Search Results for Management of Computing and Information Systems. SirsiDynix Enterprise https://tarama.pau.edu.tr/client/tr_TR/defaulttr/defaulttr/qu$003dManagement$002bof$002bComputing$002band$002bInformation$002bSystems.$0026ps$003d300? 2026-04-02T03:40:15Z UML @ Classroom An Introduction to Object-Oriented Modeling ent://SD_ILS/0/SD_ILS:78295 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Seidl, Martina. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12742-2">http://dx.doi.org/10.1007/978-3-319-12742-2</a><br/>Format:&#160;Electronic Resources<br/> Agile Methods. Large-Scale Development, Refactoring, Testing, and Estimation XP 2014 International Workshops, Rome, Italy, May 26-30, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78779 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dings&oslash;yr, Torgeir. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14358-3">http://dx.doi.org/10.1007/978-3-319-14358-3</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 14th International Conference, XP 2013, Vienna, Austria, June 3-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83076 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Baumeister, Hubert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38314-4">http://dx.doi.org/10.1007/978-3-642-38314-4</a><br/>Format:&#160;Electronic Resources<br/> Lean Enterprise Software and Systems 4th International Conference, LESS 2013, Galway, Ireland, December 1-4, 2013, Proceedings ent://SD_ILS/0/SD_ILS:84033 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fitzgerald, Brian. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-44930-7">http://dx.doi.org/10.1007/978-3-642-44930-7</a><br/>Format:&#160;Electronic Resources<br/> Situational Method Engineering ent://SD_ILS/0/SD_ILS:83928 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Henderson-Sellers, Brian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41467-1">http://dx.doi.org/10.1007/978-3-642-41467-1</a><br/>Format:&#160;Electronic Resources<br/> Feature-Oriented Software Product Lines Concepts and Implementation ent://SD_ILS/0/SD_ILS:82906 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Apel, Sven. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37521-7">http://dx.doi.org/10.1007/978-3-642-37521-7</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 15th International Conference, XP 2014, Rome, Italy, May 26-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76435 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cantone, Giovanni. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06862-6">http://dx.doi.org/10.1007/978-3-319-06862-6</a><br/>Format:&#160;Electronic Resources<br/> Aspect-Oriented Requirements Engineering ent://SD_ILS/0/SD_ILS:83168 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Moreira, Ana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38640-4">http://dx.doi.org/10.1007/978-3-642-38640-4</a><br/>Format:&#160;Electronic Resources<br/> Systems and Software Variability Management Concepts, Tools and Experiences ent://SD_ILS/0/SD_ILS:82661 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Capilla, Rafael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36583-6">http://dx.doi.org/10.1007/978-3-642-36583-6</a><br/>Format:&#160;Electronic Resources<br/> Software Measurement 25th International Workshop on Software Measurement and 10th International Conference on Software Process and Product Measurement, IWSM-Mensura 2015, Krak&oacute;w, Poland, October 5-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80955 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kobyliński, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24285-9">http://dx.doi.org/10.1007/978-3-319-24285-9</a><br/>Format:&#160;Electronic Resources<br/> Software Quality. Software and Systems Quality in Distributed and Mobile Environments 7th International Conference, SWQD 2015, Vienna, Austria, January 20-23, 2015, Proceedings ent://SD_ILS/0/SD_ILS:78454 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Winkler, Dietmar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13251-8">http://dx.doi.org/10.1007/978-3-319-13251-8</a><br/>Format:&#160;Electronic Resources<br/> Software Cost Estimation, Benchmarking, and Risk Assessment The Software Decision-Makers' Guide to Predictable Software Development ent://SD_ILS/0/SD_ILS:81694 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Trendowicz, Adam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-30764-5">http://dx.doi.org/10.1007/978-3-642-30764-5</a><br/>Format:&#160;Electronic Resources<br/> Software Quality. Increasing Value in Software and Systems Development 5th International Conference, SWQD 2013, Vienna, Austria, January 15-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82425 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Winkler, Dietmar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35702-2">http://dx.doi.org/10.1007/978-3-642-35702-2</a><br/>Format:&#160;Electronic Resources<br/> Software Quality. Model-Based Approaches for Advanced Software and Systems Engineering 6th International Conference, SWQD 2014, Vienna, Austria, January 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:75410 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Winkler, Dietmar. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03602-1">http://dx.doi.org/10.1007/978-3-319-03602-1</a><br/>Format:&#160;Electronic Resources<br/> Agile Processes in Software Engineering and Extreme Programming 16th International Conference, XP 2015, Helsinki, Finland, May 25-29, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79985 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lassenius, Casper. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18612-2">http://dx.doi.org/10.1007/978-3-319-18612-2</a><br/>Format:&#160;Electronic Resources<br/> A Survey of Core Research in Information Systems ent://SD_ILS/0/SD_ILS:72291 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sidorova, Anna. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7158-5">http://dx.doi.org/10.1007/978-1-4614-7158-5</a><br/>Format:&#160;Electronic Resources<br/> Perspectives on the Future of Software Engineering Essays in Honor of Dieter Rombach ent://SD_ILS/0/SD_ILS:82871 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;M&uuml;nch, J&uuml;rgen. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37395-4">http://dx.doi.org/10.1007/978-3-642-37395-4</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 19th International Working Conference, REFSQ 2013, Essen, Germany, April 8-11, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82878 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Doerr, Joerg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37422-7">http://dx.doi.org/10.1007/978-3-642-37422-7</a><br/>Format:&#160;Electronic Resources<br/> Software Project Effort Estimation Foundations and Best Practice Guidelines for Success ent://SD_ILS/0/SD_ILS:75417 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Trendowicz, Adam. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03629-8">http://dx.doi.org/10.1007/978-3-319-03629-8</a><br/>Format:&#160;Electronic Resources<br/> Lean Software Development in Action ent://SD_ILS/0/SD_ILS:81318 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Janes, Andrea. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-00503-9">http://dx.doi.org/10.1007/978-3-642-00503-9</a><br/>Format:&#160;Electronic Resources<br/> Aligning Organizations Through Measurement The GQM+Strategies Approach ent://SD_ILS/0/SD_ILS:75864 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Basili, Victor. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05047-8">http://dx.doi.org/10.1007/978-3-319-05047-8</a><br/>Format:&#160;Electronic Resources<br/> Recommendation Systems in Software Engineering ent://SD_ILS/0/SD_ILS:84070 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Robillard, Martin P. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45135-5">http://dx.doi.org/10.1007/978-3-642-45135-5</a><br/>Format:&#160;Electronic Resources<br/> Agile! The Good, the Hype and the Ugly ent://SD_ILS/0/SD_ILS:75898 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Meyer, Bertrand. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05155-0">http://dx.doi.org/10.1007/978-3-319-05155-0</a><br/>Format:&#160;Electronic Resources<br/> Future Internet Testing First International Workshop, FITTEST 2013, Istanbul, Turkey, November 12, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:76728 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Vos, Tanja E.J. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07785-7">http://dx.doi.org/10.1007/978-3-319-07785-7</a><br/>Format:&#160;Electronic Resources<br/> Software Project Management in a Changing World ent://SD_ILS/0/SD_ILS:84446 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Ruhe, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55035-5">http://dx.doi.org/10.1007/978-3-642-55035-5</a><br/>Format:&#160;Electronic Resources<br/> Transforming Learning and IT Management through Gamification ent://SD_ILS/0/SD_ILS:80005 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Prakash, Edmond C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18699-3">http://dx.doi.org/10.1007/978-3-319-18699-3</a><br/>Format:&#160;Electronic Resources<br/> Agile Kaizen Managing Continuous Improvement Far Beyond Retrospectives ent://SD_ILS/0/SD_ILS:84434 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Medinilla, &Aacute;ngel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54991-5">http://dx.doi.org/10.1007/978-3-642-54991-5</a><br/>Format:&#160;Electronic Resources<br/> Advances in Global Sourcing. Models, Governance, and Relationships 7th Global Sourcing Workshop 2013, Val d&rsquo;Is&egrave;re, France, March 11-14, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83806 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Oshri, Ilan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40951-6">http://dx.doi.org/10.1007/978-3-642-40951-6</a><br/>Format:&#160;Electronic Resources<br/> Software Business. From Physical Products to Software Services and Solutions 4th International Conference, ICSOB 2013, Potsdam, Germany, June 11-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83373 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Herzwurm, Georg. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39336-5">http://dx.doi.org/10.1007/978-3-642-39336-5</a><br/>Format:&#160;Electronic Resources<br/> Evolving Software Systems ent://SD_ILS/0/SD_ILS:84146 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mens, Tom. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45398-4">http://dx.doi.org/10.1007/978-3-642-45398-4</a><br/>Format:&#160;Electronic Resources<br/> Model and Data Engineering Third International Conference, MEDI 2013, Amantea, Italy, September 25-27, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83904 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cuzzocrea, Alfredo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41366-7">http://dx.doi.org/10.1007/978-3-642-41366-7</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:76504 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bauer, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07076-6">http://dx.doi.org/10.1007/978-3-319-07076-6</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Science Second International Conference, CLOSER 2012, Porto, Portugal, April 18-21, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:75694 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Ivanov, Ivan I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04519-1">http://dx.doi.org/10.1007/978-3-319-04519-1</a><br/>Format:&#160;Electronic Resources<br/> Practitioner's Guide to Health Informatics ent://SD_ILS/0/SD_ILS:79734 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Braunstein, Mark L. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17662-8">http://dx.doi.org/10.1007/978-3-319-17662-8</a><br/>Format:&#160;Electronic Resources<br/> Software Business. Towards Continuous Value Delivery 5th International Conference, ICSOB 2014, Paphos, Cyprus, June 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77032 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lassenius, Casper. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08738-2">http://dx.doi.org/10.1007/978-3-319-08738-2</a><br/>Format:&#160;Electronic Resources<br/> E-Government Strategy, ICT and Innovation for Citizen Engagement ent://SD_ILS/0/SD_ILS:74048 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Anderson, Dennis. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-3350-1">http://dx.doi.org/10.1007/978-1-4939-3350-1</a><br/>Format:&#160;Electronic Resources<br/> Electronic Government and the Information Systems Perspective Third International Conference, EGOVIS 2014, Munich, Germany, September 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77488 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10178-1">http://dx.doi.org/10.1007/978-3-319-10178-1</a><br/>Format:&#160;Electronic Resources<br/> Grand Successes and Failures in IT. Public and Private Sectors IFIP WG 8.6 International Working Conference on Transfer and Diffusion of IT, TDIT 2013, Bangalore, India, June 27-29, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83234 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dwivedi, Yogesh K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38862-0">http://dx.doi.org/10.1007/978-3-642-38862-0</a><br/>Format:&#160;Electronic Resources<br/> Governing Sourcing Relationships. A Collection of Studies at the Country, Sector and Firm Level 8th Global Sourcing Workshop 2014, Val d'Isere, France, March 23-26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77870 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kotlarsky, Julia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11367-8">http://dx.doi.org/10.1007/978-3-319-11367-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Management in the Big Data Era ent://SD_ILS/0/SD_ILS:78533 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lake, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13503-8">http://dx.doi.org/10.1007/978-3-319-13503-8</a><br/>Format:&#160;Electronic Resources<br/> User-Centric Technology Design for Nonprofit and Civic Engagements ent://SD_ILS/0/SD_ILS:76147 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Saeed, Saqib. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05963-1">http://dx.doi.org/10.1007/978-3-319-05963-1</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80444 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Almgren, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20550-2">http://dx.doi.org/10.1007/978-3-319-20550-2</a><br/>Format:&#160;Electronic Resources<br/> Achieving Success and Innovation in Global Sourcing: Perspectives and Practices 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81185 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Oshri, Ilan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26739-5">http://dx.doi.org/10.1007/978-3-319-26739-5</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 13th International Conference, CARDIS 2014, Paris, France, November 5-7, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79482 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Joye, Marc. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16763-3">http://dx.doi.org/10.1007/978-3-319-16763-3</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79698 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17533-1">http://dx.doi.org/10.1007/978-3-319-17533-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76907 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Susilo, Willy. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08344-5">http://dx.doi.org/10.1007/978-3-319-08344-5</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions and Defenses 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77874 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Stavrou, Angelos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11379-1">http://dx.doi.org/10.1007/978-3-319-11379-1</a><br/>Format:&#160;Electronic Resources<br/> Economics of Grids, Clouds, Systems, and Services 10th International Conference, GECON 2013, Zaragoza, Spain, September 18-20, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75092 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Altmann, J&ouml;rn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02414-1">http://dx.doi.org/10.1007/978-3-319-02414-1</a><br/>Format:&#160;Electronic Resources<br/> Technology-Enabled Innovation for Democracy, Government and Governance Second Joint International Conference on Electronic Government and the Information Systems Perspective, and Electronic Democracy, EGOVIS/EDEM 2013, Prague, Czech Republic, August 26-28, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83592 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kő, Andrea. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40160-2">http://dx.doi.org/10.1007/978-3-642-40160-2</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy, and Security in Digital Business 11th International Conference, TrustBus 2014, Munich, Germany, September 2-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77359 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Eckert, Claudia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09770-1">http://dx.doi.org/10.1007/978-3-319-09770-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 12th International Conference, CARDIS 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:76895 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Francillon, Aur&eacute;lien. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08302-5">http://dx.doi.org/10.1007/978-3-319-08302-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Cryptography for Networks 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77715 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Abdalla, Michel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10879-7">http://dx.doi.org/10.1007/978-3-319-10879-7</a><br/>Format:&#160;Electronic Resources<br/> Fundamentals of Service Systems ent://SD_ILS/0/SD_ILS:80835 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cardoso, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23195-2">http://dx.doi.org/10.1007/978-3-319-23195-2</a><br/>Format:&#160;Electronic Resources<br/> Cybernics Fusion of human, machine and information systems ent://SD_ILS/0/SD_ILS:85897 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sankai, Yoshiyuki. editor.<br/><a href="http://dx.doi.org/10.1007/978-4-431-54159-2">http://dx.doi.org/10.1007/978-4-431-54159-2</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II ent://SD_ILS/0/SD_ILS:77820 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11212-1">http://dx.doi.org/10.1007/978-3-319-11212-1</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78123 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lee, Hyang-Sook. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12160-4">http://dx.doi.org/10.1007/978-3-319-12160-4</a><br/>Format:&#160;Electronic Resources<br/> Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I ent://SD_ILS/0/SD_ILS:77817 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kutyłowski, Mirosław. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11203-9">http://dx.doi.org/10.1007/978-3-319-11203-9</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology &ndash; ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82939 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kwon, Taekyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37682-5">http://dx.doi.org/10.1007/978-3-642-37682-5</a><br/>Format:&#160;Electronic Resources<br/> Continuous Software Engineering ent://SD_ILS/0/SD_ILS:77842 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bosch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11283-1">http://dx.doi.org/10.1007/978-3-319-11283-1</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management and Autonomous Spontaneous Security 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84342 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54568-9">http://dx.doi.org/10.1007/978-3-642-54568-9</a><br/>Format:&#160;Electronic Resources<br/> Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79549 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Garcia-Alfaro, Joaquin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17016-9">http://dx.doi.org/10.1007/978-3-319-17016-9</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 11th International Conference, DIMVA 2014, Egham, UK, July 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76959 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dietrich, Sven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08509-8">http://dx.doi.org/10.1007/978-3-319-08509-8</a><br/>Format:&#160;Electronic Resources<br/> Monitoring and Securing Virtualized Networks and Services 8th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2014, Brno, Czech Republic, June 30 &ndash; July 3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84994 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sperotto, Anna. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43862-6">http://dx.doi.org/10.1007/978-3-662-43862-6</a><br/>Format:&#160;Electronic Resources<br/> Models@run.time Foundations, Applications, and Roadmaps ent://SD_ILS/0/SD_ILS:77088 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bencomo, Nelly. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08915-7">http://dx.doi.org/10.1007/978-3-319-08915-7</a><br/>Format:&#160;Electronic Resources<br/> Creating Value for All Through IT IFIP WG 8.6 International Conference on Transfer and Diffusion of IT, TDIT 2014, Aalborg, Denmark, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84922 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bergvall-K&aring;reborn, Birgitta. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43459-8">http://dx.doi.org/10.1007/978-3-662-43459-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83004 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Deng, Robert H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38033-4">http://dx.doi.org/10.1007/978-3-642-38033-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Architecture Patterns Practical Solutions for Recurring IT-Architecture Problems ent://SD_ILS/0/SD_ILS:82916 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Perroud, Thierry. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37561-3">http://dx.doi.org/10.1007/978-3-642-37561-3</a><br/>Format:&#160;Electronic Resources<br/> Process-Oriented Dynamic Capabilities Framework Development, Empirical Applications and Methodological Support ent://SD_ILS/0/SD_ILS:75338 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Plattfaut, Ralf. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03251-1">http://dx.doi.org/10.1007/978-3-319-03251-1</a><br/>Format:&#160;Electronic Resources<br/> ICT Development for Social and Rural Connectedness ent://SD_ILS/0/SD_ILS:72208 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Alias, Nor Aziah. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-6901-8">http://dx.doi.org/10.1007/978-1-4614-6901-8</a><br/>Format:&#160;Electronic Resources<br/> How Clouds Hold IT Together Integrating Architecture with Cloud Deployment ent://SD_ILS/0/SD_ILS:70242 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Waschke, Marvin. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4302-6167-4">http://dx.doi.org/10.1007/978-1-4302-6167-4</a><br/>Format:&#160;Electronic Resources<br/> Trust, Privacy and Security in Digital Business 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80798 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22906-5">http://dx.doi.org/10.1007/978-3-319-22906-5</a><br/>Format:&#160;Electronic Resources<br/> Guide to Security Assurance for Cloud Computing ent://SD_ILS/0/SD_ILS:81137 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Zhu, Shao Ying. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25988-8">http://dx.doi.org/10.1007/978-3-319-25988-8</a><br/>Format:&#160;Electronic Resources<br/> Cultural Synergy in Information Institutions ent://SD_ILS/0/SD_ILS:73682 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Smiraglia, Richard P. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-1249-0">http://dx.doi.org/10.1007/978-1-4939-1249-0</a><br/>Format:&#160;Electronic Resources<br/> Protecting Privacy in Data Release ent://SD_ILS/0/SD_ILS:79293 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Livraga, Giovanni. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16109-9">http://dx.doi.org/10.1007/978-3-319-16109-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for the Future Internet in the Age of Globalisation 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79988 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Camenisch, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18621-4">http://dx.doi.org/10.1007/978-3-319-18621-4</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84519 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cuppens-Boulahia, Nora. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55415-5">http://dx.doi.org/10.1007/978-3-642-55415-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79241 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lee, Jooyoung. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15943-0">http://dx.doi.org/10.1007/978-3-319-15943-0</a><br/>Format:&#160;Electronic Resources<br/> Guide to Modeling and Simulation of Systems of Systems ent://SD_ILS/0/SD_ILS:70005 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Zeigler, Bernard P. author.<br/><a href="http://dx.doi.org/10.1007/978-0-85729-865-2">http://dx.doi.org/10.1007/978-0-85729-865-2</a><br/>Format:&#160;Electronic Resources<br/> Design Science: Perspectives from Europe European Design Science Symposium, EDSS 2012, Leixlip, Ireland, December 6, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:75560 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04090-5">http://dx.doi.org/10.1007/978-3-319-04090-5</a><br/>Format:&#160;Electronic Resources<br/> S-BPM ONE - Running Processes 5th International Conference, S-BPM ONE 2013, Deggendorf, Germany, March 11-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82710 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fischer, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36754-0">http://dx.doi.org/10.1007/978-3-642-36754-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Identity Management for Emerging Services and Technologies 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84471 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Hansen, Marit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55137-6">http://dx.doi.org/10.1007/978-3-642-55137-6</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Pattern Languages of Programming III ent://SD_ILS/0/SD_ILS:83180 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Noble, James. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38676-3">http://dx.doi.org/10.1007/978-3-642-38676-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2012 International Conference on Information Technology and Software Engineering Information Technology &amp; Computing Intelligence ent://SD_ILS/0/SD_ILS:82231 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lu, Wei. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34522-7">http://dx.doi.org/10.1007/978-3-642-34522-7</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2012 International Conference on Information Technology and Software Engineering Information Technology ent://SD_ILS/0/SD_ILS:82233 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lu, Wei. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34528-9">http://dx.doi.org/10.1007/978-3-642-34528-9</a><br/>Format:&#160;Electronic Resources<br/> Software Technologies 9th International Joint Conference, ICSOFT 2014, Vienna, Austria, August 29-31, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81095 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Holzinger, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25579-8">http://dx.doi.org/10.1007/978-3-319-25579-8</a><br/>Format:&#160;Electronic Resources<br/> Implementing IT Processes The Main 17 IT Processes and Directions for a Successful Implementation ent://SD_ILS/0/SD_ILS:84676 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Pilorget, Lionel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-04773-3">http://dx.doi.org/10.1007/978-3-658-04773-3</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 2012 International Conference on Information Technology and Software Engineering Software Engineering &amp; Digital Media Technology ent://SD_ILS/0/SD_ILS:82234 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lu, Wei. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34531-9">http://dx.doi.org/10.1007/978-3-642-34531-9</a><br/>Format:&#160;Electronic Resources<br/> Software Product Quality Control ent://SD_ILS/0/SD_ILS:83146 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Wagner, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38571-1">http://dx.doi.org/10.1007/978-3-642-38571-1</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 20th International Working Conference, REFSQ 2014, Essen, Germany, April 7-10, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76108 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Salinesi, Camille. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05843-6">http://dx.doi.org/10.1007/978-3-319-05843-6</a><br/>Format:&#160;Electronic Resources<br/> Software Architecture 9th European Conference, ECSA 2015, Dubrovnik/Cavtat, Croatia, September 7-11, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80894 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Weyns, Danny. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23727-5">http://dx.doi.org/10.1007/978-3-319-23727-5</a><br/>Format:&#160;Electronic Resources<br/> Systems, Software and Services Process Improvement 22nd European Conference, EuroSPI 2015, Ankara, Turkey, September 30 -- October 2, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80991 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;O&rsquo;Connor, Rory V. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24647-5">http://dx.doi.org/10.1007/978-3-319-24647-5</a><br/>Format:&#160;Electronic Resources<br/> Systems, Software and Services Process Improvement 21st European Conference, EuroSPI 2014, Luxembourg, June 25-27, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85003 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Barafort, B&eacute;atrix. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43896-1">http://dx.doi.org/10.1007/978-3-662-43896-1</a><br/>Format:&#160;Electronic Resources<br/> Dynamic Provisioning for Community Services ent://SD_ILS/0/SD_ILS:82228 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Qi, Li. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34513-5">http://dx.doi.org/10.1007/978-3-642-34513-5</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Science Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77932 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11561-0">http://dx.doi.org/10.1007/978-3-319-11561-0</a><br/>Format:&#160;Electronic Resources<br/> Computational Inference and Control of Quality in Multimedia Services ent://SD_ILS/0/SD_ILS:81006 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Menkovski, Vlado. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24792-2">http://dx.doi.org/10.1007/978-3-319-24792-2</a><br/>Format:&#160;Electronic Resources<br/> Managing Agile Strategy, Implementation, Organisation and People ent://SD_ILS/0/SD_ILS:79338 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Moran, Alan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16262-1">http://dx.doi.org/10.1007/978-3-319-16262-1</a><br/>Format:&#160;Electronic Resources<br/> Facebook Nation Total Information Awareness ent://SD_ILS/0/SD_ILS:73802 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4939-1740-2">http://dx.doi.org/10.1007/978-1-4939-1740-2</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Mobile Open Source Technologies 10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San Jos&eacute;, Costa Rica, May 6-9, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84468 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Corral, Luis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55128-4">http://dx.doi.org/10.1007/978-3-642-55128-4</a><br/>Format:&#160;Electronic Resources<br/> Sociomaterial-Design Bounding Technologies in Practice ent://SD_ILS/0/SD_ILS:78252 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bj&oslash;rn, Pernille. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12607-4">http://dx.doi.org/10.1007/978-3-319-12607-4</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing Challenges, Limitations and R&amp;D Solutions ent://SD_ILS/0/SD_ILS:77602 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mahmood, Zaigham. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10530-7">http://dx.doi.org/10.1007/978-3-319-10530-7</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security and Privacy First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81239 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Camp, Olivier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27668-7">http://dx.doi.org/10.1007/978-3-319-27668-7</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 9th International Conference, ENASE 2014, Lisbon, Portugal, April 28-30, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81218 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27218-4">http://dx.doi.org/10.1007/978-3-319-27218-4</a><br/>Format:&#160;Electronic Resources<br/> Health Informatics in the Cloud ent://SD_ILS/0/SD_ILS:71840 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Braunstein, Mark L. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5629-2">http://dx.doi.org/10.1007/978-1-4614-5629-2</a><br/>Format:&#160;Electronic Resources<br/> Facebook Nation Total Information Awareness ent://SD_ILS/0/SD_ILS:71749 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-5308-6">http://dx.doi.org/10.1007/978-1-4614-5308-6</a><br/>Format:&#160;Electronic Resources<br/> Theory and Practice of Model Transformations 8th International Conference, ICMT 2015, Held as Part of STAF 2015, L'Aquila, Italy, July 20-21, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80544 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kolovos, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21155-8">http://dx.doi.org/10.1007/978-3-319-21155-8</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy, Security, Privacy and Trust in a Digital World 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77979 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sideridis, Alexander B. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11710-2">http://dx.doi.org/10.1007/978-3-319-11710-2</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Data Quality Research and Practice ent://SD_ILS/0/SD_ILS:82567 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sadiq, Shazia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36257-6">http://dx.doi.org/10.1007/978-3-642-36257-6</a><br/>Format:&#160;Electronic Resources<br/> Open Source Systems: Adoption and Impact 11th IFIP WG 2.13 International Conference, OSS 2015, Florence, Italy, May 16-17, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79780 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17837-0">http://dx.doi.org/10.1007/978-3-319-17837-0</a><br/>Format:&#160;Electronic Resources<br/> Agile Risk Management ent://SD_ILS/0/SD_ILS:75851 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Moran, Alan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-05008-9">http://dx.doi.org/10.1007/978-3-319-05008-9</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82997 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;J&oslash;sang, Audun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38004-4">http://dx.doi.org/10.1007/978-3-642-38004-4</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85532 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cid, Carlos. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46706-0">http://dx.doi.org/10.1007/978-3-662-46706-0</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXIII 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81141 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26096-9">http://dx.doi.org/10.1007/978-3-319-26096-9</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81188 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Reiter, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26823-1">http://dx.doi.org/10.1007/978-3-319-26823-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83872 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Gierlichs, Benedikt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41224-0">http://dx.doi.org/10.1007/978-3-642-41224-0</a><br/>Format:&#160;Electronic Resources<br/> E-Democracy &ndash; Citizen Rights in the World of the New Computing Paradigms 6th International Conference, E-Democracy 2015, Athens, Greece, December 10-11, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81212 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Katsikas, Sokratis K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27164-4">http://dx.doi.org/10.1007/978-3-319-27164-4</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Modeling Tackling Business Challenges with the 4EM Method ent://SD_ILS/0/SD_ILS:84963 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sandkuhl, Kurt. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43725-4">http://dx.doi.org/10.1007/978-3-662-43725-4</a><br/>Format:&#160;Electronic Resources<br/> Counterterrorism and Cybersecurity Total Information Awareness ent://SD_ILS/0/SD_ILS:72306 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lee, Newton. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4614-7205-6">http://dx.doi.org/10.1007/978-1-4614-7205-6</a><br/>Format:&#160;Electronic Resources<br/> Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lectures ent://SD_ILS/0/SD_ILS:77460 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling: Theory and Practice 7th International Workshop, SAM 2012, Innsbruck, Austria, October 1-2, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:82711 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Haugen, &Oslash;ystein. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36757-1">http://dx.doi.org/10.1007/978-3-642-36757-1</a><br/>Format:&#160;Electronic Resources<br/> Intelligent Mechanisms for Network Configuration and Security 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80334 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Latr&eacute;, Steven. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20034-7">http://dx.doi.org/10.1007/978-3-319-20034-7</a><br/>Format:&#160;Electronic Resources<br/> Theory and Practice of Model Transformations 6th International Conference, ICMT 2013, Budapest, Hungary, June 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83241 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Duddy, Keith. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38883-5">http://dx.doi.org/10.1007/978-3-642-38883-5</a><br/>Format:&#160;Electronic Resources<br/> Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:78988 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Rhee, Kyung-Hyune. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15087-1">http://dx.doi.org/10.1007/978-3-319-15087-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78091 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12060-7">http://dx.doi.org/10.1007/978-3-319-12060-7</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Services Sciences International Conference in Cloud Computing and Services Sciences, CLOSER 2014 Barcelona Spain, April 3&ndash;5, 2014 Revised Selected Papers ent://SD_ILS/0/SD_ILS:81073 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Helfert, Markus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25414-2">http://dx.doi.org/10.1007/978-3-319-25414-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80317 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Foo, Ernest. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19962-7">http://dx.doi.org/10.1007/978-3-319-19962-7</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85670 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Leander, Gregor. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48116-5">http://dx.doi.org/10.1007/978-3-662-48116-5</a><br/>Format:&#160;Electronic Resources<br/> Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80848 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement and Capability Determination 15th International Conference, SPICE 2015, Gothenburg, Sweden, June 16-17, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80293 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Rout, Terry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19860-6">http://dx.doi.org/10.1007/978-3-319-19860-6</a><br/>Format:&#160;Electronic Resources<br/> Fast Software Encryption 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:85014 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Moriai, Shiho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43933-3">http://dx.doi.org/10.1007/978-3-662-43933-3</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement and Capability Determination 14th International Conference, SPICE 2014, Vilnius, Lithuania, November 4-6, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78388 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mitasiunas, Antanas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13036-1">http://dx.doi.org/10.1007/978-3-319-13036-1</a><br/>Format:&#160;Electronic Resources<br/> Model and Data Engineering 5th International Conference, MEDI 2015, Rhodes, Greece, September 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80900 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bellatreche, Ladjel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23781-7">http://dx.doi.org/10.1007/978-3-319-23781-7</a><br/>Format:&#160;Electronic Resources<br/> Software Process Improvement and Capability Determination 13th International Conference, SPICE 2013, Bremen, Germany, June 4-6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83225 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Woronowicz, Tanja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38833-0">http://dx.doi.org/10.1007/978-3-642-38833-0</a><br/>Format:&#160;Electronic Resources<br/> Theory and Practice of Model Transformations 7th International Conference, ICMT 2014, Held as Part of STAF 2014, York, UK, July 21-22, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77049 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Ruscio, Davide Di. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08789-4">http://dx.doi.org/10.1007/978-3-319-08789-4</a><br/>Format:&#160;Electronic Resources<br/> Risk Assessment and Risk-Driven Testing Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81161 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Seehusen, Fredrik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26416-5">http://dx.doi.org/10.1007/978-3-319-26416-5</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 15th International Conference, NEW2AN 2015, and 8th Conference, ruSMART 2015, St. Petersburg, Russia, August 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80823 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23126-6">http://dx.doi.org/10.1007/978-3-319-23126-6</a><br/>Format:&#160;Electronic Resources<br/> Service Systems Concepts, Modeling, and Programming ent://SD_ILS/0/SD_ILS:77694 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cardoso, Jorge. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10813-1">http://dx.doi.org/10.1007/978-3-319-10813-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:77537 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10329-7">http://dx.doi.org/10.1007/978-3-319-10329-7</a><br/>Format:&#160;Electronic Resources<br/> Smart Grid Security First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83003 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cuellar, Jorge. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38030-3">http://dx.doi.org/10.1007/978-3-642-38030-3</a><br/>Format:&#160;Electronic Resources<br/> Software Business 6th International Conference, ICSOB 2015, Braga, Portugal, June 10-12, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80232 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fernandes, Jo&atilde;o M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19593-3">http://dx.doi.org/10.1007/978-3-319-19593-3</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management for Society 10th IFIP WG 5.1 International Conference, PLM 2013, Nantes, France, July 6-10, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83939 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bernard, Alain. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41501-2">http://dx.doi.org/10.1007/978-3-642-41501-2</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networking 13th International Conference, NEW2AN 2013 and 6th Conference, ruSMART 2013, St. Petersburg, Russia, August 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83638 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40316-3">http://dx.doi.org/10.1007/978-3-642-40316-3</a><br/>Format:&#160;Electronic Resources<br/> Technology Integration to Business Focusing on RFID, Interoperability, and Sustainability for Manufacturing, Logistics, and Supply Chain Management ent://SD_ILS/0/SD_ILS:70623 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Yee, John T. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4390-1">http://dx.doi.org/10.1007/978-1-4471-4390-1</a><br/>Format:&#160;Electronic Resources<br/> Information Systems and Neuroscience Gmunden Retreat on NeuroIS 2015 ent://SD_ILS/0/SD_ILS:80006 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Davis, Fred D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18702-0">http://dx.doi.org/10.1007/978-3-319-18702-0</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78023 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mauw, Sjouke. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11851-2">http://dx.doi.org/10.1007/978-3-319-11851-2</a><br/>Format:&#160;Electronic Resources<br/> SAP on the Cloud ent://SD_ILS/0/SD_ILS:81747 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Missbach, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-31211-3">http://dx.doi.org/10.1007/978-3-642-31211-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy in a Digital, Networked World Technologies, Implications and Solutions ent://SD_ILS/0/SD_ILS:76946 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Zeadally, Sherali. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08470-1">http://dx.doi.org/10.1007/978-3-319-08470-1</a><br/>Format:&#160;Electronic Resources<br/> Innovation from Information Systems An Ambidexterity Approach ent://SD_ILS/0/SD_ILS:81984 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dupouet, Olivier. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-32876-3">http://dx.doi.org/10.1007/978-3-642-32876-3</a><br/>Format:&#160;Electronic Resources<br/> Trust Management in Cloud Services ent://SD_ILS/0/SD_ILS:78150 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Noor, Talal H. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12250-2">http://dx.doi.org/10.1007/978-3-319-12250-2</a><br/>Format:&#160;Electronic Resources<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:70667 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4543-1">http://dx.doi.org/10.1007/978-1-4471-4543-1</a><br/>Format:&#160;Electronic Resources<br/> Agile Project Management: Managing for Success ent://SD_ILS/0/SD_ILS:77121 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Crowder, James A. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09018-4">http://dx.doi.org/10.1007/978-3-319-09018-4</a><br/>Format:&#160;Electronic Resources<br/> The Road to a Modern IT Factory Industrialization &ndash; Automation &ndash; Optimization ent://SD_ILS/0/SD_ILS:83609 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Abolhassan, Ferri. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40219-7">http://dx.doi.org/10.1007/978-3-642-40219-7</a><br/>Format:&#160;Electronic Resources<br/> Business Models in the Software Industry The Impact on Firm and M&amp;A Performance ent://SD_ILS/0/SD_ILS:84648 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Schief, Markus. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-04352-0">http://dx.doi.org/10.1007/978-3-658-04352-0</a><br/>Format:&#160;Electronic Resources<br/> Guide to Computer Network Security ent://SD_ILS/0/SD_ILS:71140 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kizza, Joseph Migga. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6654-2">http://dx.doi.org/10.1007/978-1-4471-6654-2</a><br/>Format:&#160;Electronic Resources<br/> Internet of Things, Smart Spaces, and Next Generation Networks and Systems 14th International Conference, NEW2AN 2014 and 7th Conference, ruSMART 2014, St. Petersburg, Russia, August 27-29, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77545 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Balandin, Sergey. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10353-2">http://dx.doi.org/10.1007/978-3-319-10353-2</a><br/>Format:&#160;Electronic Resources<br/> FM 2015: Formal Methods 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80154 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bj&oslash;rner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19249-9">http://dx.doi.org/10.1007/978-3-319-19249-9</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the Seventh International Conference on Management Science and Engineering Management Focused on Electrical and Information Technology Volume I ent://SD_ILS/0/SD_ILS:83569 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Xu, Jiuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40078-0">http://dx.doi.org/10.1007/978-3-642-40078-0</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the Seventh International Conference on Management Science and Engineering Management Focused on Electrical and Information Technology Volume II ent://SD_ILS/0/SD_ILS:83570 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Xu, Jiuping. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40081-0">http://dx.doi.org/10.1007/978-3-642-40081-0</a><br/>Format:&#160;Electronic Resources<br/> S-BPM Illustrated A Storybook about Business Process Modeling and Execution ent://SD_ILS/0/SD_ILS:82754 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fleischmann, Albert. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36904-9">http://dx.doi.org/10.1007/978-3-642-36904-9</a><br/>Format:&#160;Electronic Resources<br/> Privacy and Security for Cloud Computing ent://SD_ILS/0/SD_ILS:70573 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Pearson, Siani. editor.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-4189-1">http://dx.doi.org/10.1007/978-1-4471-4189-1</a><br/>Format:&#160;Electronic Resources<br/> S-BPM ONE - Application Studies and Work in Progress 6th International Conference, S-BPM ONE 2014, Eichst&auml;tt, Germany, April 22-23, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76220 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Zehbold, Cornelia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06191-7">http://dx.doi.org/10.1007/978-3-319-06191-7</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing Third European Conference, ESOCC 2014, Manchester, UK, September 2-4, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85214 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Villari, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44879-3">http://dx.doi.org/10.1007/978-3-662-44879-3</a><br/>Format:&#160;Electronic Resources<br/> Smart Information Systems Computational Intelligence for Real-Life Applications ent://SD_ILS/0/SD_ILS:78732 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Hopfgartner, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14178-7">http://dx.doi.org/10.1007/978-3-319-14178-7</a><br/>Format:&#160;Electronic Resources<br/> The Use of Smart Mobile Equipment for the Innovation in Organizational Coordination ent://SD_ILS/0/SD_ILS:81699 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cho, Namjae. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-30847-5">http://dx.doi.org/10.1007/978-3-642-30847-5</a><br/>Format:&#160;Electronic Resources<br/> User-Centred Engineering Creating Products for Humans ent://SD_ILS/0/SD_ILS:85024 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Richter, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43989-0">http://dx.doi.org/10.1007/978-3-662-43989-0</a><br/>Format:&#160;Electronic Resources<br/> Measurement Methodology and Tools First European Workshop, FP7 FIRE/EULER Project, Aalborg, Denmark, May 9, 2012, Revised and Extended Papers ent://SD_ILS/0/SD_ILS:83889 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;F&agrave;brega, Llu&iacute;s. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41296-7">http://dx.doi.org/10.1007/978-3-642-41296-7</a><br/>Format:&#160;Electronic Resources<br/> Requirements Engineering: Foundation for Software Quality 21st International Working Conference, REFSQ 2015, Essen, Germany, March 23-26, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79290 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fricker, Samuel A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16101-3">http://dx.doi.org/10.1007/978-3-319-16101-3</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology - EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85546 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46803-6">http://dx.doi.org/10.1007/978-3-662-46803-6</a><br/>Format:&#160;Electronic Resources<br/> Risks and Resilience of Collaborative Networks 16th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2015, Albi, France,, October 5-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80938 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24141-8">http://dx.doi.org/10.1007/978-3-319-24141-8</a><br/>Format:&#160;Electronic Resources<br/> Service Oriented and Cloud Computing 4th European Conference, ESOCC 2015, Taormina, Italy, September 15-17, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80929 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dustdar, Schahram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24072-5">http://dx.doi.org/10.1007/978-3-319-24072-5</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 7th International Conference, ENASE 2012, Warsaw, Poland, June 29-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84154 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45422-6">http://dx.doi.org/10.1007/978-3-642-45422-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- EUROCRYPT 2015 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85545 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Oswald, Elisabeth. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46800-5">http://dx.doi.org/10.1007/978-3-662-46800-5</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XXII 22nd International Workshop, Cambridge, UK, March 19-21, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78190 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12400-1">http://dx.doi.org/10.1007/978-3-319-12400-1</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXIX 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80487 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Samarati, Pierangela. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-20810-7">http://dx.doi.org/10.1007/978-3-319-20810-7</a><br/>Format:&#160;Electronic Resources<br/> Data and Applications Security and Privacy XXVIII 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85015 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Atluri, Vijay. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-43936-4">http://dx.doi.org/10.1007/978-3-662-43936-4</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77963 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mosca, Michele. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11659-4">http://dx.doi.org/10.1007/978-3-319-11659-4</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Network 12th International Conference, ADHOC-NOW 2013, Wrocław, Poland, July 8-10, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83345 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cichoń, Jacek. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39247-4">http://dx.doi.org/10.1007/978-3-642-39247-4</a><br/>Format:&#160;Electronic Resources<br/> Open Source Software: Quality Verification 9th IFIP WG 2.13 International Conference, OSS 2013, Koper-Capodistria, Slovenia, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83254 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Petrinja, Etiel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38928-3">http://dx.doi.org/10.1007/978-3-642-38928-3</a><br/>Format:&#160;Electronic Resources<br/> ICT Systems Security and Privacy Protection 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79943 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Federrath, Hannes. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18467-8">http://dx.doi.org/10.1007/978-3-319-18467-8</a><br/>Format:&#160;Electronic Resources<br/> Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76261 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Huang, Xinyi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06320-1">http://dx.doi.org/10.1007/978-3-319-06320-1</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83840 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Accorsi, Rafael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41098-7">http://dx.doi.org/10.1007/978-3-642-41098-7</a><br/>Format:&#160;Electronic Resources<br/> QoS Management of Web Services ent://SD_ILS/0/SD_ILS:82184 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Zheng, Zibin. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34207-3">http://dx.doi.org/10.1007/978-3-642-34207-3</a><br/>Format:&#160;Electronic Resources<br/> Information Computing and Applications 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013 Revised Selected Papers, Part II ent://SD_ILS/0/SD_ILS:84161 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Yang, Yuhang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53703-5">http://dx.doi.org/10.1007/978-3-642-53703-5</a><br/>Format:&#160;Electronic Resources<br/> Information Computing and Applications 4th International Conference, ICICA 2013, Singapore, August 16-18, 2013, Revised Selected Papers, Part I ent://SD_ILS/0/SD_ILS:84192 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Yang, Yuhang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53932-9">http://dx.doi.org/10.1007/978-3-642-53932-9</a><br/>Format:&#160;Electronic Resources<br/> Internet of Vehicles &ndash; Technologies and Services First International Conference, IOV, Beijing, China, September 1-3, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77805 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Hsu, Robert C.-H. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11167-4">http://dx.doi.org/10.1007/978-3-319-11167-4</a><br/>Format:&#160;Electronic Resources<br/> Economics of Grids, Clouds, Systems, and Services 11th International Conference, GECON 2014, Cardiff, UK, September 16-18, 2014. Revised Selected Papers. ent://SD_ILS/0/SD_ILS:78854 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Altmann, J&ouml;rn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14609-6">http://dx.doi.org/10.1007/978-3-319-14609-6</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc Networks and Wireless ADHOC-NOW 2014 International Workshops, ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN, Benidorm, Spain, June 22--27, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85459 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Garcia Pineda, Miguel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46338-3">http://dx.doi.org/10.1007/978-3-662-46338-3</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76958 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08506-7">http://dx.doi.org/10.1007/978-3-319-08506-7</a><br/>Format:&#160;Electronic Resources<br/> Big Data and Analytics Strategic and Organizational Impacts ent://SD_ILS/0/SD_ILS:77646 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Morabito, Vincenzo. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10665-6">http://dx.doi.org/10.1007/978-3-319-10665-6</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85551 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Zhang, Shiyong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46826-5">http://dx.doi.org/10.1007/978-3-662-46826-5</a><br/>Format:&#160;Electronic Resources<br/> System Analysis and Modeling: Models and Reusability 8th International Conference, SAM 2014, Valencia, Spain, September 29-30, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77990 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Amyot, Daniel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11743-0">http://dx.doi.org/10.1007/978-3-319-11743-0</a><br/>Format:&#160;Electronic Resources<br/> SOA Maturity Model A Delphi-Derived Proposal for Inter-Enterprise Setups ent://SD_ILS/0/SD_ILS:75105 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Antoniades, Pericles. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02453-0">http://dx.doi.org/10.1007/978-3-319-02453-0</a><br/>Format:&#160;Electronic Resources<br/> Managing Open Innovation Technologies ent://SD_ILS/0/SD_ILS:81807 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Eriksson Lundstr&ouml;m, Jenny S. Z. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-31650-0">http://dx.doi.org/10.1007/978-3-642-31650-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:81178 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format:&#160;Electronic Resources<br/> Practitioner's Knowledge Representation A Pathway to Improve Software Effort Estimation ent://SD_ILS/0/SD_ILS:84243 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mendes, Emilia. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54157-5">http://dx.doi.org/10.1007/978-3-642-54157-5</a><br/>Format:&#160;Electronic Resources<br/> Introduction to Software Quality ent://SD_ILS/0/SD_ILS:76192 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;O&rsquo;Regan, Gerard. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06106-1">http://dx.doi.org/10.1007/978-3-319-06106-1</a><br/>Format:&#160;Electronic Resources<br/> Fourth Generation Mobile Communication The Path to Superfast Connectivity ent://SD_ILS/0/SD_ILS:75044 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Curwen, Peter. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02210-9">http://dx.doi.org/10.1007/978-3-319-02210-9</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 10th European Conference, ECMFA 2014, Held as Part of STAF 2014, York, UK, July 21-25, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77176 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cabot, Jordi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-09195-2">http://dx.doi.org/10.1007/978-3-319-09195-2</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Internet Technologies Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84195 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Su, Jinshu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-53959-6">http://dx.doi.org/10.1007/978-3-642-53959-6</a><br/>Format:&#160;Electronic Resources<br/> Practical Biometrics From Aspiration to Implementation ent://SD_ILS/0/SD_ILS:71158 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Ashbourn, Julian. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4471-6717-4">http://dx.doi.org/10.1007/978-1-4471-6717-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems and Global Assemblages. (Re)Configuring Actors, Artefacts, Organizations IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&amp;O 2014, Auckland, New Zealand, December 11-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85371 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Doolin, Bill. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45708-5">http://dx.doi.org/10.1007/978-3-662-45708-5</a><br/>Format:&#160;Electronic Resources<br/> Traffic Monitoring and Analysis 6th International Workshop, TMA 2014, London, UK, April 14, 2014. Proceedings ent://SD_ILS/0/SD_ILS:84436 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dainotti, Alberto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-54999-1">http://dx.doi.org/10.1007/978-3-642-54999-1</a><br/>Format:&#160;Electronic Resources<br/> Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80935 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Chakraborty, Rajat Subhra. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24126-5">http://dx.doi.org/10.1007/978-3-319-24126-5</a><br/>Format:&#160;Electronic Resources<br/> Security and Trust Management 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81013 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Foresti, Sara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24858-5">http://dx.doi.org/10.1007/978-3-319-24858-5</a><br/>Format:&#160;Electronic Resources<br/> Design Thinking Research Building Innovators ent://SD_ILS/0/SD_ILS:76422 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Plattner, Hasso. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06823-7">http://dx.doi.org/10.1007/978-3-319-06823-7</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 11th International Conference, ICSOC 2013, Berlin, Germany, December 2-5, 2013, Proceedings ent://SD_ILS/0/SD_ILS:84044 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Basu, Samik. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45005-1">http://dx.doi.org/10.1007/978-3-642-45005-1</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80785 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format:&#160;Electronic Resources<br/> Information Systems Security 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81196 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jajodia, Sushil. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26961-0">http://dx.doi.org/10.1007/978-3-319-26961-0</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:80941 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24174-6">http://dx.doi.org/10.1007/978-3-319-24174-6</a><br/>Format:&#160;Electronic Resources<br/> Computer Security -- ESORICS 2015 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:80942 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Pernul, G&uuml;nther. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24177-7">http://dx.doi.org/10.1007/978-3-319-24177-7</a><br/>Format:&#160;Electronic Resources<br/> Cryptology and Network Security 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78158 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Gritzalis, Dimitris. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12280-9">http://dx.doi.org/10.1007/978-3-319-12280-9</a><br/>Format:&#160;Electronic Resources<br/> Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 &ndash; July 2, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76985 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Databases and Information Systems 17th East European Conference, ADBIS 2013, Genoa, Italy, September 1-4, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83734 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Catania, Barbara. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40683-6">http://dx.doi.org/10.1007/978-3-642-40683-6</a><br/>Format:&#160;Electronic Resources<br/> Asset Management for Infrastructure Systems Energy and Water ent://SD_ILS/0/SD_ILS:79792 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Balzer, Gerd. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17879-0">http://dx.doi.org/10.1007/978-3-319-17879-0</a><br/>Format:&#160;Electronic Resources<br/> Proceedings of the 5th International Asia Conference on Industrial Engineering and Management Innovation (IEMI2014) ent://SD_ILS/0/SD_ILS:88864 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Qi, Ershi. editor.<br/><a href="http://dx.doi.org/10.2991/978-94-6239-100-0">http://dx.doi.org/10.2991/978-94-6239-100-0</a><br/>Format:&#160;Electronic Resources<br/> Investing in Information The Information Management Body of Knowledge ent://SD_ILS/0/SD_ILS:78042 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bytheway, Andy. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11909-0">http://dx.doi.org/10.1007/978-3-319-11909-0</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85301 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format:&#160;Electronic Resources<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:84125 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/> Network and System Security 9th International Conference, NSS 2015, New York, NY, USA, November 3-5, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81101 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Qiu, Meikang. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25645-0">http://dx.doi.org/10.1007/978-3-319-25645-0</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering Second International Conference, FDSE 2015, Ho Chi Minh City, Vietnam, November 23-25, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81144 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26135-5">http://dx.doi.org/10.1007/978-3-319-26135-5</a><br/>Format:&#160;Electronic Resources<br/> Research in Attacks, Intrusions, and Defenses 18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings ent://SD_ILS/0/SD_ILS:81157 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bos, Herbert. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26362-5">http://dx.doi.org/10.1007/978-3-319-26362-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 13th International Conference, ICSOC 2015, Goa, India, November 16-19, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85699 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Barros, Alistair. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48616-0">http://dx.doi.org/10.1007/978-3-662-48616-0</a><br/>Format:&#160;Electronic Resources<br/> SDL 2015: Model-Driven Engineering for Smart Cities 17th International SDL Forum, Berlin, Germany, October 12-14, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81019 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fischer, Joachim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24912-4">http://dx.doi.org/10.1007/978-3-319-24912-4</a><br/>Format:&#160;Electronic Resources<br/> Energy-Efficient Data Centers Second International Workshop, E&sup2;DC 2013, Berkeley, CA, USA, May 21, 2013. Revised Selected Papers ent://SD_ILS/0/SD_ILS:84474 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55149-9">http://dx.doi.org/10.1007/978-3-642-55149-9</a><br/>Format:&#160;Electronic Resources<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83341 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Rieck, Konrad. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39235-1">http://dx.doi.org/10.1007/978-3-642-39235-1</a><br/>Format:&#160;Electronic Resources<br/> Product Lifecycle Management for a Global Market 11th IFIP WG 5.1 International Conference, PLM 2014, Yokohama, Japan, July 7-9, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85409 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fukuda, Shuichi. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45937-9">http://dx.doi.org/10.1007/978-3-662-45937-9</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 9th International Doctoral Workshop, MEMICS 2014, Telč, Czech Republic, October 17--19, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:78932 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Hliněn&yacute;, Petr. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14896-0">http://dx.doi.org/10.1007/978-3-319-14896-0</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 13th International Conference, ADHOC-NOW 2014, Benidorm, Spain, June 22-27, 2014 Proceedings ent://SD_ILS/0/SD_ILS:76612 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Guo, Song. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07425-2">http://dx.doi.org/10.1007/978-3-319-07425-2</a><br/>Format:&#160;Electronic Resources<br/> Post-Quantum Cryptography 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83161 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Gaborit, Philippe. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38616-9">http://dx.doi.org/10.1007/978-3-642-38616-9</a><br/>Format:&#160;Electronic Resources<br/> Mathematical and Engineering Methods in Computer Science 8th International Doctoral Workshop, MEMICS 2012, Znojmo, Czech Republic, October 25-28, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82512 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kučera, Anton&iacute;n. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36046-6">http://dx.doi.org/10.1007/978-3-642-36046-6</a><br/>Format:&#160;Electronic Resources<br/> Green in Software Engineering ent://SD_ILS/0/SD_ILS:76981 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Calero, Coral. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08581-4">http://dx.doi.org/10.1007/978-3-319-08581-4</a><br/>Format:&#160;Electronic Resources<br/> Managing Requirements Knowledge ent://SD_ILS/0/SD_ILS:82217 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Maalej, Walid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-34419-0">http://dx.doi.org/10.1007/978-3-642-34419-0</a><br/>Format:&#160;Electronic Resources<br/> Risks and Security of Internet and Systems 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79579 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lopez, Javier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17127-2">http://dx.doi.org/10.1007/978-3-319-17127-2</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 8th International Workshop, MACOM 2015, Helsinki, Finland, September 3-4, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80862 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23440-3">http://dx.doi.org/10.1007/978-3-319-23440-3</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering International Summer Schools, ISSSE 2009-2011, Salerno, Italy. Revised Tutorial Lectures ent://SD_ILS/0/SD_ILS:82515 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lucia, Andrea De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36054-1">http://dx.doi.org/10.1007/978-3-642-36054-1</a><br/>Format:&#160;Electronic Resources<br/> Computer Security &ndash; ESORICS 2013 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83605 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Crampton, Jason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40203-6">http://dx.doi.org/10.1007/978-3-642-40203-6</a><br/>Format:&#160;Electronic Resources<br/> Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambridge, UK, June 10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79193 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Klingert, Sonja. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15786-3">http://dx.doi.org/10.1007/978-3-319-15786-3</a><br/>Format:&#160;Electronic Resources<br/> Provable Security 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81139 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Au, Man-Ho. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26059-4">http://dx.doi.org/10.1007/978-3-319-26059-4</a><br/>Format:&#160;Electronic Resources<br/> Knowledge-Based Software Engineering 11th Joint Conference, JCKBSE 2014, Volgograd, Russia, September 17-20, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78024 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kravets, Alla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11854-3">http://dx.doi.org/10.1007/978-3-319-11854-3</a><br/>Format:&#160;Electronic Resources<br/> Cryptographic Hardware and Embedded Systems -- CHES 2015 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85684 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;G&uuml;neysu, Tim. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48324-4">http://dx.doi.org/10.1007/978-3-662-48324-4</a><br/>Format:&#160;Electronic Resources<br/> Grand Societal Challenges in Information Systems Research and Education Ideas from the ERCIS Virtual Seminar Series ent://SD_ILS/0/SD_ILS:78970 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;vom Brocke, Jan. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15027-7">http://dx.doi.org/10.1007/978-3-319-15027-7</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communcations 6th International Workshop, MACOM 2013, Vilnius, Lithuania, December 16-17, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75492 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-03871-1">http://dx.doi.org/10.1007/978-3-319-03871-1</a><br/>Format:&#160;Electronic Resources<br/> Formal Methods: Foundations and Applications 17th Brazilian Symposium, SBMF 2014, Macei&oacute;, AL, Brazil, September 29--October 1, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78985 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Braga, Christiano. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-15075-8">http://dx.doi.org/10.1007/978-3-319-15075-8</a><br/>Format:&#160;Electronic Resources<br/> Information Systems for Small and Medium-sized Enterprises State of Art of IS Research in SMEs ent://SD_ILS/0/SD_ILS:83059 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Devos, Jan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38244-4">http://dx.doi.org/10.1007/978-3-642-38244-4</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented and Cloud Computing Second European Conference, ESOCC 2013, M&aacute;laga, Spain, September 11-13, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83724 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lau, Kung-Kiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40651-5">http://dx.doi.org/10.1007/978-3-642-40651-5</a><br/>Format:&#160;Electronic Resources<br/> Service-Oriented Computing 12th International Conference, ICSOC 2014, Paris, France, November 3-6, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85308 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Franch, Xavier. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45391-9">http://dx.doi.org/10.1007/978-3-662-45391-9</a><br/>Format:&#160;Electronic Resources<br/> The Google Model Managing Continuous Innovation in a Rapidly Changing World ent://SD_ILS/0/SD_ILS:75598 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Steiber, Annika. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04208-4">http://dx.doi.org/10.1007/978-3-319-04208-4</a><br/>Format:&#160;Electronic Resources<br/> Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013, Barcelona, Spain, June 25-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83272 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Doyen, Guillaume. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38998-6">http://dx.doi.org/10.1007/978-3-642-38998-6</a><br/>Format:&#160;Electronic Resources<br/> Financial Cryptography and Data Security FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85665 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Brenner, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48051-9">http://dx.doi.org/10.1007/978-3-662-48051-9</a><br/>Format:&#160;Electronic Resources<br/> FM 2014: Formal Methods 19th International Symposium, Singapore, May 12-16, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76289 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jones, Cliff. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06410-9">http://dx.doi.org/10.1007/978-3-319-06410-9</a><br/>Format:&#160;Electronic Resources<br/> Accountability and Security in the Cloud First Summer School, Cloud Accountability Project, A4Cloud, Malaga, Spain, June 2-6, 2014, Revised Selected Papers and Lectures ent://SD_ILS/0/SD_ILS:79600 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Felici, Massimo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17199-9">http://dx.doi.org/10.1007/978-3-319-17199-9</a><br/>Format:&#160;Electronic Resources<br/> Wireless Algorithms, Systems, and Applications 9th International Conference, WASA 2014, Harbin, China, June 23-25, 2014. Proceedings ent://SD_ILS/0/SD_ILS:76727 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cai, Zhipeng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07782-6">http://dx.doi.org/10.1007/978-3-319-07782-6</a><br/>Format:&#160;Electronic Resources<br/> Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82735 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Basin, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36830-1">http://dx.doi.org/10.1007/978-3-642-36830-1</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81084 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format:&#160;Electronic Resources<br/> Stabilization, Safety, and Security of Distributed Systems 17th International Symposium, SSS 2015, Edmonton, AB, Canada, August 18-21, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80631 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Pelc, Andrzej. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-21741-3">http://dx.doi.org/10.1007/978-3-319-21741-3</a><br/>Format:&#160;Electronic Resources<br/> Industrial Engineering, Management Science and Applications 2015 ent://SD_ILS/0/SD_ILS:85594 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Gen, Mitsuo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-47200-2">http://dx.doi.org/10.1007/978-3-662-47200-2</a><br/>Format:&#160;Electronic Resources<br/> Pattern and Security Requirements Engineering-Based Establishment of Security Standards ent://SD_ILS/0/SD_ILS:79454 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XIX Special Issue on Big Data and Open Data ent://SD_ILS/0/SD_ILS:85503 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46562-2">http://dx.doi.org/10.1007/978-3-662-46562-2</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Identity Management Towards an Investment Decision Support Approach ent://SD_ILS/0/SD_ILS:82302 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Royer, Denis. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-35040-5">http://dx.doi.org/10.1007/978-3-642-35040-5</a><br/>Format:&#160;Electronic Resources<br/> Ad-hoc, Mobile, and Wireless Networks 14th International Conference, ADHOC-NOW 2015, Athens, Greece, June 29 -- July 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:80246 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Papavassiliou, Symeon. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19662-6">http://dx.doi.org/10.1007/978-3-319-19662-6</a><br/>Format:&#160;Electronic Resources<br/> Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings ent://SD_ILS/0/SD_ILS:79953 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bishop, Matt. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18500-2">http://dx.doi.org/10.1007/978-3-319-18500-2</a><br/>Format:&#160;Electronic Resources<br/> Information Hiding 14th International Conference, IH 2012, Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82600 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Kirchner, Matthias. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36373-3">http://dx.doi.org/10.1007/978-3-642-36373-3</a><br/>Format:&#160;Electronic Resources<br/> Policies and Research in Identity Management Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013. Proceedings ent://SD_ILS/0/SD_ILS:82848 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fischer-H&uuml;bner, Simone. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37282-7">http://dx.doi.org/10.1007/978-3-642-37282-7</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings ent://SD_ILS/0/SD_ILS:85216 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-44885-4">http://dx.doi.org/10.1007/978-3-662-44885-4</a><br/>Format:&#160;Electronic Resources<br/> Multiple Access Communications 7th International Workshop, MACOM 2014, Halmstad, Sweden, August 27-28, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77515 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jonsson, Magnus. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10262-7">http://dx.doi.org/10.1007/978-3-319-10262-7</a><br/>Format:&#160;Electronic Resources<br/> Enterprise Systems. Strategic, Organizational, and Technological Dimensions International Workshops, Pre-ICIS 2010, St. Louis, MO, USA, December 12, 2010, Pre-ICIS 2011, Shanghai, China, December 4, 2011, and Pre-ICIS 2012, Orlando, FL, USA, December 16, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:79714 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Sedera, Darshana. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17587-4">http://dx.doi.org/10.1007/978-3-319-17587-4</a><br/>Format:&#160;Electronic Resources<br/> Traffic Monitoring and Analysis 7th International Workshop, TMA 2015, Barcelona, Spain, April 21-24, 2015. Proceedings ent://SD_ILS/0/SD_ILS:79592 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Steiner, Moritz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17172-2">http://dx.doi.org/10.1007/978-3-319-17172-2</a><br/>Format:&#160;Electronic Resources<br/> Software Engineering International Summer Schools, LASER 2013-2014, Elba, Italy, Revised Tutorial Lectures ent://SD_ILS/0/SD_ILS:81266 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Meyer, Bertrand. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28406-4">http://dx.doi.org/10.1007/978-3-319-28406-4</a><br/>Format:&#160;Electronic Resources<br/> Communications and Multimedia Security 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25-26, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83757 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Decker, Bart De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40779-6">http://dx.doi.org/10.1007/978-3-642-40779-6</a><br/>Format:&#160;Electronic Resources<br/> Practice-Driven Research on Enterprise Transformation 6th Working Conference, PRET 2013, Utrecht, The Netherlands, June 6, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83208 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Harmsen, Frank. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38774-6">http://dx.doi.org/10.1007/978-3-642-38774-6</a><br/>Format:&#160;Electronic Resources<br/> Provenance and Annotation of Data and Processes 5th International Provenance and Annotation Workshop, IPAW 2014, Cologne, Germany, June 9-13, 2014. Revised Selected Papers ent://SD_ILS/0/SD_ILS:79394 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Lud&auml;scher, Bertram. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16462-5">http://dx.doi.org/10.1007/978-3-319-16462-5</a><br/>Format:&#160;Electronic Resources<br/> Transactions on Large-Scale Data- and Knowledge-Centered Systems XX Special Issue on Advanced Techniques for Big Data Management ent://SD_ILS/0/SD_ILS:85531 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Hameurlain, Abdelkader. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46703-9">http://dx.doi.org/10.1007/978-3-662-46703-9</a><br/>Format:&#160;Electronic Resources<br/> Future Data and Security Engineering First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings ent://SD_ILS/0/SD_ILS:78307 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dang, Tran Khanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-12778-1">http://dx.doi.org/10.1007/978-3-319-12778-1</a><br/>Format:&#160;Electronic Resources<br/> Security Protocols XVIII 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers ent://SD_ILS/0/SD_ILS:85404 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Christianson, Bruce. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45921-8">http://dx.doi.org/10.1007/978-3-662-45921-8</a><br/>Format:&#160;Electronic Resources<br/> Cloud Computing and Security First International Conference, ICCCS 2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81201 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Huang, Zhiqiu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27051-7">http://dx.doi.org/10.1007/978-3-319-27051-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Communication Networking 19th EUNICE/IFIP WG 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83699 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Bauschert, Thomas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40552-5">http://dx.doi.org/10.1007/978-3-642-40552-5</a><br/>Format:&#160;Electronic Resources<br/> Service Research and Innovation Third Australian Symposium, ASSRI 2013, Sydney, NSW, Australia, November 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:76783 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Davis, Joseph G. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07950-9">http://dx.doi.org/10.1007/978-3-319-07950-9</a><br/>Format:&#160;Electronic Resources<br/> Algorithms and Architectures for Parallel Processing ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings ent://SD_ILS/0/SD_ILS:81211 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Wang, Guojun. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-27161-3">http://dx.doi.org/10.1007/978-3-319-27161-3</a><br/>Format:&#160;Electronic Resources<br/> Formal Aspects of Component Software 10th International Symposium, FACS 2013, Nanchang, China, October 27-29, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:76670 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fiadeiro, Jos&eacute; Luiz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07602-7">http://dx.doi.org/10.1007/978-3-319-07602-7</a><br/>Format:&#160;Electronic Resources<br/> Software Language Engineering 6th International Conference, SLE 2013, Indianapolis, IN, USA, October 26-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:75165 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Erwig, Martin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02654-1">http://dx.doi.org/10.1007/978-3-319-02654-1</a><br/>Format:&#160;Electronic Resources<br/> Technology and Practice of Passwords International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers ent://SD_ILS/0/SD_ILS:80943 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mj&oslash;lsnes, Stig F. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24192-0">http://dx.doi.org/10.1007/978-3-319-24192-0</a><br/>Format:&#160;Electronic Resources<br/> Privacy Enhancing Technologies 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83293 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Cristofaro, Emiliano De. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39077-7">http://dx.doi.org/10.1007/978-3-642-39077-7</a><br/>Format:&#160;Electronic Resources<br/> Frontiers in Algorithmics and Algorithmic Aspects in Information and Management Third Joint International Conference, FAW-AAIM 2013, Dalian, China, June 26-28, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83203 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Fellows, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38756-2">http://dx.doi.org/10.1007/978-3-642-38756-2</a><br/>Format:&#160;Electronic Resources<br/> Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings ent://SD_ILS/0/SD_ILS:80922 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Akram, Raja Naeem. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-24018-3">http://dx.doi.org/10.1007/978-3-319-24018-3</a><br/>Format:&#160;Electronic Resources<br/> Big Data Integration Theory Theory and Methods of Database Mappings, Programming Languages, and Semantics ent://SD_ILS/0/SD_ILS:75582 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Majkić, Zoran. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-04156-8">http://dx.doi.org/10.1007/978-3-319-04156-8</a><br/>Format:&#160;Electronic Resources<br/> Medical Content-Based Retrieval for Clinical Decision Support Third MICCAI International Workshop, MCBR-CDS 2012, Nice, France, October 1, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82688 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Greenspan, Hayit. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36678-9">http://dx.doi.org/10.1007/978-3-642-36678-9</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 15th International Conference, PROFES 2014, Helsinki, Finland, December 10-12, 2014. Proceedings ent://SD_ILS/0/SD_ILS:78634 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Jedlitschka, Andreas. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-13835-0">http://dx.doi.org/10.1007/978-3-319-13835-0</a><br/>Format:&#160;Electronic Resources<br/> Product-Focused Software Process Improvement 14th International Conference, PROFES 2013, Paphos, Cyprus, June 12-14, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83349 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Heidrich, Jens. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39259-7">http://dx.doi.org/10.1007/978-3-642-39259-7</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I ent://SD_ILS/0/SD_ILS:85707 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format:&#160;Electronic Resources<br/> Advances in Cryptology &ndash; ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II ent://SD_ILS/0/SD_ILS:85708 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format:&#160;Electronic Resources<br/> Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83853 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Palamidessi, Catuscia. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-41157-1">http://dx.doi.org/10.1007/978-3-642-41157-1</a><br/>Format:&#160;Electronic Resources<br/> Smart Card Research and Advanced Applications 11th International Conference, CARDIS 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:82850 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Mangard, Stefan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-37288-9">http://dx.doi.org/10.1007/978-3-642-37288-9</a><br/>Format:&#160;Electronic Resources<br/> Public-Key Cryptography -- PKC 2015 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 -- April 1, 2015, Proceedings ent://SD_ILS/0/SD_ILS:85482 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Katz, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-46447-2">http://dx.doi.org/10.1007/978-3-662-46447-2</a><br/>Format:&#160;Electronic Resources<br/> Information Assurance and Security Education and Training 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gon&ccedil;alves, RS, Brazil, July 27-31, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:83386 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Dodge, Ronald C. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39377-8">http://dx.doi.org/10.1007/978-3-642-39377-8</a><br/>Format:&#160;Electronic Resources<br/> Web Technologies and Applications APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings ent://SD_ILS/0/SD_ILS:77790 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Han, Weihong. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11119-3">http://dx.doi.org/10.1007/978-3-319-11119-3</a><br/>Format:&#160;Electronic Resources<br/> Evaluation of Novel Approaches to Software Engineering 6th International Conference, ENASE 2011, Beijing, China, June 8-11, 2011. Revised Selected Papers ent://SD_ILS/0/SD_ILS:81912 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Maciaszek, Leszek A. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-32341-6">http://dx.doi.org/10.1007/978-3-642-32341-6</a><br/>Format:&#160;Electronic Resources<br/> Security and Privacy in Communication Networks 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers ent://SD_ILS/0/SD_ILS:82750 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Keromytis, Angelos D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-36883-7">http://dx.doi.org/10.1007/978-3-642-36883-7</a><br/>Format:&#160;Electronic Resources<br/> Design Thinking Research Building Innovation Eco-Systems ent://SD_ILS/0/SD_ILS:74763 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Leifer, Larry. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-01303-9">http://dx.doi.org/10.1007/978-3-319-01303-9</a><br/>Format:&#160;Electronic Resources<br/> Business Process Models. Change Management ent://SD_ILS/0/SD_ILS:83157 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Gerth, Christian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38604-6">http://dx.doi.org/10.1007/978-3-642-38604-6</a><br/>Format:&#160;Electronic Resources<br/> Modelling Foundations and Applications 9th European Conference, ECMFA 2013, Montpellier, France, July 1-5, 2013. Proceedings ent://SD_ILS/0/SD_ILS:83275 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Gorp, Pieter Van. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-39013-5">http://dx.doi.org/10.1007/978-3-642-39013-5</a><br/>Format:&#160;Electronic Resources<br/> Collaborative Systems for Reindustrialization 14th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2013, Dresden, Germany, September 30 &ndash; October 2, 2013, Proceedings ent://SD_ILS/0/SD_ILS:83696 2026-04-02T03:40:15Z 2026-04-02T03:40:15Z by&#160;Camarinha-Matos, Luis M. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-40543-3">http://dx.doi.org/10.1007/978-3-642-40543-3</a><br/>Format:&#160;Electronic Resources<br/>