Search Result Save to File Save as CSV
Your search for 44160 returns 3831 document(s)
Computer fraud and cuntermeasures/ Leonard I. Krauss
Author: Krauss, Leonard I.; | Call Number: 364.168 Kra c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Perancangan host-based instrusion detection system berbasis artificial neural network, HAL. B.69-B.74
Author: Bondan Himawan, Taufiq Hidayat; | Call Number: SEM-283 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Perbandingan intelligent deicision support system dan genetic algorithm dalam mendeteksi penyusunan (intrusion detection) jaringan komputer, Hal. 66-70
Author: Wiwin Suwarningsih; | Call Number: SEM-276 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Implementation of parallel BACON-MVV method based on data decomposition in intrusion detection system, Hal. 85-90
Author: Lely Hiryanto; Andri Muliawan, Dyah Erny Herwindiati; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The construction of indonesian-english cross language plagiarism detection system using fingerprinting technique
Author: Zakiy Firdaus Alfikri and Ayu Purwarianti | Call Number: JURNAL ILMU KOMPUTER DAN INFORMASI, Vol. 5 No. 1 February 2012 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa Dan Perancangan Intrusion Detection System (IDS) Pada Jaringan Nirkabel Stikom Dinamika Bangsa
Author: Kurniabudi; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Analisa Dan Perancangan Intrusion Detection System (IDS) Pada Jaringan Nirkabel Stikom Dinamika Bangsa
Author: Kurniabudi; | Call Number: SEM-356 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
TIDOA- Trilaterlation Algorithm for Position and Trajectory Detection of Ballistic Rockets Secondar Radar System ( hal. 139- 144 )
Author: Darjat , Shulchul Chabib Achmad , Yuli Christiyono , Sumardi , Wahyu Widada; | Call Number: SEM-367 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient and Secure Routing Protocol for Wireless Sensor Networks using Mine Detection (An Extension of Triple Umpiring System for WSN) (141-145)
Author: Ganesh Subramanian Dr.R.Amutha; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Quantitative system performance computer system analysis using queueing network models
Author: Lazowska, Edward D.; | Call Number: 621.381 9 Laz q | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next