic Resources<br/>Cybersecurity for Industry 4.0 Analysis for Design and Manufacturingent://SD_ILS/0/SD_ILS:4809242026-04-02T05:08:35Z2026-04-02T05:08:35Zby Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815782026-04-02T05:08:35Z2026-04-02T05:08:35Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2ent://SD_ILS/0/SD_ILS:4815792026-04-02T05:08:35Z2026-04-02T05:08:35Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format: Electronic Resources<br/>Introduction to Computer Networkingent://SD_ILS/0/SD_ILS:4810822026-04-02T05:08:35Z2026-04-02T05:08:35Zby Robertazzi, Thomas G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53103-8">http://dx.doi.org/10.1007/978-3-319-53103-8</a><br/>Format: Electronic Resources<br/>Cyber-Physical Security of an Electric Microgrident://SD_ILS/0/SD_ILS:6908682026-04-02T05:08:35Z2026-04-02T05:08:35Zby Palaniswamy, Prashanth, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10792606</a><br/>Format: Books<br/>Strategic Engineering for Cloud Computing and Big Data Analyticsent://SD_ILS/0/SD_ILS:4810492026-04-02T05:08:35Z2026-04-02T05:08:35Zby Hosseinian-Far, Amin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-52491-7">http://dx.doi.org/10.1007/978-3-319-52491-7</a><br/>Format: Electronic Resources<br/>Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 1ent://SD_ILS/0/SD_ILS:4817612026-04-02T05:08:35Z2026-04-02T05:08:35Zby Bhatia, Sanjiv K. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3770-2">http://dx.doi.org/10.1007/978-981-10-3770-2</a><br/>Format: Electronic Resources<br/>Securing FPGA Systems with Moving Target Defense Mechanismsent://SD_ILS/0/SD_ILS:6931772026-04-02T05:08:35Z2026-04-02T05:08:35Zby Zhang, Zhiming, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816420">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816420</a><br/>Format: Books<br/>Computational Intelligence in Wireless Sensor Networks Recent Advances and Future Challengesent://SD_ILS/0/SD_ILS:4807542026-04-02T05:08:35Z2026-04-02T05:08:35Zby Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47715-2">http://dx.doi.org/10.1007/978-3-319-47715-2</a><br/>Format: Electronic Resources<br/>Proceedings of the International Conference on Signal, Networks, Computing, and Systems ICSNCS 2016, Volume 1ent://SD_ILS/0/SD_ILS:4815212026-04-02T05:08:35Z2026-04-02T05:08:35Zby Lobiyal, Daya K. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-3592-7">http://dx.doi.org/10.1007/978-81-322-3592-7</a><br/>Format: Electronic Resources<br/>Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016ent://SD_ILS/0/SD_ILS:4816462026-04-02T05:08:35Z2026-04-02T05:08:35Zby Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2471-9">http://dx.doi.org/10.1007/978-981-10-2471-9</a><br/>Format: Electronic Resources<br/>Proceedings of International Conference on Communication and Networks ComNet 2016ent://SD_ILS/0/SD_ILS:4816752026-04-02T05:08:35Z2026-04-02T05:08:35Zby Modi, Nilesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2750-5">http://dx.doi.org/10.1007/978-981-10-2750-5</a><br/>Format: Electronic Resources<br/>