Skip to content
Toggle navigation
VuFind
Your Account
Log Out
Login
Language
English
Malay
中文(简体)
Tamil
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Evaluating intrusion detection...
Description
Cite this
Text this
Email this
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
Save to List
Evaluating intrusion detection systems in a Unix-based environment / by Mazni Zambri.
Saved in:
Bibliographic Details
Main Author:
Mazni, Zambri
Format:
Thesis
Published:
2003
Subjects:
QA Mathematics
Online Access:
http://pendeta.um.edu.my/client/en_AU/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:694666/ada?qu=Mazni+Zambri
http://pendeta.um.edu.my/client/en_AU/default/search/detailnonmodal/ent:$002f$002fSD_ILS$002f0$002fSD_ILS:694666/ada?qu=Mazni+Zambri
http://studentsrepo.um.edu.my/2952/1/PENDAHULUAN.pdf
http://studentsrepo.um.edu.my/2952/2/KANDUNGAN.pdf
http://studentsrepo.um.edu.my/2952/3/ABSTRAK.pdf
http://studentsrepo.um.edu.my/2952/4/BAB_1.pdf
http://studentsrepo.um.edu.my/2952/5/BAB_2.pdf
http://studentsrepo.um.edu.my/2952/6/BAB_3.pdf
http://studentsrepo.um.edu.my/2952/7/BAB_4.pdf
http://studentsrepo.um.edu.my/2952/8/BAB_5.pdf
http://studentsrepo.um.edu.my/2952/9/BAB_6.pdf
http://studentsrepo.um.edu.my/2952/10/BAB_7.pdf
http://studentsrepo.um.edu.my/2952/11/BAB_8.pdf
http://studentsrepo.um.edu.my/2952/12/LAMPIRAN.pdf
http://studentsrepo.um.edu.my/2952/13/BIBLIOGRAFI.pdf
Tags:
Add Tag
No Tags, Be the first to tag this record!
Holdings
Description
Comments
Preview
Collection Items
Description
Description not available.
Similar Items
A brief introduction to intrusion detection system
by: A. B., Mohamed, et al.
Published: (2012)
The effectiveness of detection methods in intrusion detection systems / by Hafiz bin Mohd Sarim.
by: Mohd Sarim, Hafiz
Published: (2002)
Anomaly intrusion detection based on fuzzy logic and data mining
by: Idris, Norbik Bashah, et al.
Published: (2006)
Intrusive system calls analysis for intrusion detection system
by: Ramakrishna, Pathmenanthan
Published: (2004)
Anomaly intrusion detection model using data mining techniques
by: Abdullah, Abdul Hanan, et al.
Published: (2006)
×
Loading...