Search Result
Save to File
Your search for
36497
returns
6017
document(s)
Implementation of parallel BACON-MVV method based on data decomposition in intrusion detection system, Hal. 85-90
Author: Lely Hiryanto; Andri Muliawan, Dyah Erny Herwindiati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Trust based intrusion detection scheme for secure data transfer, HAL. 651-658
Author: Shabana Mehfuz and M.N. Doja; | Call Number: SEM-291A | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A data mining framework for building intrusion detection models based on IPv6, (LNCS-Lecture Notes in Computer Science 5576) Hal 608-618
Author: Zenghui Liu; Yingxu Lai; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Intrusion Detection Systems and Multisensor Data Fusion
Author: Tim Bass | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
A Feature-based Lane Detection System using Hough Transform Method (17)
Author: Muhammad Azwan Nasirudin Mohd Rizal Arshad; | Call Number: SEM-307 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Efficient presentation of multivariate audit data for intrusion detection of web-based internet services, (LNCS-Lecture Notes in Computer Science 2576) Hal 63-75
Author: Zhi Guo; Kwok-Yan Lam; Siu-Leung Chung; Ming Gu; Jia-Guang Sun; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Impelentasi intrusion detection system pada router WRT54G untuk pengamanan jaringan wireles, HAL. C.145-C.169
Author: Arif Firmanwan; Fathul Wahid; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Intrusion detection dan reporting system berbasis mobile agent, Hal. 439-443
Author: P. Tri Riska Ferawan Widiasrini; | Call Number: SEM-271 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Domain specifict intented use evaluation method: intrusion detection spesific intented use evaluation method, (LNCS-Lecture Notes in Computer Science 5576) Hal 778-787
Author: Albert Park; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Intrusion Detection Systems/ Dony Ariyus
Author: Ariyus, Dony; | Call Number: 004.65 Ari i | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next