Search Results for Electrical engineering. - Narrowed by: Computer security. SirsiDynix Enterprise http://katalog.baskent.edu.tr/client/en_US/default/default/qu$003dElectrical$002bengineering.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300?dt=list 2026-03-31T16:22:30Z Information Science and Applications 2017 ICISA 2017 ent://SD_ILS/0/SD_ILS:481784 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Kim, Kuinam. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-4154-9">http://dx.doi.org/10.1007/978-981-10-4154-9</a><br/>Format:&#160;Electronic Resources<br/> Security Challenges and Approaches in Internet of Things ent://SD_ILS/0/SD_ILS:480524 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Misra, Sridipta. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44230-3">http://dx.doi.org/10.1007/978-3-319-44230-3</a><br/>Format:&#160;Electronic Resources<br/> On Privacy-Preserving Protocols for Smart Metering Systems Security and Privacy in Smart Grids ent://SD_ILS/0/SD_ILS:480290 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Borges de Oliveira, F&aacute;bio. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40718-0">http://dx.doi.org/10.1007/978-3-319-40718-0</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the First International Conference on Intelligent Computing and Communication ent://SD_ILS/0/SD_ILS:481606 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Mandal, Jyotsna Kumar. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-2035-3">http://dx.doi.org/10.1007/978-981-10-2035-3</a><br/>Format:&#160;Electronic Resources<br/> Innovations in Computer Science and Engineering Proceedings of the Fourth ICICSE 2016 ent://SD_ILS/0/SD_ILS:481764 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Saini, H. S. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3818-1">http://dx.doi.org/10.1007/978-981-10-3818-1</a><br/>Format:&#160;Electronic Resources<br/> Computing and Network Sustainability Proceedings of IRSCNS 2016 ent://SD_ILS/0/SD_ILS:481772 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Vishwakarma, H.R . editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3935-5">http://dx.doi.org/10.1007/978-981-10-3935-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Grids: Security and Privacy Issues ent://SD_ILS/0/SD_ILS:480572 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Boroojeni, Kianoosh G. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45050-6">http://dx.doi.org/10.1007/978-3-319-45050-6</a><br/>Format:&#160;Electronic Resources<br/> Vehicular Cyber Physical Systems Adaptive Connectivity and Security ent://SD_ILS/0/SD_ILS:480540 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Rawat, Danda B. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44494-9">http://dx.doi.org/10.1007/978-3-319-44494-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practices Emerging Threats and Perspectives ent://SD_ILS/0/SD_ILS:480820 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Traor&eacute;, Issa. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-48947-6">http://dx.doi.org/10.1007/978-3-319-48947-6</a><br/>Format:&#160;Electronic Resources<br/> Hack proofing your Web applications ent://SD_ILS/0/SD_ILS:1188343 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Traxler, Julie.<br/>ScienceDirect <a href="https://www.sciencedirect.com/science/book/9781928994312">https://www.sciencedirect.com/science/book/9781928994312</a><br/>Format:&#160;Electronic Resources<br/> Information Fusion for Cyber-Security Analytics ent://SD_ILS/0/SD_ILS:480528 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Alsmadi, Izzat M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-44257-0">http://dx.doi.org/10.1007/978-3-319-44257-0</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity for Industry 4.0 Analysis for Design and Manufacturing ent://SD_ILS/0/SD_ILS:480924 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Thames, Lane. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-50660-9">http://dx.doi.org/10.1007/978-3-319-50660-9</a><br/>Format:&#160;Electronic Resources<br/> Computer Communication, Networking and Internet Security Proceedings of IC3T 2016 ent://SD_ILS/0/SD_ILS:481714 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-3226-4">http://dx.doi.org/10.1007/978-981-10-3226-4</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 1 ent://SD_ILS/0/SD_ILS:481578 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1675-2">http://dx.doi.org/10.1007/978-981-10-1675-2</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the International Conference on Data Engineering and Communication Technology ICDECT 2016, Volume 2 ent://SD_ILS/0/SD_ILS:481579 2026-03-31T16:22:30Z 2026-03-31T16:22:30Z by&#160;Satapathy, Suresh Chandra. editor.<br/><a href="http://dx.doi.org/10.1007/978-981-10-1678-3">http://dx.doi.org/10.1007/978-981-10-1678-3</a><br/>Format:&#160;Electronic Resources<br/>