Your search for 35706 returns 3834 document(s) |
Honeybee-based model to detect intrusion, (LNCS-Lecture Notes in Computer Science 5576) Hal. 598-607 |
Author: Ghassan Ahmed Ali; Aman Jantan; Abdulghani Ali; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient presentation of multivariate audit data for intusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2846) Hal. 63-75 |
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu, and Jia Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Trust-based security in pervasive computing environments, page 154 |
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Normal Based Subdivision Scheme for Curve Design, page 243-260 |
Author: X. Yang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
General scheme of region competition based on scale space, page 1366 |
Author: M. Tang And S. Ma | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Improved CRT-based broadcast authentication scheme in WSNs, hal. 47-50 |
Author: Yunjie Zhu, YuShen; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Full disk encryption based on virtual machineb and ken recovery scheme, 217-222 |
Author: Min Liang, Jiang-ke Xu; | Call Number: SEM-347 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Networking Scheme for Transmission Line Monitoring System Based on loT (180-184) |
Author: ruixue LI
Jianming LIU
Xiangzhen LI; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A Semantic Broadcast Scheme for a Mobile Environment based on Dynamic Chunking (522-229) |
Author: K. Lee
H. Leong
A. Si; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|