استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Encyclopedia of data warehousing and mining /
Investigative data mining for security and criminal detection /
Modern data warehousing, mining, and visualization : core concepts /
Data mining : concepts and techniques /
Intelligent data mining : techniques and applications /
Data warehousing fundamentals for IT professionals /
Data mining : practical machine learning tools and techniques /
Oracle data warehousing and business intelligence solutions /
Research and trends in data mining technologies and applications /
Introduction to Data Mining /
Knowledge-based business intelligence depends on data mining technique \
Data and knowledge protection in data mining \
Knowledge discovery and data mining : challenges and realities /
Web data mining : exploring hyperlinks, contents, and usage data /
Quality measures in data mining /
Principles of data security /
Principles of data mining /
Data mining introductory and advanced topics /
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Visualizing discovered knowledge in databases mining \
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Fundamentals of database systems /
Fundamentals of data mining in genomics and proteomics /
Evaluating the Performance of Multiple Sequence Alignment Algorithms with Application to Genotyping SARS-CoV-2 for Saudis Population /
Mining the social web /
Visualization of Arabic Entities in Online Social Media using Machine Learning /
Handbook of research on fuzzy information processing in databases /
Cyberbullying Detection Using Text Mining Techniques and Semantic Resources in the Arabic Language / By Alanood Hamad Abdulaziz supervised by Muhammad Badruddin Khan
Automatic Temporal Classification of Arabic Texts /
Advanced data mining and applications : second international conference, ADMA 2006, Xi'an, China, August 14-16, 2006 : proceedings /
Features Selection for Image Steganalysis Using Swarm Intelligence /
Intelligent information processing and web mining : proceedings of the international IIS: IIPWM'06 conference held in Ustron, Poland, June 19-22, 2006 /
A Unified Framework for Automating Software Security Analysis in DevSecOps /
Data Warehousing and Data Mining Techniques for Cyber Security /