Search Result Save to File Save as CSV
Your search for 53361 returns 1569 document(s)
A Process Control Approach to Cyber Attack Detection
Author: Nong Ye, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Konsep Penerapan dan Pencegahan : HACK ATTACK / Harianto Ruslim
Author: Ruslim, Harianto; | Call Number: 005.8 Rus k | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Design DDoS Attack Detector using NTOPNG (139-144)
Author: Grafika Jati Budi Hartadi akmal Gafar Putra Fahri Nurul M. Riza Iqbal Setiadi Yazid; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A Novel scheme for generating and transmitting UWB signals
Author: Mithilesh Kumar; Ananjan Basu; Shiban K. Koul | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Silent witness: a novel of computer crime/ by ed. Yourdon
Author: Yourdon; | Call Number: 364.168 You s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Memetic evolutionary meta-heuristic attack on simplified data encyption standard algorithms
Author: Poonam Garg; | Call Number: SEM-291B | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Computer based attack on RSA algorithm and its future credibility, HAL. 635-638
Author: Dinesh Dhawan, Swami Sarvanand; | Call Number: SEM-290 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
1-Bit Insertion Attack Effect On Randomness Tolerance Of Random Bit Sequences (hal 203-208)
Author: Santi Indarjani; | Call Number: SEM-370 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Modified RAP-WOTA for Preventing Man in the Middle and Replay Attack (73-78)
Author: Zianita Syafrilah Anang Adi Permana Annisa Dini Handayani; | Call Number: SEM-373 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next