Search Result Save to File Save as CSV
Your search for 45944 returns 250 document(s)
Measuring The Effect of Classification on Music Retrieval Performance (147-151)
Author: Hendy Kusumo Nugroho Mirna Adriani; | Call Number: SEM-297 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
The Effect of Nogood Learning in Distributed Constraint Satisfaction (169-179)
Author: M. Yakoo K. Hirayama; | Call Number: SEM-287 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Algoritma enkripsi citra digital dengan kombinasi dua CHAOS MAP dan penerapan teknik selektif terhadap BIT-BIT MSB ( hal. G-1 - G-6 )
Author: Rinaldi Munir; | Call Number: SEM-365 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Memetic evolutionary meta-heuristic attack on simplified data encyption standard algorithms
Author: Poonam Garg; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Modified RAP-WOTA for Preventing Man in the Middle and Replay Attack (73-78)
Author: Zianita Syafrilah Anang Adi Permana Annisa Dini Handayani; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Verifiable E-Voting with Resistance against Physical Forced Abstention Attack (85-90)
Author: Misni Harjo Suwirto Sabyasachi Dutta; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Study on the Method to Prevent the DDoS TCP SYN Flood Attack (V1-671 -- V1-674)
Author: Cungao Min; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Threat Risk Analysis for Cloud Security based on Attack-Defense Trees (106-111)
Author: Ping Wang Wen-Hui Lin Pu-Tsun Kuo Hui-Tang Lin Tzu Chia Wang; | Call Number: SEM-314 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next