Suggested Topics within your search.
Suggested Topics within your search.
Intrusion detection systems (Computer security). Computer network security. Hackers
9
Computer networks. General works. Traffic monitoring
5
Detectors. Sensors. Sensor networks
4
Electronic Computers. Computer Science
3
Computer networks. Electronic information resources . Including the Internet
2
Information services. Information centers
2
Online data processing
2
Software protection
2
Web-based user interfaces. User interfaces (Computer systems)
2
Accounting. Bookkeeping
1
Application software
1
Balance sheets. Financial statements. Including corporation reports. Financial reporting. Financial disclosure
1
Coding theory
1
Communication of technical information
1
Computer engineering. Computer hardware
1
Computer network resources
1
Digital mapping
1
Educational games
1
Electronic commerce
1
Electronic information resources
1
Engineering mathematics. Engineering analysis
1
Evolutionary programming (Computer science). Genetic algorithms
1
Factor analysis. Principal components analysis. Correspondence analysis
1
Financial management. Business finance. Corporation finance
1
Groups and organizations
1
HG Finance
1
Immunology
1
Information technology. Information systems
1
Internet access. Internet access control
1
Library information networks
1
-
1Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
2Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
3by Kamarudin, Nur Khairani, Bismi, Nur Syafiqa, Ahmad Zukri, Nurul Hidayah, Mohd Fuzi, Mohd Faris, Ramle, RashidahSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2020
Get fulltext
View Fulltext in UiTM IR
Article -
4by Abd Halim, Iman Hazwam, Abu Hassan, Nur Muhammad Irfan, Razak, Tajul Rosli, Jamaluddin, Muhammad Nabil Fikri, Ismail, Mohammad HafizSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2019
Get fulltext
View Fulltext in UiTM IR
Article -
5Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
6
-
7
-
8by Hashim, Muhamad Arif, Abd Halim, Iman Hazwam, Ismail, Mohammad Hafiz, Mohd Noor, Norfaizalfarid, Mohd Fuzi, Mohd Faris, Mohammed, Abdul Hapes, JM. Gining, Ray AdderleySubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2017
Get fulltext
View Fulltext in UiTM IR
Article -
9by Osman, Mohd Nizam, Sedek, Khairul Anwar, Othman, Nor Arzami, Rosli, Muhammad Afiqhakimi, Maghribi, MushahadahSubjects: “...Local area networks (Computer networks)...”
Published 2021
Get fulltext
View Fulltext in UiTM IR
Article -
10by Kamarudin, Nur Khairani, Md Hasani, Nur Nazifa, Ruslan, Rafiza, Ramle, Rashidah, Ahmad Zukri, Nurul Hidayah, Abd Halim, Iman HazwamSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2018
Get fulltext
View Fulltext in UiTM IR
Article -
11Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
12Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
13by Mohd Fuzi, Mohd Faris, Abdullah, Khairunnisa, Abd Halim, Iman Hazwam, Ruslan, RafizaSubjects: “...Computer network resources...”
Published 2021
Get fulltext
View Fulltext in UiTM IR
Article -
14
-
15by Kritsana, Sukdee, Wattanapong, Rakwichian, Watchara, Wongpanyo, Bunyawat, Vichanpol, Chatkaew, ChailuechaGet fulltext
Published 2016
View Fulltext in UiTM IR
Article -
16
-
17
-
18
-
19Subjects: “...Computer networks. General works. Traffic monitoring...”
Get fulltext
View Fulltext in UiTM IR
Article -
20