Your search for 32649 returns 3707 document(s) |
Trus based instrusion detection scheme for secure data transfer, Hal. 651-658 |
Author: Mehfuz, Shabana; Doja, M.N.; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658 |
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cross-selling's sampling with clustering approach for large instrusion detection data. hal, 53 |
Author: Eko K. Bdiardjo, Bayu Adhi Tama; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimized sampling with clustering approach for large instrusion detection data. hal, 56 |
Author: Nani yasmin, Anto Satriyo Nugroho, Harya Widiputra; | Call Number: SEM-317 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan host-based instrusion detection system berbasis artificial neural network, HAL. B.69-B.74 |
Author: Bondan Himawan, Taufiq Hidayat; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
WAPI Secure Access Authentication Scheme for Heterogeneous Network Based on Identity-Based Cryptograph (130-135) |
Author: FENG Tao
JIAO Jian; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597 |
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Pengembangan prototipe sistem secure data transfer secara offline menggunakan teknologi smart card dan near field communication (NFC) pada perangkat android |
Author: Ruhush, Shoalihin; | Call Number: SK-1390 (Softcopy SK-872) Source code SK-563 | Type: Skripsi
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Hybrid face detection algorithm based on a data mining approach |
Author: E. Fattahi, A. Broumandnia; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementation of parallel BACON-MVV method based on data decomposition in intrusion detection system, Hal. 85-90 |
Author: Lely Hiryanto; Andri Muliawan, Dyah Erny Herwindiati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|