Search Results for Computer security. - Narrowed by: Engineering. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dComputer$002bsecurity.$0026qf$003dSUBJECT$002509Subject$002509Engineering.$002509Engineering.$0026ic$003dtrue$0026ps$003d300?dt=list 2026-04-02T09:20:05Z Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/> Group-target Tracking ent://SD_ILS/0/SD_ILS:481592 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Geng, Wen-dong. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1888-6">http://dx.doi.org/10.1007/978-981-10-1888-6</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:481606 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Electronic Resources<br/> Digital Watermarking Techniques and Trends ent://SD_ILS/0/SD_ILS:481612 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Nematollahi, Mohammad Ali. author.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2095-7">http://dx.doi.org/10.1007/978-981-10-2095-7</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:481764 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Electronic Resources<br/> Computing and Network Sustainability Proceedings of IRSCNS 2016 ent://SD_ILS/0/SD_ILS:481772 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format:&#160;Electronic Resources<br/> Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:481784 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Electronic Resources<br/> Security Challenges and Approaches in Internet of Things ent://SD_ILS/0/SD_ILS:480524 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Misra, Sridipta. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44230-3">http://dx.doi.org/10.1007/978-3-319-44230-3</a><br/>Format:&#160;Electronic Resources<br/> Multimedia Forensics and Security Foundations, Innovations, and Applications ent://SD_ILS/0/SD_ILS:480530 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Hassanien, Aboul Ella. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44270-9">http://dx.doi.org/10.1007/978-3-319-44270-9</a><br/>Format:&#160;Electronic Resources<br/> Vehicular Cyber Physical Systems Adaptive Connectivity and Security ent://SD_ILS/0/SD_ILS:480540 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Rawat, Danda B. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44494-9">http://dx.doi.org/10.1007/978-3-319-44494-9</a><br/>Format:&#160;Electronic Resources<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Security-Aware Design for Cyber-Physical Systems A Platform-Based Approach ent://SD_ILS/0/SD_ILS:480968 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Lin, Chung-Wei. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-51328-7">http://dx.doi.org/10.1007/978-3-319-51328-7</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Biometric Security and Privacy Opportunities &amp; Challenges in The Big Data Era ent://SD_ILS/0/SD_ILS:480719 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Jiang, Richard. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47301-7">http://dx.doi.org/10.1007/978-3-319-47301-7</a><br/>Format:&#160;Electronic Resources<br/> Hardware IP Security and Trust ent://SD_ILS/0/SD_ILS:480829 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Mishra, Prabhat. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-49025-0">http://dx.doi.org/10.1007/978-3-319-49025-0</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Four ent://SD_ILS/0/SD_ILS:481731 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3391-9">http://dx.doi.org/10.1007/978-981-10-3391-9</a><br/>Format:&#160;Electronic Resources<br/> Advanced Computing and Systems for Security Volume Three ent://SD_ILS/0/SD_ILS:481732 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Chaki, Rituparna. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3409-1">http://dx.doi.org/10.1007/978-981-10-3409-1</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/> Hard and Soft Computing for Artificial Intelligence, Multimedia and Security ent://SD_ILS/0/SD_ILS:480786 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Kobayashi, Shin-ya. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48429-7">http://dx.doi.org/10.1007/978-3-319-48429-7</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Computer Networking ent://SD_ILS/0/SD_ILS:481082 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Robertazzi, Thomas G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53103-8">http://dx.doi.org/10.1007/978-3-319-53103-8</a><br/>Format:&#160;Electronic Resources<br/> Europe and MENA Cooperation Advances in Information and Communication Technologies ent://SD_ILS/0/SD_ILS:480679 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46568-5">http://dx.doi.org/10.1007/978-3-319-46568-5</a><br/>Format:&#160;Electronic Resources<br/> Strategic Engineering for Cloud Computing and Big Data Analytics ent://SD_ILS/0/SD_ILS:481049 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Hosseinian-Far, Amin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-52491-7">http://dx.doi.org/10.1007/978-3-319-52491-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Computer and Computational Sciences Proceedings of ICCCCS 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481761 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Bhatia, Sanjiv K. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3770-2">http://dx.doi.org/10.1007/978-981-10-3770-2</a><br/>Format:&#160;Electronic Resources<br/> Securing FPGA Systems with Moving Target Defense Mechanisms ent://SD_ILS/0/SD_ILS:693177 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Zhang, Zhiming, author.<br/><a href="http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816420">http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqm&rft_dat=xri:pqdiss:10816420</a><br/>Format:&#160;Books<br/> Hardware Security and Trust Design and Deployment of Integrated Circuits in a Threatened Environment ent://SD_ILS/0/SD_ILS:480531 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Sklavos, Nicolas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44318-8">http://dx.doi.org/10.1007/978-3-319-44318-8</a><br/>Format:&#160;Electronic Resources<br/> Computational Intelligence in Wireless Sensor Networks Recent Advances and Future Challenges ent://SD_ILS/0/SD_ILS:480754 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Abraham, Ajith. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-47715-2">http://dx.doi.org/10.1007/978-3-319-47715-2</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Systems and Technologies Volume 1 ent://SD_ILS/0/SD_ILS:481296 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56535-4">http://dx.doi.org/10.1007/978-3-319-56535-4</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Systems and Technologies Volume 2 ent://SD_ILS/0/SD_ILS:481297 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56538-5">http://dx.doi.org/10.1007/978-3-319-56538-5</a><br/>Format:&#160;Electronic Resources<br/> Recent Advances in Information Systems and Technologies Volume 3 ent://SD_ILS/0/SD_ILS:481298 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Rocha, &Aacute;lvaro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-56541-5">http://dx.doi.org/10.1007/978-3-319-56541-5</a><br/>Format:&#160;Electronic Resources<br/> Trends in Advanced Intelligent Control, Optimization and Automation Proceedings of KKA 2017&mdash;The 19th Polish Control Conference, Krak&oacute;w, Poland, June 18&ndash;21, 2017 ent://SD_ILS/0/SD_ILS:481380 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Mitkowski, Wojciech. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-60699-6">http://dx.doi.org/10.1007/978-3-319-60699-6</a><br/>Format:&#160;Electronic Resources<br/> Business Resilience System (BRS): Driven Through Boolean, Fuzzy Logics and Cloud Computation Real and Near Real Time Analysis and Decision Making System ent://SD_ILS/0/SD_ILS:481109 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Zohuri, Bahman. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-53417-6">http://dx.doi.org/10.1007/978-3-319-53417-6</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Signal, Networks, Computing, and Systems ICSNCS 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481521 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Lobiyal, Daya K. editor.<br/><a href="http://dx.doi.org/10.1007/978-81-322-3592-7">http://dx.doi.org/10.1007/978-81-322-3592-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Conference on Computer Vision and Image Processing CVIP 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481614 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Raman, Balasubramanian. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2107-7">http://dx.doi.org/10.1007/978-981-10-2107-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Conference on Computer Vision and Image Processing CVIP 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481613 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Raman, Balasubramanian. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2104-6">http://dx.doi.org/10.1007/978-981-10-2104-6</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016 ent://SD_ILS/0/SD_ILS:481646 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2471-9">http://dx.doi.org/10.1007/978-981-10-2471-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of International Conference on Communication and Networks ComNet 2016 ent://SD_ILS/0/SD_ILS:481675 2026-04-02T09:20:05Z 2026-04-02T09:20:05Z by&#160;Modi, Nilesh. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2750-5">http://dx.doi.org/10.1007/978-981-10-2750-5</a><br/>Format:&#160;Electronic Resources<br/>