Your search for 44160 returns 3831 document(s) |
Computer fraud and cuntermeasures/ Leonard I. Krauss |
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perancangan host-based instrusion detection system berbasis artificial neural network, HAL. B.69-B.74 |
Author: Bondan Himawan, Taufiq Hidayat; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Perbandingan intelligent deicision support system dan genetic algorithm dalam mendeteksi penyusunan (intrusion detection) jaringan komputer, Hal. 66-70 |
Author: Wiwin Suwarningsih; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Implementation of parallel BACON-MVV method based on data decomposition in intrusion detection system, Hal. 85-90 |
Author: Lely Hiryanto; Andri Muliawan, Dyah Erny Herwindiati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The construction of indonesian-english cross language plagiarism detection system using fingerprinting technique |
Author: Zakiy Firdaus Alfikri and Ayu Purwarianti | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 1 February 2012 | Type: UI-ana Indek Artikel
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisa Dan Perancangan Intrusion Detection System (IDS) Pada Jaringan Nirkabel Stikom Dinamika Bangsa |
Author: Kurniabudi; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analisa Dan Perancangan Intrusion Detection System (IDS) Pada Jaringan Nirkabel Stikom Dinamika Bangsa |
Author: Kurniabudi; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
TIDOA- Trilaterlation Algorithm for Position and Trajectory Detection of Ballistic Rockets Secondar Radar System ( hal. 139- 144 ) |
Author: Darjat , Shulchul Chabib Achmad , Yuli Christiyono , Sumardi , Wahyu Widada; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145) |
Author: Ganesh Subramanian
Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Quantitative system performance computer system analysis using queueing network models |
Author: Lazowska, Edward D.; | Call Number: 621.381 9 Laz q | Type: Buku
|
Find Similar |
Add To Favorites |
Detail in New Window
|